search menu icon-carat-right cmu-wordmark

Subject: Handheld Devices

Context-Aware Computing in the DoD

Context-Aware Computing in the DoD

• SEI Blog
Jeff Boleng

In their current state, wearable computing devices, such as glasses, watches, or sensors embedded into your clothing, are obtrusive. Jason Hong, associate professor of computer science at Carnegie Mellon University, wrote in a 2014 co-authored article in Pervasive Computing that while wearables gather input from sensors placed optimally on our bodies, they can also be "harder to accommodate due to our social context and requirements to keep them small and lightweight."...

Read More
HTML5 for Mobile Software Applications at the Edge

HTML5 for Mobile Software Applications at the Edge

• SEI Blog
Grace Lewis

Many warfighters and first responders operate at what we call "the tactical edge," where users are constrained by limited communication connectivity, storage availability, processing power, and battery life. In these environments, onboard sensors are used to capture data on behalf of mobile applications to perform tasks such as face recognition, speech recognition, natural language translation, and situational awareness. These applications then rely on network interfaces to send the data to nearby servers or the cloud...

Read More
Establishing Trust in the Wireless Emergency Alerts Service

Establishing Trust in the Wireless Emergency Alerts Service

• SEI Blog
Carol Woody

The Wireless Emergency Alerts (WEA) service went online in April 2012, giving emergency management agencies such as the National Weather Service or a city's hazardous materials team a way to send messages to mobile phone users located in a geographic area in the event of an emergency. Since the launch of the WEA service, the newest addition to the Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System (IPAWS),"trust" has emerged as a...

Read More
 Jun 10 2013 Situational Awareness Mashups at the Tactical Edge

Jun 10 2013 Situational Awareness Mashups at the Tactical Edge

• SEI Blog
Soumya Simanta

Warfighters in a tactical environment face many constraints on computational resources, such as the computing power, memory, bandwidth, and battery power. They often have to make rapid decisions in hostile environments. Many warfighters can access situational awareness data feeds on their smartphones to make critical decisions. To access these feeds, however, warfighters must contend with an overwhelming amount of information from multiple, fragmented data sources that cannot be easily combined on a small smartphone screen....

Read More
Equipping the Soldier with End-User Programming

Equipping the Soldier with End-User Programming

• SEI Blog
Edwin Morris

Whether soldiers are on the battlefield or providing humanitarian relief effort, they need to capture and process a wide range of text, image, and map-based information. To support soldiers in this effort, the Department of Defense (DoD) is beginning to equip soldiers with smartphones to allow them to manage that vast array and amount of information they encounter while in the field. Whether the information gets correctly conveyed up the chain of command depends, in...

Read More
A New Approach for Handheld Devices in the Military

A New Approach for Handheld Devices in the Military

• SEI Blog
Edwin Morris

Many people today carry handheld computing devices to support their business, entertainment, and social needs in commercial networks. The Department of Defense (DoD) is increasingly interested in having soldiers carry handheld computing devices to support their mission needs in tactical networks. Not surprisingly, however, conventional handheld computing devices (such as iPhone or Android smartphones) for commercial networks differ in significant ways from handheld devices for tactical networks. For example, conventional devices and the software that...

Read More