Ideas for the Mobility Strategy

Must include Security at the Core of this Dialogue

Even in early draft form, a document like this that has the power to transform Government must address security at a fundamental level. If security is left to be bolted on by individual agency procurements, we'll end up increasing risks and costs. There should be some high level direction that the introduction of mobile must not increase the risks, and that a common set of standards (not products) across broad groups ...more »

Submitted by

Voting

13 votes
Active

Ideas for the Mobility Strategy

Mobile Workplace for Government

A federal identity management standard combined with set of mobile applications for communication (web, voice, text, e-mail, video), collaboration (online document sharing), productivity (word processing, spreadsheets, presentations, online publishing), HR, travel and expense reporting that would empower all federal workers to fully support their mission at any time from anywhere on any device.

Submitted by

Voting

7 votes
Active

Ideas for the Mobility Strategy

Integrate Mobility Strategy with Cloud Strategy

A Mobile Strategy should not be developed in a vacuum from an agency’s Cloud Strategy. Mobility is dependent on where data is stored, how it is accessed, and how you can manipulate it. Understanding where and how an agency will store and secure the data that is necessary to make the applications useful and empower the end user will make a mobile strategy more effective. The Federal Mobility Strategy must integrate, ...more »

Submitted by

Voting

7 votes
Active

Ideas for the Mobility Strategy

Mobile Asset Management across the Federal Government

What if...? The Federal Government is the legal owner or tennant of tens or hundreds of thousands of servers, network and storage devices and probably millions of desktops and laptops worldwide... Imagine if a mobile app available on all pupular mobile devices could automatically scan, identify and assign location to every federal IT asset with a barcode. Then it could communicate that encrypted information over existing ...more »

Submitted by

Voting

1 vote
Active