US Military's Latest Field Recruit: The iPod
U.S. soldiers are being issued iPod touches; however, it's not a morale-boosting exercise or a way to combat boredom, but a low-cost way to give them access to important portable tools.
In the past, the Army gave soldiers dedicated electronic devices for key tasks such as on-the-spot translation. However, officials found this proved expensive, particularly when they had to issue different devices for different tasks. This approach also meant the military bore the costs of researching and developing the hardware and didn't get as many economies of scale as with consumer devices. (Source: cnet.com)
Soldiers Find Device Intuitive
Using the iPod Touch, and in some cases the iPhone, brings several advantages. It's considerably cheaper than most alternative technologies, since it's only a couple of hundred dollars. Many, if not most, soldiers have already used one in civilian life and thus need less training in its basic operation. And the intuitive design means most functions can be performed with a single thumb, making it less distracting and cumbersome in the field.
According to Newsweek, the military is funding the development of iPod applications specifically designed for the military. There's already an app which calculates ballistics trajectories and distance. Apps in the works include a remote control for a bomb disposal unit and a database of local information accessed by photographing a local street sign. (Source: newsweek.com)
Standard Features Also Useful
The devices' standard features have their uses, too. For example, soldiers can use the iPhone to record video messages from local tribal leaders to show to potentially hostile groups they encounter.
The obvious question is security. Newsweek reports an Army official saying the devices have yet to be successfully hacked, but it's not clear if the military has added extra security to the iPods it issues to soldiers. If that isn't the case, it seems risky to rely on a technology which, despite Apple's best efforts, is widely explored and dissected by enthusiasts.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.