Browse Definitions :
Definition

Army Knowledge Online (AKO)

Army Knowledge Online (AKO) is the U.S. Army's main intranet.  It is said to be the world's largest corporate intranet. 

The intranet is accessed through the Army's public Web page (also known as "AKO"), which it uses for recruiting and public information. Registering for an AKO account is mandatory upon enlistment in the army. 

AKO access follows DoD security policy and requires a strong password or combination of a Common Access Card (CAC) smart card and personal identification number (PIN). As of July 2010, soldiers must also answer 3 out of 15 personal questions of their own choosing in order to further validate access with knowledge-based authentication.

The main AKO intranet serves over 2 million registered users, including active duty and retired service personnel and their family members, and provides single sign-on access to over 300 applications and services. According to the Web site, AKO is the "pivotal tool" for use in "transforming the Army to a knowledge-based organization."

There is also a U.S. Navy Knowledge Online (NKO) and a U.S. Air Force portal. AKO has been expanded to the broader DoD community through Defense Knowledge Online (DKO).


Learn more about AKO:

Army Knowledge Online/Defense Knowledge Online has a Facebook page.

The Defense Health Information Management System (DHIMS) provides information management for the military's electronic health records.

Joint Knowledge Online (JKO) integrates with other DoD systems to provide online training courses and resources to all branches of the service.

This was last updated in January 2011

Continue Reading About Army Knowledge Online (AKO)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close