Home

Technology

 

 
 
PREV
1 2 3
NEXT
Information Technology
THE MILITARY-TECHNICAL REVOLUTION : A PRELIMINARY ASSESSMENTT  By Andrew F. Krepinevich, Jre

Over the next several decades, the systems and operations characteristic of present-day military establishments will probably be superseded by new, far more capable means and methods of ...Read more >

65 Pages
213.71 KB
TELECOMMUNICATIONS NETWORKS  By Mark L. Goldstein

The network providers and equipment manufacturers GAO spoke with reported taking steps in their security plans and procurement processes to ensure the integrity of parts and equipment obtained from foreign sources. Although these companies do not consider foreign-manufactured equipment to be their most pressing security threat, their brand image and profitability depend on providing secure, reliable ...Read more >

52 Pages
725.02 KB
RELEVANCE OF CLOUD COMPUTING FOR DEFENCE  By Ajey Lele and Munish Sharma

Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of ...Read more >

23 Pages
605.88 KB
ARMY INFORMATION TECHNOLOGY  

This regulation establishes policies and assigns responsibilities for information management and information technology (IT). This regulation applies to IT contained in mission command systems; intelligence ...Read more >

100 Pages
279.53 KB
INFORMATION-SHARING WITH THE PRIVATE SECTOR  By Veronica A. Chinn

Imagine logging onto your banks secure Web site using your personal computer to pay monthly bills or transfer money between accounts to pay your ...Read more >

7 Pages
690.51 KB
STEALTH TECHNOLOGY AND ITS EFFECT ON AERIAL WARFARE  By VIVEK KAPUR

Stealth as a concept is not new to warfare. Stealth used as a noun means the act of moving, proceeding, or acting in a covert way; the quality or characteristic of being furtive or ...Read more >

106 Pages
631.69 KB
THE GLOBAL INFORMATION GRID 2.0 CONCEPT OF OPERATIONS  

Achieving and maintaining the information advantage as a critical element of national power requires the concentrated effort of the entire Department of Defense (DoD) to provide a seamless information environment optimized for the ...Read more >

46 Pages
1.59 MB
RADICALISATION IN THE DIGITAL ERA  

The use of the internet in 15 cases of terrorism and extremism : The internet has brought extensive change in peoples lives. It has revolutionised how we communicate and simplified the way we create networks among like-minded individuals. We live in an era in which 84 per cent of the EU population use the internet daily, including 81 per cent of whom access it from ...Read more >

76 Pages
1.23 MB
ADDITION THROUGH SUBTRACTION  

A complex and dynamic global security environment, coupled with an uncertain fiscal environment, demands that the Army continue to invest wisely in innovation and ...Read more >

4 Pages
2.18 MB
HIGH-TECH BUBBLES, TECHNOLOGY DIFFUSION AND HOW TO PREPARE FOR THE NEXT TECHNO-MANIA  By Andrew

technology predictions inherently hard techno-manias rooted in human mass psychology, ignited by appearance of promising new ...Read more >

27 Pages
347.12 KB
INFORMATION OPERATIONS NEWSLETTER  By Mr. Jeff Harley

Due to the current fiscal constraints, and the most recent Army guidance outlined in the SA and CSA Risk Mitigation Memo, we cancelled the 10th Annual Army Global Information Operations Conference this year. We will look at dates for the conference next year and announce those ...Read more >

27 Pages
253.62 KB
REDEFINING INFORMATION OPERATIONS  By Carmine Cicalese

Whether it is strategic communication, information operations, or cyberspace operations, the Department of Defense (DOD) recognizes the importance of conducting operations within the information ...Read more >

4 Pages
284.83 KB
WHAT AN IP ADDRESS CAN REVEAL ABOUT YOU  

As demonstrated in the above case studies, knowledge of subscriber information, such as phone numbers and IP addresses, can provide a starting point to compile a picture of an individual's online ...Read more >

16 Pages
244.88 KB
PREV
1 2 3
NEXT