Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

October 2009

Cloud Computing Offers Government Solutions

October 15, 2009
Katie Packard

Cloud computing can solve many problems that state and federal governments are experiencing with traditional network-based systems. Through its cost-effective, flexible options, cloud computing enables organizations to move the burden of network management from their own staff to a host environment.

Virtual Design Challenge Opens To All

October 13, 2009
Henry S. Kenyon

A new competition is opening up the process of developing and improving virtual training environments by streamlining the rules and requirements for participation. By reaching out to the global design and development community, the Federal Virtual World Challenge seeks innovative, outside-the-box ideas to provide the U.S. government with virtual training and analysis technologies.

The Critical Moment of Awareness

October 2009

October is Cyber Awareness Month. This is an excellent effort to spread the word about cyber safety and reinforce the policies, procedures and best business practices that support sound information assurance (IA).

Building a Better Government Personnel System

October 15, 2009
By Christopher J. Dorobek

If you think the health care debate has been controversial, just mention “pay-for-performance” in government circles. The government has made several attempts to develop a more modern pay system; a number of them have taken place in various agencies over the years. But there have been several big, high-profile pay-for-performance systems.

Trite but True: He Got it Half Right

October 15, 2009
By Alan P. Balutis

Christopher J. Dorobek’s “Incoming” column focused on good leadership. I once was as misguided as Dorobek, but no more. I hope it is not too late to affect his thinking—and yours as well.

U.S. Army Ponders Cyber Operations

October 15, 2009
By Henry S. Kenyon

Modern communications and sensor systems have greatly increased the speed and effectiveness of maneuver warfare and have empowered units at the edge by providing them with greater situational awareness. But these benefits have a price—lack of interoperability caused by disparate equipment and vulnerability to external threats ranging from jamming to cyberattacks.

Cyber Operations Span the Globe's Largest Theater

October 15, 2009
By Kent R. Schneider

This is a time when everyone needs to be part of the cyber debate. Our dependency on the cyber environment is greater than ever. Cyber is being recognized as a priority domain for warfare. U.S. capabilities and those of the nation’s allies are growing, but the threat is growing and becoming more sophisticated at an alarming rate.
Both state and non-state players are active in this domain. The new U.S. administration has put a very high priority on the cyber environment and on cyberwarfare and has commissioned a number of studies to determine the way ahead. But the path remains unclear for the United States and, certainly, as the country works with its coalition partners around the globe.

Twitter Is Mission Critical

October 15, 2009
By Maj. Daniel Ward, USAF, Maj. Gabe Mounce, USAF, and Carol Scheina

The explosion of online social media is profoundly changing how people produce, consume and share information. Social media rapidly turns monologues into dialogues and broadcasts into conversations. The result is a rich environment in which ideas are shared, questions are answered and collaborative relationships flourish.

Military Needs New Operational Paradigm

October 15, 2009
By Gen. James N. Mattis, USMC

Command and control is a subject that encompasses all military functions. No matter how brave soldiers are or how many billions of dollars are spent, command and control is essential in enabling the warfighter to execute commander’s intent.

Agency Aims to Outmaneuver Cyber Enemies

October 15, 2009
By Maryann Lawlor

The burgeoning number of devices, wireless capabilities and social media sites is challenging one of the leading U.S. intelligence organization’s goals to provide the decisive advantage to outmaneuver adversaries in cyberspace. A large hurdle to overcome is the growing use of commercial technologies that often bring with them varying degrees of information security requirements.

Pages

Subscribe to RSS - October 2009