cross-domain data sharing

October 1, 2020
By Joseph Mitola III
Senior Airman Daniel M. Davis, USAF, 9th Communications Squadron information system security officer, looks at a computer in the cybersecurity office on Beale Air Force Base. Cybersecurity airmen must manage more than 1,100 controls to maintain the risk management framework. Credit: U.S. Air Force photo by Airman Jason W. Cochran

Users need to transition all networked computing from the commercial central processing unit addiction to pure dataflow for architecturally safe voting machines, online banking, websites, electric power grids, tactical radios and nuclear bombs. Systems engineering pure dataflow into communications and electronic systems can protect them. The solutions to this challenge are in the users’ hands but are slipping through their fingers. Instead, they should grab the opportunity to zeroize network attack surfaces.

June 16, 2020
 

Braxton Technologies LLC, Colorado Springs, Colorado, has been awarded a $19,910,587 cost-plus-fixed-fee contract modification (P00014) to contract FA8806-19-C-0003 for support to the Schriever Air Force Base Infrastructure - Minimal Viable Product (MVP) effort. This modification provides for cross-domain solutions, design, integration and rapid delivery team services. Work will be performed in Colorado Springs, Colorado, and is expected to be completed April 30, 2021. Fiscal 2020 research, development, test and evaluation funds in the amount of $14,465,154 are being obligated at the time of award. The total cumulative face value of the contract is $80,366,105. Space and Missile Systems Center, Los Angeles Air Force Base, California, is

August 28, 2019
 

Lockheed Martin Corp. Rotary and Mission Systems, Littleton, Colorado, is awarded an estimated $44,308,222 indefinite-delivery/indefinite-quantity hybrid contract with cost-plus-fixed-fee and firm-fixed-price contract line item numbers.  The contract is in support of Navy and other agencies' Radiant Mercury (RADMERC) operations to securely transfer data across different security domains.

October 22, 2010
By Beverly Schaeffer

Information technology provides us with mountains of data, but therein lies the challenge of weeding through what's useful and what's not. How do we whittle the mountain down to the molehill to find golden nuggets of data? Processing, exploitation and dissemination analysts are finding ways to identify necessary info, and in the process, move it more efficiently and effectively.