by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : October 2015
GameChanger Game ChanGinG TeChnoloGy To meeT aGenCy missions SponSored report MobiliTy The need for strong security is a given in today’s mobile world. And for federal agencies, the stakes are higher. The proliferation of the Bring Your Own Device (BYOD) movement has been a game-changer. Without the right tools, these devices increase the risks of sensitive information getting into the wrong hands. It’s a challenge, but not insurmount- able. Starting with a mobile device with built-in security and layering the latest security tools on top, agencies can be confident in securely expanding mobile programs. The first step is to choose a solid mo- bile device with built-in security features like root detection, secure boot, authenti- cation, data encryption, local/auto wipe, device lock, secure managed containers and even fingerprint identification. With those solid security features as a baseline, the next step is to add endpoint management and security tools on top. Enterprise Mobility Management (EMM) systems include most features agencies need. EMM combines some of the most effective products of the past, including Mobile Device Management (MDM), Mobile Application Management (MAM) and Mobile Content Management. The typical EMM feature set includes: Password management Lock and find devices Remote device wipe Role-based access control Encrypted application transmission Secure application distribution Authentication of users before they can access documents and data Limited access to third-party applications Of course, all of the technology in the world won’t work to its full potential if employees aren’t trained in mobile security. That means enforcing policies, such as avoiding public Wi-Fi, consistent password use and never clicking on unknown e-mail links. Federal agencies today expect mobility to improve productivity and efficiency in many areas, from telework and fieldwork to telehealth and inventory management. As technology improves and developers gain experience, agencies continue to push the envelope. They’re squeezing more functionality and innovation out of mobile devices and applications. Here are some examples of innovative mobility in action throughout the federal government: Protecting the food supply: The FDA’s Field Investigator Tool with Map- ping (FIT-MAP) lets employees with Windows mobile devices use geo-tags to collect more detailed, location-specific data. With this information, the agency can analyze and create situational aware- ness of threats to the food supply. Keeping our borders safe: Immigra- tion and customs enforcement agents now have a mobile biometrics app. The app can quickly process fingerprints, transfer photos, and compare them with existing records. Instead of taking hours or longer to identify persons of interest, it now takes only minutes. Saving lives: PTSD and suicide prevention are genuine concerns for the military. Using an app called POS REP, veterans can get push notifications of peers and activities near their location. Its developers call it “the social network for the 0.5 percent.” Fast, automated building upkeep: Instead of individually checking every component of a building to ensure it’s ready for occupancy, GSA’s Public Build- ing Service will use a system based on Google Glass. This lets inspectors take photos, scan barcodes and dictate notes by voice. The report is then sent to a content management system. Connecting with citizens via social media: The Interior Department re- cently experimented with Periscope; a live streaming video app that lets users watch and broadcast video from all over the world. The goal is to improve citizen interaction. Other agencies are watching this carefully. secure Mobility: better than before With Mobility, the sky is the Limit As teChnoLoGy iMproves And deveLopers GAin experienCe, AGenCies Continue to push the enveLope. ALL of the teChnoLoGy in the WorLd Won’t Work if eMpLoyees Aren’t trAined in MobiLe seCurity.
September 30, 2015
November and December 2015