Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo

SIGNAL Online Exclusives

Strategy Boosts Combat Decision-Making Capability

December 9, 2010
By Maryann Lawlor, SIGNAL Online Exclusive

The Air Combat Command is offering an information-sharing approach and visualization tool to facilitate decision making based on knowledge rather than available technology. As this strategy moves out, it will affect not only the U.S. Air Force but also the U.S. Defense Department and industry.

Military Releases Early C2 Data Standards

December 2, 2010
By Rita Boland, SIGNAL Online Exclusive

U.S. military command and control (C2) systems developers are closer to enhanced interoperability after the release of C2 Core Version 1.0 in October. The core is an open, Extensible Markup Language (XML)-based data exchange standard developed by the C2 community for capability implementation. These data standards change the current approach to military-systems design that results in unique interfaces, often with multiple standards for similar data, for each information exchange.

NIST Releases Better Bug Catcher

November 29, 2010
By George I. Seffers, SIGNAL Online Exclusive

National Institute of Standards and Technology (NIST) researchers recently released a new and improved bug catching system designed to more efficiently find software glitches during the development process. The Advanced Combinatorial Testing System (ACTS) generates plans for efficiently testing every combination of six or fewer interacting variables rather than the more commonly used “pairwise” approach to testing software, which checks combinations of only two variables.

Computer Viruses Hit Milestone; Cure Remains Elusive

November 18, 2010
By Beverly Cooper, SIGNAL Online Exclusive

The silver anniversary of the first PC virus is approaching in January, but even after 25 years, no victory celebration is on the horizon. Today, some experts contend we are moving from cyber mayhem to cyber missiles, as multifaceted software attacks are being used to target specific industries. The original computer worm that surfaced in 1979 was designed to scour a network for idle processors to enable more efficient computer use. Stuxnet, a worm discovered in July 2010, infects, spies on and modifies the control systems of industrial utilities, including nuclear systems. It is the most important malware yet seen, says Hypponen.

International Doctrine Development Thrives

November 10, 2010
By Maryann Lawlor, SIGNAL Online Exclusive

Multinational Experiment 6 sends one concrete solution directly into Afghanistan and creates inroads into coalition collaboration concepts that are being integrated into individual nations' military and political doctrine.

Federal Teleconference Centers to Open Nationwide

November 3, 2010
By Rita Boland, SIGNAL Online Exclusive

The General Services Administration (GSA) is establishing 15 virtual meeting centers across the United States for use by government personnel. Scheduled to open in 2011, the centers will be available to representatives from all federal agencies, military and civilian, and should help reduce greenhouse emissions and travel.

Shedding Human Resources Systems

October 21, 2010
By George I. Seffers, SIGNAL Online Exclusive

The U.S. Air Force Personnel Center is transferring virtually all human resources-related information technology responsibilities to the Defense Information Systems Agency, becoming a customer rather than a human resources systems owner. The service is migrating its Total Force Service Center to the Defense Information Systems Agency’s (DISA’s) Defense Enterprise Computing Center, a fee-for-service organization providing processing capability, systems management, communications and data storage in a reliable and secure cloud-computing environment.

Addressing Cyber Vulnerabilities

October 13, 2010
By Rita Boland, SIGNAL Online Exclusive

When a U.S. federal jury convicted Noshir Gowadia of spying for the People's Republic of China in August, it marked a victory for several U.S. investigative agencies. But the verdict might never have arrived without three years of assistance from another organization-the Defense Cyber Crime Center (DC3). Comprising five different entities, the military center has a special focus on computer forensics to assist its various customers and clients.

Apps Advance Onto the Frontline

October 5, 2010
By Maryann Lawlor, SIGNAL Online Exclusive

DARPA's Transformative Apps program is taking the Android to new places and will help keep warfighters out of harm's way. Much like its commercial counterparts, these apps will provide capabilities that the users didn't even realize they needed until they were in the palms of their hands. And best of all, new apps can be suggested, created and delivered in days rather than months because of an innovative production process.

Laser Backpack Prototype Maps Inside Buildings

September 30, 2010
By George I. Seffers, SIGNAL Online Exclusive

In the next few years, the U.S. military could field a portable, laser backpack device developed by the University of California, Berkeley, which will provide three-dimensional maps of buildings.


Subscribe to RSS - SIGNAL Online Exclusives