Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5254 Results
Army Eliminates Enemies at Any Node
Technology resembling the human immune system is enhancing security for ad hoc mobile wireless networks on the battlefield. It will automate operations; offer unique, enhanced protection to communications assets; and relieve troops from constant network-monitoring. The result is increased user trust in the network.
Organizations Collaborate To Capture and Share Adversaries' Identity Traits
According to the military and its partners, for the United States to succeed in the Global War on Terrorism, they must be able to share biometrics information across a network-centric environment. To that end, personnel at various agencies are developing new architectures and streamlining methods to identify terrorists based on their unique characteristics, and they are putting systems in place to efficiently share that information. The most useful pieces of a variety of stovepipe systems already in place are being combined to create a synchronized joint program.
An Info-Centric Force Learns to Share
The U.S. Defense Department is developing an information sharing implementation plan based heavily on current need and impending reality. One foundational element of the department’s approach is that everyone agrees on the need to share information, but differences lie in how that goal is to be accomplished. The other factor is that new technologies and capabilities are changing the very nature of information access, and users ignore them at their own risk.
Web 2.0, Military Style
Exuberance tempered with caution describes the U.S. military’s current outlook about deploying Web 2.0 technologies. The services’ information technology leaders as well as the U.S. Defense Department recognize the multitude of benefits the capabilities offer warfighters from the tactical through the strategic levels. However, concern about the security risks in what could be termed the Wild West of the World Wide Web is currently hampering the services’ ability to take full advantage of promising properties in the Web 2.0 landscape.
Welcome to the Wide World of Web 2.0
The Web 2.0 revolution is as much about business culture as it is about social networking sites such as MySpace, Facebook, Second Life and LinkedIn or collaborative content sites such as Wikipedia. Faced with a growing number of employees from the Gen X or Gen Y age groups, baby boomer executives are learning to let go of traditional thinking while simultaneously trying to discover the best way to adopt new capabilities without losing all control. As a result, organizations find themselves turning not only to technology providers but also to firms that specialize in integration.
Training System Models National Defense
The U.S. Air Force is preparing to defend national airspace against a variety of airborne terrorist threats such as hijacking and missile attacks. To achieve this goal, the service has modified its training and simulation software toolkit to model the crowded skies over the United States. This new capability also permits Air Force commands to train jointly with federal and state law enforcement and civil aviation agencies and to simulate operating in a network-centric communications and sensor environment.
Airmen Train Today, Deploy Tomorrow
The increased operational tempo for special operations forces over recent years has mandated a new training plan for their aircrew. In an effort to transition fully qualified crew members to the field faster and to accommodate upcoming airframe changes, various agencies have come together to fund and update a major U.S. Air Force instruction program.
Iraq, Afghanistan Provide Templates for New Army Simulations
A new world is emerging from cyberspace as U.S. Army simulations draw from innovative technologies coming out of the private sector. These advances are allowing planners to build simulations that can model causes and effects of asymmetric warfare similar to what troops are experiencing in Southwest Asia.
Simulation Benefits Troops and Civilians
The creation of virtual worlds and robots is spiraling out from the military into a broad array of applications. While the defense community continues to advance its technology to offer better instruction and to improve the safety of troops, other fields of interest—ranging from the technical to the personal—are beginning to use similar tools to meet their needs.
Cultural Changes Key to Reducing Barriers to Open Source Software
Misconceptions about open source software have made many U.S. Defense Department sectors reluctant to employ this technology. Although a 2003 department policy allows its use, many still believe that open source software poses an increased security risk to networks and that it is not supported as well as commercial products.