August 2010

August 16, 2010
By George I. Seffers, SIGNAL Connections

August 5, 2010
By George I. Seffers, SIGNAL Online Exclusive

Open-source, social networking tool is designed to help employees get the job done.

August 12, 2010
By Maryann Lawlor, SIGNAL Online Exclusive

August 19, 2010
By George I. Seffers, SIGNAL Online Exclusive

Years from now, engineers and scientists across the U.S. Defense Department may double-click an icon on their desktop computer screens and access the phenomenal processing power of the Army Research Laboratory (ARL) Defense Department Supercomputing Resource Center (DSRC) at Aberdeen Proving Ground, Maryland. Those computers are currently capable of processing 350 trillion calculations per second. 

August 16, 2010
By Rita Boland, SIGNAL Connections

August 16, 2010
By Jordan Garegnani, SIGNAL Connections

August 2010
By Paul A. Strassmann, SIGNAL Magazine

The warfighters’ focus must be on the mission and not on the performance of the infrastructure.

August 2010
By Paul A. Strassmann, SIGNAL Magazine

Many of today’s original ideas about a global command and control system can be traced to Vice Adm. Jerry Tuttle, USN (Ret.), who served as director, Space and Electronic Warfare, from 1989 until his retirement in 1994. Faced with the need to restructure the Naval Telecommunications System to handle dramatically increased message traffic, Tuttle could have proposed buying bigger pipes. Instead, he created the Copernicus concept for evolving the Navy’s networks. His immediate objective was to restructure the Naval Telecommunications System and then to extend it to other parts of the Navy as well as to other military departments.

August 16, 2010
By George I. Seffers, SIGNAL Connections

Headborne Energy Analysis and Diagnostic System Generation II

August 2010
By Linton Wells II, SIGNAL Magazine

 
Open information sharing in diverse environments is critical. A new initiative in Afghanistan called UnityNet can help bring unclassified information to bear to support U.S. and coalition strategy there and elsewhere around the globe.

August 2010
By Chris Sanders

 

During a peer teaching session, EWA analyst Sean Rosado discusses open-source intelligence gathering tactics.

Flagging anomalies is the basis for real-time cyberthreat detection architecture.

August 2010
By Rita Boland, SIGNAL Magazine

August 2010
By Robert K. Ackerman, SIGNAL Magazine

August 2010
By Robert K. Ackerman

 

An image from a corrugated quantum well infrared photodetector (C-QWIP) shows traffic flowing along a highway near Kings Island theme park in Mason, Ohio. Note the white "hot" spots on the tires and engines in some of the vehicles and the sharp detail of the rock-lined pond in the foreground.

August 2010
By Rita Boland, SIGNAL Magazine

 

The Homeland Security Advanced Research Projects Agency, in conjunction with several partners, is developing a chemical sensor that would fit into smart phones. The sensors would promote public safety and homeland security by crowd sourcing the sensors and would enhance private safety by alerting smart phone users to toxins in their areas.

August 2010
By Rita Boland, SIGNAL Magazine

 

The U.S. Chief Information Officers Council initiated a review of the federal government’s information technology, or IT, work force and the impact of the Net Generation on agency practices.

Technical advances and an aging population should push organizations to shift policies, attract young workers.

August 2010
By Maryann Lawlor, SIGNAL Magazine

 

In 2008, according to its own records, the National Institute of Standards and Technology published 17 new information systems security vulnerabilities per day in the National Vulnerability Database.

Identifying vulnerabilities may be as simple as agreeing to speak the same language.

August 2010
By Michael A. Robinson, SIGNAL Magazine

A blue-sky approach may be enabled by clouds.

It is almost impossible to overstate the importance computer networks and Internet-oriented applications play in today’s federal arena. After all, Pentagon officials constantly stress the military superiority inherent in net-centric warfare in which voice, data, satellite images and video provide essential battlefield information in real time. In this electronic enclave, U.S. fighting forces always stay at least one step ahead of the enemy.

August 2010
By Kent R. Schneider, SIGNAL Magazine

This month’s SIGNAL Magazine includes a focus on information security, which, these days, I can only think about in the context of the larger cybersecurity problem. There finally is a preoccupation with discussing cybersecurity on an international basis. The important question is, “How much of this dialogue is being converted to action/implementation?” This is a timely subject for me, as I have written this commentary while sitting in an international conference on Regional Collaboration in Cyber Security being held in Singapore.

Pages