Satellite communications have never been more vital to the security of our nation, or under such assault. Recent increases in aggressive and targeted interference have put the continuous connectivity of government satellite communications in question. Guest blogger Lesley M. Rahman offers a solution.
Defense Operations Blog
The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in C4ISR disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. According to guest blogger Cyndi Thomas, those days are gone.
U.S. military and the Australian Defense Force noted improved connectivity while testing an advanced Time Division Multiple Access (TDMA) waveform technology during the Talisman Sabre 2015 joint training exercise.
U.S. Marines and their allies in the Asia-Pacific region must maintain effective C3 both to maintain connectivity among forces and to ensure that miscalculations do not lead to more severe confrontations.
Some U.S. allies in the Asia-Pacific region have strengthened their defense commitment; new allies are emerging, but some relationships have soured as a result of actions elsewhere, according to the deputy commander of the U.S. Pacific Fleet.
Earlier today, a JLENS surveillance system aerostat detached from its mooring station in Aberdeen Proving Ground, Maryland, and is currently located approximately northeast of Washington, D.C., over Pennsylvania.
NIST seeks comment on draft guidance for attribute-based access to networks and computers.
Get ready to clear out the email inbox—because size matters. Effective Oct. 1, DISA will enforce size limits of military mailboxes. Users who exceed the limits will receive warnings to reduce mailbox size; ironically by receiving an email.
In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.
Just when you thought consolidation was a good thing. Guest blogger Chris LaPoint addresses the issue caused by consolidation of federal data centers and the added workload for administrators of the remaining centers who must manage the growing infrastructure—and all of the problems that brings—while still meeting service levels required by end users.
A team of students from Delft University of Technology, Netherlands, will use this year's Undersea Defence Technology exhibition to present a revolutionary man-powered submarine. The group, known as WASUB, designed the craft to break the world speed record for a single-person propeller driven submarine.
Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.
Information technology systems, elements and methodologies are becoming more of a factor in U.S. naval aviation. Virtual capabilities are supplanting physical training, and new architectures may allow faster incorporation of new technologies.
Mark Orndorff, the mission assurance executive and program executive officer for mission assurance and network operations at the Defense Information Systems Agency (DISA), bids farewell to colleagues today as he retires.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.
The Twitter and YouTube accounts for U.S. Central Command are back online after hackers, stated to be in support of Islamic State militant group, broke into the accounts and posted menacing messages.
The Defense Information Systems Agency (DISA) is reorganizing to focus on five Cs: cyber, cloud, collaboration, and command and control, Lt. Gen. Ronnie D. Hawkins Jr., USAF, DISA director, announced Monday at a luncheon event hosted by AFCEA's Washington, D.C. Chapter.
URS Federal Services Incorporated, Germantown, Maryland, is being awarded a $35,951,345 modification to a previously awarded indefinite-delivery/indefinite quantity, cost-plus-fixed-fee with firm-fixed-price provisions, performance-based contract (N65236-12-D-4806) for a ceiling increase and period of performance extension to July 10, 2016, to provide submarine C5I and NC3 system engineering, technical, logistics and management support services including test and evaluation, certification, modernization, repair, refurbishment, overhaul and logistics support
Six3 Intelligence Solutions Incorporated, McLean, Virginia, was awarded a $12,783,597 firm-fixed-price multi-year contract for intelligence support services in Afghanistan with an estimated completion date of July 9, 2016. One bid was solicited with one received. Fiscal 2015 operations and maintenance (Army) funds in the amount of $9,587,697 are being obligated at the time of the award. The Army Contracting Command, Rock Island, Illinois, is the contracting activity (W560MY-15-C-0004).