TechNet Asia-Pacific 2011

November 4, 2011
By Robert K. Ackerman

If the space-based global positioning system (GPS) were to go down, the Joint Aerial Layer Network might be able to fill in to provide timing and navigation in theater during military operations.

November 3, 2011
By Robert K. Ackerman

Airpower dominated the 20th century, but cyberpower will dominate the 21st century. Change is outstripping conventional patterns as technologies race capabilities.

November 3, 2011
By Robert K. Ackerman

Network situational awareness, largely the purview of military systems, may be the best line of defense against cybermarauders threaten the nation's critical infrastructure.

November 3, 2011
By Robert K. Ackerman

The nation's critical infrastructure, long a potential target of cybermarauders, now faces even greater threats--ironically because of the very information technologies on which it depends for better efficiency of operation.

November 3, 2011
By Robert K. Ackerman

The U.S. Coast Guard is looking at a variety of options for adding maritime versions of unmanned air vehicles (UAVs) to its sea assets. These vehicles would be used to maintain persistent presence in remote ocean areas.

November 3, 2011
By Robert K. Ackerman

The Defense Department wants innovative solutions to build the third generation of the Global Information Grid (GIG 3.0), but it wants only current technologies to underpin those innovations.

November 3, 2011
By Robert K. Ackerman

Accountability, in the form of identity and access management, will be the key elements in the Defense Department's third-generation Global Information Grid, or GIG 3.0.

November 2, 2011
By Robert K. Ackerman

The problems that the military is facing as personnel make greater use of social media are the same that it has confronted with earlier communications technologies. And, the solution may be the same: greater education on, and adherence to, security guidelines.

November 2, 2011
By Robert K. Ackerman

Modern cybercriminals have become too sophisticated for traditional security measures. So, the old way of ensuring network security must give way to a new approach that encompasses the whole of user operations in the network.

November 2, 2011
By Robert K. Ackerman

The spread of mobile networking systems along with the use of social media have opened new backdoors for hackers with potentially serious consequences, according to a leading security expert speaking at TechNet Asia-Pacific 2011. Tom Reilly, vice president and general manager, HP Enterprise Security, told the Wednesday breakfast audience that this major information technology transformation is leading to an escalation of attacks, especially against applications, and cyberspace will be a more dangerous place as a result.

November 2, 2011
By Robert K. Ackerman

Everything over Internet Protocol (EoIP) is not the cure-all for military communications and networking, a panel of experts warned. Legacy systems must be integrated with EoIP to form a hybrid network that is more flexible and less vulnerable than EoIP would be alone.

November 1, 2011
By Robert K. Ackerman

Industry must change the way it provides key information technologies and systems to the military, especially with a major budget storm looming on the horizon.

November 1, 2011
By Robert K. Ackerman

U.S. forces will need to be more dispersed and have greater capabilities if they are to meet challenges in the Asia-Pacific region in the coming century.

November 1, 2011
By Robert K. Ackerman

The Asia-Pacific region will be the focal point of this century as nations try to maintain booming economic growth amid longtime regional tensions. Many nations in the area want the United States to remain an active partner in security measures.

November 1, 2011
By Robert K. Ackerman

The United States must partner closely with Asia-Pacific nations to ensure that regional security and stability persist in that region. Sacrificing presence in favor of budget cuts would be the wrong move right now.

November 1, 2011
By Robert K. Ackerman

It's time for the United States to review its national policy and develop procedures for going after cyberspace intruders. This may be the only way to have an effect on persistent cyber attacks.

November 1, 2011
By Robert K. Ackerman

Unintended consequences may dampen early success in Libya. The lessons learned by rogue nations such as North Korea and Iran is not to give up nuclear weapons.

November 1, 2011
By Robert K. Ackerman

An attack on India by terrorists based in Pakistan could lead to the unthinkable, as retaliation by India probably would escalate into a nuclear response by Pakistan.