Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25000 Results
The Front Line Is Less Clear On a 360-Degree Battlefield
Battlespace digitization was the focus of a number of leading experts as they debated the reality and trends evolving from this concept. The discussions were part of a recent international symposium in Paris presented by the AFCEA Paris Chapter and conducted under the patronage of the French Minister of Defense.
Steve Cooper, U.S. Department of Homeland Security
The U.S. Department of Homeland Security became the 15th cabinet department in January 2003, consolidating 22 agencies and more than 180,000 people under one unified organization. Prior to creation of the department, no single federal department had homeland security as its primary objective. One can only imagine the challenges it faces as a brand new department in this age of technology. The department's staff is confronted every day with building the enterprise architecture, developing its geospatial capabilities, enhancing its cybersecurity and improving its wireless technologies.
Tuesday, February 1, 2005
West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, opened with a series of controversial speeches and panel discussions. The three days of conferences, speakers, panels and courses began with the Marine Band playing music ranging from marches to swing jazz. This proved to be something of a metaphor for the ideas that were exchanged on this first day. Being held February 1-3 in San Diego, this year's event mixed current events with prognostications in its program, "Beyond Iraq; How Do We Get Transformation Right?"
Wednesday, February 2, 2005
The second and busiest day of West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, featured a full day of speeches and panels. While the discussions may not have been as contentious as on the first day, many of the topics aired by speakers and panelists touched on common themes.
Thursday, February 3, 2005
The third and final day of West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, featured speakers and panels covering topics ranging from homeland security to support for military personnel.
Looking Ahead
Over the past three years, AFCEA International has undergone several changes, both internally and externally. Some of these changes reflected the new world that we faced after the September 11, 2001, attacks. Others were a part of the internal activities that a dynamic organization undergoes to remain vibrant. The next three years hold more changes in store for the association, and they promise to be as important as those of the recent past.
Major Carriers on Collision Course With Voice Over Internet Protocol
After several years of depressed revenues, the telecommunications industry is poised to recover in 2005, experts say. Rebounding from the historic lows of the past several years, the equipment manufacturing sector can expect robust growth while gains for services will remain modest. But storm clouds loom on the horizon as emerging technologies such as broadband and voice over Internet protocol threaten to radically change traditional service carrier arrangements.
Radio Frequency Identification Ready to Deliver
A former niche technology will greatly improve how military and commercial organizations stock and track supplies and products. The system permits the identification of equipment fitted with radio frequency devices known as tags. This capability allows quartermasters to know a cargo container's contents immediately as it enters a theater of operation. Inventory information can then be fed into a database to follow incoming parts and equipment shipments, allowing commanders to react quickly to demand spikes.
Data Holds the Key to Network-Centricity
Data identification is emerging as the primary challenge facing network-centric warfare. Many elements of network-centric operations have been field-tested in the Afghanistan and Iraq wars, and user feedback is giving U.S. Defense Department planners insight into capabilities and drawbacks. These lessons learned span both technological and cultural issues, and defense experts are adapting their efforts to deal with both disciplines.
Apathy and Incompetence Trump Terrorism In Cyberspace
Today's threats to U.S. national security range from the bloody reality of terrorist suicide bombers who kill and maim individuals to weapons of mass destruction that potentially hold many thousands at risk. The U.S. information infrastructure is a vital element of U.S. national security, but the design and management of software render its terminals, nodes and networks demonstrably vulnerable to malicious manipulation.