The SIGNAL Blog

What's Hot in 2015 for the Evolution of Federal IT

January 28, 2015
By Ed Bender



With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.

Continuing Development for Interoperable ISR Systems for Military Services and Defense Agencies

January 15, 2015
By Ralph Wade



The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.

DISA Director Announces Reorganization Details

January 13, 2015

The Defense Information Systems Agency (DISA) is reorganizing to focus on five Cs: cyber, cloud, collaboration, and command and control, Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, announced Monday at a luncheon event hosted by AFCEA's Washington, D.C. Chapter.

The Bottom Line: Time to Dust Off the Basics

January 13, 2015
By Maryann Lawlor
E-mail About the Author


While cybersecurity is getting big play in the news these days—as it well should—three topics require just as much attention but have not yet hit the big time. Acquisition, spectrum and interoperability may not have the headline-grabbing charm of the hack into the U.S. Central Command’s Twitter account, but they are issues that need the same serious attention.

Letter to the Editor: Incoming, January 2015

January 12, 2015

In this Letter to the Editor, Michael Schmitt responds to the latest Incoming column regarding the definition of cyber attack. Do you agree or disagree? Let us know in the comments.

Guest Blog: Effectively Monitoring Video Traffic

January 5, 2015
By Ed Bender

Outside the world of government, video traffic is mostly about watching clips on YouTube and streaming a favorite Netflix series. Within the government, particularly the Defense Department, video traffic—more specifically videoconference calling—often is far more mission critical.

Pages