Browse Definitions :
Definition

Army Knowledge Online (AKO)

Army Knowledge Online (AKO) is the U.S. Army's main Intranet.  It is said to be the world's largest corporate intranet. 

The intranet is accessed through the Army's public Web page (also known as "AKO"), which it uses for recruiting and public information. Registering for an AKO account is mandatory upon enlistment in the army. 

AKO access follows DoD security policy and requires a strong password or combination of a Common Access Card (CAC) smart card and personal identification number (pin). As of July 2010, soldiers must also answer 3 out of 15 personal questions of their own choosing in order to further validate access with knowledge-based authentication.

The main AKO intranet serves over 2 million registered users, including active duty and retired service personnel and their family members, and provides single sign-on access to over 300 applications and services. According to the Web site, AKO is the "pivotal tool" for use in "transforming the Army to a knowledge-based organization."

There is also a U.S. Navy Knowledge Online (NKO) and a U.S. Air Force portal. AKO has been expanded to the broader DoD community through Defense Knowledge Online (DKO).


Learn more about AKO:

Army Knowledge Online/Defense Knowledge Online has a Facebook page.

The Defense Health Information Management System (DHIMS) provides information management for the military's electronic health records.

Joint Knowledge Online (JKO) integrates with other DoD systems to provide online training courses and resources to all branches of the service.

This was last updated in January 2011

Continue Reading About Army Knowledge Online (AKO)

Networking
Security
  • personally identifiable information (PII)

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

  • zero-day vulnerability

    A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close