Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Search

Search results

  1. PlugFest Wraps With Cyber Focus in Baltimore, Looks Ahead

    ... source was malicious or benign. “I can send out the IP (internet protocol) address, and I can determine whether this IP is associated ... a real-world crime at San Diego State University, where he works. “One of our students was shot and killed. We looked at social ...

    Woodwing - 09/12/2012 - 10:26 - 0 comments

  2. InternetWorks: Show Me the Money

    ... offered. When visiting new Web sites, please use proper Internet security procedures. Tags:  Internet Works ...

    Rita Boland - 06/17/2010 - 13:44 - 0 comments

  3. Making Battlefield Intelligence "iPad Easy"

    ... Wells and his team already had some enhancements in the works that would meet the warfighters’ urgent operational needs. Those ... with a Web browser and with access to either the secret Internet protocol router network or the coalition network. Because it can be ...

    SIGNAL - 09/12/2012 - 19:48

  4. Plug-and-Play Biometrics

    ... devices and clients connected on a network or through the Internet. “We did a lot of work to make it modality-agnostic,” Kevin ... specification. “So we spent a lot of time making sure this works well with computer-aided software engineering tools,” Mangold states. ...

    Helen Mosher - 09/05/2012 - 15:56 - 0 comments

  5. Video Beyond YouTube

    ... original video content is made for the interactive Internet. No full-length television episodes or movies are cut and posted ... clips and creative work. Tags:  Internet Works ...

    Rita Boland - 10/02/2009 - 14:27 - 0 comments

  6. The Mobile Evolution Becomes a Revolution

    ... we do our work.” Developments such as ubiquitous broadband Internet connections, wireless access to broadband connections, Web services, ... “Now, we have mobile devices in a form factor that works for us,” she says. “Whereas, in the past, the mobile device of choice ...

    SIGNAL - 07/02/2012 - 00:00

  7. An Approaching Cyber Storm Includes New Threats

    ... as its newest operational domain, and Lambo’s unit works daily with the Defense Department to help integrate its cyber defense ... Participants responded to simulated attacks focusing on the Internet’s Domain Name System (DNS) and on the so-called Internet chain of ...

    SIGNAL - 06/27/2012 - 00:00

  8. WIN-T Marches Forward

    ... in theater,” Col. Swanson states. Because it is an Internet protocol network, WIN-T should be interoperable with the Army’s ... Army-issued extended cold weather clothing system, or ECWCS, works with WIN-T Increment 2 equipment during the January 2012 CWNET test in ...

    SIGNAL - 06/27/2012 - 00:00

  9. Defending the Systems Supplying Everyday Life

    ... Security Program in the Department of Homeland Security works to protect the computer control systems vital to the delivery of services ... factor is the ready availability of information on the Internet regarding how these systems work. In addition, attacks via the ...

    SIGNAL - 03/01/2012 - 00:00

  10. Technology Impels Command and Control Changes

    ... in the world, with its ability to tap into the global Internet to provide access to the full information spectrum. Because ... offers. In addition to the alliance’s 28 nations, NATO works with other countries in a variety of operations. In Afghanistan, 50 ...

    SIGNAL - 05/10/2012 - 00:00

Pages