SIGNAL Online Exclusives

November 3, 2011
By Robert K. Ackerman, SIGNAL Online Exclusive

It may take a village of computer experts to build the next generation of networks as access, identification, applications and security concerns weigh heavily on planners and managers alike.

November 2, 2011
By Rita Boland, SIGNAL Online Exclusive

NASA, the National Reconnaissance Office and the U.S. Air Force have created a coordinated strategy for certifying commercial launch vehicles to send their payloads into space, including Evolved Expendable Launch Vehicle missions.

November 2, 2011
By Robert K. Ackerman, SIGNAL Online Exclusive

The future is in the East, and the United States must adapt to ensure that it can meet the challenges of the Asia-Pacific region in the 21st century.

October 26, 2011
By George I. Seffers, SIGNAL Online Exclusive

A recently released report from researchers at Georgia Institute of Technology, Atlanta, Georgia, predicts an explosion of cell phone threats in the coming months and reveals newly emerging vulnerabilities, including weaknesses in mobile device browsers.

October 20, 2011
By Robert K. Ackerman, SIGNAL Online Exclusive

A new U.S. Army generator technology is saving fuel and lives in the rugged terrain of Afghanistan. Known as a microgrid, the technology links smart generators to provide the appropriate amount of power when it is needed.

October 13, 2011
By Rita Boland, SIGNAL Online Exclusive

Naval Special Warfare (NSW) Group 4 has reduced its time to process Government Purchase Card acquisitions from months to 3.2 days with a combination of technology and employee involvement. The resulting system not only lessens the time from request submission to purchase completion, it also walks users through processes to eliminate mistakes and can create various reports automatically for a variety of purposes.

October 3, 2011
By Max Cacas, SIGNAL Online Exclusive

A researcher at the University of Texas at Dallas has discovered a new way to anticipate the actions of computer viruses, possibly heralding a new generation of tools and strategies to combat malware that attacks networks, servers and individual personal computers.

September 15, 2011
By George I. Seffers, SIGNAL Online Exclusive

The U.S. Marine Corps Warfighting Laboratory, Quantico, Virginia, is planning the biggest evaluation yet of its concept for networking unmanned platforms—including sensors, aircraft and ground vehicles—and controlling them with a Common Robotic Controller (CRC).

September 9, 2011
By Max Cacas, SIGNAL Online Exclusive

The Federal Communications Commission is in the midst of a rulemaking process for Docket No. 11-82, which would extend the commission’s rules under Part 4 of the Communications Act to telecommunications networks based on voice over Internet protocol (VoIP) technology, and broadband networking services provided by Internet service providers (ISPs).

August 25, 2011
By Rachel Eisenhower Lilly

Although women make up nearly 50 percent of the U.S. work force, they fill less than 25 percent of science, technology, engineering and mathematics (STEM) positions. The unequal share of women in STEM is particularly apparent in the engineering field, where only one out of every seven engineers is female. This vast gender gap restricts the United States in the global race for a high-tech work force.

August 22, 2011
By George I. Seffers, SIGNAL Online Exclusive

The commander of the International Security Assistance Force (ISAF) in Afghanistan has recommended that the network architecture approach established in that country be developed for future alliance and coalition operations and exercises.

August 22, 2011

“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.

August 22, 2011

“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.

August 11, 2011
By Max Cacas, SIGNAL Online Exclusive

Young summer campers whose focus is cybersecurity rather than swimming or working on their tan had a chance to show their skills and maybe earn a scholarship recently in Virginia. It is part of the latest in a series of U.S. Cyber Challenge Camps taking place across the country as part of an effort to get more young people to seriously consider careers in the high-demand field of cybersecurity and information assurance.

August 3, 2011
By Max Cacas, SIGNAL Online Exclusive

A large cyberespionage campaign has been ongoing for five or more years, with its targets ranging from private companies to nations. Commercial cybersecurity experts say all the evidence so far points to a “state player” as the source of the attack, and they have located server logs outlining the extent of the attack.

August 2, 2011
By Robert K. Ackerman, SIGNAL Online Exclusive

A small business innovation research (SBIR) program is allowing U.S. Army researchers to generate on-the-move satellite links that would take advantage of the greater data rates available from military communications satellites. A recent demonstration at Aberdeen Proving Ground, Maryland, proved the worth of this approach for transmitting and receiving vital situational awareness data and command and control messages.

July 19, 2011
By Rita Boland, SIGNAL Online Exclusive

Troops soon will have access to an upgrade that allows them to counter one of their most complex foes—Mother Nature. A project at the U.S. Air Force Electronic Systems Center incorporates weather information with flight maps so crews can more quickly understand what the environment plans to throw their way and when.

July 15, 2011
By Max Cacas, SIGNAL Online Exclusive

The revelation that an unnamed defense contractor suffered a large-scale data breach emphasized the urgency and importance of a Defense Department strategy for operating in cyberspace.

July 15, 2011
By Max Cacas, SIGNAL Online Exclusive

The revelation that an unnamed defense contractor suffered a large-scale data breach emphasized the urgency and importance of a Defense Department strategy for operating in cyberspace.

July 11, 2011
By George I. Seffers, SIGNAL Online Exclusive

First-ever systems integration testing approach proves painful but beneficial.

Pages