Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
Information Sharing in Afghanistan
Linton Wells II points to UnityNet as an example of how information sharing can support U.S. and coalition strategy in Afghanistan and elsewhere around the globe. He then challenges readers: "Now think of how you can support UnityNet-like approaches."
John Hopkins Receives $147 Million for Technical Support
John Hopkins University/Applied Physics Laboratory, Laurel, Maryland, is being awarded a $147 million ceiling increase to a previously awarded contract to continue
L-3 Communications to Provide Encryption System Kits
L-3 Communications System West, Salt Lake City, Utah, was recently awarded a $17 million contract for 345 Type II interim encryption system kits in various configurations. U.S.
One for the Money, Two for the Foe
A seemingly dead program now has new life as the basis of a U.S. Army tactical communications system. Building on extensive past funding, the service is excerpting pieces of the past and crafting them into a network for the future. This time around, the Army is drawing the users into the design process sooner so that the results are likely to pay big dividends.
Security Comes Standard
Instead of a NASCAR winner-take-all competition, the race to secure information systems is more of a traffic jam where getting ahead depends on the lane you’re in. Operators consistently crawl along by putting patches in place and upgrading antivirus software, yet that annoying lane-changing system attacker keeps bobbing and weaving its way to the front of the gridlock daring you to catch up. But information superhighway menaces are being quashed by a collaborative effort among government organizations to ensure that the United States is in the correct lane when it comes to staying ahead of information security troublemakers.
Securing America's Defense Computers Becomes Big Business
It is almost impossible to overstate the importance computer networks and Internet-oriented applications play in today’s federal arena. After all, Pentagon officials constantly stress the military superiority inherent in net-centric warfare in which voice, data, satellite images and video provide essential battlefield information in real time. In this electronic enclave, U.S. fighting forces always stay at least one step ahead of the enemy.
The Primacy of Focus on Cybersecurity
This month’s SIGNAL Magazine includes a focus on information security, which, these days, I can only think about in the context of the larger cybersecurity problem. There finally is a preoccupation with discussing cybersecurity on an international basis. The important question is, “How much of this dialogue is being converted to action/implementation?” This is a timely subject for me, as I have written this commentary while sitting in an international conference on Regional Collaboration in Cyber Security being held in Singapore.
A Sensor In Every Pocket
Scientists at the U.S. Department of Homeland Security are a phase closer to putting chemical detectors into the hands of everyone who wants them. Developers have finished demonstrating a miniaturized sensor that can fit into the now-omnipresent personal cell phone. Early testing shows promise for small, inexpensive technology, and over the next year or so project personnel plan to test its real-world application. The cell phone platform would enable crowd sourcing to reduce false positive readings, and it would support instant alerts that would send out timely notifications. The goal of developers is to improve public safety, enhance homeland security and ultimately save lives. In this next round of development, researchers with the program have to figure out how the network will support the technology and determine whether applications that seem strong in the laboratory will function in the field.
Government Prepares For Work Force Changes
The U.S. federal information technology work force is sandwiched between two major trends it must address to continue successful operations—the retirement eligibility of the Baby Boomer generation and the emergence of Web 2.0. The former threatens to empty hundreds of thousands of positions across the government, while the latter is shifting how the work force thinks about and uses technology. Solutions for both these issues converge in the Net Generation (sometimes referred to as Generation Y or the Millennial Generation), the demographic of youth currently preparing to enter institutions of higher learning and the job market. However, this population group is not a panacea for the government’s problems, because the ideas held by these young adults will challenge the status quo.
Approval Granted for Private Software to Run in Secure Cloud
The federal government has approved commercial products to operate on a defense cloud, marking the first time industry online offerings with this level of security are accessible to the military via such an environment. The accreditation, which took approximately two years, means that military organizations can route sensitive data through online software products. As more clients migrate to the cloud and employ the technology, the cost of use will drop. This creates a benefit for anyone wishing to take advantage of the offerings, which include a suite of products designed to enhance communications across Web, social and contact center touch points.