Warfighters must keep their eye on the metrics to manage and secure military networks.
Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.
U.S. Defense Department’s strategic plan and cloud computing mesh well.
Cloud computing could give a major assist to the U.S. Defense Department’s information technology strategy for implementing network-centric operations.
Federal investments advance national threat protection capabilities.
Unmanned aerial vehicles are used extensively in current operations and to some degree to patrol borders; however, size and power requirements may limit extensive use in homeland security efforts.
Data analysis continues to prove difficult in multilevel security realm.
Accredited, tested solutions could allow military decision makers and intelligence analysts to access information and make decisions simultaneously using information that resides in multiple security classifications. However, although the U.S. Defense Department is moving forward to address information-sharing challenges, it has encountered difficulties in proving and certifying these technologies in a testbed environment.
Administrators strive for free flow of information between nations.
The debate between the European Union and the United States over protecting personal information represents a fundamental cultural difference that could alter the future growth of electronic commerce. Throughout this debate, these differences have threatened to bring data transfers from within the European Union to the United States to a grinding halt.
Distance education specialists agree that learning has never been a place--it has always been a process.
The smell of fat crayons, the snap of three-ring binders and the crack of book spines as they open for the first time bring back memories of those old school days. Students today, both in the classroom and on the job, are more familiar with the hum of a hard drive and glow of a monitor screen. One thing, however, has not changed--the up-front expenses for an education rarely reflect the final cost.
Experts debate accommodation of third-generation communications devices.
Open systems require multilevel security solutions.
Government agencies and commercial companies that are striving to share data to protect citizens or improve service to customers are discovering that as access to data increases, information security challenges grow exponentially. To address this concern, trusted security approaches emerging from government applications offer information assurance at both the operating-system and relational-database-management levels.
Problem may be more widespread than officials acknowledge.
Having effective sensors, fire control, ordnance and control systems is only part of the picture for building a capable shipboard combat system. The task that makes all of these play together is called combat system integration, or CSI.
Many foreign navies rely on CSI to pull together shipboard combat systems that have components originating from different suppliers. If integration is not done well, it can be very costly and take years to do what should take months. Valuable warships needed for naval missions can be unavailable for years. The result is best described as combat system dis-integration.
Technology advances are balanced against national, institutional needs.
Three important decisions reached at the recent World Radiocommunication Conference may hold substantial ramifications for the United States and the global telecommunications community as a whole. Many of the issues discussed at the conference are illustrative of the realities affecting both commercial and U.S. Defense Department spectrum usage today.
Changes in government procurement policies may play critical role.
After years of economic stagnation, the satellite industry could find that a turnaround is about to begin. Early returns point to a resurgence in interest and visibility for a weathered, yet optimistic, industry. Now more than ever, the government community recognizes that the commercial satellite industry plays an essential role in both international and homeland security. Several important occurrences in 2003 have set the stage for a turnaround.
Advanced technologies lie at the heart of most efforts.
The focus of long-term changes underway in China’s military is on regional rather than global improvements. This approach includes deploying systems that have only a local reach as well as developing or acquiring advanced technologies for specific military units or elements.