Networks

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.

October 1, 2012
By Robert K. Ackerman

The newly reconstituted Joint Staff office is not just picking up where the previous version left off.

October 1, 2012
By Robert K. Ackerman

New common goals open doors for more efficient approaches to information sharing.

Technological and cultural barriers are falling away as intelligence community organizations strive to establish a collaborative environment for sharing vital information. This thrust may be a case of an urgent need overcoming traditional obstacles as onetime rival groups embrace cooperation with the goal of building a synergistic information realm.

September 12, 2012
By Robert K. Ackerman

Defense customers are driving change; this effort tries to map the future.

The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.

July 2012
By Robert K. Ackerman, SIGNAL Magazine

 

When the U.S. Joint Forces Command folded, its networked functions did not disappear.

Transitioning a network amid a command disestablishment can produce more than its share of surprises.

June 2012
By Robert K. Ackerman, SIGNAL Magazine

 

U.S. Navy sailors learn cryptologic elements in a Joint Cyber Analysis Course at the Center for Information Dominance. The Navy’s multibillion-dollar Next Generation Enterprise Network (NGEN) program is a major step in the service’s drive toward information dominance.

March 2010
By Rita Boland, SIGNAL Magazine

Tuesday, January 02, 2010
By Maryann Lawlor

 

The DEFStar social networking front page has a clean look that enables users to immediately see the information that is most important to them.

Military and government personnel acquaint themselves with social media and each other.

Tuesday, September 08, 2009
By Maryann Lawlor

July 2007
By Henry S. Kenyon

 
The U.S. Army’s Integrated Air and Missile Defense Battle Command System (IBCS) will integrate sensors and weapons platforms such as this Patriot missile battery into a single battalion-level network.
Command and control tool weaves sensors, weapons into an integrated network.

February 2007
By Allan D. Kissam

 
The command, control, communications, computers and intelligence (C4I) Mobile Application Server (CMAS) emulates a C4I network. CMAS allows users such as John Olson (c); Cpl. Andrew Reiplinger, USMC (l); and Cpl. Eric Holcomb, USMC, to hone their skills with one stand-alone package.
Mobile application server delivers realistic, operational training to deployed troops.

May 2006
By Rita Boland

Editor's Note: This is a revised version of the article that appeared in the May 2006 issue of SIGNAL.

 

January 2006
By Dr. Cullen Jennings

 
Because of their robust reliability, security and flexibility, voice over Internet protocol solutions are being adapted by the military worldwide.
Voice technologies evolve for tomorrow’s military networks.

May 1999
By Michael A. Robinson

Finding the World Wide Web increasing in importance, businesses hit speed bumps in race to stay competitive.

The Internet’s promise of providing low-cost electronic commerce and information exchange in reality is bringing a whole new set of obstacles to corporations that are embracing these seemingly broad opportunities. These obstacles, apart from conventional logistics snags, involve rising costs, corporate intrigue and mushrooming marketing budgets.

May 1999
By Maryann Lawlor

Metaphorically speaking, cyberneighborhoods are right around the corner and growing fast.

The network urban landscape is under construction. And while T-1 lines and Ethernet may deliver the power, they are also becoming the lines of communication between cyberbuildings that host fully equipped accommodations for meetings, classes and seminars.

May 1999
By Michelle L. Hankins

Research could challenge existing notions of the network layer hierarchy.

Now that information service providers are rushing to provide global high-speed connectivity, differences of opinion have emerged about which type of protocol will best link diverse users. The potential for a dramatic shift in network methodology and the inability to predict what the future communications protocol of choice will be have left developers in a quandary.

May 1999
By Michelle L. Hankins

Embedded information makes diagrammed pictures worth a thousand words.

Many of the complex and often tediously precise tasks for computer and telecommunications planners and administrators can now be delegated to automation software designed to graphically represent architectures. The software eliminates many of the network maintenance frustrations by presenting information in a basic diagram with embedded data accessible in multiple levels beneath the illustrations.

December 1999
By Michelle L. Hankins

With less than 30 days remaining before the new year, federal agencies are predicting only minor disruptions.

The U.S. government is focusing on contingency planning to deal with potential malfunctions that could threaten operations at the onset of 2000. Agencies have been tasked with developing business continuity and contingency plans, many of which were tested this fall for year 2000 durability. Even organizations that are believed to be 100 percent compliant are establishing procedures to ensure that their core business procedures are not halted unexpectedly. This includes creating backup plans and determining key decision makers in the event of an operation shutdown.

September 2001
By Henry S. Kenyon

Applications link devices via power lines.

Internet access may soon be as close as the nearest electrical outlet. New power-line networking technology allows voice, data and video signals to travel through standard electrical lines, turning building or campus electrical grids into ready-made communications pathways. Connected by devices similar to modems that are plugged into wall sockets, computers and smart appliances can be linked together or to existing fiber optic lines without extensive installation costs.

Pages