Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5247 Results
Cognitive Radio Prepares for Action
An experimental radio technology could provide U.S. warfighters with assured access to voice, data and video communications. The prototype systems use an advanced wireless networking capability to link troops with larger networks such as the Global Information Grid. The radios also are capable of sensing the electromagnetic environment and selecting frequencies that are not in use automatically.
Governing in a Web 2.0 World
U.S. government agencies recognize the effect that Web 2.0 technologies are having on society, and some are eagerly incorporating them into their operations. However, unlike previous eras in which government embraced new capabilities routinely, today’s efforts go beyond merely adapting to innovative technologies. The Web 2.0 revolution is impelling cultural change faster and to a greater degree than ever experienced in recorded history, and democracies that answer to their populaces already are feeling the effects of that change—and ignore those effects at their own risk.
Small Atomic Clocks Chart New Horizons
A tiny device the size of a sugar cube may revolutionize military communications and sensor systems. The technology is a micro-scale atomic clock designed to help spectrum-hopping radios synchronize their frequencies and access signals from navigation satellites. This prototype time keeper is undergoing testing to determine its readiness for military applications.
Army Eliminates Enemies at Any Node
Technology resembling the human immune system is enhancing security for ad hoc mobile wireless networks on the battlefield. It will automate operations; offer unique, enhanced protection to communications assets; and relieve troops from constant network-monitoring. The result is increased user trust in the network.
Organizations Collaborate To Capture and Share Adversaries' Identity Traits
According to the military and its partners, for the United States to succeed in the Global War on Terrorism, they must be able to share biometrics information across a network-centric environment. To that end, personnel at various agencies are developing new architectures and streamlining methods to identify terrorists based on their unique characteristics, and they are putting systems in place to efficiently share that information. The most useful pieces of a variety of stovepipe systems already in place are being combined to create a synchronized joint program.
An Info-Centric Force Learns to Share
The U.S. Defense Department is developing an information sharing implementation plan based heavily on current need and impending reality. One foundational element of the department’s approach is that everyone agrees on the need to share information, but differences lie in how that goal is to be accomplished. The other factor is that new technologies and capabilities are changing the very nature of information access, and users ignore them at their own risk.
Web 2.0, Military Style
Exuberance tempered with caution describes the U.S. military’s current outlook about deploying Web 2.0 technologies. The services’ information technology leaders as well as the U.S. Defense Department recognize the multitude of benefits the capabilities offer warfighters from the tactical through the strategic levels. However, concern about the security risks in what could be termed the Wild West of the World Wide Web is currently hampering the services’ ability to take full advantage of promising properties in the Web 2.0 landscape.
Welcome to the Wide World of Web 2.0
The Web 2.0 revolution is as much about business culture as it is about social networking sites such as MySpace, Facebook, Second Life and LinkedIn or collaborative content sites such as Wikipedia. Faced with a growing number of employees from the Gen X or Gen Y age groups, baby boomer executives are learning to let go of traditional thinking while simultaneously trying to discover the best way to adopt new capabilities without losing all control. As a result, organizations find themselves turning not only to technology providers but also to firms that specialize in integration.
Training System Models National Defense
The U.S. Air Force is preparing to defend national airspace against a variety of airborne terrorist threats such as hijacking and missile attacks. To achieve this goal, the service has modified its training and simulation software toolkit to model the crowded skies over the United States. This new capability also permits Air Force commands to train jointly with federal and state law enforcement and civil aviation agencies and to simulate operating in a network-centric communications and sensor environment.
Airmen Train Today, Deploy Tomorrow
The increased operational tempo for special operations forces over recent years has mandated a new training plan for their aircrew. In an effort to transition fully qualified crew members to the field faster and to accommodate upcoming airframe changes, various agencies have come together to fund and update a major U.S. Air Force instruction program.