July 2009

July 2009
By Kent R. Schneider

The preeminence of the expanded use of cyberspace, the desire for more openness in government, and the demands for faster and better information sharing within and among enterprises—particularly in the context of inter-agency and coalition information sharing—have changed fundamentally the demands of information security. The wider reach of our networks and the quest for timely, relevant information have improved decision-making but have made us more dependent on cyberspace and more vulnerable.

July 2009
By Christopher J. Dorobek

 
Agency information technology executives have to find ways to be enablers ... securely.

For federal chief information officers (CIOs), it is the best of times and the worst of times. The broader, less literary question is: Do CIOs matter?

July 2009
By Paul A. Strassmann

Warfighters must keep their eye on the metrics to manage and secure military networks.

Network systems are similar to icebergs. Less than 10 percent of their volume is visible to the user of an application. Almost all of the hidden code, measured in hundreds of thousands of lines of logic, is invisible in the operating system, in the database management software, in security safeguards and in communication routines. The problem with such software is that for each application—and the U.S. Defense Department has more than 7,000 major software projects—contractors will develop the hidden coding to suit separate requirements.

July 2009
By Rita Boland

 

Lt. Gen. Jack C. Stultz, USAR (4th from l), commander, U.S. Army Reserve Command (USARC), and Gen. Charles C. Campbell, USA, (5th from l), commander, U.S. Army Forces Command (FORSCOM), are flanked by other Army, state and local officials during the groundbreaking ceremony for the commands’ combined headquarters at Fort Bragg, North Carolina.

July 2009
By Robert K. Ackerman

 
Keeping out the interloper yields to surviving the intrusion.

July 2009
By Robert K. Ackerman

 
From the military to the economy, the country is open to vast damage.

July 2009
By Rita Boland

 

Airman 1st Class Caleb Force, USAF (r), helps 1st Lt. Jorden Smith, USAF, locate simulated targets during an MQ-1 Predator training mission at Creech Air Force Base (AFB), Nevada. The U.S. Air Force works constantly to keep networks running to ensure the viability of systems necessary for operational success.

July 2009
By Rita Boland

 

llinois Army National Guard soldiers conduct a room clearing demonstration while Polish Army soldiers watch.

Weekend warrior units partner with foreign militaries, organizations to exchange expertise.

July 2009
By Maryann Lawlor

 

Constantin Kostenko (r) and Ted Winograd (c) direct James Gillespie (l) as he plays the Cloud Computing Wargame created by Booz Allen Hamilton Incorporated.

War game mimics craps competition to reveal the gains and losses that latest generation of computing entails.

July 2009
By Rita Boland

 

A small group of users’ avatars gather outside the Defense Acquisition University’s (DAU’s) Scott Hall in US-Nexus prior to an event inside the auditorium.

Real-world maps, public-agency funding and unique capabilities combine to create computer-generated experiences unlike any others.

July 2009
By Henry S. Kenyon

 

The Networked Interoperable Real-Time Information Services (NIRIS) enhances commanders' situational awareness and provides military and civilian convoys operating in Afghanistan with real-time alerts to security threats such as improvised explosive devices (IEDs) and potential ambushes along their routes.

July 2009
By Maryann Lawlor and Helen Thompson Mosher

 

Gen. James N. Mattis, USMC, NATO Supreme Allied Commander Transformation, and commander, U.S. Joint Forces Command, calls for the acceleration of military transformation.

Persistent warfare demands fundamental changes.

July 2009
By Maryann Lawlor

Stimulus program transforms acquisition world.

The U.S. economic stimulus package is making waves throughout government and industry. Some experts believe that it represents a sea change in government acquisition in terms of oversight, contractor accountability and transparency, which has been attempted before but never has been fully realized. Companies that wish to benefit from the stimulus package need to move—and move quickly—by positioning themselves as solutions providers and as businesses that are willing to follow the new rules.

July 2009
By Henry S. Kenyon

July 2009
By Henry S. Kenyon

 

NetMRI is being installed in the Army’s Joint Network Nodes, part of the service’s Warfighter Information Network–Tactical program. The appliance will help operators manage and maintain their battlefield networks efficiently.

July 2009
By Col. Alan D. Campen, USAF (Ret.)

Many are called, but few are truly effective.

Some risks attend all travel in the domains of land, sea, air and outer space, but in those realms the voyager is afforded a patently acceptable measure of protection by laws, rules, sanctions against misbehavior, and social norms and comity. Aviators, firefighters, law enforcement officials, soldiers and others obliged to function in highly contested domains can seek added protection from partners who warn of danger from their rear perspective—their six o’clock.

July 2009
By Helen Thompson Mosher

 

 

Gen. Victor E. Renuart Jr., USAF, commander, North American Aerospace Defense Command (NORAD) and U.S. Northern Command, opens the SOLUTIONS conference on information sharing among agencies and coalition partners with a call to move from discussion to action.