MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
National Defense
October 2005
Joe Pappalardo
As Military Becomes More Reliant On Networks, Vulnerabilities Grow If problems are not addressed, the Pentagon could spend $200 billion during the next 10 years on a network with serious vulnerabilities, according to security experts. mark for My Articles similar articles
National Defense
April 2007
Sandra I. Erwin
Research Chief Takes Steps to Link Incompatible Weapons Despite years and billions of dollars spent to develop networking technologies, some major weapon systems today still lack basic connectivity to exchange information with other systems. Two initiatives are addressing this issue. mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
National Defense
May 2006
Sandra I. Erwin
Plans for Global Information Grid Unrealistic A Pentagon effort to develop a global network that connects all military services and Defense Department agencies could fail as a result of current procurement and funding policies, says the Government Accountability Office. mark for My Articles similar articles
National Defense
August 2009
Jason Jacks
Updated Global Information Grid Would Bring Web 2.0 to the Defense Department Frustrated that the different communications networks deployed by its four branches aren't always able to speak to one another, the Defense Department is moving forward with a major overhaul of its global information grid. mark for My Articles similar articles
Military & Aerospace Electronics
May 2007
John Keller
Harris RF Designers Expand Into Networked Sensors Applications Harris' RF Communications Division is making a strategic expansion into networked sensors applications to augment their state-of-the-art military radios that operate securely in bands ranging from HF to satellite communications. mark for My Articles similar articles
Military & Aerospace Electronics
July 2008
Courtney E. Howard
iWar Technology companies devise innovations to help combat the growing threat of information warfare. mark for My Articles similar articles
Military & Aerospace Electronics
May 2009
Courtney E. Howard
War in the Information Age Secure operating systems and code verification tools are the front line when it comes to protecting mission-critical and classified information on today's digital battlefield. mark for My Articles similar articles
Military & Aerospace Electronics
November 2005
Secure LAN Technology Approved for Air Force Networks Members of the U.S. Air Force Infostructure Architecture Council (IAC) have approved the SecNet 11 Plus secure wireless local area network from Harris Corp. for Air Force networks, including the Secret Internet Protocol Network (SIPRNet) of the U.S. Department of Defense. mark for My Articles similar articles
National Defense
June 2004
Peter Teets
Space Programs Reflect War-Fighting Priorities Space systems increasingly have become integrated into national intelligence and war-fighting operations. mark for My Articles similar articles
National Defense
May 2010
Dunderdale & Tyliszczak
Is It Possible to Both Share and Protect Sensitive Data? The Defense Department must be able to communicate critical intelligence across agencies and geographic boundaries quickly and securely. mark for My Articles similar articles
Military & Aerospace Electronics
January 2008
National Security Agency Chooses General Dynamics Smartphones The Sectera Edge smartphone is designed to provide users with wireless access to the U.S. Government's Secret Internet Protocol Router Network (SIPRNet) and Non-classified Internet Protocol Router Network (NIPRNet). mark for My Articles similar articles
Popular Mechanics
September 2008
Glenn Derene
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
National Defense
September 2004
Robot Guard Patrols With an Attitude The Guardium perimeter security system, featuring an autonomous unmanned ground security vehicle called M-Guard, provides perimeter security for government and military facilities, as well as transportation and industrial hubs. mark for My Articles similar articles