The U.S. Navy will not receive the funding it needs, but it still is moving forward on key modernization plans.
Defense Operations Blog
The 20th century way of building walls for security failed dismally, leading to two devastating world wars. The key to security in this century is partnership among nations.
North Korea leads a diverse list of significant threats around the world.
The U.S. Army Communications-Electronics Research, Development and Engineering Center will host a two-day technical interchange meeting with industry to identify and align mutually beneficial research and development investments. Registration begins on February 1.
Satellite communications have never been more vital to the security of our nation, or under such assault. Recent increases in aggressive and targeted interference have put the continuous connectivity of government satellite communications in question. Guest blogger Lesley M. Rahman offers a solution.
The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in C4ISR disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. According to guest blogger Cyndi Thomas, those days are gone.
U.S. military and the Australian Defense Force noted improved connectivity while testing an advanced Time Division Multiple Access (TDMA) waveform technology during the Talisman Sabre 2015 joint training exercise.
U.S. Marines and their allies in the Asia-Pacific region must maintain effective C3 both to maintain connectivity among forces and to ensure that miscalculations do not lead to more severe confrontations.
Some U.S. allies in the Asia-Pacific region have strengthened their defense commitment; new allies are emerging, but some relationships have soured as a result of actions elsewhere, according to the deputy commander of the U.S. Pacific Fleet.
Earlier today, a JLENS surveillance system aerostat detached from its mooring station in Aberdeen Proving Ground, Maryland, and is currently located approximately northeast of Washington, D.C., over Pennsylvania.
NIST seeks comment on draft guidance for attribute-based access to networks and computers.
Get ready to clear out the email inbox—because size matters. Effective Oct. 1, DISA will enforce size limits of military mailboxes. Users who exceed the limits will receive warnings to reduce mailbox size; ironically by receiving an email.
In the Defense Department, networks carry critical information and applications from a data center to the battlefield. Guest blogger Davis Johnson from Riverbed Technology addresses how ensuring the apps travel quickly and securely over the vast networks is not only mission-critical—it can mean the difference between life and death.
Just when you thought consolidation was a good thing. Guest blogger Chris LaPoint addresses the issue caused by consolidation of federal data centers and the added workload for administrators of the remaining centers who must manage the growing infrastructure—and all of the problems that brings—while still meeting service levels required by end users.
A team of students from Delft University of Technology, Netherlands, will use this year's Undersea Defence Technology exhibition to present a revolutionary man-powered submarine. The group, known as WASUB, designed the craft to break the world speed record for a single-person propeller driven submarine.
Guest blogger Ed Bender from SolarWinds outlines the steps the U.S. Defense Department should take to secure and streamline information networks successfully toward the realization of the JIE. The department must strive for greater interoperability of NetOps and other IT management tools within the services.
Information technology systems, elements and methodologies are becoming more of a factor in U.S. naval aviation. Virtual capabilities are supplanting physical training, and new architectures may allow faster incorporation of new technologies.
Mark Orndorff, the mission assurance executive and program executive officer for mission assurance and network operations at the Defense Information Systems Agency (DISA), bids farewell to colleagues today as he retires.
With 2014 in the rearview mirror, federal agencies now are looking ahead to what the next year will bring. For information technology professionals working in the Defense Department and intelligence community, 2015 will be the year of the cloud, application stacks, security challenges and centralization.
The changing nature of threats and diversity of adversaries bring unique challenges to maintaining a strong national security posture. In 2015, we will see nation-states, extremist groups and individuals bring a distinctive set of intelligence challenges to U.S. defense officials. By making the best use of ISR technological capabilities, coupled with innovative commercial information technology, we can equip our military leaders with an integrated ISR enterprise to evaluate and anticipate threats so they more fully and quickly understand proper courses of action, whether on a battlefield or at home.