November 1, 2012
By Paul A. Strassmann


The Defense Business Board is the highest-level committee advising the U.S. Secretary of Defense. Its report on “Data Center Consolidation and Cloud Computing” offers advice on what directions the Defense Department should follow.

However, the Defense Business Board (DBB) report is incomplete. It does not offer actionable solutions; it only raises policy-level questions. As components are formulating budget requests through fiscal year 2018, they will find nothing in this report to guide them on what type of realignments are needed to advance the Defense Department toward cloud computing.

November 1, 2012
By Capt. Mike Stephens, USAF, and Frank Klucznik
 Gen. Stephane Abrial, FRA, Supreme Allied Commander Transformation (ACT), observes part of the Coalition Warrior Interoperability Exercise (CWIX) 12 held in June. The exercise helped validate the effectiveness of the new Tactical Edge Data Solutions (TEDS) joint capability technology demonstration (JCTD).

A new message exchange framework offers
 potential across department and coalition assets.

Different command and control systems are closer to enjoying Web interoperability as a result of experiments performed in coalition exercises. Protocols and processes developed by defense information technology experts can enable data to be exchanged among the services as well as in coalition operations.

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.

October 1, 2012
By Robert K. Ackerman

The newly reconstituted Joint Staff office is not just picking up where the previous version left off.

October 1, 2012
By Robert K. Ackerman

New common goals open doors for more efficient approaches to information sharing.

Technological and cultural barriers are falling away as intelligence community organizations strive to establish a collaborative environment for sharing vital information. This thrust may be a case of an urgent need overcoming traditional obstacles as onetime rival groups embrace cooperation with the goal of building a synergistic information realm.

September 12, 2012
By Robert K. Ackerman

Defense customers are driving change; this effort tries to map the future.

The new Defense Information Systems Agency (DISA) strategic plan lines up many of the diverse information technology thrusts that are whirring throughout the Defense Department, according to an agency official. Tony Montemarano, director for strategic planning and information at DISA, states that the plan’s main goal is to codify where DISA is headed. This direction is fueled by demand signals from the Defense Department, particularly in high-mileage areas such as the Joint Information Environment, mobility initiatives and cloud services.

July 2012
By Robert K. Ackerman, SIGNAL Magazine


When the U.S. Joint Forces Command folded, its networked functions did not disappear.

Transitioning a network amid a command disestablishment can produce more than its share of surprises.

June 2012
By Robert K. Ackerman, SIGNAL Magazine


U.S. Navy sailors learn cryptologic elements in a Joint Cyber Analysis Course at the Center for Information Dominance. The Navy’s multibillion-dollar Next Generation Enterprise Network (NGEN) program is a major step in the service’s drive toward information dominance.

March 2010
By Rita Boland, SIGNAL Magazine

Tuesday, January 02, 2010
By Maryann Lawlor


The DEFStar social networking front page has a clean look that enables users to immediately see the information that is most important to them.

Military and government personnel acquaint themselves with social media and each other.

Tuesday, September 08, 2009
By Maryann Lawlor

July 2007
By Henry S. Kenyon

The U.S. Army’s Integrated Air and Missile Defense Battle Command System (IBCS) will integrate sensors and weapons platforms such as this Patriot missile battery into a single battalion-level network.
Command and control tool weaves sensors, weapons into an integrated network.

February 2007
By Allan D. Kissam

The command, control, communications, computers and intelligence (C4I) Mobile Application Server (CMAS) emulates a C4I network. CMAS allows users such as John Olson (c); Cpl. Andrew Reiplinger, USMC (l); and Cpl. Eric Holcomb, USMC, to hone their skills with one stand-alone package.
Mobile application server delivers realistic, operational training to deployed troops.

May 2006
By Rita Boland

Editor's Note: This is a revised version of the article that appeared in the May 2006 issue of SIGNAL.


January 2006
By Dr. Cullen Jennings

Because of their robust reliability, security and flexibility, voice over Internet protocol solutions are being adapted by the military worldwide.
Voice technologies evolve for tomorrow’s military networks.

May 1999
By Michael A. Robinson

Finding the World Wide Web increasing in importance, businesses hit speed bumps in race to stay competitive.

The Internet’s promise of providing low-cost electronic commerce and information exchange in reality is bringing a whole new set of obstacles to corporations that are embracing these seemingly broad opportunities. These obstacles, apart from conventional logistics snags, involve rising costs, corporate intrigue and mushrooming marketing budgets.

May 1999
By Maryann Lawlor

Metaphorically speaking, cyberneighborhoods are right around the corner and growing fast.

The network urban landscape is under construction. And while T-1 lines and Ethernet may deliver the power, they are also becoming the lines of communication between cyberbuildings that host fully equipped accommodations for meetings, classes and seminars.

May 1999
By Michelle L. Hankins

Research could challenge existing notions of the network layer hierarchy.

Now that information service providers are rushing to provide global high-speed connectivity, differences of opinion have emerged about which type of protocol will best link diverse users. The potential for a dramatic shift in network methodology and the inability to predict what the future communications protocol of choice will be have left developers in a quandary.

May 1999
By Michelle L. Hankins

Embedded information makes diagrammed pictures worth a thousand words.

Many of the complex and often tediously precise tasks for computer and telecommunications planners and administrators can now be delegated to automation software designed to graphically represent architectures. The software eliminates many of the network maintenance frustrations by presenting information in a basic diagram with embedded data accessible in multiple levels beneath the illustrations.