data management

October 1, 2014
By Rita Boland

As organizations migrate more data into public clouds, demands for a different type of security are emerging. A specialized option is available now for Amazon Web Services that aims to mitigate threats more quickly by finding them faster and suggesting methods of remediation.

August 7, 2014
by George I. Seffers

Will you be able to guess a location by analyzing an image?

July 16, 2014
By Sandra Jontz

Where human analysis might fail in the intelligence community, technological solutions are at the ready to fill the void. Companies are ginning up software programs that can prove to be key for intelligence analysts as they track the bad guys—be they insider threats or an outside enemy.

August 1, 2014
By George I. Seffers
Two IARPA programs, Finder and Aladdin Video, are designed to help analysts grapple with massive amounts of photographs and videos in an effort maximize mission effectiveness and enhance national security.

Two closely related science and technology programs aim to improve image location and search capabilities, saving intelligence analysts significant time and effort.

August 1, 2014
By Rita Boland

Mining big data for salient information points presents a plethora of challenges, but in Europe a different issue with the action has emerged as a concern. Regulations prohibiting researchers and others from searching through the data in certain documents are putting countries on the continent at a competitive disadvantage in a number of fields, studies are revealing. With several economies there already in dire straits, the legal encumbrances could add to difficulties in improving financial situations.

August 1, 2014
By George I. Seffers

U.S. Army officials envision a future in which ground and air platforms share data and where soldiers at a remote forward-operating base easily can access information from any sensor in the area, including national satellites or reconnaissance aircraft flying overhead.

August 1, 2014
By Robert K. Ackerman

Technology innovations, new roles and expanding missions are shaping the move toward big data in the National Geospatial-Intelligence Agency. A mix of tradecraft and technology is ensuing as the agency evolves from an organization that always has worked with voluminous imagery files to one in which big data represents a goal that promises to change many aspects of intelligence.

June 25, 2014
By Robert K. Ackerman

U.S. Defense Department data will be invading the commercial world as the department moves its unclassified information out of its own hands. Terry Halvorsen, acting Defense Department chief information officer, described the upcoming move at the AFCEA Cyber Symposium.

July 1, 2014
By Kent R. Schneider

Virtualization and cloud implementation are critical components of information technology planning, acquisition and management going forward. Cloud implementations are important to security, efficiency, effectiveness, cost savings and more pervasive information sharing, particularly among enterprises.

May 15, 2014
By Sandra Jontz

Sandia National Laboratories researchers are developing “neuro-inspired” computing systems to work basically like human brains.

May 15, 2014
By Maryann Lawlor

The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.

May 1, 2014
By Robert K. Ackerman
A  U.S. Navy sailor monitors communications aboard an Arleigh Burke-class destroyer. The Defense Department’s JIE builds on communications and networking advances within the individual services.

The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.

March 11, 2014
By George I. Seffers

It is not surprising that cybersecurity would dominate the discussion on the second day of the AFCEA Homeland Security Conference in Washington, D.C. But the depth and breadth and variety of topics surrounding cybersecurity and information protection in all its forms indicates the degree to which the information security mission has engulfed every department and agency at all levels of government.

March 11, 2014
By George I. Seffers

The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer.

March 10, 2014
By George I. Seffers

Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.

March 10, 2014
By George I. Seffers

Homeland Security Conference Show Daily, Day 1

Information sharing and interoperability have come a long way since the terrorist attacks of September 11, 2001, but challenges still remain, agreed speakers and panelists on the first day of the AFCEA Homeland Security Conference in Washington, D.C.

February 1, 2014
By Michael A. Robinson
The U.S. Office of Naval Research’s Situational Awareness System (SAWS) uses electro-optic/infrared sensors for 360-degree surveillance in the water and in the air. The greater variety of sensor capabilities is feeding big data, which in turn is spawning new types of sensor systems.

The emergence of big data combined with the revolution in sensor technology is having a synergistic effect that promises a boom in both realms. The ability to fuse sensor data is spurring the growth of large databases that amass more information than previously envisioned. Similarly, the growth of big data capabilities is spawning new sensor technologies and applications that will feed databases’ ever-increasing and diverse types of information.

February 1, 2014
By Kent R. Schneider

This rarely happens, but for 2014, defense and technology analysts are in agreement that big data and cybersecurity are the two drivers in planning and investment for information technology, both in government and in industry. Most everything else will be enabling these two key capabilities. While much attention has been focused on the threats and work being done globally on cybersecurity, I want to focus on big data.

Big data is critical because, unless it is collected, analyzed, managed and made ubiquitously available, many analysts and decision makers will be buried in information they cannot use effectively in a timely fashion. It also is the starting and ending point for many of the technologies and capabilities we care about: networks, data centers, cloud initiatives, storage, search, analytics and secure access

February 1, 2014
By Rita Boland

The increasing presence of news sources on the Internet offers an unprecedented opportunity to access open-source intelligence for a variety of purposes. Researchers from several U.S. universities have collaborated to take advantage of these resources, creating a big data collection and distribution process applicable to disciplines ranging from social research to national security.

January 1, 2014
By Paul A. Strassmann

The U.S. Defense Department now is advancing into the third generation of information technologies. This progress is characterized by migration from an emphasis on server-based computing to a concentration on the management of huge amounts of data. It calls for technical innovation and the abandonment of primary dependence on a multiplicity of contractors.

Pages