Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Mobile Continues to Trickle in to the Military
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Culture/Leadership > Mobile Continues to Trickle in to the Military
Culture/LeadershipSocial Data

Mobile Continues to Trickle in to the Military

AlexOlesker
AlexOlesker
4 Min Read
SHARE

We’ve recently heard a few big announcements for mobile computing in the military, which has long been blocked by security issues.

We’ve recently heard a few big announcements for mobile computing in the military, which has long been blocked by security issues. First, the US Defense Information Systems Agency approved Dell Android 2.2 for use on Department of Defense networks with a few notable limitations. DoD users won’t be able to access either classified data or the Android app store.  

Currently only one device, the Dell Venue smartphone, runs Dell Android 2.2, so the benefits of mobile and BYOD (Bring Your Own Device) will not yet to be fully realized, but the future looks bright for Android in the military, with Dell planning more devices in the coming year to be rapidly integrated into DoD networks.  Mike McCarthy, director of operations for Brigade Modernization Command at Fort Bliss, Texas, expects an NSA-approved secure version of Android operating system in early 2012, leading to soldiers deploying with smartphones and tablets by the end of the year.

While Apple is having a harder time with the Army and NSA, it’s currently making headway with the Air Force, which will provide iPads to its Special Operations Command as “electronic flight bags” to replace physical maps and manuals. This limited deployment will be a test case for iPads and could lead to their adoption by the entire fleet of cargo aircraft and possible wider uses. The iPads will have WiFi but the Air Force is more concerned about information being lost through theft and is using the software GoodReader to encrypt individual files. While GoodReader by Goodi.Ware is a great app, it is primarily a PDF reader, and is not a security solution. Downloading PDFs is a very risky activity, which is why Invincea’s security software puts your PDF reader into a virtualized environment.

More Read

Who will manage Big Data?
9 Amazing Ways Big Data Is Used Today to Change the World
Kahneman and Data Management: A Critique of ‘Thinking Fast and Slow’
Mobile BI: An App or Just Another Report?
WOW! Big Data at Google

While these are all exciting developments for cutting costs and increasing capabilities, the DoD’s rush to adopt mobile raises some security concerns. As Adam Elkus noted, through cloud computing, mobile devices can even have tactical applications such as controlling a UAV, or can bring advanced analytics to the field. Tactical Nav, an app designed by U.S. Army captain Jonathan Springer to guide and coordinate artillery, has been used in combat and training.

But mobile security needs to be further addressed before widespread military deployment. As Bryan Halfpap mentions, government Android should concern you without the proper Mobile Risk Management solution such as Fixmo, derived from the NSA’s own software, to manage updates, encryption, and compensate for vulnerabilities. While Apple’s closed ecosystem means it faces much less malware, concerns have been raised over the iPad supply chain. Security for the Air Force iPads also seems lax as the tablets will be connecting to the Internet and downloading files. Though military mobile is a great trend, it seems that at least as much attention should be choosing great Mobile Risk Management solutions as the right brand of phone or tablet.

TAGGED:mobile
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Hottest Trends in Mobile BI

4 Min Read

A Small Idea with Big Implications

6 Min Read

The “Big Five” IT Trends of the Next Half Decade: Summarizing Hinchcliffe

19 Min Read

Meeting the Business Technology Needs of Midsized Companies

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?