The Kill Chain Integration Branch at Hanscom Air Force Base has begun an experimentation campaign, known as Data-to-Decisions, to look at ways to provide warfighters data in the fastest and most efficient way possible.
The SIGNAL Blog
The Defense Advanced Research Projects Agency (DARPA) has kicked off the Consortium for Execution of Rendezvous and Servicing Operations (CONFERS) to tackle the lack of clear, widely accepted technical and safety standards for responsible performance of on-orbit activities involving commercial satellites.
Engineers at the Massachusetts Institute for Technology, with support from the Office of Naval Research, have developed a portable measurement system to precisely and inexpensively monitor the amount the electricity used by individual household appliances, lighting fixtures and electronic devices.
While it’s clear the cloud is the future of government IT, concerns surrounding cloud security continue to abound. Some agency IT personnel remain skittish about handing over data to cloud service providers and skeptical that the data will remain out of the hands of bad actors. As a result, they’re more comfortable housing information in legacy IT systems, even if those systems are, in some cases, decades old and prone to security vulnerabilities, writes SolarWinds blogger Joe Kim.
When we think about critical infrastructure, specifically the sectors the Department of Homeland Security has deemed essential to the well being of the country, rarely does the idea center on public networking assets to support critical infrastructure. But a rapid transformation of network technology and security improved processes so that agencies now can take advantage of combined public and private networking to accomplish information technology goals.
It seems like a simple choice. You need to upgrade a platform’s computing capabilities but some of the existing hardware still is salvageable. Rather than do a complete upgrade from scratch, it is possible to retain much of the existing technology in the retrofit. But a closer inspection might reveal a different answer. Let’s peel back a few layers and see why—and when—it might make sense to throw away existing equipment and start over.
Hackers, take your mark. Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, the Army now launches its own challenge. it’s now the Army’s turn.
AFCEA’s Small Business Committee welcomed Marques Peterson and Kelly Buroker of Vedder Price to its November meeting to present on government contracts, with a focus on teaming agreements and bid protests.
At AFCEA TechNet Asia-Pacific, a panel of U.S. military communications officers stationed in the Asia-Pacific region told the defense technology industry what they most need to accomplish the mission. The list included capabilities ranging from next-generation authentication tools to airborne command and control network modeling.