Mobile Security and Data Integrity in Mobile Data Collection

COMMANDmobile enables survey data to be collected easily, quickly and securely.

Facebook: The privacy saga continues

The privacy saga continues (Photo credit: opensourceway)

Within the computing industry, it is a common practice for some companies such as marketers and computer software manufacturers to gather data about customers who use their computers, smartphones and tablet computers to access the Internet, a practice known as data mining. Organizations use this data to guide their manufacturing and marketing decisions, so that they will be more capable of providing a beneficial user experience to their customers and growing their business. [Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.

Mobile Computing And Its Uses In Arson Investigation

US Navy observer watches firefighters during aircraft firefighting training

US Navy observer watches firefighters during aircraft firefighting training (Photo credit: Wikipedia)

For arson investigators, determining the cause of a fire typically involves gathering sufficient data from multiple sources. After the fire is extinguished by first responders, investigators arrive at the fire scene, contact the team, define the scene’s boundaries and interview eyewitnesses such as first responders, property owners and tenants.

Investigators also collect evidence such as damage around the ignition source or sources, tool marks, fuel containers, bloodstains and latent prints to not only determine the type of fire but whether or not the fire was started by human activity. After the fire scene has been thoroughly processed, reviewed and released to its owners, an investigator will then create and submit paper-based incident reports to local, state and national databases, helping authorities to more easily identify trends and to develop new procedures and equipment. [Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.

National Security Issues in Cloud Computing

English: Cloud Computing Image

Cloud Computing Image (Photo credit: Wikipedia)

Cloud computing has resulted in greater agility, cost savings and efficiency for many companies and federal agencies, but also increases the vulnerability of crucial data and may threaten national security.

As the recent controversy concerning government contractor Edward Snowden has shown, data leakage not only causes financial losses to companies and federal agencies but also has implications for U.S. national security and international relations with other countries. [Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.

Data Security is an Organizational Cloud Computing Concern

English: Cloud Computing ImageRecent show that while IT executives and companies have become increasingly comfortable with the security of third-party cloud computing service providers, more than half are concerned about data security and compliance at the end user level.

People are bringing to work their own devices and using smartphone apps for data storage, communications and collaboration. This “shadow IT” — IT solutions built or used inside organizations without the company’s approval — is predicted to exceed 35% of enterprise IT expenditures by 2015, according to Gartner. [Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.

Mobile Security for Enterprise Data Collection Technologies

Mobile Security Challenges of Enterprise Data Collection Technologies:

mobile securityData security to and from mobile devices have the same problems and solution space as other data transmissions. Good encryption is the obvious solution for secure transmissions on commercial networks. While Public Key Infrastructure (PKI) has become the tool of choice for securing data and access from mobile devices to backend systems, physical security of local data on the device is also a threat. The use of Smart Card technology is one solution to this mobile security problem, and has been widely adopted by the United States Government for the implementation of physical infrastructure security. The issue with reliance on Smart Card technology for the newer mobile technologies is readers and hardware support for newer operating systems such as iOS and Android are very limited. [Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.

Mobile Data Collection and Physical Security Problem Management

physical securityThe ever-evolving physical security market is showing a number of trends in 2012, including the convergence of the Internet, physical access, network access and mobile phones; an increase in workforce mobility; the rise of “bring your own device to work,” or BYOD; and the significant growth of cloud computing.
[Read more…]

About DeAnna Davidson

DeAnna Davidson is a proven technologist and business leader who is passionate about the power of mobile computing to revolutionize a business or industry, and dedicated to helping organizations use mobile, wireless, and web technologies to their advantage.