Communications Engineering and IT
Spotlight on MARCORSYSCOM: Current and Future Demands for Night Vision Systems
May 15 by IDGA EditorNo single imaging sensor can meet all the capabilities Marines require. Whether it's the ability to look through glass or to recognize faces in the dark, Marines require state of the art night visio...
Robots: Working to Meet the Needs of Today’s Soldier
May 10 by Marissa AlvordWhat capabilities will make robots more effective for the modern soldier? What considerations are made in the development of new capabilities for military robots? Dr Naomi Zirkind, US Army Armament...
Elimination of the Bin Laden Threat
May 07 by IDGA EditorAnne Ward, Middle East Analyst examines the NTISR intelligence gathered in the Middle East and highlights what this has taught us about the complexity of intelligence in warfare. Read on to learn ab...
Secure Management for Government Networks
May 05 by IDGA EditorSecuring your network is an ongoing battle for network managers overseeing government and DOD networks. Maintaining the highest possible security requires constant vigilance to ensure data and netwo...
Log Management & Compliance Best Practice for the Government Sector
May 05 by IDGA EditorIn order to ensure compliance as well as protection of confidential government records and assets, you need to know who is accessing which systems and data and what they are doing at all times. Reco...
U.S. Army Counts on WhatsUp Gold to "reboot" Iraq
May 05 by IDGA EditorCENTCOM needed a network monitoring application that could be installed quickly, immediately pinpoint the cause of network and power outages, and handle a complex, dynamic network topology. ORHA, un...
How are Biometric Technologies Securing the US/Canadian Border?
May 03 by Marissa AlvordThere have been rapid advances in biometric technologies in recent years, but how exactly are these technologies helping to ensure the security of the Northern US border? Gary Wheeler, Chief, Global...
Supporting the Visibility of US Army Assets
May 01 by IDGA EditorThe Department of Defense’s logistics transformation requires a leaner and more efficient management of the global supply chain. In an effort to do more with less, global supply chain operatio...
Surviving the Advanced Persistent Threat of Cyber ‘Hacktivists’
April 23 by IDGA EditorCurtis Levinson, Cyber Subject Matter Expert and U.S. Liaison, NATO – explores the term ‘Advanced Persistent Threat’ and how this applies to the US Government. The following interv...
"He who defends everywhere defends nowhere"
April 23 by IDGA Editor"There’s no way to have enough resources to be fully prepared at every state and local level for every contingency, so that’s a huge strength of the Incident Command System" says Brigadi...
Examining the Incident Command System with Brig Gen Mike Stone, Michigan National Guard
April 23 by IDGA EditorIn an IDGA exclusive interview Brig Gen Mike Stone, Assistant Adjutant General, Michigan National Guard examines the main strengths and weaknesses of the ICS and highlights the ways in which the Mic...
Where are we Vulnerable? Mitigating Risk and Managing Security
April 17 by IDGA EditorRon Ross, Computer Security Division, Information Technology Laboratory, at NIST examines the various challenges of the Federal Data Center Consolidation Initiative (FDCCI), in an effort to meet the...