From Aerostats to chat rooms, the demand for intelligence, surveillance and reconnaissance assets in Afghanistan is at an all-time high. As coordinators work to allocate and organize the largest number of capabilities ever deployed, the challenge remains to maximize the potential of what already exists.
The semantic Web's ultimate objective is to endow everyone with the capacity to compile, assess and exploit data for decision making. The Navy's IDC is working toward this goal with the belief that only a semantic approach-where the computer network relates data to its local situation-can deliver that outcome. Agree or disagree? Share you input here.
Cloaking technology that could enable troops to hide in plain sight is still in the R&D stage. Advances made by the U.S. Army Research Lab and participating universities, however, mean the ability to achieve invisibility is no longer just within the purview of the Stealth fighter of years past. How far into the future will "cloaks of invisibility" become standard-issue gear? Are other organizations studying this capability and working to collaborate? Share your thoughts here.
The Navy/Marine Corps Intranet ultimately is facing relegation to the cyberspace garage, with the sea services revving up their new NGEN for launch in 43 months. By going the multivendor route, rather than using a single vendor, NMCI/NGEN architects must adjust to multiple changes and procedures. They see no risks, but the current vendor does. Will the NGEN changeover be smooth, or is the road ahead a rocky one? Share your views.
Despite challenges, however, the government has expressed the political willpower to continue implementing electronic governance, and the general public supports the effort, Zografov states. In addition, the country has invested in the human capital needed to continue its transformation. "For me, the most positive action of the international information technology business is the right evaluation of the Bulgarian information technology human capital. Despite the small size of the internal market, many companies have established their offices, competence and service centers, software development centers and training programs," he says.
The words soldier and hero often are synonymous, but what about soldiers and super heroes? A new robotic exoskeleton that gives warfighters amazing strength would make even the Hulk green with envy.
DARPA's dynamic spectrum access radio technology is but one solution in the overall quest to increase electromagnetic spectrum efficiency-but it's considered state of the art. The DSA can be likened to a traffic cop in that it directs the flow of spectrum traffic based on usage and volume. Cooperative efforts among international entities in the military, public and private sectors is integral to making this technology a continued success. Read the complete article and share your views on the DSA's impact and further potential.
Whether for military ops, standard communications or a lofty connection linking nations together during crises, space systems are critical. Enhancing the ability to monitor space assets-and to augment them with newer, better equipment-is a major STRATCOM mission. The command continues to move forward and to seek commercial support, but are the requirements clear? Is the acquisition process easily navigable? Share your thoughts here.
Homeland security, coalition and other military operations-all depend on the fruits of quick and efficient data processing, exploitation and dissemination. Companies with solutions are making it work with greater efficiency and less impact on bandwidth, paring down copious amounts of data to the bare essentials. Can more be done to achieve success? Read the full article and share your ideas.
It's a wide world out there, and U.S. government agencies can use all help available to catch the bad guys. The Army's Biometrics Identity Management Agency is tasked with and has undertaken the job of coordinating biometrics across the Defense Department, patching together the databases of Justice, State and Homeland Security in the endeavor. Are these efforts reaping benefits yet, and can this coordination be achieved seamlessly? Read the full article and share your views.
PACOM has the overarching responsibility for ensuring security in the Asia-Pacific region. The organization's commander offers that if PACOM can get its five focus areas right, it will have achieved its goals and enable it to focus on other challenges. What's the ideal future scenario? Read the complete interview and share your input.
PACOM's effort to increase interaction between the U.S. and foreign governments through training exercises can reduce the potential for disputes or conflicts. What more can be done in the area to promote security and stability? Share your ideas here.
The United Kingdom plans to undertake the monumental task of restructuring its defense forces, equipping them to face current and future challenges more effectively. Do its plans thus far adequately address the major threats? Or, has it failed to focus more on specific contingencies? Share you ideas and suggestions here.
The NATO NC3A's ultimate goal is interoperability among alliance nations and their regional neighbors, and it is poised to provide more innovative, cost-effective tools. On its current path, is the NC3A meeting its challenges, and will these solutions prove successful in the long term? Discuss your ideas here.
The notion of robots as trusted companions on the battlefield is no longer limited to the scope of science fiction or TV adventure. With the U.S. Army's Robotics Collaborative Technology Alliance and its members forging ahead on autonomous technologies, warfighters may just very well have their own "Lassie" to save the day. What more can be done to enhance robotic artificial intelligence to benefit the troops? Share you ideas here.
CWID 2010 has continued its tradition of showcasing innovative technologies in an active, joint scenario. Participants now "play and learn" in a realistic environment modeled after the combat theater of Afghanistan. While some believe CWID has outlived its usefulness, others advocate its importance to joint operations in the international arena. What's your opinion?
NACMAST aims to broaden the view of the cyberwarfare intelligence base, and Seminole is one solid outcome of these efforts. Read the full article to learn more about this testbed and Seminole's components and operation. Share your views on this IDS architecture's current status and its potential for future success.
The changeover to another generation of IT professionals is inevitable; it's happening right now. But does the federal IT community have a handle on just what this transition entails, and have the Defense Department and other organizations prepared adequately to take on the changes consistently and effectively? Will they end up with a deer-in-the-headlights look, or will they be able to adjust without a hitch? Discuss your ideas and suggestions here.
The military services haven't accepted the GIG or NECC as a unifying design. Has this been to their detriment? What other initiatives underway could bridge the interoperability gap and enable networks to expand to meet global C2 needs? Share your expertise, ideas and suggestions here.
Linton Wells II points to UnityNet as an example of how information sharing can support U.S. and coalition strategy in Afghanistan and elsewhere around the globe. He then challenges readers: "Now think of how you can support UnityNet-like approaches."