January 2012

Janaury 2012
By Michael A. Robinson, SIGNAL Magazine

 

Molycorp Incorporated’s Mountain Pass, California, mine, is one of the largest rare earth mines outside China. It recently reopened after being closed for about a decade.

China’s newly gained monopoly may disappear by mid-decade.

January 2012
By Kent R. Schneider, SIGNAL Magazine

 
Happy New Year 2012!

January 2012
By Max Cacas, SIGNAL Magazine

Both government and the private sector may benefit from a new approach.

A variation of cloud computing one day could lead to the benefits of the cloud being extended to troops on the battlefield, or to humanitarian relief workers, no matter where they operate. These microclouds would be generated by small computer servers running on devices as small as a high-capacity universal serial bus thumb drive attached to a laptop computer.

January 2012
By George I. Seffers, SIGNAL Magazine

 

U.S. Chief Information Officer Steve VanRoekel discusses cloud computing at a forum where the government road map was released.

A draft plan maps cloud computing priorities.

January 2012
By Paul A. Strassmann, SIGNAL Magazine

 
A smartphone that engages in conversations is the next perturbation that will dictate how the U.S. Defense Department needs to revise its information management practices. The effects of this new technology will reverberate from individual communications protocols all the way to data architectures.

January 2012
By Max Cacas, SIGNAL Magazine

The need to do more with less dictates crucial changes in national security procurement.

Top U.S. military officials are warning that the current fiscal crisis is the single biggest threat to the country’s national security. And, the most critical concern facing the United States is ensuring that it has the resources necessary to maintain its security globally—and that it is prepared for the challenges ahead.

In fiscal years to come, the U.S. Defense Department must make major changes to the way it deals with the competing forces of decreased financial resources and continually morphing security challenges.

Pages