Not finding what you’re looking for?
Cool App-titude: Shakespeare
It's almost time for students to head back to school. Don't contribute to the insignificance of human learning by failing to understand Shakespeare. Use the free Shakespeare app for access to the literary genius' complete works. The application features the full text of all 40 plays as well as the Bard's six poems and 154 sonnets.
Harris To Supply Radios To Next-Generation Vehicles
Harris Corporation has received a $228 million contract order from the U.S.
DRC Wins FEMA Program Management Contract
The Federal Emergency Management Agency (FEMA) has awarded Dynamics Research Corporation a contract worth up to $1.2 million.
Globecom Receives Contract Extension to Support NATO Blue Force Tracking System
Globecomm Systems Inc., has received a contract extension from NATO valued at $9.1
BUSINESS DEVELOPMENT AT THE NSA
If you've been following this blog, you know I like a varied approach to penetrating these complex agencies. Unfortunately, they do not exist to make life easy for sales folks, but I have found if we know how to work with them, there is more to be gained then by complaining.
SYSTEM IMPROVEMENTS AFTER THE CHRISTMAS TERROR ATTACK?
Information Technology in the federal enterprise does not work like it does in Hollywood. Although there are plenty of success stories to go around, federal IT is more limited and constrained than we would all want, for lots of reasons. Some of the reasons are just do to complexities and limited budgets. Some of the reasons are for security. Some of the reasons are because of the way the government funds its agencies and manages programs. And some of reasons are because we humans have designed things using the wrong models and implemented them to serve workflows that are flawed to begin with.
Welcoming Linton Wells to SIGNAL
SIGNAL welcomes Dr. Linton Wells II as the new Incoming columnist.
Standing Outside the Wire
What does the United States need to make its efforts in Afghanistan successful? According to Dr. Linton Wells II, the answer is sharing unclassified information.
Cybersecurity Issues Reach Across Vast Pacific Region
The problems presented by information technology acquisition pale in comparison to those of cybersecurity acquisition. Challenges range from rapidly changing requirements to outmoded criteria for the security work force. And, these challenges coalesce against the backdrop of an ever-increasing cyberspace menace that is growing in both size and sophistication worldwide.
Look Outside the Wire for Information Sharing
Improving the way we share unclassified information is essential to the success of the president’s strategy for Afghanistan. The reason is straightforward: The United States and its coalition partners must engage effectively with the populations they are trying to influence to achieve the social, political and economic goals for which their military forces have been committed. In Afghanistan, these populations include governments at various levels, security forces, businesses and the Afghan people. Unclassified information is the path to most of these audiences. It also is a key channel for them to help us understand their needs and the knowledge they have.