SIGNAL Blogs

June 9, 2016
By Sandra Jontz
NATO officials highlight several business initiatives to meet future needs during the NITEC 2016 cyber conference in Tallinn, Estonia. Photo by Marcos Fernandez Marin, NCI Agency

Industry said, “Show me the money,” and NATO obliged. Officials shared several key business initiatives to meet future NATO needs during the three-day NITEC 2016 cyber conference, informing industry members about 3 billion euros worth of upcoming business opportunities and contract work.

June 8, 2016
By Sandra Jontz

The world needs at least 1.5 million cybersecurity professionals who do not exist—a labor shortage created by the increase in frequency and severity of cyber attacks and employers all fishing from the same pond, said Michael Cameron, vice president for business development, cyber and cybersecurity at Leidos, during the NITEC 2016 cyber conference.

June 7, 2016
by Sandra Jontz
Lt. Gen. Riho Terras, commander of Estonian Defense Forces, warns that Europe is too reactionary to world events while speaking at the NITEC 2016 cyber conference in Tallinn, Estonia. Photo by Marcos Fernandez Marin, NCI Agency

Europe is asleep at the wheel and needs an awakening before it crashes, warned Lt. Gen. Riho Terras, commander of Estonian Defense Forces. The reactionary nature of the continent’s militaries has caught leaders unawares far too many times already, and forces no longer can afford to leave proactive measures to someone else, Gen. Terras shared at of NITEC 2016. 

June 7, 2016
By Sandra Jontz
Ingvar Parnamae, undersecretary for defense investments for the Estonian Ministry of Defense shares some of the Baltic nation's defense challenges during NITEC 2016, running June 7-9 in Tallinn, Estonia. Photo by Marcos Fernandez Marin, NCI Agency

Small nation-state budgets aren’t always such a bad thing, offered Ingvar Parnamae, undersecretary for defense investments for the Estonian Ministry of Defense. It forces leaders to make good choices—it is hoped. 

June 6, 2016
By Al Krachman, Esq.

Bidders for federal contracts need to pay attention to the most minute of details, lest they lose the bid up front or on appeal. There is no space to maneuver when it comes to government proposal specifications.

June 6, 2016
By Beverly Mowery Cooper

A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach.

June 2, 2016
By Katie Helwig

As AFCEA International kicks off its next series of contracting courses, the association's manager of small business programs Katie Helwig mulls over advice contributors from the last series shared with participants. One common message correlates nicely with revamping dinner recipes, Helwig shares: You might use similar ingredients for creating a proposal, but don’t just "cut and paste" from your repository—reposition to fit the situation. The end result should be an original recipe that explains, excites and inspires.

June 2, 2016
By Joel Dolisy

No one needs reliable connectivity more than the nation’s armed forces, especially during the heat of battle. But reliable connectivity often can be hampered by a hidden enemy: latency and bandwidth concerns. The Army is working a network solution and has laid out a communications blueprint that other defense organizations can—and should—emulate, writes SolarWinds' CIO Joel Dolisy.

May 23, 2016
The AeroVironment Tether Eye UAS is being evaluated for the counterterrorism mission.

AeroVironment Inc. has announced the U.S. Combating Terrorism Technical Support Office (CTTSO) is evaluating the company’s new tethered unmanned aircraft system, named Tether Eye, for intelligence, surveillance, reconnaissance and security applications.

May 25, 2016
By Robert K. Ackerman

The U.S. Navy wants to apply lessons learned by industry in the commercial marketplace to its own information technology capabilities. So, it is instituting Technology Exchange Meetings, or TEMs, in which industry can present solutions based on its own experiences with new capabilities.

May 24, 2016
By Sandra Jontz

In just a matter of weeks, DISA will open the process for requesting proposals for the next round in the U.S. Defense Department’s cloud services offering. DISA’s pre-solicitation notice serves as notification to industry of the upcoming RFP package for milCloud 2, Phase 1 contract, a government-offered service that, while not a completely commercial cloud-based system, leverages commercial products.

May 23, 2016
By Max Emelianov

By now, you've probably heard all about the so-termed Panama Papers, one of the largest data leaks in history with 11.5 million confidential documents leaked online. How did it happen—and what can we learn from it?

May 20, 2016
By Beverly Mowery Cooper
Lt. Gen. Arnold W. Bunch Jr., USAF, military deputy, Office of the Assistant Secretary of the Air Force for Acquisition, spoke at the AFCEA International/GMU Critical Issues in C4I Symposium.

The Air Force can move down the cost/schedule curve to benefit value delivered to the warfighter, and the key is communications and dialog, said Lt. Gen. Arnold W. Bunch Jr., USAF, military deputy, Office of the Assistant Secretary of the Air Force for Acquisition, during his address to the AFCEA International/GMU Critical Issues in C4I Symposium.

May 24, 2011
By Max Cacas

When it comes to the transition for C4I systems to cloud computing architectures, both the challenge-and the promise--boils down to "getting the right information to the right individual at the right time--and doing it securely," according to Teri Takai, Assistant Secretary of Defense for Networks, and DoD Chief Information Officer (CIO).

May 25, 2011
By Max Cacas

In his talk regarding the G-6's strategic vision for managing IT resources ""from the Pentagon to the warfighter in theater," Col. Michael Jones, USA (Ret.), noted the most recent challenge to the U.S. Army: the explosive growth of mobile devices, such as iPhones, BlackBerrys and Android tablets.

May 26, 2011
By Max Cacas

Additional headlines, bullet points, and takeaways from the AFCEA "Solutions" series conference, "Critical Issues in C4I", sponsored by AFCEA International and the George Mason University C4I conference, held May 24th-25th at George Mason University in Fairfax, Va.:

May 19, 2016
By Beverly Mowery Cooper
William Halal, chairman of TechCast Global, speaks at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

By the year 2040, we can expect to have general artificial intelligence comparable to humans, according to William Halal, chairman of TechCast Global, speaking on a panel at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

May 19, 2016
By Beverly Mowery Cooper
Lt. Gen. Rhett Hernandez, USA (Ret.) (l), spoke with conference attendees about the importance of academic, industry and Army partnership for innovation in the cyber domain.

Through innovation, we must adjust the human-machine balance to increase operational effectiveness. This begins with investing in people and technology, said Lt. Gen. Rhett Hernandez, USA (Ret.) at the AFCEA International/George Mason University Critical Issues in C4I Symposium.

May 19, 2016
By Bob Fortna
Realizing benefits such as lighter and more agile equipment, the Army has launched a steady march toward network modernization, evident through efforts such as the Project Manager Warfighter Information Network-Tactical (PM WIN-T).

For too long, warfighters have struggled with issues of space, weight and power, each posing major problems in tactical environments. Networking equipment historically has contributed to all three—barriers that must be expunged. Soldiers must travel light. Humvees that barely fit four people must serve as both transport vehicles and portable communication hubs. And networks must be powerful yet agile.

May 17, 2016
By David E. Meadows

History has shown that deceiving an enemy may lie as much in reactions as actions.

Pages