August 2005

August 2005
By Brig. Gen. (Sel.) David B. Warner, USAF, Acting Chief Information Officer, U.S. Joint Forces Command

As director of the Command, Control, Communication and Computer Systems Directorate at U.S. Joint Forces Command (JFCOM), the question of which technology will most impact this command is not easily answered. In our network-centric, global-reaching environment, technology will be the fulcrum around which success or failure will pivot. The level of measured success for the warfighter will depend directly on how evolving technologies are used to enable JFCOM's role within of the U.S. Defense Department as an organization where the military services, combatant commands, multinational partners, industry and other governmental agencies rely on each other in a truly interdependent relationship.

August 2005
By Maryann Lawlor, Jeff Hawk and Henry S. Kenyon

The role of networks in various environments was the topic of discussions

August 2005
By Cmdre. Robert Howell, RN (Ret.)

Better intelligence and information management are key elements of a NATO

August 2005
By Maryann Lawlor

Homeland defense initiatives and the global war on terrorism are reshaping

August 2005
By Jeff Hawk

The defense community's annual transformation-focused meeting offered

August 2005
By Maryann Lawlor

The U.S. Defense Department has designed a road map that plots the objectives

August 2005
By Martin E. Mendoza and Kelly Straub

The pace of fielding technology is increasing so quickly that testing, training and maintenance personnel

August 2005
By Cheryl Lilie

Multi-National Force-Iraq, plagued by problems with incompatible data sources

August 2005
By Jeff Hawk

New data-fusing, Web-enabling technology that promises to bridge

August 2005
By Jeff Hawk

The defense community is turning to new weapons to wage war

August 2005
By Henry S. Kenyon

U.S. government agencies are using a secure electronic conferencing tool

August 2005
By Henry S. Kenyon

The U.S. Defense Department has successfully deployed a major program to provide secure access

August 2005
By Jeff Hawk

Sending Top Secret e-mail from a hotel room may soon be possible pending

August 2005
By Robert K. Ackerman

New technologies, better hackers and an increased demand for network services

August 2005
By Maryann Lawlor

In the constantly changing information assurance realm, security is more often than not a moving target. To confront this challenge, the U.S. Defense Department's intelligence enterprise is beefing up its efforts to prepare information warriors, to track threats and to provide, not only information assurance but more importantly, mission assurance. Today, the need for agility is as immense and intense in cyberspace as it is on the battlefield.

August 2005
By Vice Adm. Herbert A. Browne, USN (Ret.)

There should be no debate over the need for effective information security in the information revolution. As digital information becomes more vital with the growth of cyberspace, securing it increases in importance. However, even with broad public awareness of the need for cybersecurity, the infosphere is faced with a serious challenge that is multifaceted and that defies easy solution.