Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 25037 Results
Systems Integration Offers Answers To Fault Analysis
The U.S. Air Force is developing a software-based system that will allow aircrews to diagnose and predict equipment failure with greater speed and accuracy, keeping more aircraft in the air, not the hangar. In a renewed effort to maintain operational readiness through enhanced systems integration, the service is emphasizing the need for greater precision and efficiency across the spectrum of aviation maintenance.
Personalized Computer Interaction Improves Customer Service
An adaptive hypermedia system that streamlines and enhances work-order procedures demonstrates that technology can be profitably employed to achieve an organization's customer support goals. Although the initial deployment of the technology was limited to building maintenance, the software could have far-reaching implications for improved customer relations and effective time utilization.
Biometrics Charts Course to Secure Future
Personal identification technologies such as fingerprint, voice and facial recognition are adding another layer of security to government facilities and computer systems. Once prohibitively expensive, these devices are poised to become ubiquitous applications in wireless communications equipment, portable and desktop computers, smart cards and secure area access systems.
Intelligence Agency Seeds Technology Entrepreneurs
Faced with rapidly changing information technology needs, the Central Intelligence Agency is serving as a venture catalyst to help fund private sector startup companies with promising technologies. An organization established by the agency seeks new companies with commercially viable products and serves as a facilitator providing the firms with access to capital and markets.
Jointness Defines Priorities for the Defense Department's Global Grid
Virtually every piece of military electronics hardware, from the simplest handheld personal computing assistant to the most powerful mainframe computer, faces the challenge of interoperability to fit into the U.S. Defense Department's Global Information Grid. Designed as the ultimate military networking project, the grid is a cornerstone for achieving the information superiority outlined in the department's Joint Vision 2010 and Joint Vision 2020.
Small Business Is Big Business in AFCEA
Small businesses constitute a major element of AFCEA International's membership. Their breadth of activity in many ways reflects AFCEA's areas of interest, and the association is paying heed to their impact as well as to their needs.
Using Information Mandates A Military of One
Although experts agree that the vast majority of future military operations will be fought by joint forces, the U.S. military's information technology continues to be somewhat fragmented. To take advantage of all the benefits of information operations during a mission, systems used by all the forces and at all levels must be able to talk to each other. Numerous technologies have been developed that enable this capability; however, the challenge is larger than technology.
Space Warriors Defend Information Assets
The U.S. Defense Department is refocusing efforts to protect military communications from computer network threats. By shifting its network operations emphasis from exclusively defensive to a more offensive stance, the government seeks to ensure the integrity of coalition operations. Preparations for projecting a greater disruptive potential to adversaries are underway.
Swarming Attacks Challenge Western Way of War
Asymmetric tactics and network-centric warfare demand a new look at command and control. Information now is a weapon of choice; software, radio frequencies and bandwidth are critical commodities; networks are essential delivery platforms; and access controls are mandatory. All must be melded into operational art. The foremost challenge for commanders and staffs in this new battlespace environment may be the command and control (C2) of the infostructure.
Balancing Capability Protection and Mission Readiness
In Case of Emergency, Break Glass. That phrase calls to mind the image of a firefighter's axe in a glass box on a wall. It also is an appropriate analogy for the U.S. Defense Department's approach to information operations, wherein powerful capabilities often are locked away from the hands of the warfighter. But unlike the firefighter, who is trained in the use of the axe, warfighters have virtually no opportunity to train with U.S. information operations capabilities or to factor them into their plans. Tight security controls that are designed to ensure the protection of many capabilities are, as an unintended consequence, locking the armed forces out of opportunities to learn to use them effectively. This, in a nutshell, is the problem of overprotection.