iPads, Android tablets and smartphones join the military
Contractors build military apps for use with cheaper, consumer-grade devices
Computerworld - Shooting turtles or attacking enemy warplanes with game apps on an iPad is child's play compared to the apps two military contractors are planning for use with low-cost, consumer-grade tablets and smartphones.
For example, Harris, a Pentagon contractor with experience in commercial broadcast video products, is working on an app for Apple's iPad and other tablets that will allow a soldier on the ground to use touchscreen gestures to remotely move a camera aboard an Unmanned Aerial Vehicle (UAV) to find enemy weapons or troops, while watching what the camera sees on the tablet. The video information, combined with data about location and time, can be quickly transmitted using Harris video technology to a network manned by intelligence commanders around the globe who could make quick decisions about military targets.
Meanwhile, Pentagon contractor Intelligent Software Solutions (ISS) is readying a field test for Android and iPhone smartphone apps that will tell a soldier arriving in a war zone what fighting and bombings have already occurred at that precise location. Geo-mapping on the smartphones would be super-imposed with historical data sent wirelessly from a command center, showing the locations and types of encounters -- from shootings and bombings to arrests -- to better prepare troops on the ground.
The applications from Harris and ISS rely on relatively inexpensive smartphones and tablets, company officials said, either from Apple or various Android manufacturers. Such devices might cost $300 to $800 apiece, compared to super-rugged gear previously used in military operations that can cost $10,000 or more per device because they can withstand dust, drops and vibrations.
Another benefit to using commercially-available smartphones and tablets is that soldiers and other users know about them from civilian life, lessening the training time dramatically, an ISS executive said.
"We've seen first-hand what happens to a laptop used in the desert [in combat], so there's going to be some problem with...these [consumer handheld] devices that are fairly inexpensive and almost disposable," said Rob Rogers, vice president of national systems for ISS.
"But if they break or get dust in them, you don't have to shell out a lot to replace them," he said. "It's a trade-off. I would anticipate a lot of broken Androids and iPhones."
One of ISS's major goals is "to use off-the-shelf, widely used and generally accepted products...to drive down costs for the government," Rogers said.
Since so many military personnel know how to use newer smartphones and tablets, rolling them out to soldiers and other military and law enforcement personnel means "we will not need a week-long training session."
ISS has built its mobile intelligence visualization and event reporting application to run on multiple sizes of displays and form factors, Rogers explained. He would not disclose any terms or details of the ISS contract for the software with the Pentagon, however.
- iPad sales skew even more toward Mini
- Apple's Mac ends up in tablet cannibal pot, too
- The case for an iPad Pro
- Is Apple's 13-in. iPad a desktop for kids?
- Balky browsers tick off tablet owners
- The PC's fate hinges on tablets, but it's 2014 or bust
- iPhone, iPad dwarf mobile rivals in small- and mid-sized firms
- iPad grabs top spot in tablet purchase poll
- Tablets remain tops in American gift-buying plans
- iOS 7 now powers 3 out of 4 Apple devices
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts