signalarticles

Echoes of Chechnya Warfare Resound in Moscow, Quantico

May 2000
By Robert K. Ackerman
E-mail About the Author

Several months of Russian attacks have shifted the balance of power in Chechnya and changed U.S. thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year. Yet, according to U.S. analysts, this may have merely altered the thrust of battle, not resolved it. And, the tactics employed by both sides are forcing U.S. experts to take another look at the concept of urban warfare.

Internet Tax Analysts Encounter Legislative, Regulatory Minefield

May 2000
By Maryann Lawlor
E-mail About the Author

The passionate debate about whether to collect sales tax on purchases made over the Internet has politicians, economists and industry searching for the right course of action to continue unprecedented economic growth while supporting the flow of revenue to states or to countries. Experts on both sides of the issue have strong convictions, leaving the legislators with some very hard choices to make during the next several years.

Collaborative Input Capability Shortens Government Paper Trail

May 2000
By Henry S. Kenyon

A World Wide Web-based document coordination tool developed for the U.S. Army has become available for the entire federal government. The system enables multiple users to review a directive or regulation posted on a Web or intranet site and enter their comments. The recorded information is then used to modify the document efficiently as it moves toward completion.

Electronic Commerce Commands Canny Insight Into Hacker Moves

May 2000
By Clarence A. Robinson, Jr.

Profound Internet growth and the changes it generates in the economy and society is a double-edged sword. Electronic commerce benefits are fundamentally altering the way people produce, consume and communicate. Yet, risks and vulnerabilities are inherent network byproducts. Growing electronic threats mandate risk management, customer confidence and at least some level of information protection.

Providers Uncover Different Approach to Software Access

May 2000
By Sharon Berry

A new method of delivering software promises to reduce the cost and time required for infrastructure setup, software installation, maintenance and support. Known as the application service provider model, the approach reduces the burden on internal information systems resources and enables a predictable cost model for running programs.

Secure Remote Access System Unlocks Off-Site Availability

May 2000
By Roger Black

The adoption of networked systems and the prevalence of Internet use have created the potential for unauthorized access to critical data. U.S. Defense Department officials believe that uncontrolled Internet connections pose a significant and unacceptable threat to all of their information systems and operations. Ensuring secure transmissions and the authenticity of data while allowing users to connect from remote locations requires high levels of security.

Navy, Marine Corps Warfighters Gird for Multifaceted Missions

May 2000
By Robert K. Ackerman and Beverly P. Mowery
E-mail About the Author

The new network-centric U.S. Navy, flush with advanced information technologies, can expect greater challenges as it is tasked with more diverse and widespread operations well into the 21st century. Both the Navy and the U.S. Marine Corps will be dealing with major operational issues involving a longer military reach amid greater geopolitical tension and more complex coalition operations. And, both services will be relying on as yet unfielded technologies to fulfill their missions.

Fierce Competition and Demand Engender Grow or Die Mentality

April 2000
By Maryann Lawlor
E-mail About the Author

Telecommunication technologies allow people to reach out and touch someone in ways that were unimaginable just a few years ago. No longer restricted to voice-only transmissions, consumers are using the metal and fiber veins that run throughout the world to send data, images and even multimedia presentations worldwide. Companies that develop the technology and services that facilitate these connections are watching opportunities blossom. More importantly, they are fighting hard to stay ahead of a game in which ignoring a chance to provide in-demand services means handing your competitor the advantage.

Pages