by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : December 2012
"The application may not always be possible to launch, depending on where the employee is located," McCarthy said. "And it might not be compatible with every device that s out there." Johnson said another option is to deploy a virtual desktop infrastruc- ture. With VDI, an employee s les and applications remain in the agen- cy s database, whether that s on site or in the cloud, and employees access their unique "desktop" and work on it remotely using any device they want. A growing number of agencies are using VDI, including the Commerce Department and the Air Force. The major advantage of VDI, paired with strong multifactor authentica- tion, is that the agency s resources never leave the protective control of the IT department, and therefore, it is easier for employees to use their own devices for work. However, VDI is expensive and complicated to imple- ment across an enterprise, so agen- cies generally use it only in targeted scenarios where they can save money or boost productivity. Mobile device management is another critical tool for IT depart- ments as more employees are allowed to work remotely. MDM can reduce risks and costs by securing, moni- toring and supporting all employee devices. For example, MDM can check for viruses, facilitate software updates and security patches, guard against unintended data leakage, and remotely lock down and wipe clean lost or stolen devices. The hurdles How successful agencies are in using commercial wireless broadband net- works will ultimately depend on the amount of time and effort they re will- ing to put in at the very beginning of the process, Johnson said. "We are seeing movement in this direction, but it s to the extent that agencies can effectively address the policy needs, the back-end technology reality and the nance," he said. "There is a road map that needs to be followed in order to bring this to fruition." In the area of policy, agencies must realign their security rules and prac- tices to address the new reliance on wireless mobility, which might or might not include a bring-your-own- device environment. "In thinking about security, agen- cies clearly need to think about the back-end device management, device provisioning and obviously the secu- rity protocols," Haan said. "And those may differ between the agencies and between the data itself, whether it s publicly available data versus con - dential health care data versus truly national security data. These are all issues that must be fully thought through." Johnson noted that the variety of technological options can complicate matters. "There are a lot of disparate systems out there today, which could include different carriers and different platforms that don t necessarily inter- operate," he said. "So, for example, if I want to use applications on a smart device and they re being hosted on a number of different platforms, how do I make sure that all of my architectures actually integrate?" Finally, in today s increasingly aus- tere scal environment, agencies must determine how much it will cost to deploy, operate and maintain a more mobile environment using commercial wireless carriers and then make a busi- ness case for the technology. It is not an insurmountable hurdle, however. "Even in a tight budget crunch, you can deploy solutions in a certain sub- segment of an enterprise," Johnson said. "That s because to the extent that agencies can work out the policy and the technology, they ll use it." ■ H.B. Hatter is a freelance reporter based in Virginia who covers tech- nology and business. 28 December 2012 FCW.COM ExecTe c h Critical steps for adopting wireless broadband 1. Decide what you want to achieve. 2. Review best practices and lessons learned by other government agencies and the private sector. 3. Rethink and revise relevant policies, including those related to security. 4. Determine which employees need wireless mobile access and whether the efficiency or productivity benefits justify the added costs. 5. Develop a deployment strategy. 6. Choose a network carrier based on the provider's ability to sup- port your business requirements. 7. Plan and develop mobile applications for employees and the public to use to access your agency's resources.
November 30, 2012