TechNet Augusta 2016: Defensive Cyber

This is the sixth in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The US Army must ensure they have the ability to maneuver in cyberspace.  There were considerable discussions on defensive and offensive cyber operations and how they will occur in a conflict.  Defensive cyber […]

TechNet Augusta 2016: Integrated Electronic Warfare Systems (IEWS)

This is the third in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. Integrated Electronic Warfare Systems (IEWS).  Electronic warfare and spectrum management operations are being developed, synchronized and integrated into the electromagnetic operational environment.   There is a new emphasis on how “cyber electromagnetic activities” can […]

TechNet Augusta 2016: US Army Expeditionary Networks

This is the forth in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. Expeditionary Networks.  Army’s plan to modernize their expeditionary networks comes after years of fighting on the ground in Iraq and Afghanistan. They will rely on two methods to modernize the force: Unit Set […]

TechNet Augusta 2016: US Army Networks and Services

This is the second in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The first was an overview you can find at: TechNet Augusta 2016 “Cyber in the Combined Arms Fight” Networks and Services.  The Army is emphasizing the “convergence of their lines of effort” to achieve […]

TechNet Augusta 2016 “Cyber in the Combined Arms Fight”

This is the first in our series of posts based on our attendance at AFCEA’s TechNet in Augusta. Other coming posts will dive into details of Army Mission Needs for Networking, Integrated Electronic Warfare, Tactical Radios, Defensive Cybersecurity, Cybersecurity Training, and the Army’s Cybersecurity Center of Excellence. The annual AFCEA TechNet Augusta conference continues to […]

Can You Imagine Processing Classified Government Data In The Cloud?

DoD technologists continue their pioneering work in leveraging cloud computing in support of national security missions. Cloud Computing for DoD is hard for many reasons, including the fact that like many other organizations the tendency is to keep things in motion that are already in motion. The fact that the old things never stop makes starting […]