The SIGNAL Blog
Northrop Grumman Corporation has been awarded a five-year, follow-on contract valued up to $16 million by the National Institute of Allergy and Infectious Diseases, part of the National Institutes of Health. Under the contract, the company will create a resource that supports the research of pathogenic viruses and will lead to new medical treatments and preventive measures. Northrop Grumman was awarded the initial five-year contract in 2004.
Budgetary pressure may force the military to change the way it procures communications and information systems. The result may be the elimination of duplicative systems and interoperability problems.
The adage of "train the way you fight" isn't working for Marines using communications and networking systems. The result is that personnel have to learn how to use vital command, control and communications (C3) gear in the field, which hinders their effectiveness in a combat zone.
The top priority for the U.S. Pacific Fleet is not merely command and control, it is command and control of command and control (C2C2). That is the assessment delivered by Rear Adm. Scott Van Buskirk, USN, deputy commander and chief of staff, U.S. Pacific Fleet.
The U.S. Marine Corps is ramping up to conduct operations in cyberspace as part of its everyday capabilities. Marine Air Ground Task Forces (MAGTFs) will operate in cyberspace as they do on land, sea and air.
Technological solutions can bridge differences between the U.S. forces and other nations as the U.S. Pacific Command (PACOM) builds relationships among its diverse partners. The Marine Corps in particular are seeking translation technologies to break down language barriers in daily activities.
The U.S. Air Force has awarded BAE Systems a five-year contract valued up to $20 million to support the service's global monitoring for nuclear treaty compliance. The company will provide engineering, research and program management services for the Air Force Technical Applications Center at Patrick Air Force Base, Florida.
The information technology arena is experiencing large tectonic shifts that are directly affecting requirements for cybersecurity. Transitions-from physical to virtual; from the premise to the cloud; from more formal networks to social networks-will have their counterparts in new security requirements and approaches.