Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
Distributed Analysis, Processing Capabilities Empower Warfighters
Recognizing that the Global War on Terrorism covers many distinct areas of the world, the U.S. Army is expanding its intelligence databases by adding regional analysis capabilities for its areas of operation. This information will be stored in distributed data warehouses that allow analysts to access and share actionable intelligence to support forces in theater. Army intelligence brigades will use these tools to store and study data before providing it to deployed forces.
AFCEA Well-Positioned for a Dynamic Future
As AFCEA enters its 62nd year, I am pleased to report that the association has never had a stronger program of services nor been sounder financially. We have been listening to our stakeholders and are responding with a new set of offerings that will be important to every member.
Information Integration Is Explored at Sea
A diverse group of military, government, commercial and industrial experts gathered in a unique conference environment to examine the integration of information.
Leaders Talk Tough About Interoperability
Interoperability remains an illusive goal that the U.S. military continues to fight for on all fronts. From the simulations used in training to the radios on battlefields, the ability to communicate using voice, video and data continues to be a problem despite years of effort. New strategies are being adopted that already have shown the inklings of improvements, but reform is needed at the policy hub so the military service spokes can deliver network-centric capabilities out to the edge—right to the individual warfighters themselves.
Asia-Pacific Challenges Meld War, Cooperation
“We are at war.”
“So, general, tell me what went awry.”
This is what I’ve been hearing from government and industry leaders who invested heavily in information technology to improve organizational performance but didn’t see the returns they expected. Some chief executive officers implemented instant messaging software across their organizations to improve communication flow, but because users were not convinced that communications were secure, instant messaging was ignored. In other situations, both leadership and staff were uncomfortable with social networking tools because they were used to communicating through other people—not with more direct, less formal means.
Download to the Danger Zone
It seems so innocent, downloading a game or other entertainment to pass the time during a tedious or stressful deployment. Yet, some of the dangerous cyber-critters that hitch a ride on many of those “fun” downloads make the fleas your dog brought home last summer seem like a welcome addition to the household.
Command Swells With New Responsibilities
In the cell phone business, it’s all about the network, but in the military world, it’s about the information that rides on that network. The type commander in charge of the U.S. Navy’s networks set sail a mere five years ago, but in that short period of time, its mission has grown and shifted with equal emphasis on the security of the systems and the intelligence they carry. Along the way, the command has picked up a few new responsibilities, including becoming the primary authority to ensure the homogeneity of the service’s communications systems.