Military, industry experts review alliance Internet thrust.
Dag Wilhelmsen, director of the NATO Consultation, Command and Control (C3) Agency, discusses how commercial interoperability standards are Web-focused under the umbrella of the NATO Network Enabled Capability.
Company president predicts continued growth despite night-vision technology scandal.
Steve Gaffney vividly recalls the day he literally got a whack upside the head that gave him a lifelong lesson in success—one that would come in handy this year.
An enthusiastic athlete and varsity pitcher at his high school in Morris County, New Jersey, located 50 miles west of
Forum seeks solutions, progress reports on major networking programs.
Views about sharing and retaining classified and sensitive information are changing as the
A simple mantra can change the course of history. “It’s the economy, stupid!” shifted the tide of a political race by keeping partisan foot soldiers focused on the critical issue of a campaign.
A Web-based system confirms the legitimacy of credentials.
An enrollment officer uses a document authenticator to scan and verify an applicant’s source document at a Federation for Identity and Cross-Credentialing Systems (FiXs) enrollment center. FiXs is working with the federal government and contractors to create a uniform identification authentication system.
But that activity gives way to more measured progress.
Two U.S. Army soldiers radio a report on the discovery of improvised explosive devices near Mahmudiya, Iraq. The need to extend greater benefits of the network down to the individual soldier level has compelled the Army to field technologies as soon as they present a coherent capability.
Small changes making a big difference in moving U.S. Army forward.
U.S. Army tactical operations centers are one communications hub in current operations. The service is introducing integrated systems to ensure that stovepipes do not get in the way of mission effectiveness.
Soldiers leave the vehicles behind but take the capabilities with them.
Commanders and other dismounted soldiers can use the Commander’s Digital Assistant (CDA) Version 5 to improve situational awareness as well as to share and receive other battle command information.
Cooperation is a primary element of protection in cyberspace.
One of the DHS’ priorities in cybersecurity is to increase awareness of system vulnerabilities and network threats. In recognition of September as Cyber Security Awareness Month, the DHS participated in a vendor fair that took place at the U.S. State Department.