Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Featured Stories

Defense Department Seeks Big-Picture View of Systems

March 2010
By Rita Boland, SIGNAL Magazine

The Defense Information Systems Agency is improving military networks by increasing the situational awareness of their statuses. The process enables people with permission to evaluate where a problem exists anywhere on a network, so they can reduce the time and resources necessary to fix it. Personnel also will be able to route their data better by understanding where failures occur and how to work around them.

Simulation Project Demonstrates Covert Applications

March 2010
By Rita Boland, SIGNAL Magazine

Researchers in the United Kingdom have completed a preliminary investigation into the use of millimeter-wave, body-worn antenna arrays to create mobile ad hoc networking for dismounted combat soldiers. The effort proved the feasibility and benefits of such a network as well as provided a platform for future study of the concept. Personnel involved in the experiments focused their work on the 60-GHz band, which offers the high amount of bandwidth necessary for troops to exchange large quantities of information on the battlefield. The short range of the communications enhances covertness by reducing the chance for enemies to exploit transmissions, and it also reduces interference.

Center Fortifies Cyberspace Front Line

March 2010
By Maryann Lawlor, SIGNAL Magazine

The convergence of information technology and voice communications is prompting another merger—this one between government and industry. The establishment of the National Cybersecurity and Communications Integration Center late last year is the first step in unifying the effort to keep U.S. information networks and infrastructure secure and to respond immediately in case of attack. The center increases the U.S. government’s ability to detect, prevent, respond to and mitigate disruptions of voice and cyber communications.

West 2010 Online Show Daily: Information Is the New Sextant for a Networked Navy

February 4, 2010
By Robert K. Ackerman and Maryann Lawlor

All the chief of naval operations did on the last day of West 2010 was describe the future U.S. Navy and its top requirements. Adm. Gary Roughead, USN, told an overflow audience at the three-day event’s final luncheon that the Navy will be built around information, in both technology and practice.

West 2010 Online Show Daily: New Needs, New Missions Mandate a New Navy

February 3, 2010
By Maryann Lawlor and Robert K. Ackerman

The second day of West 2010 began with an examination of one of the Navy’s biggest recent changes. During the Wednesday luncheon, Vice Adm. David J. “Jack” Dorsett, USN, the first deputy chief of naval operations for information dominance (N2/N6), outlined the three issues that he sees as key in this newly created position. The U.S. Navy must determine what it means for the United States to have information dominance, how it plans to achieve it and what the opportunities are for industry in this regard.

West 2010 Online Show Daily:The More Things Change, The More They Really Change

February 2, 2010
Robert K. Ackerman

The information revolution that is sweeping the globe is forcing radical changes in the national security arena. Previous notions of strategic and tactical military planning are being swept away as both time and power have new definitions. And, that information technology realm itself is a major player in the concept of national security.

Air Force Research Aims at Undefined Future

Tuesday, February 02, 2010
By Robert K. Ackerman

The future air battlespace may be dominated by unmanned aerial vehicles fully networked to exchange sensor information and battle damage assessments. They could be controlled remotely by human pilots or guided by autonomous programming that allows them to change their objective mid-mission like a flock of birds suddenly changing direction. Similarly, they might trade off capabilities to ensure mission success if one or more fails or is destroyed.

Washington D.C. Police Confront Homeland Security Challenges

Tuesday, February 02, 2010
By Robert K. Ackerman

The Metropolitan Police Department of Washington, D.C., is accelerating its implementation and use of information technology to meet the terrorist threat that looms over the U.S. capital. This includes adapting everyday police technologies for homeland security and counterterrorism operations, and it also involves bringing in new capabilities from the civil and private sectors.

Research in the Final Frontier

Tuesday, February 02, 2010
By Rita Boland

Nestled deep inside NASA’s Johnson Space Center in Houston is the Defense Department’s Human Spaceflight Payloads Office, where a team of personnel strives to find rides into space for military experiments. Tests that affect defense, security and commercial interests route through the office in the hopes of making it aboard a manned mission off the planet. The work in the office is only part of a program that aims to place as many research projects into space as possible. Successes from the experiments range from technologies now in everyday use to products that save lives on the battlefield.

Poland Prepares for A Networked Future

Tuesday, February 02, 2010
By Henry S. Kenyon

A key NATO nation on the alliance’s eastern flank is rapidly upgrading its computer and communications equipment to enhance interoperability with allied forces. Recent exercises and battlefield experience in Afghanistan have provided valuable lessons in establishing and managing networks in a coalition environment. This knowledge is being applied to the acquisition of new equipment, the creation of administrative and cyber security organizations and the adoption of alliance-wide policies for information assurance and data sharing.

Pages

Subscribe to RSS - Featured Stories