Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Presidents Commentary

Smart Defence

July 2012
By Kent R. Schneider, SIGNAL Magazine

"Smart Defence" is a NATO concept and policy that involves national burden-sharing on a broad range of developments, including information technology and cybersecurity. The European Union has a parallel initiative called Pooling and Sharing, and it similarly is aimed at sharing the cost of critical infrastructure. All of this, of course, is driven by the need to modernize, coupled with the global economic crisis, which has reduced defense and security budgets dramatically.

It Is All About Integration and Synergy

June 2012
By Kent R. Schneider, SIGNAL Magazine

At the Defense Information Systems Agency (DISA) Mission Partner Conference in Tampa, Florida, last month, the discussion focused on the enterprise and jointness and coalition. If it did not cause attendees to have an epiphany, it certainly should have triggered a re-awareness.

DISA Is a Laser Focused on Services for the Enterprise

May 2012
By Kent R. Schneider, SIGNAL Magazine

The command, control, communications and computers (C4) technology community has undergone a great deal of change over the past couple of years. The U.S. Cyber Command and the military services’ cyber component commands were created, the Joint Forces Command was disbanded, the Assistant Secretary of Defense for Networks and Information Integration (ASD NII) transformed to become the Office of the Defense Chief Information Officer (CIO), the J-6 (C4) on the Joint Staff was eliminated, and the Defense Information Systems Agency (DISA) has changed significantly. All of these modifications have resulted in adjustments to priorities, shifts of mission and more focus on the enterprise.

How Geolocation Has Changed

April 2012
By Kent R. Schneider, SIGNAL Magazine

I joined the U.S. Army in 1968. Having been trained as a Signal officer, I went to the field in the early 1970s with maps in hand, and I used acetate and grease pencils to prepare overlays for troop movements, command post and signal site locations, and the ever-important radio line-of-sight calculations. One of the greatest technology developments of the time was the marking pen—we got rid of grease pencils and we had color!

Critical Changes Loom in Cyber Direction

March 2012
By Kent R. Schneider, SIGNAL Magazine

Cyber threats draw much of the focus in today’s information technology realm. The threat profile in cyberspace is growing and becoming more complex, more sophisticated and more diverse.

Homeland Security Enters a Challenging Period

February 2012
By Kent R. Schneider, SIGNAL Magazine

I don’t think anyone would argue with my notion that we live in a dangerous world and that, no matter where you live, there are significant threats to national and regional security.

The New Year Abounds With Challenges and Opportunities

January 2012
By Kent R. Schneider, SIGNAL Magazine

For most of the economies in the world, 2012 should continue to be a recovery year. This will prolong the pressure placed on budgets in defense, intelligence and homeland security. In the command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and information technology business—our focus—budget cuts often are not as great as in other sectors. However, the price is that expectations are high for information-driven savings that can be applied to reductions in the out years.

The Broad Perspective on Cyber

December 2011
By Kent R. Schneider, SIGNAL Magazine

The concept and practice of cyber operations are topics of considerable discussion. I thought about what I could add to this dialogue, and I came down on the side of making one more case for a comprehensive, holistic view of cyber.

Weaving a Common Thread in Government Information Technology

November 2011
By Kent R. Schneider, SIGNAL Magazine

Government information technology is an area rife with issues for discussion. These include enterprise initiatives, mobile computing, the cloud in all its forms, cybersecurity and many more. However, one activity is the key to making all government information technology useful and secure: the common operating environment.

Jumping to Cloud Conclusions

October 2011
By Kent R. Schneider, SIGNAL Magazine

In a recent Op-Ed piece in the New York Times, Vivek Kundra, former federal chief information officer, made the point that in order to maximize effectiveness and efficiency in information technology (IT), the federal government and supporting industry need to leverage cloud technology and virtualization.

Pages

Subscribe to RSS - Presidents Commentary