signalarticles

Digitized Battlefield Elements Tested for Joint Environment

May 2000
By Robert K. Ackerman
E-mail About the Author

The drive to speed new military information system technologies to the field, coupled with an increased reliance on commercial off-the-shelf products, is posing new interoperability problems for communicators. Many of these systems must interoperate in an increasingly networked environment with legacy equipment or foreign counterparts in coalition operations.

U.S. Forces in Asia Map Out Consolidated Wide Area Network

May 2000
By Lt. Col. James G. O’Donnell, USA (Ret.)

Communications specialists are proposing that the U.S. Forces-Korea change engineering and management approaches and follow the lead of commercial Internet service providers. The plan offers wide area network transmission bandwidth between the global defense information infrastructure and command, control, communications, computers and intelligence systems users on the Korean Peninsula, and it addresses several problems with the existing data network there.

Remotely Operated Communications To Link British Forces in Balkans

May 2000
By Henry S. Kenyon

British forces in Bosnia and Herzegovina and Kosovo will receive a new, highly automated communications network designed to reduce staffing requirements. Part of an ambitious 28-week program by the United Kingdom's Ministry of Defence, it will replace a manpower-intensive system currently in use, allowing roughly 260 Royal Signal Corps personnel to be reassigned. Made entirely from commercial technologies, all elements must be in place and operational by late August before the harsh Balkan winter begins.

Echoes of Chechnya Warfare Resound in Moscow, Quantico

May 2000
By Robert K. Ackerman
E-mail About the Author

Several months of Russian attacks have shifted the balance of power in Chechnya and changed U.S. thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year. Yet, according to U.S. analysts, this may have merely altered the thrust of battle, not resolved it. And, the tactics employed by both sides are forcing U.S. experts to take another look at the concept of urban warfare.

Internet Tax Analysts Encounter Legislative, Regulatory Minefield

May 2000
By Maryann Lawlor
E-mail About the Author

The passionate debate about whether to collect sales tax on purchases made over the Internet has politicians, economists and industry searching for the right course of action to continue unprecedented economic growth while supporting the flow of revenue to states or to countries. Experts on both sides of the issue have strong convictions, leaving the legislators with some very hard choices to make during the next several years.

Collaborative Input Capability Shortens Government Paper Trail

May 2000
By Henry S. Kenyon

A World Wide Web-based document coordination tool developed for the U.S. Army has become available for the entire federal government. The system enables multiple users to review a directive or regulation posted on a Web or intranet site and enter their comments. The recorded information is then used to modify the document efficiently as it moves toward completion.

Electronic Commerce Commands Canny Insight Into Hacker Moves

May 2000
By Clarence A. Robinson, Jr.

Profound Internet growth and the changes it generates in the economy and society is a double-edged sword. Electronic commerce benefits are fundamentally altering the way people produce, consume and communicate. Yet, risks and vulnerabilities are inherent network byproducts. Growing electronic threats mandate risk management, customer confidence and at least some level of information protection.

Providers Uncover Different Approach to Software Access

May 2000
By Sharon Berry

A new method of delivering software promises to reduce the cost and time required for infrastructure setup, software installation, maintenance and support. Known as the application service provider model, the approach reduces the burden on internal information systems resources and enables a predictable cost model for running programs.

Secure Remote Access System Unlocks Off-Site Availability

May 2000
By Roger Black

The adoption of networked systems and the prevalence of Internet use have created the potential for unauthorized access to critical data. U.S. Defense Department officials believe that uncontrolled Internet connections pose a significant and unacceptable threat to all of their information systems and operations. Ensuring secure transmissions and the authenticity of data while allowing users to connect from remote locations requires high levels of security.

Pages