Government should foster secure, NIST compliant, collaboration and crowdsourcing technologies within and across government agencies to make information sharing more efficient and effective. A variety of information is collected across agencies, and agency-specific security limitations inhibit information transfer. Creating one collaboration platform accessible across agencies will increase speed of communication and information ...more »
Government enterprise-wide mobile strategy cannot be limited to simply purchasing mobile devices. Agencies and departments need to recognize the need to establish short- and long-term plans and strategies for mobile deployment and mobile application development. Without a strategy for effectively using mobile in the federal space, mobile application and device deployment will be inefficient and costly.
The civilian side of the federal government currently has no common policies or guidelines in place on how to evaluate, validate, protect or secure mobile technologies - including mobile infrastructure, mobile devices, mobile apps, mobile data practices, etc. I suggest that the government create reasonable security guidelines so that the important work of protecting the federal computing infrastructure is not duplicated ...more »
Even in early draft form, a document like this that has the power to transform Government must address security at a fundamental level. If security is left to be bolted on by individual agency procurements, we'll end up increasing risks and costs. There should be some high level direction that the introduction of mobile must not increase the risks, and that a common set of standards (not products) across broad groups ...more »
A Mobile Strategy should not be developed in a vacuum from an agency’s Cloud Strategy. Mobility is dependent on where data is stored, how it is accessed, and how you can manipulate it. Understanding where and how an agency will store and secure the data that is necessary to make the applications useful and empower the end user will make a mobile strategy more effective. The Federal Mobility Strategy must integrate, ...more »
A federal identity management standard combined with set of mobile applications for communication (web, voice, text, e-mail, video), collaboration (online document sharing), productivity (word processing, spreadsheets, presentations, online publishing), HR, travel and expense reporting that would empower all federal workers to fully support their mission at any time from anywhere on any device.
Too often government strategic plans neglect legislative and regulatory requirements imposed on the agencies. Rightly the focus is on opportunities to modernize and participate in new models technical transformations can offer. For the Federal Mobility Strategy to be successful, it must be implementable without unduly exposing agencies to legal and administrative risks. Legal and regulatory requirements for security, ...more »
Implement a task command interface that allows a severely disabled user to "Ask What They Need to Know", "Say What They Want to Do" or access a Task Menu Display to perform application tasks and receive audio/visual feedback.
Analyze the proposed architecture for security and recovery defects.
Establish a government run wireless operator (MVNO) leased from a commercial carrier that meets the unique security and operational requirements of the Federal government.
Security personnel (ISSO) in the federal government are preventing federal employees from trying the different platforms or developing for the different platforms by preventing the purchase of certain devices over others. Security concerns are valid but they should not hinder innovation. Apple and Blackberry are the only supported devices where I work so we cannot play in the Android space for instance. So my idea ...more »
Before any major initiative can even be discussed, the US government MUST pass laws to protect online speech at the same levels of offline speech. This must include, but not be limited to: - Warrants to access GPS signals - Bans on data mining of personal data (including anonymized approaches) - Bans on roving wiretaps - Bans against Deep Packet Inspection - Strict limitations on acceptable uses of cookies - 4th amendment ...more »