SIGNAL Connections

June 16, 2008
SIGNAL Staff

The New SIGNAL Online

SIGNAL Connections arrives in thousands of e-mail inboxes each month, but now it’s time to also catch up on news about SIGNAL Online. SIGNAL Connections, AFCEA’s monthly e-newsletter, is only part of the SIGNAL family of publications. Newly redesigned and easier to get around in, the magazine’s redesigned Web site features additional online exclusives such as “On Cyber Patrol,” the popular cartoon and feature from the U.S. Army’s Office of Information Assurance and Compliance, and archives of recent SIGNAL webinars.

June 16, 2008
by Henry S. Kenyon

 

A recent report on the state of U.S. emergency management and hospital systems found that they were lacking in modern communications and that little or no information sharing existed between first responders, hospitals and the military.

June 16, 2008
SIGNAL Staff

Knowledge of the International Traffic in Arms Regulations (ITAR), including what they are, what they cover and the corporate responsibilities for compliance under these regulations, is pertinent to all small businesses that work in the federal sector. This especially is true for those that routinely deal with technical data.

June 15, 2008
by Maryann Lawlor

U.S. sailors and Marines are accustomed to sitting down in front of their computers and tapping into the Navy/Marine Corps Intranet (NMCI). But recently Naval Network Warfare Command (NETWARCOM) personnel and EDS contractors practiced moving command and control (C2) of the intranet quickly so they are prepared to relocate to safe ground when a natural disaster such as a hurricane is imminent.

June 16, 2008
by Maryann Lawlor

June 16, 2008
by Henry S. Kenyon

A Canadian company is offering two free software packages that allow a single computer to support two workstations. Besides supporting multiple computers, the software provides computers with a range of office applications.

The Userful Corporation is giving away the software as part of a promotional package, explains the firm’s marketing head, Sean Rousseau. He says that the firm has extended its offer, allowing people to sample the free product and then buy it for their businesses or organizations. “It is a full-fledged product. It’s not a beta,” he shares.

May 15, 2008
by Henry S. Kenyon

In late April, hackers attempted to penetrate the computer networks of several U.S. military academies and graduate schools. The intruders tried to infiltrate the school’s cyberdefenses to plant malicious software, shut down servers and cause damage to data. The military institutions resisted the attacks with varying levels of success, for which they were graded—there was a trophy at stake.

May 15, 2008
by Henry S. Kenyon

May 15, 2008
by Robert K. Ackerman

The ongoing conflict in Southwest Asia is changing the thrust of many charities that support warfighters and their families. As patterns of need have emerged over time, charities are shifting their focus toward specific activities that address those needs.

The charities are not abandoning their original purposes. Instead, they are taking on new roles that are increasing in importance. And despite the slow economy, people are responding to charities’ appeals on behalf of men and women in the armed forces.

May 15, 2008
by Rita Boland

The minds of the world creating the future’s communications technology already know what to expect in the next generation—tools that are smaller, more powerful and more flexible yet less expensive. These experimenters also know that current bandwidth problems have to be a focus area for future operations.

May 15, 2008

Information professionals from all over Europe are gathering on June 4 at the SHAPE Club in Mons, Belgium, to learn and share their ideas about the pitfalls and benefits of using commercial technology in the battlespace. Sponsored by AFCEA Europe, “The Dual Use of Technology” symposium and exposition features a variety of speakers from industry, government and the military.

May 15, 2008
by Maryann Lawlor

While most military planning focuses on how to win wars, a concept developed by forward-thinkers in the joint world is honing methods to prevent them. Dubbed cooperative security, the plan aims at helping countries with struggling governments and economies so they do not fall victim to internal conflict or become tempted to open their doors to terrorists.

May 15, 2008
by Maryann Lawlor

E-communities are growing by leaps and bounds in the U.S. Air Force’s premier professional networking venue: Air Force Knowledge Now (AFKN). With more than 225,000 users and nearly 12,000 communities of practice (COPs), AFKN is fast becoming the virtual go-to place for airmen seeking to connect with each other to discuss issues and solve problems. And although the e-space was originally established for members of the Air Force, it is quickly becoming a joint collaborative environment as members of active-duty, Reserve and Guard of the U.S. Army, Navy and Marine Corps join the ranks of users.

June 16, 2008
SIGNAL Staff

The U.S. government’s progress toward a universal personal identification card for government employees and contractors is moving into the next phase. A need to increase key lengths to ensure security has the National Institute of Standards and Technology (NIST) busy working to define replacements and to determine a specific migration schedule. Updates will begin at the end of this year and continue through 2015.

May 15, 2008

The AFCEA Intelligence Committee is looking for a few good men and women from industry to share their expertise by serving as members of the committee. The group comprises intelligence professionals from both the public and private sectors who volunteer to oversee AFCEA’s intelligence outreach.

SIGNAL Staff

August 2009
Satellite Communications/Search and Rescue System

SIGNAL Staff

May 2008
Secure Communications Coming to Marines

Pages