Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

signalarticles

CANES Experiments with Cloud Computing at Sea

August 21, 2014
By George I. Seffers

The Navy’s afloat network will benefit from cloud computing while enhancing cybersecurity.

CBP, Maryland Prisons Look to Industy for Cellular Phone Protective Technology

August 21, 2014
By Sandra Jontz

Defense contractor giant Lockheed Martin’s LUMEN technology aims to protect cellular phone users from rogue, spoofing systems.

From CERDEC's Outreach Program STEMs a New Generation of Scientists

August 20, 2014
By Sandra Jontz

For two decades, CERDEC’s Outreach Program has offered a host of courses to get students, from elementary- through college-aged, excited about careers in science, technology, engineering and mathematics.

Game On: Businesses Use Techniques from the Gaming World to Increase Engagement

August 14, 2014
By Cyndy Hogan

The business world is taking a cue from the gaming world, increasingly using a system of incentives and old-fashioned competition to spur engagement. Gamification, which started out on video game screens with top score designations and leaderboards, is now helping companies meet real-life objectives.

Iraq, Russia, Defense Hot Topics for U.S., Australia Dialogue

August 14, 2014
By Rita Boland

Foreign fighters, general Middle East unrest and how to handle the unfolding events in Ukraine led interests during the Australia-United States Ministerial Consultation 2014 discussion.

RoboSubs Transform from Toys to Warfighter Tools

August 8, 2014
By George I. Seffers

Navy competition launches technology innovation and student careers.

U.S. Army Prototypes to Ease Warfighters’ Reliance on GPS

August 7, 2014
By Sandra Jontz

U.S. Army engineers developed technology prototypes aimed at weaning U.S. forces from dependence on GPS systems.

Bottom Up! Tool Transfers Unclassified Data to Classified Networks

August 6, 2014
By Rita Boland

A small form factor device that will allow communications from low-level unclassified networks up to high-level secret classified networks has completed the development stage and is in the process of transferring to its new program.

Big Data and Cybersecurity Key Players in Dynamic M&A Market

July 31, 2014
By Sandra Jontz

A whirlwind of big companies buying smaller, high-quality companies is setting up 2014 as a huge year for mergers and acquisitions.

Cybersecurity Challenges Vex Planners, Responders

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford.

Pages

Subscribe to signalarticles