Members of the U.S. Joint Forces Command’s Joint Enabling Capabilities (JEC) Command arrived home from Afghanistan and the first major operational use of the Ready JEC Package (RJP) just in time to join their families for the Thanksgiving holiday.
Some of the digital world’s most bitter rivals have joined forces with government and public-sector organizations to develop solutions for disaster relief. An inaugural meeting November 12-14 in Mountain View, California, already has generated some products, and the administrator of the Federal Emergency Management Agency (FEMA) has lauded the effort and has pledged support.
A multitude of sentries stand between state-of-the-art solutions and warfighters’ hands. The acquisition bureaucracy has become so convoluted that even urgent need requests are feeling the effects. Debating the way around or right through the administrative sentinels that procurement professionals face in the government was the focus of AFCEA International’s SOLUTIONS Series event, “IT Acquisition: Shifting to a Modern Paradigm.” At the September event in Lansdowne, Virginia, identifying the problems was not a challenge; agreeing on the most expedient way to solve them was a little more difficult.
AFCEA increasingly is engaged in the effort to improve the acquisition process, particularly as it supports the command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and information technology communities. The association addresses this critical topic in this edition of SIGNAL; it has supported some workshops to discuss specific aspects of the problem; and it has held two conferences in the past several months on acquisition.
The threat to cyberspace now rivals that of terrorism and weapons of mass destruction. That is the message in the latest effort to rouse the public from slumber induced by ignorance, indifference, apathy, confusion and denial. Government is inundated with reports and studies from think tanks, academia, prestigious government research agencies and the cybersecurity industry—each decrying the weak and deteriorating state in our cyberdefenses and proffering advice to the new administration.