The U.S. Air Force Personnel Center is transferring virtually all human resources-related information technology responsibilities to the Defense Information Systems Agency, becoming a customer rather than a human resources systems owner. The service is migrating its Total Force Service Center to the Defense Information Systems Agency’s (DISA’s) Defense Enterprise Computing Center, a fee-for-service organization providing processing capability, systems management, communications and data storage in a reliable and secure cloud-computing environment.
When a U.S. federal jury convicted Noshir Gowadia of spying for the People's Republic of China in August, it marked a victory for several U.S. investigative agencies. But the verdict might never have arrived without three years of assistance from another organization-the Defense Cyber Crime Center (DC3). Comprising five different entities, the military center has a special focus on computer forensics to assist its various customers and clients.
DARPA's Transformative Apps program is taking the Android to new places and will help keep warfighters out of harm's way. Much like its commercial counterparts, these apps will provide capabilities that the users didn't even realize they needed until they were in the palms of their hands. And best of all, new apps can be suggested, created and delivered in days rather than months because of an innovative production process.
The United States faces the likelihood of a “destructive cyber attack” in the future as malevolent digital capabilities proliferate among a range of adversaries, says the head of the U.S. Cyber Command, Gen. Keith B. Alexander, USA. He warns that nation-states and other malefactors now “can use this as a way of applying their will and power against our country in an asymmetric manner.”
The U.S. Marine Corps now has its first fully assembled Ground/Air Task Oriented Radar (G/ATOR) system and is working to overcome past difficulties to put the asset in warfighters' hands. Plans to upgrade multiple radar capabilities with the single system hit some snags over the past few years, but developers are back on track after finding solutions to the problems.
Most people distrust the security of all websites equally. But in reality, Web devotees can take simple precautions to ensure their safety while researching, shopping, downloading or playing browser games such as Texas Hold’em.
Give two cents—get big prizes. The U.S. General Services Administration (GSA), in partnership with ChallengePost, launched Challenge.gov on September 7 at the Gov 2.0 Summit 2010 in Washington, D.C. The free online challenge platform invites the general public to propose solutions to government challenges, including the U.S. Army’s push for new training and simulation tools utilizing artificial intelligence.
The Global Threat Reduction Initiative (GTRI) is working to keep U.S. citizens safe from dirty bombs by conducting exercises on the other side of the world. Members representing the initiative recently wrapped up a three-scenario tabletop exercise in Mongolia to help the country prevent terrorists from obtaining its nuclear or radiological material.
Years from now, engineers and scientists across the U.S. Defense Department may double-click an icon on their desktop computer screens and access the phenomenal processing power of the Army Research Laboratory (ARL) Defense Department Supercomputing Resource Center (DSRC) at Aberdeen Proving Ground, Maryland. Those computers are currently capable of processing 350 trillion calculations per second.