Not finding what you’re looking for?
Wednesday, February 2, 2005
The second and busiest day of West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, featured a full day of speeches and panels. While the discussions may not have been as contentious as on the first day, many of the topics aired by speakers and panelists touched on common themes.
Thursday, February 3, 2005
The third and final day of West 2005, the annual conference and exposition sponsored by AFCEA International and the U.S. Naval Institute, featured speakers and panels covering topics ranging from homeland security to support for military personnel.
Looking Ahead
Over the past three years, AFCEA International has undergone several changes, both internally and externally. Some of these changes reflected the new world that we faced after the September 11, 2001, attacks. Others were a part of the internal activities that a dynamic organization undergoes to remain vibrant. The next three years hold more changes in store for the association, and they promise to be as important as those of the recent past.
Major Carriers on Collision Course With Voice Over Internet Protocol
After several years of depressed revenues, the telecommunications industry is poised to recover in 2005, experts say. Rebounding from the historic lows of the past several years, the equipment manufacturing sector can expect robust growth while gains for services will remain modest. But storm clouds loom on the horizon as emerging technologies such as broadband and voice over Internet protocol threaten to radically change traditional service carrier arrangements.
Radio Frequency Identification Ready to Deliver
A former niche technology will greatly improve how military and commercial organizations stock and track supplies and products. The system permits the identification of equipment fitted with radio frequency devices known as tags. This capability allows quartermasters to know a cargo container's contents immediately as it enters a theater of operation. Inventory information can then be fed into a database to follow incoming parts and equipment shipments, allowing commanders to react quickly to demand spikes.
Data Holds the Key to Network-Centricity
Data identification is emerging as the primary challenge facing network-centric warfare. Many elements of network-centric operations have been field-tested in the Afghanistan and Iraq wars, and user feedback is giving U.S. Defense Department planners insight into capabilities and drawbacks. These lessons learned span both technological and cultural issues, and defense experts are adapting their efforts to deal with both disciplines.
Apathy and Incompetence Trump Terrorism In Cyberspace
Today's threats to U.S. national security range from the bloody reality of terrorist suicide bombers who kill and maim individuals to weapons of mass destruction that potentially hold many thousands at risk. The U.S. information infrastructure is a vital element of U.S. national security, but the design and management of software render its terminals, nodes and networks demonstrably vulnerable to malicious manipulation.
Small Systems, Big Business
The military may be moving toward the massive Global Information Grid, but interest also is growing in networks that feature lilliputian qualities. Research that began in the mid-1990s is starting to bear fruit in the form of networking nodes that are scarcely the size of a postage stamp. Sometimes referred to as "smart dust" or "motes," these miniature networking nodes can be integrated with a variety of sensors to then pass on the information that is gathered to the people who need it.
Modular Robots Shimmy Past Conventional Automatons
Researchers are developing shape-shifting robots that can climb obstacles, drop down cliffs and fit into tunnels. Small, individual modules link to form a system that can take a multitude of shapes to travel over varied terrain. Two distinctly different designs could allow military and first responder personnel to reach past obstructions into previously inaccessible areas while remaining at a safe distance.
Army Finds Communications Path
Networking capabilities that increase situational awareness are moving down the chain of command and eliminating bottlenecks in data sharing. Work underway on the Pathfinder advanced concept technology demonstration aims at integrating capabilities so that information gathered by unmanned ground vehicles, unmanned aerial vehicles and unattended ground sensors can be distributed within a mobile, self-forming, self-healing network. The system is designed for use by special operations and lightweight conventional forces in small team operations.