March 2008

March 2008

 

It is easy to say, if he had just used common sense he wouldn’t have lost his Common Access Card (CAC). She should have had the common sense not to leave her thumb drive in the coffee shop. What is common sense? It’s the knowledge and experience we start to develop as soon as we are born. For example, the pot on the stove is hot: don’t touch it; the ice is slippery: walk carefully; the information is sensitive: encrypt and protect it, etc.

March 2008
By Maryann Lawlor

Transparent asset garners attention from top down and bottom up.

March 2008
By Kent R. Schneider

Web 2.0. Web 3.0. Webinars. Podcasts. Blogs. RSS feeds. Virtual environments. Social networking. This is the language of today’s Internet. It has not been the language of AFCEA, but that is changing. Our younger members are very comfortable in this environment. The rest of us in government and industry are trying to catch up and learn how to apply these technologies and this culture to our work. AFCEA is moving to help.

March 2008
By Lt. Gen. Harry D. Raduege Jr., USAF (Ret.)

March 2008
By Rita Boland

 
Soldiers from the North Carolina Army National Guard 252nd Combined Arms Battalion take part in an augmented cognition system evaluation at the Aberdeen Test Center. Program officials examined the viability of a wearable sensor system to assess soldiers’ cognitive states on the battlefield.
Research into warfighter cognition could save lives in combat and apply to multiple programs.

March 2008
By Adam Baddeley

 
Poland has deployed sizable formations to support operations in Iraq and Afghanistan. These require reach-back capabilities to headquarters in Warsaw, which in turn require satellite connectivity.
New infrastructure to align with NATO avoids duplication of capability.

March 2008
By Henry S. Kenyon

March 2008
By Maryann Lawlor

 
The U.S. Air Force Cyberspace Command recently was stood up to ensure the security of the service’s networks. The addition of Web 2.0 technologies into the Air Force toolkit will require the service as well as the armed forces in general to boost their security profile.
Need for security hinders but does not stop services from implementing tools that improve communication.

March 2008
By Henry S. Kenyon

March 2008
By Rita Boland

 
The Crusher unmanned ground combat vehicle (UGCV) performs during a field test. When raised, the long mast enables surveillance capabilities.
Organization focuses on building and testing prototypes quickly and including program sponsors earlier in the process.

March 2008
By Robert K. Ackerman

 
Boeing’s  Airborne Laser system uses adaptive optics to focus a megawatt-class beam on a ballistic missile target, destroying it. The chemical-pumped laser soon will be able to destroy a ballistic missile in its boost phase.
Longtime research, new technologies bring reality closer.

March 2008
By Robert K. Ackerman

 
A U.S. Navy officer stands surface watch coordinator watch in the combat information center of a guided missile destroyer during a large joint exercise. As network centricity grows and jointness dominates operations, stovepiped systems and cultural challenges stand in the way of true information sharing.
Cultural, security, Web 2.0 issues remain to be conquered.

March 1, 2008
By Robert K. Ackerman

 
A terminal high-altitude area defense (THAAD) interceptor blasts off into the night sky during a test last year. The United States has begun fielding several different ballistic missile defense technologies, some of which may be extended to protect allies.
As enabling technologies mature, the threat becomes more complex.

March 2008
By Henry S. Kenyon