The Joint Information Environment (JIE) will enable a single security architecture that may be the key to defending the U.S. military against attacks from cyberspace, said the Joint Staff’s top communicator on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
The U.S. military needs to take active measures to ensure that it acquires good cyber professionals, said the Joint Staff's communicator.
U.S. military forces will not be able to pursue operational goals successfully unless the Joint Information Environment (JIE) is implemented, according to a member of the Joint Staff.
The future soldier, sailor, airman, Marine and coast guardsman may be communicating with a mobile device attached to his or her wrist, if the vision of the nation’s top uniformed communicator comes to pass.
The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.
The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.
A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium.
Private sector high-technology firms are taking considerable measures to ensure the security of data, knowing that industrial espionage or foreign sabotage could cost a company its competitive edge or even put it out of business.
The defense community should follow the lead of the private sector in both technologies and processes, said industry experts on a panel at AFCEA's JIE Mission Partner Symposium, and revamp the way of doing business.
The Intelligence Community Information Technology Enterprise has generated a host of lessons learned that could be applied to many network consolidation efforts. Al Tarasiuk, chief information officer, Office of the Director of National Intelligence, outlined these lessons to a luncheon audience on the second day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium.
The Intelligence Community Information Technology Enterprise, or ICITE, will link to the Defense Department’s Joint Information Environment (JIE) via a bridge architecture. The Defense Intelligence Information Enterprise will ensure that ICITE and the JIE can coexist.
The U.S. Defense Department should reach out to the hacker community for critical expertise in the war against cyber aggressors, said a member of industry during AFCEA's JIE Mission Partner Symposium.
The U.S. Special Operations Command is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.
The Defense Logistics Agency is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment, which will help improve interoperability.
The U.S. Transportation Command moves more information than it does any physical commodity, and this development has redefined the command's security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.
Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials said during AFCEA’s JIE Mission Partner Symposium.
The battle against cybermarauders begins with individual home computers, said Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command (NORTHCOM), and deputy J-3 for cyberspace operations at NORAD, during a panel presentation on the second day of AFCEA's three-day JIE Mission Partner Symposium.
New information technologies may change the military to a greater degree than they have changed society at large, suggested a panel of chief technology officers at AFCEA’s three-day Joint Information Environment Mission Partner Symposium being held in Baltimore.
The most important innovation looming in information technology may involve virtual networks. Software-defined networking will open a new door to network architectures and activities that will rival previous advances, according to a panel of industry chief technology officers at AFCEA's three-day JIE Mission Partner Symposium being held in Baltimore.
The cloud, social media and cybersecurity are some of the major issues vexing two of the world’s major information technology users. One of those users is the U.S. military, but the other is IBM, which is plotting a road map to the future that might apply to the defense community.