Analysis

July 2009
By Paul A. Strassmann

Warfighters must keep their eye on the metrics to manage and secure military networks.

Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.

June 2009
By Bob Gourley

U.S. Defense Department’s strategic plan and cloud computing mesh well.

Cloud computing could give a major assist to the U.S. Defense Department’s information technology strategy for implementing network-centric operations.

February 2006
By Braun Jones and Nick Bundy

 
Unmanned aerial vehicles are used extensively in current operations and to some degree to patrol borders; however, size and power requirements may limit extensive use in homeland security efforts.
Federal investments advance national threat protection capabilities.

November 2005
By Adm. Leighton W. Smith Jr., USN (Ret.)

Data analysis continues to prove difficult in multilevel security realm.

Accredited, tested solutions could allow military decision makers and intelligence analysts to access information and make decisions simultaneously using information that resides in multiple security classifications. However, although the U.S. Defense Department is moving forward to address information-sharing challenges, it has encountered difficulties in proving and certifying these technologies in a testbed environment.

August 1999
By Michelle L. Hankins

Administrators strive for free flow of information between nations.

The debate between the European Union and the United States over protecting personal information represents a fundamental cultural difference that could alter the future growth of electronic commerce. Throughout this debate, these differences have threatened to bring data transfers from within the European Union to the United States to a grinding halt.

January 2000
By Maryann Lawlor

Distance education specialists agree that learning has never been a place--it has always been a process.

The smell of fat crayons, the snap of three-ring binders and the crack of book spines as they open for the first time bring back memories of those old school days. Students today, both in the classroom and on the job, are more familiar with the hum of a hard drive and glow of a monitor screen. One thing, however, has not changed--the up-front expenses for an education rarely reflect the final cost.

March 2001
By Ken Keane

Experts debate accommodation of third-generation communications devices.

August 2002
By Joseph McKendrick

Open systems require multilevel security solutions.

Government agencies and commercial companies that are striving to share data to protect citizens or improve service to customers are discovering that as access to data increases, information security challenges grow exponentially. To address this concern, trusted security approaches emerging from government applications offer information assurance at both the operating-system and relational-database-management levels.

March 2003
By James C. Bussert

Problem may be more widespread than officials acknowledge.

Having effective sensors, fire control, ordnance and control systems is only part of the picture for building a capable shipboard combat system. The task that makes all of these play together is called combat system integration, or CSI.

Many foreign navies rely on CSI to pull together shipboard combat systems that have components originating from different suppliers. If integration is not done well, it can be very costly and take years to do what should take months. Valuable warships needed for naval missions can be unavailable for years. The result is best described as combat system dis-integration.

September 2003
By Ken Keane

Technology advances are balanced against national, institutional needs.

Three important decisions reached at the recent World Radiocommunication Conference may hold substantial ramifications for the United States and the global telecommunications community as a whole. Many of the issues discussed at the conference are illustrative of the realities affecting both commercial and U.S. Defense Department spectrum usage today.

April 2004
By David Helfgott

Changes in government procurement policies may play critical role.

After years of economic stagnation, the satellite industry could find that a turnaround is about to begin. Early returns point to a resurgence in interest and visibility for a weathered, yet optimistic, industry. Now more than ever, the government community recognizes that the commercial satellite industry plays an essential role in both international and homeland security. Several important occurrences in 2003 have set the stage for a turnaround.

October 2003
By Robert K. Ackerman

Advanced technologies lie at the heart of most efforts.

The focus of long-term changes underway in China’s military is on regional rather than global improvements. This approach includes deploying systems that have only a local reach as well as developing or acquiring advanced technologies for specific military units or elements.