SIGNAL Online Exclusives

August 28, 2013
By Robert K. Ackerman

The U.S. Army’s Network Integration Evaluation (NIE) is a good idea that is not achieving its potential, according to the Government Accountability Office (GAO).

August 27, 2013
By Rachel Lilly

Cutting-edge consumer technology that once seemed possible only in science-fiction films now is in the hands of experts and innovators working to solve government challenges. From wearable mobile devices to a sensor that lets you control your screen with the wave of a hand or lift of a finger, these tools could one day be key to serving soldiers in the field.

August 26, 2013
By Rita Boland

Iris scans are a legitimate form of biometric identification over the long term, a new study from the National Institute of Standards and Technology confirms.

August 21, 2013
By Henry Kenyon

As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.
 

July 31, 2013
By Robert K. Ackerman
Eugene Kaspersky, chief executive officer and co-founder of Kaspersky Lab, runs through the cyber threat spectrum and offers some solutions.

Protecting the nation from cyber attack entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.
 

July 19, 2013
By Max Cacas

In October 2014, the International Telecommunications Union (ITU) is scheduled to convene its Plenipotentiary Conference in Busan, South Korea. The conference, held every four years, is a venue for ITU member nations, including the United States, to discuss matters pertaining to the management of the planet’s telecommunications infrastructure.

July 11, 2013
By George I. Seffers

The U.S. Army is currently delivering a new and improved Coalition Joint Spectrum Management and Planning Tool (CJSMPT) to divisions scheduled for deployment in Afghanistan. The software automates the spectrum management process, dramatically reducing the amount of time and paperwork associated with spectrum allocation and mission planning in a tactical environment.

For operational security reasons, Army officials cannot reveal exactly which divisions will be receiving the systems or when, but for the next few months, they will be working to get the system out to Afghanistan.

June 27, 2013
By Robert K. Ackerman

The U.S. Navy has programmed change into its $3.45 billion Next-Generation Enterprise Network (NGEN) contract.

 

June 21, 2013
By Max Cacas
The U.S. Army has a long history of using supercomputers to further research and development toward meeting warfighter needs. A historical display of past Army supercomputers was part of the dedication of the new Army Supercomputing center.

The U.S. Army Research Laboratory (ARL) at Aberdeen Proving Grounds, Maryland, has unveiled two new supercomputers that are among the fastest and most powerful devices of their kind. The devices are part of a recently opened supercomputing center that is the new locus of the service’s use of high-speed computing not only for basic scientific research and development, but also to solve basic warfighter needs using the latest available technologies.

June 17, 2013
By George I. Seffers

NATO and eight coalition nations participating in the Coalition Warrior Interoperability eXploration, eXperimentation and eXamination, eXercise (CWIX) are working to reduce the amount of time it takes to join coalition networks in the future. On average, it took a year or more for a nation to join the Afghan Mission Network, but officials hope to trim that down to a matter of weeks, says Lt. Col, Jenniffer Romero, USAF, the CWIX Future Mission Network focus area lead.

June 12, 2013
By Robert K. Ackerman

In the midst of a raging controversy over widespread National Security Agency (NSA) monitoring, the head of the NSA and U.S. Cyber Command defends cyber surveillance efforts and calls for greater consolidation of cyber activities among diverse organizations.

June 12, 2013
By Rita Boland

Cyberwarfare is a primary concern for the U.S. Marine Corps as it continues its rebalance toward the Asia-Pacific region. With the growing involvement of cyber in every operation along with specific concerns of virtual attacks from large nations in the region, emphasis on the new domain is becoming increasingly important.

June 5, 2013
By Robert K. Ackerman

Concerns about the telecommunications supply chain have led U.S. network providers to institute extensive security procedures, but government officials are looking at establishing formal guidelines for procuring network components overseas—for better or worse.

June 3, 2013
By Henry S. Kenyon

If necessity is the mother of invention, innovation will be the father as the U.S. Navy seeks new methods that will allow it to continue to modernize amid harsh budget constraints.

May 31, 2013
By Rita Boland

Fort Bliss, Texas, has installed an unusual mircogrid to help power a dining facility on base, introducing a new approach to the U.S. Army’s efforts to find alternatives to traditional power. The technology is intelligent, optimizing energy usage.

May 24, 2013
By Max Cacas

A hand-picked group of Defense Department’s top information technology experts will work with a giant in the cloud computing industry to determine how security will play a part on the military’s migration to the cloud.

May 24, 2013
By Bev Cooper

The lowest price technically acceptable (LPTA) acquisition strategy, which focuses on price over value, has become the dominant approach that agencies are applying to federal contracting. The accelerated transition to this strategy has been fueled by sequestration and the growing need for government to do business at a reduced cost. Contractors are still learning how to operate in this new environment, but many fear that the emphasis on lower cost labor will reduce the expertise of the work force and result in lower levels of effort.

May 22, 2013
By Robert K. Ackerman

James Bond’s U.S. counterpart may be equipped more with commercial technologies than with systems developed in intelligence community laboratories. The private sector will be called upon to provide even more capabilities to help keep the intelligence community ahead of adversaries and budget cuts.

May 17, 2013
By George I. Seffers

 

 

 

May 9, 2013
By Robert K. Ackerman

Unmanned vehicles may become joint platforms as new software allows operators using a standard control system to use craft employed by different services. So, an Army squad deep in the battlefield may be able to use data accessed directly from a Navy unmanned aerial vehicle to bring an Air Force strike to bear against enemy forces.

Pages