Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.
Where sequestration had been the focal point of discussions only 24 hours earlier, Wednesday at West 2015 featured force modernization as its focal point. Military, civilian government and industry leaders discussed modernization plans as well as the ailing defense information technology acquisition architecture.
Information technology systems, elements and methodologies are becoming more of a factor in U.S. naval aviation. Virtual capabilities are supplanting physical training, and new architectures may allow faster incorporation of new technologies.
Unlike other postwar cycles when the military downsized, the current environment is more dynamic and hostile than any other postwar period. So, the military does not have time to reset itself and adjust to a new mobilization.
The Defense Information Systems Agency is rolling out a new open source collaboration service to facilitate secure Web-based conferencing and chats throughout the Defense Department, and is expecting to save millions of dollars over the legacy enterprise, officials say.
The technological lead the U.S. military has over its adversaries could be a fleeting one as repeated budgetary cuts have bled funding from research and development coffers while rivals grew their technology prowess, offers Adm. Jonathan Greenert, USN, the Navy’s top military officer.
Mark Orndorff, the mission assurance executive and program executive officer for mission assurance and network operations at the Defense Information Systems Agency (DISA), bids farewell to colleagues today as he retires.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.
The Twitter and YouTube accounts for U.S. Central Command are back online after hackers, stated to be in support of Islamic State militant group, broke into the accounts and posted menacing messages.
The Defense Information Systems Agency (DISA) is reorganizing to focus on five Cs: cyber, cloud, collaboration, and command and control, Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, announced Monday at a luncheon event hosted by AFCEA's Washington, D.C. Chapter.
After more than 13 years of continuous war, the U.S. military is entering a new era with a smaller force that faces new and expanding roles and challenges. As with all the services, the Navy’s and Marine Corps’ challenges are complicated by budget tightening amid an evolving and broadening security environment.
Today, as U.S. combat missions wind down, a part of the U.S. Marine Corps is reverting to its origin as the nation’s expeditionary force in readiness established in 1775. And research is spearheading that effort.
URS Federal Services Incorporated, Germantown, Maryland, is being awarded a $35,951,345 modification to a previously awarded indefinite-delivery/indefinite quantity, cost-plus-fixed-fee with firm-fixed-price provisions, performance-based contract (N65236-12-D-4806) for a ceiling increase and period of performance extension to July 10, 2016, to provide submarine C5I and NC3 system engineering, technical, logistics and management support services including test and evaluation, certification, modernization, repair, refurbishment, overhaul and logistics support
Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).
Science Applications International Corporation, McLean, Virginia, was awarded a $7,179,527 modification (003748) to multi-year foreign military sales contract W31P4Q-05-A-0031 (Afghanistan, Australia, Bahrain, Central African Republic, Chad, Djibouti, Dominican Republic, Egypt, France, Georgia, Germany) for systems and computer resources support. Fiscal 2011, 2013, 2014, 2015 research, development, testing and evaluation, operations and maintenance (Army), and other procurement funds in the amount of $7,179,527 were obligated at the time of the award.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
SBIR program manager with U.S. Special Operations Command helps spread the word about small business innovation.
As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.
Cubic Applications Incorporated, San Diego, has been awarded a $9,900,000 indefinite-delivery/indefinite-quantity contract for solutions to enhance the U.S. Air Force Chemical, Biological, Radiological, and Nuclear (CBRN) counter proliferation and survivability missions program. The contractor will provide research, test, evaluate and analyze short-term and long-term CBRN technologies.