As director of the Command, Control, Communication and Computer Systems Directorate at U.S. Joint Forces Command (JFCOM), the question of which technology will most impact this command is not easily answered. In our network-centric, global-reaching environment, technology will be the fulcrum around which success or failure will pivot. The level of measured success for the warfighter will depend directly on how evolving technologies are used to enable JFCOM's role within of the U.S. Defense Department as an organization where the military services, combatant commands, multinational partners, industry and other governmental agencies rely on each other in a truly interdependent relationship.
The role of networks in various environments was the topic of discussions
Better intelligence and information management are key elements of a NATO
Homeland defense initiatives and the global war on terrorism are reshaping
The defense community's annual transformation-focused meeting offered
The U.S. Defense Department has designed a road map that plots the objectives
The pace of fielding technology is increasing so quickly that testing, training and maintenance personnel
Multi-National Force-Iraq, plagued by problems with incompatible data sources
New data-fusing, Web-enabling technology that promises to bridge
The defense community is turning to new weapons to wage war
U.S. government agencies are using a secure electronic conferencing tool
The U.S. Defense Department has successfully deployed a major program to provide secure access
Sending Top Secret e-mail from a hotel room may soon be possible pending
New technologies, better hackers and an increased demand for network services
In the constantly changing information assurance realm, security is more often than not a moving target. To confront this challenge, the U.S. Defense Department's intelligence enterprise is beefing up its efforts to prepare information warriors, to track threats and to provide, not only information assurance but more importantly, mission assurance. Today, the need for agility is as immense and intense in cyberspace as it is on the battlefield.
There should be no debate over the need for effective information security in the information revolution. As digital information becomes more vital with the growth of cyberspace, securing it increases in importance. However, even with broad public awareness of the need for cybersecurity, the infosphere is faced with a serious challenge that is multifaceted and that defies easy solution.