Major programs within the Air Force

Enterprise Portal. The Air Force is using One-to-One Enterprise and InfoExchange Portal software from BroadVision Inc. of Redwood City, Calif., and Plumtree Version 4.0 from Plumtree Software of San Francisco to consolidate hundreds of legacy systems at 110 bases into a single point of access. The portal will merge about 700 legacy databases and hundreds of applications and make a variety of information'from personal data to frontline combat intelligence'available to authorized users throughout the service.

Global Strike Task Force. As envisioned by Gen. John P. Jumper, the Air Force chief of staff, the task force will integrate systems'such as the Airborne Warning and Control System, the Joint Surveillance Target Attack Radar System, space-based systems and other platforms'to collect enough data to help military planners refine their target lists. Through such precise targeting, and the use of manned and unmanned attack vehicles, the Air Force plans to use the task force to pave the way for deployment of air and ground forces.

Joint Surveillance Target Attack Radar System. JSTARS is a long-range, air-to-ground surveillance system built to track ground targets. Three systems combine to form JSTARS: radar systems in Air Force E-8C aircraft, Army Common Ground Stations and the data link connection between the two. Mobile ground stations with computer workstations, communications equipment and data link capability integrate with the JSTARS aircraft, intelligence networks and other information sources to receive, process and display radar images transmitted from the aircraft.

Featured

  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.