Guest Blogs

July 31, 2014
By Jessica Gulick

Partnerships are growing from disparate groups in search of the same goal.

July 3, 2014
By Chris LaPoint

Compliance with Defense Information Systems Agency rules are a must. Break the rules, and companies can lose their applications or have systems removed from the network.

June 4, 2014
By Chris LaPoint

Ongoing changes in the tactical networks—the mobile battlefield—should provide the U.S. Cyber Command with an increased ability to discover and address vulnerabilities in these networks.

May 27, 2014
By Anthony Robbins

Ongoing budget cuts place the Defense Department in a challenging situation, tasked with continually supporting warfighters on an increasingly tight budget. The most direct route for the department to accomplish mission goals and support warfighters is through information technology innovation.

April 30, 2014
By Chris LaPoint

In large federal organizations, tension always exists between local and central personnel who have different priorities, available resources and levels of control. In the U.S. Defense Department, that tension is especially apparent between the information technology professionals at the local level and the folks who oversee all of an agency’s operations.

April 23, 2014
By Matthew Smith

Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.

August 30, 2013
By Paul Christman and Jamie Manuel

For years, the Defense department took a “do it alone” posture when it came to sharing information and protecting its networks and communication infrastructures from security attacks. Now in an interconnected world of reduced budgets and ever-increasing security risks, the DOD is fundamentally changing the way it approaches information sharing and cybersecurity. 

April 12, 2013
By Dr. Louis S. Metzger

The latest Incoming column from Lt. Ben Kohlmann, USN, titled “Link Warfighters to Technologists at the Lowest Possible Level” (SIGNAL Magazine, April 2013), resonated with observations I’ve made and conclusions I’ve reached over the years. I’ve been involved with the research and development and acquisition communities for a long time, including serving as the Air Force chief scientist from 1999 to 2001. Perhaps my adding to Lt.

March 25, 2013
By Michael Carter

The current driving force in the military and defense environment is to keep legacy systems operating longer, or the replacement of legacy systems with new systems that emulate one or more legacy systems with commercial-off-the-shelf (COTS) technology. However, there is insufficient budget to fund development of these COTS systems, and the burden of development falls upon private industry. The current sequestration environment adds another burden on industry to perform to the needs of the military, but without the benefit of nonrecurring engineering (NRE) costs being reimbursed.

March 14, 2013
By Rick Hansen

The Regional Information Sharing Systems (RISS) Program recently implemented a simplified sign-on capability that enables federal, state and local law enforcement to collaborate.

 

June 11, 2012
By Dan Ward

 The Air Force Chief of Staff had but three critical requirements for the Joint Direct Attack Munition (JDAM): "It should work; it should hit the target; and it should cost under $40,000 each." If only every requirements document could fit on a sticky note!

May 25, 2012
By Jonathan Cisneros

For those who have lost their lives and for the Wounded Warriors that now have long roads to recovery, we owe them the homage and the support they ultimately deserve.

April 11, 2012
By Roger Foster, SIGNAL Scape Guest Blogger

We are drowning in health care data, but remain thirsty for information. Driven by federal incentives, public and private healthcare institutions have generated billions of electronic health records (EHRs), rich with clinical and demographic data. This data can be aggregated and analyzed to improve scientific research, drug safety and overall public health. However, the growth in health care data is so fast that issues surrounding data storage, integrity, modeling and sharing can diminish its tremendous potential. Guest blogger Roger Foster of DRC looks at this important health IT issue.

December 21, 2011
By Dan Barber

From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.

December 2, 2011
By Prenston Gale

Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.

September 15, 2011
By Jennifer Miller

"Let's do lunch?" is a phrase many mock; others use it as much as possible to gain invaluable insight from personal experiences and get feedback about present actions and future aspirations. As an intern, I have a limited perspective of the Department of Defense and rely heavily on the guidance of others when contemplating different career ideas, experience opportunities and developmental paths or programs to pursue.

July 25, 2011
By Christine Robinson

We presently are experiencing intense pressure not to raise the debt ceiling, prophecies about the downfall of government IT, more legislators considering reducing the once-sacred defense budget, and prophecies of gloom and doom relating to government programs in general. Despite this, a number of leaders and real change agents both in government and outside government offer us some real hope and shining examples.

July 1, 2011
By Rita Boland

The president and CEO of the USO of Metropolitan Washington encourages everyone to remember our troops and their families as we celebrate our nation's independence.

June 1, 2011
By Christine Robinson

The Air Force and Arlington County, Virginia, are taking preventative measures against hackers such as the ones that recently attacked Sony, costing them over $170 million. It's not just money at risk for government networks, however.

Pages