Browse Definitions :
Definition

Army Knowledge Online (AKO)

Army Knowledge Online (AKO) is the U.S. Army's main intranet.  It is said to be the world's largest corporate intranet. 

The intranet is accessed through the Army's public Web page (also known as "AKO"), which it uses for recruiting and public information. Registering for an AKO account is mandatory upon enlistment in the army. 

AKO access follows DoD security policy and requires a strong password or combination of a Common Access Card (CAC) smart card and personal identification number (PIN). As of July 2010, soldiers must also answer 3 out of 15 personal questions of their own choosing in order to further validate access with knowledge-based authentication.

The main AKO intranet serves over 2 million registered users, including active duty and retired service personnel and their family members, and provides single sign-on access to over 300 applications and services. According to the Web site, AKO is the "pivotal tool" for use in "transforming the Army to a knowledge-based organization."

There is also a U.S. Navy Knowledge Online (NKO) and a U.S. Air Force portal. AKO has been expanded to the broader DoD community through Defense Knowledge Online (DKO).


Learn more about AKO:

Army Knowledge Online/Defense Knowledge Online has a Facebook page.

The Defense Health Information Management System (DHIMS) provides information management for the military's electronic health records.

Joint Knowledge Online (JKO) integrates with other DoD systems to provide online training courses and resources to all branches of the service.

This was last updated in January 2011

Continue Reading About Army Knowledge Online (AKO)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close