Mobility for GCSS-MC through virtual PCs
Thompson, Steven K.
MetadataShow full item record
The ability for Marines to access Global Combat Support System-Marine Corps (GCSS-MC) through mobile devices such as tablets and smart phones would greatly improve their productivity. Mobile device access to GCSS-MC would allow Marines to access a required program for their mission using a form of computing device with which they are most familiar. Currently, there is not an approved mobile application designed for use with GCSS-MC or any approved mobile access method. Our research shows that the use of virtual PCs (VPCs) to access applications such as GCSS-MC is a secure and technologically feasible method to provide mobile access to GCSS-MC. By using VPCs, thin clients, such as mobile devices, are able to access computationally strenuous and high-network throughput applications with a device running on various operating systems with limited computational ability. The use of VPCs leads to a reduced need for network throughput and faster overall execution.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Schofield, Brandan R.; Snelgrove, Brittany (Monterey, CA; Naval Postgraduate School, 2019-09);The Marine Corps Operating Concept (MOC) outlines critical tasks which will have a significant impact on current Marine Corps logistics Major Automated Information Systems (MAIS), especially as tactical units operate in ...
Leonard, Timothy J.; Gallo, Philip (Monterey, California: Naval Postgraduate School, 2014-12);Global Combat Support System – Marine Corps (GCSS-MC) was created to combine both Logistics and Supply capabilities into one system. The existing systems of Asset Tracking Logistics and Supply System (Atlass) and PC Marine ...
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...