February 2009

February 2009

Making sure your computer system satisfactorily goes through Information Assurance (IA) Certification and Accreditation (C&A) is the same as getting your car inspected. It ensures your system meets the official minimum security and IA maintenance standards. It also prevents equipment failures and crashes on the vital and very congested Army information superhighway, the LandWarNet.

February 2009
By Christopher J. Dorobek

 
Being agile and innovative will require moving beyond blame.

It has become a truism that the federal government is awash with waste, fraud and abuse. Over the years, that widely held belief has spurred the creation of an entire oversight industry. This includes the inspectors general, the so-called good-government groups, lawmakers on Capitol Hill and, of course, the news media.

February 2009
By Charlotte Adams

 
Then-Secretary of Homeland Security Michael Chertoff gives a keynote address at the AFCEA Solutions Cyberspace conference, held in Washington, D.C., in December.
The digital realm may host key battles in coming conflicts.

February 2009
By Henry S. Kenyon

February 2009
By Michael A. Robinson

A mid-size company blends needed electronics with acquisitions.

One could forgive Paul Domorski for running a little scared. How else can people describe an executive whose guiding business book is none other than Only the Paranoid Survive by former Intel Chairman Andy S. Grove?

That critically acclaimed book documents the impact that disruptive change can have on a company and its leaders. Grove’s case study about the power of what he calls strategic inflection points can be viewed as something of an oxymoron: It is a blueprint of sorts for managing unpredictable technological upheavals and the resulting chaos.

February 2009
By Kent R. Schneider

February 2009
By Rita Boland

 
The current approach to military software development is stovepiped. The U.S. Defense Information Systems Agency wants a more collaborative approach to provide capabilities  to warfighters.
Defense Information Systems Agency effort will enhance cooperation among certain information technology personnel.

February 2009
By Robert K. Ackerman

 
Lt. Gen. Pietro Finocchio, ITAF,
is the general director of Italy’s General Directorate for Information Technology and High Technology.
The NATO member is building network centricity among military and other governmental forces.

February 2009
By Rita Boland

February 2009
By Robert Fonow

 
Mamoun Tower near the Green Zone in Baghdad is the major transit point for Iraqi communications.
Rush to wireless creates roadblocks in national infrastructure expansion.

February 2009
By Henry S. Kenyon

February 2009
By Rita Boland

 
Spc. Jin Wang, USA, A Company, 2nd Battalion, 1st Infantry Regiment, 5th Stryker Brigade Combat Team, 2nd Infantry Division, kneels near a Stryker, manning a checkpoint during a training raid. The vehicles have proven themselves valuable
assets for troops in combat areas.
A signal captain from a Stryker unit documents the vehicle’s value in combat.

February 2009
By Maryann Lawlor

February 2009
By Maryann Lawlor

 
Sailors on the watch floor of the U.S. Navy’s Cyber Defense Operations Command  monitor, analyze, detect and protect unauthorized activity within the service’s information systems. The Navy is in the process of determining the structure it will assume for cyber activities.
Sea service and industry to share responsibility for information technology services.

February 2009
By Robert K. Ackerman

 
The U.S. Navy guided missile frigate USS McInerney tows a semi-submersible craft seized by several U.S. Coast Guard law enforcement officers embarked aboard the frigate. The Navy and the Coast Guard are joining forces in a National Maritime Intelligence Center to address new oceangoing intelligence requirements.

A global reach now embraces maritime domain awareness across agencies.