It’s traditional for journalists to end an interview with some version of the question, “What would you like to add?” On the surface, it is the softest of softball questions, but for one interview, it led to headline news.
Compliance with Defense Information Systems Agency rules are a must. Break the rules, and companies can lose their applications or have systems removed from the network.
The shrinking military cannot achieve mission success without the advances promised by the Joint Information Environment, U.S. Defense Department leaders say. Yet the effort itself depends on innovative advances that may lead to changes in doctrine and operations if—and when—they are incorporated into the force.
The U.S. Cyber Command (CYBERCOM) views the Defense Information Systems Agency as a key partner in its effort to secure defense cyberspace. This includes the agency having an operational mission in which it plays a critical role in defending defense cyberspace, according to the commander of CYBERCOM.
U.S. Defense Department officials intend to complete a departmentwide spectrum strategy road map this month, which will make more frequencies available to warfighters, provide greater flexibility—especially for international operations—and ultimately allow warfighters to conduct their missions more effectively. At the same time, however, some are suggesting a nationwide strategy to allow for more innovative and effective spectrum management and sharing across government and industry.
The complexities of the U.S. Army’s networks and spectrum allocation processes interfere with the need to reassign units to different tasks, creating major delays and presenting serious challenges.
The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.
The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.
A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
The architecture of the Joint Information Environment (JIE) will help the Defense Department deal with the growing insider threat, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, director of the Defense Information Systems Agency (DISA). He told the audience at AFCEA’s three-day Joint Information Environment Mission Partner Symposium that the move to the cloud will enable better security and prevent the traditional insider threat from menacing valuable data.
The Defense Information Systems Agency (DISA) is changing its own internal methods of operation to reflect the direction it is giving the services in the move toward the Joint Information Environment, according to Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, at the Joint Information Environment Mission Partner Symposium.
The defense community must move away from email and fully into social media, says the director of the Defense Information System Agency (DISA). Lt. Gen. Ronnie D. Hawkins Jr., USAF, told the audience at AFCEA’s Joint Information Environment Mission Partner Symposium that the defense community must break with the past in digital information technology.
The military’s evolving environment stands on the strong shoulders of the past to reach for the clouds.
Anyone following the progress of the Joint Information Environment (JIE) knows by now that it is not a program of record. No one will see large procurements to provide the JIE. It definitely is a framework: it defines standards and architectures for consistency across the defense environment. It defines a core environment and interfaces for the connection of networks and systems to the core.
The Defense Department drive toward its Joint Information Environment is picking up speed as it progresses toward its goal of assimilating military networks across the warfighting realm. Individual services are developing solutions, some of which are targeted for their own requirements, that are being applied to the overarching goal of linking the entire defense environment.
Once the Joint Information Environment (JIE) is in place, the U.S. Defense Department may be able to deploy secure mobile apps much more quickly than it can with today’s cumbersome process, according to Teri Takai, Defense Department chief information officer.
It’s impossible these days to attend a U.S. Defense Department information technology presentation without repeated mentions of the Joint Information Environment (JIE). But industry representatives often ask, “What does JIE mean to me?” I did some digging into the environment—leveraging the expertise of the AFCEA Technology Committee, discussions with several senior defense information technology leaders and insights from colleagues at my firm who participated in JIE Increment 1 in Europe.
The Defense Information Systems Agency (DISA) has deployed the initial version of its unclassified mobility capability, which will provide military and civilian Defense Department personnel with access to a wide selection of mobile devices, applications and services.
The U.S. Defense Department will deploy version 1.0 of its unclassified mobility capability on January 31 with plans to expand the capacity to support up to 100,000 users by the end of the fiscal year. The Defense Information Systems Agency (DISA) is the lead agency for the program and has made substantial progress toward delivering the capability.
Cyber has provided the means for rapidly assembling and operating military coalitions in the post-Cold-War era. Now, the very nature of the domain may require coalitions to save it from a growing menu of threats. These threats can range from annoying hackers to organized crime to malicious nation-states and even geopolitical movements to restrict the flow of ideas. While the panoply of perils is diverse, the actions to defend against them may have to spring from the well of government and organizational cooperation.