Home
About Us
About
SIGNAL
Meet the Staff
Upcoming Stories
Writer's Guide
Contact Us
Articles
Current Issue
Digital Edition
Search the Archives
Departments
Chapter News
Contract Awards
Homefront Help
Internet Works
Recent Events
AFCEA Directories>
Source Book
Cybersecurity Directory
Health IT Directory
Intelligence Directory
Homeland Security Directory
Education Directory
Directories Tips and Guides
Webinars
Advertising
Media Kit
Sales Contacts
Advertisers FAQ
Current Advertisers
Subscribe
Subscribe to SIGNAL
Newsletters
Join AFCEA
RSS Feeds
Legal
AFCEA's Privacy Policy
Copyright
For Bloggers and Educators
Rights and Reprints
Social Media Policy
AFCEA
About AFCEA
Join AFCEA
Chapters
Chapter News
Source Book
Events
Member Login
Blog
e-Newsletter
Resource Library
Directories
Webinars
SIGNAL Article Search
Keywords :
Category :
-- All --
2008 12 SIGNAL Connections
2009 01 SIGNAL Connections
2009 02 SIGNAL Connections
2009 03 SIGNAL Connections
2009 05 SIGNAL Connections
2009 06 Connections
2009 07 SIGNAL Connections
2009 08 SIGNAL Connections
2009 09 SIGNAL Connections
200904SIGNALConnections
Acquisition
Acquisition Forecast
Aerospace
AFCEAN of the Month
Afghanistan
AFRICOM
Air Force Technologies
Analysis
Anniversary Section
Antenna Technology
April 1999
April 2000
April 2001
April 2002
April 2003
April 2004
April 2005
April 2006
April 2007
April 2008
April 2009
April 2010
April 2011
April 2012
Architectures
Army Technologies
Artificial Intelligence
Asia-Pacific
Association Feature
August 1999
August 2000
August 2001
August 2002
August 2003
August 2004
August 2005
August 2006
August 2007
August 2008
August 2009
August 2010
August 2011
August 2012
Aviation
Avionics
Battlefield Information Systems
Battlespace Information Systems
Biometrics
Breaking News
Bulgaria
Business
C4ISR Market Forecast
Cloud Computing
Coalition Operations
Coast Guard Technologies
Collaborative Technologies
Command and Control
Commentary
Communications
Computing
Convergent Communications
COTS Electronics
Counter IED
Cover Story
Current
CWID
Cyber Operations
Cyber Threat
Cybersecurity
Cyberspace
Czech Republic
Data Management
Data Mining
Data Storage
December 1999
December 2000
December 2001
December 2002
December 2003
December 2004
December 2005
December 2006
December 2007
December 2008
December 2009
December 2010
December 2011
Digital Medicine
DISA
Display Technologies
Distance Learning
E-Commerce
E-Government
Electronic Warfare
Embedded in Afghanistan
Embedded in Afghanistan _ Print Articles
Emergency Response
Energy
Entrepreneurial Government
Europe
Featured Homeland Stories
Featured Stories
February 1999
February 2000
February 2001
February 2002
February 2003
February 2004
February 2005
February 2006
February 2007
February 2008
February 2009
February 2010
February 2011
February 2012
Federal Laboratories
Fleet Operations
Force Transformation
Future Technologies
Future Warfighting
Geospatial Information Systems
Germany
Global Threat
Government Information Technology
Government Labs
Government Research
Guard and Reserves
Health Information Technology
Highlights
Homeland Defense
Homeland Security
Hurricane Katrina Recovery
Imaging
Incoming
Information Operations
Information Security
Information Sharing
Information Systems
Infrastructure Protection
Input
Intel Blogs
Intel Essays
Intel Small Business Blog
Intel Tech Blog
Intel White Papers
Intelligence
International
Internet Networking
Iraq
IT Acquisition
Italy
January 1999
January 2000
January 2001
January 2002
January 2003
January 2004
January 2005
January 2006
January 2007
January 2008
January 2009
January 2010
January 2011
January 2012
Joint Operations
Joint Warfighting Coverage
Joint Warfighting Features
July 1999
July 2000
July 2001
July 2002
July 2003
July 2004
July 2005
July 2006
July 2007
July 2008
July 2009
July 2010
July 2011
July 2012
June 1999
June 2000
June 2001
June 2002
June 2003
June 2004
June 2005
June 2006
June 2007
June 2008
June 2009
June 2010
June 2011
June 2012
JWID
Knowledge Management
Land Forces
Land Forces Southwest Featured
Language Translation
Law Enforcement
Law Enforcement Technologies
Lead Photos
March 1999
March 2000
March 2001
March 2002
March 2003
March 2004
March 2005
March 2006
March 2007
March 2008
March 2009
March 2010
March 2011
March 2012
Marine Corps Technologies
Maritime Security
May 1999
May 2000
May 2001
May 2002
May 2003
May 2004
May 2005
May 2006
May 2007
May 2008
May 2009
May 2010
May 2011
May 2012
Military
Military Aerospace
Military Laboratories
Missile Defense
Mobile Government
Modeling and Simulation
Nanotechnology
Navy Technologies
Netherlands
Network Centric Operations
Networks
NewsNet
Next-Generation Technologies
Notes on Intelligence Blog
November 2000
November 1999
November 2001
November 2002
November 2003
November 2004
November 2005
November 2006
November 2007
November 2008
November 2009
November 2010
November 2011
October 1999
October 2000
October 2001
October 2002
October 2003
October 2004
October 2005
October 2006
October 2007
October 2008
October 2009
October 2010
October 2011
On Cyber Patrol
Optics
Personal Warfighter Technologies
Poland
Portugal
Power Technologies
Presidents Commentary
Remote Sensing
Research and Development
Reserves
Robotics
Satellite Communications
Satellite Telecommunications
Science and Technology
Security
Sensors
September 1999
September 2000
September 2001
September 2002
September 2003
September 2004
September 2005
September 2006
September 2007
September 2008
September 2009
September 2010
September 2011
Side Bar
SIGNAL BLOGS
SIGNAL Connections
SIGNAL Forum
SIGNAL Online
SIGNAL Online Exclusives
Simulation and Tranining
Small Business
SOCOM
Southwest Asia
Space
Special Operations
Spectrum
STRATCOM
Surveillance and Reconnaissance
Sweden
Tactical Operations
TechNet Land Forces East Coverage
TechNet Land Forces South Featured
TechNet South Coverage
TechNet SW Coverage
Technology
Telecommunications
Telemedicine
TNLF East Featured
Training
Transformation
U.S. Southern Command
Unmanned Systems
Veteran Focus
Viewpoint
Virtual Collaboration
Virtual Newsstand
Warfighter Technologies
Web 2.0
Web 3.0
West 2012 Featured
West Coverage
West Coverageold
Wireless Communications
Wireless Technologies
Year 2000 Strategies
Archives
What is RSS?
31.
As With the Rest of the World, Europe and NATO Are Changing
(September 2010 - By Kent R. Schneider, SIGNAL Magazine)
The fundamental nature of warfare has changed. Asymmetric warfare has become the prominent threat. Non-state actors, often difficult to identify, have become the primary warfighters in many cases. The cyber domain has been recognized as one of the most dangerous and potentially harmful warfighting domains. And, defense and security budgets are strained by a troubled global economy. Does this sound familiar? It is the environment no matter where you sit on this globe.
32.
The Primacy of Focus on Cybersecurity
(August 2010 - By Kent R. Schneider, SIGNAL Magazine)
This month’s SIGNAL Magazine includes a focus on information security, which, these days, I can only think about in the context of the larger cybersecurity problem. There finally is a preoccupation with discussing cybersecurity on an international basis. The important question is, “How much of this dialogue is being converted to action/implementation?” This is a timely subject for me, as I have written this commentary while sitting in an international conference on Regional Collaboration in Cyber Security being held in Singapore.
33.
It Is All About the Enterprise
(July 2010 - By Kent R. Schneider, SIGNAL Magazine)
The U.S. Army has become a fount of innovation. Under the leadership of Lt. Gen. Jeff Sorenson, USA, the Army’s chief information officer/G-6, and Maj. Gen. Susan Lawrence, USA, commanding general of the U.S. Army Network Enterprise Technology Command (NETCOM), the Army is transforming its LandWarNet to become a global enterprise network fully capable of supporting an expeditionary Army in an era of persistent conflict.
34.
Change Is More Than a Line Item
(June 2010 - By Kent R. Schneider, SIGNAL Magazine)
The U.S. fiscal year 2011 budget submission is in the hands of Congress, and information on defense budgets internationally provides clarity in the wake of the global economic crisis. At the same time, dialogue with government and industry has given us some insight into near- and mid-term direction. I want to share some of that information because the more we all understand probable trends and direction, the better we will be able to work together to provide the solutions needed going forward.
35.
Joint Operations Are Complex and Diverse
(May 2010 - By Kent R. Schneider, SIGNAL Magazine)
36.
An Agency In Transformation
(April 2010 - By Kent R. Schneider, SIGNAL Magazine)
The Defense Information Systems Agency (DISA) is in the final stages of planning and executing its Base Realignment and Closure (BRAC) move from Arlington, Virginia, to Fort Meade, Maryland. Our nation remains at war, with a surge occurring in Afghanistan and pending withdrawal being planned and prepared in Iraq. The recently published Quad- rennial Defense Review will drive a course change in critical defense domains. Cyberspace has become a focus for our nation, and it has gained priority in governments around the world as a warfighting domain.
37.
Cyberspace Issues Touch Everyone
(March 2010 - By Kent R. Schneider, SIGNAL Magazine)
Probably no other area is receiving more attention and more discussion in the global security community than cyberspace. The realm of cyberspace is so critical to every part of society that it finally has been recognized as both a major asset and a threat environment. It could have tremendous impact on defense as well as crucial industries such as finance, energy, water and others if denied to nations or companies. As a result, every nation is trying to define its roles and vulnerabilities in cyberspace, and alliances such as NATO are creating organizations and procedures to strengthen their position.
38.
Revisiting Homeland Security—Again
(February 2010 - By Kent R. Schneider)
No, the title is not a redundancy. Given all the recent events in homeland security, it appears the whole process will undergo yet another round of reviews. I don’t think any of us would question that security is better today than in 2001. But is it good enough? Probably not.
39.
A New Year Dawns for AFCEA
(Tuesday, January 02, 2010 - By Kent R. Schneider)
As we kick off the new year, it is appropriate to give you an update on AFCEA—what have we accomplished over the past year and where we are headed in 2010.
40.
It's All About Trust
(December 2009 - By Kent R. Schneider)
Periodically, we ask the senior leadership of the global security community to give us feedback on their top priorities in the command, control, communications, computers, intelligence and information technology domains. In the past couple of years, they have been fairly consistent in saying that their top priority is interagency and coalition information sharing.
Articles Found
: 75
Page 4 of 8
Go to Page :
1
2
3
4
5
6
7
8
<<
>>
Sponsor Advertisements
"
SIGNAL:
Reading Loud and Clear."