SIGNAL Connections

March 15, 2010

February 16, 2010
by Maryann Lawlor

The U.S. Coast Guard has deployed a nationwide alert system that notifies its maritime partners as soon as an emergency arises. Unlike previous communications capabilities, this system not only ensures that the appropriate people are alerted but also acts as a status system so during a disaster the Coast Guard can account for all personnel. This single commercial system both delivers the messages and confirms that they have been received—it is a two-way street of information about ground truth.

February 16, 2010

Small Satellite Data Transceiver
Designed for embedded applications such as remote asset tracking, this small satellite data transceiver permits two-way communications to and from remote devices. The matchbox-sized Iridium 9602 transceiver can be remotely reprogrammed and adjusted to provide specific data updates. For more information, visit www.iridium.com.

February 16, 2010
by Maryann Lawlor

With encouragement from the front lines, Capt. Josh Dixon, USMC, graduate student, Naval Postgraduate School (NPS), is exploring another way to bring the benefits of cell phone technology to warfighters. Although this type of work is going on within other military organizations, Capt. Dixon's study focuses on integrating cell technology by adapting the software-defined radios to host cell networks. With his colleagues, the captain aims at bringing secure cell phone technology to the field at an affordable price.

February 16, 2010
by Henry S. Kenyon

If U.S. Army scientists have their way, future antennas for vehicles and dismounted infantry will be smaller and more nondescript and will feature greatly increased reception. Research is focusing on lightweight conformal antennas that can be built into soldiers’ uniforms and equipment as well as vehicle structures.

February 16, 2010
SIGNAL Staff

January 15, 2010
SIGNAL Staff

Encryptor for High-Frequency Radios
This device is designed to support manpack radios and transceiver systems. The DV AES-256 Encryptor is engineered to improve the quality of voice communications in harsh and noisy environments. The encryptor can be programmed via a radio handset or the front panel of the transceiver. The device features 258-bit AES encryption, 128-bit CES encryption and frequency hopping keys. For more information, visit www.codanusinc.com.

January 15, 2010
by Henry S. Kenyon

Managing bandwidth over military computer networks is critical for modern combat operations. An experimental networking protocol may help get vital information to warfighters by tracking data and giving priority to specific users, such as a unit involved in a firefight.

January 15, 2010
SIGNAL Staff

January 15, 2010
By Amy Walker

Knowing the locations of friendly forces and enemy combatants can be the difference between life and death on the battlefield. The Joint Battle Command-Platform, or JBC-P, the second increment of the Force XXI Battle Command Brigade and Below (FBCB2), plots the participants of war for quick, precise identification. The JBC-P will employ both a celestial and terrestrial network to optimize bandwidth, efficiency and speed to adapt to various terrains and situations.

January 15, 2010
SIGNAL Staff

CPI

 
CPI’s SuperLinear® TWTAs, including the 40 W Ka-band outdoor amplifier pictured, are designed for optimal operation at backoff power levels that are required in order to meet traditional international intermodulation specifications. This has resulted in a line of HPAs that is smaller, lighter and runs cooler than competing products.

January 15, 2010
by Rita Boland

The U.S. military has added a third feature to its knowledge management tool suite milSuite by imitating a popular social networking site behind the firewall. MilBook enables users to create personal accounts as well as public and private groups to facilitate networking and data sharing. The application diminishes stovepipes by connecting people working on similar projects and moves information that might have been posted on a commercial site open to the world into a more protected environment.

December 15, 2009
SIGNAL Staff

December 15, 2009
SIGNAL Staff

December 15, 2009
by Katie Packard

Government and defense agencies can use a new data mining application to help gather and share information and intelligence as well as look for national security and terrorist threats. The tool searches the Internet and provides organizations with data that enables them to make informed decisions and, if necessary, respond quickly.

December 15, 2009
by Rita Boland

The U.S. Department of Homeland Security (DHS) is breaking rank with the current way of hiring government employees and instituting a new process to attract top talent in cybersecurity.

November 16, 2009
SIGNAL Staff

November 16, 2009
SIGNAL Staff

November 16, 2009
SIGNAL Staff

Secure File-Sharing Software
Designed for secure file sharing, the GigaTribe software package allows users to share photos, videos, music and other files with GigaTribe users in a private, fully encrypted peer-to-peer environment. Only recipients selected by users can see the files and can decide whether they wish to download them. The company claims there are no files to upload, no size limitations and all transfers are encrypted. For more information, visit www.gigatribe.com.

Pages