NORAD Launches Santa Tracker Site, App

December 4, 2014
By Sandra Jontz
E-mail About the Author

Ho ho ho—it’s that time of year again, and though Christmas Day is a still a few weeks away, the folks at NORAD have launched their wildly popular Santa Claus tracker apps and website, giving children (big and small) a chance to play games, watch movies and countdown to Santa’s departure from the North Pole.

Student and Teacher Support Crucial to Combat STEM Shortage

December 2, 2014
By Rachel Lilly
E-mail E-mail the Author

On the heels of the Black Friday and Cyber Monday shopping frenzy, a new tradition is making its way into the headlines: #GivingTuesday. For the AFCEA Educational Foundation, it's an opportunity to highlight the impact of awarding scholarships and grants to deserving students and teachers around the world in support of STEM education.

Guest Blog: How Modernizing the JIE Can Make It a Success

December 2, 2014
By Chris LaPoint

Two years ago, the Defense Department developed the Joint Information Environment framework. Since then, key stakeholders and drivers have worked to realign, restructure and modernize the department’s information technology networks to increase collaboration while reducing the cyberthreat landscape.

U.S. Commerce Department Releases Web Tool to Foster Export Law Compliance

November 20, 2014
By George I. Seffers
E-mail About the Author

The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.

Disposable Cyber Systems to Stay Ahead of Adversaries

November 19, 2014
By George I. Seffers
E-mail About the Author

Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.