May 1, 2009 Flu Watchboard offers DOD-related info on flu outbreak With just a few clicks of the mouse, servicemembers, civilians and families interested in learning more about the H1N1 Flu outbreak, otherwise known as swine flu, can access a variety of resources on the Web. Department of Defense officials created and maintain a Pandemic Influenza Watchboard,
May 1, 2009 Proposed Post-9/11 GI Bill transferability rules explained With Department of Veterans Affairs representatives ready to begin accepting sign-ups for the Post-9/11 GI Bill May 1, Defense Department officials are working to get word out on the proposed policy regarding the bill's transferability provisions to help servicemembers decide if the new benefit is
April 29, 2009 Germany increases traffic ticket fines, SFS reinforce point system Slow down, Saber drivers! As the weather gets warmer and the days get longer, the number of traffic tickets written increase. Many drivers may speed up because they think the roads are safer now that they are no longer dusted with snow or covered in ice. Some drivers may simply be distracted by the
April 28, 2009 SFS breaks down vehicle registration procedures In order to register a vehicle on base there are a number of things a drive must have in order. Obtaining a registration The person registering a privately owned vehicle must have their name on the title, registration and insurance card. Personnel registering a second vehicle may need a POV waiver.
April 28, 2009 TMO offers tips for a successful moving day Many Sabers are making warm weather to-do lists. If a permanent change of station move is on your list, there are three easy things you can do to make it go smooth. If you plan ahead, remain flexible, and have a good understanding of the moving process then your upcoming PCS will be a walk in the
April 28, 2009 Unauthorized software a threat to network security Software exploits take advantage of bugs or vulnerabilities in software and use them to cause unintended behavior on computer systems. Most exploits are used to gain control of a system, or to attack it using a denial of service. Vulnerabilities and bugs arise due to human factors in software