Lt. Gen. Robert Ferrell, USA, Army chief information officer/G-6 unveiled the publication of the Army Network Campaign Plan.
Privacy hasn't disappeared. We've been handing it over bit by bit for years.
The National Cybersecurity Center of Excellence outlines a threat to medical devices and launches a search for solutions.
IBM Corp., Bethesda, Maryland, was awarded a $60,424,975 modification (CC0169) to contract (W91QUZ-06-D-0010) to increase the not-to-exceed labor hours and dollars and contract ceiling for information technology services for the Computer Hardware Enterprise Software and Solutions contract, which is the Army preferred website and source for the procurement of information technology services and products. Fiscal 2014 operations and maintenance Army funds in the amount of $370,000 were obligated at the time of the award.
The technology gap caused by the growing sophistication of U.S. defense communications and networking systems threatens to leave less advanced nations unable to participate effectively in coalitions. One approach to mitigate the gap is to have allies work with the United States on establishing standards for new systems and capabilities.
Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.
Some interoperability issues are cultural, not technical. Now, a new approach uses advanced virtual technology to help overcome cultural issues before a coalition is formed.
Many nations are loath to share data in a coalition operation, because they fear the wrong partner will access sensitive information. Now, a new system under development will allow countries to tag data for only the countries that they want to view it.
Creating an effective mission partner environment (MPE) is a daunting task entwined with that of the Joint Information Environment.
The new word for the Defense Department CIO office is intercollaborability. The goal is to encompass all options and then add some more.
Success for the Joint Information Environment may come down to the Joint Regional Security Stacks (JRSS), says the Defense Department's acting CIO. However, their success may hinge on acquisition reform.
The Defense Information Systems Agency (DISA) no longer will be the required go-to-group for military cloud services. Beginning Monday, December 15, the services will be able to choose their own clouds. DISA will be able to compete with commercial providers on an economic basis.
The Pentagon finally will begin a foray into wireless with a test program scheduled to begin December 23. Terry Halvorsen, Defense Department acting chief information officer, says the department has been late in implementing this capability.
The 3-D printer recently installed on the International Space Station has printed a replacement part for itself, proving the process works in space and potentially paving the way for long-term space expeditions.
The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.
Students from 27 middle schools across New Mexico—some who might aspire to be automotive engineers—will vie this Saturday for top honors in the New Mexico Electric Car Challenge held in Albuquerque.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
Lockheed Martin, Mission Systems and Training, Moorestown, New Jersey, is being awarded a $15,577,396 modification to previously awarded contract (N00024-09-C-5103) to incrementally fund the Aegis Platform Systems Engineering Agent (PSEA) activities and Aegis Modernization Advanced Capability Build (ACB) engineering.
Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.
NCI Incorporated, Reston, Virginia, recently announced it was awarded three firm-fixed price task orders and one cost-plus-fixed-fee task order aggregating $10.9 million under the Total Engineering and Information Systems III contract for information technology services in support of the U.S. Army Information Systems Engineering Command. These task orders represent both new and follow-on work for NCI at U.S. Army locations worldwide, and each task order consists of a 12-month base period and one option year.