West 2011 Online Show Daily, Day 3. "Adaptability often is viewed as a responsive act. However, adaptability and preparation are inexorably linked."--Alfred Grasso, president and chief executive officer, the MITRE Corporation
A competition for students age 18 and older in California, New York and Delaware seeks to turn hackers into viable assets for the nation's cybersecurity needs. The U.S. Cyber Challenge's (USCC's) Security Treasure Hunt, taking place from April 12 to May 20, aims to find 5,000 people to compete to find security flaws and vulnerabilities on a target system. The top performers from each state will receive all-expenses-paid trips to Cyber Challenge summer camps. They also could be exposed to government, industry and academia officials searching for their skills to fill critical roles.
Members of the U.S. Joint Forces Command’s Joint Enabling Capabilities (JEC) Command arrived home from Afghanistan and the first major operational use of the Ready JEC Package (RJP) just in time to join their families for the Thanksgiving holiday.
The news earlier this year that the U.S. Marine Corps was banning social media sent some people into a near tizzy. How could it do such a thing? Aside from the fact that it was not what Marine Corps officials actually said—for security reasons they prohibited Marines from using applications such as Facebook and Twitter on Marine Corps computer networks—the move by the Marine Corps, and the uproar surrounding it, spurred the Pentagon to examine its policies surrounding these collaborative tools and to assess how they are treated.
Some of the digital world’s most bitter rivals have joined forces with government and public-sector organizations to develop solutions for disaster relief. An inaugural meeting November 12-14 in Mountain View, California, already has generated some products, and the administrator of the Federal Emergency Management Agency (FEMA) has lauded the effort and has pledged support.
Actually, there are only 10. The Defense Advanced Research Projects Agency (DARPA) is holding the DARPA Network Challenge on December 5 to celebrate the 40th anniversary of the Internet. Participants must locate the exact latitude and longitude coordinates of 10 red weather balloons that will be posted at undisclosed locations across the continental United States.
The final day of TechNet Asia-Pacific 2009 featured two panels and two speakers looking at the way ahead.
Wednesday’s speakers and panelists at TechNet Asia-Pacific 2009 included assessments of needs and methods for information systems and cybersecurity.
The challenges of the Pacific region and cyberwarfare issues dominated discussion on the second day of TechNet Asia-Pacific 2009.
The NC3A installed communications in a new headquarters in record time.
The opening session of TechNet Asia-Pacific 2009 was a four-hour acquisition seminar titled "Cyber Security—Its Acquisition and Environment."
Energy as a weapon and an enabler could dominate future battlefields, according to a recent war game that focused on military energy requirements. Participants in the 2009 war game, which had the theme “Future Energy Requirement on the Battlefield,” examined energy produced, packaged and used in novel ways to enable persistence.
Cloud computing can solve many problems that state and federal governments are experiencing with traditional network-based systems. Through its cost-effective, flexible options, cloud computing enables organizations to move the burden of network management from their own staff to a host environment.
A new competition is opening up the process of developing and improving virtual training environments by streamlining the rules and requirements for participation. By reaching out to the global design and development community, the Federal Virtual World Challenge seeks innovative, outside-the-box ideas to provide the U.S. government with virtual training and analysis technologies.