More News


How USGS tracked the Mississippi flowing … backward

Storm sensor system contributes to a 3D model of when Hurricane Isaac sent things in reverse.

Army pilots app marketplace to speed development and procurement

The six-month effort not only includes an app store, but a place where developers and customers can get together.

Graded on a curve: How feds lead the way on IPv6

Most agencies missed the Sept. 30 deadline, but industry observers say it's not the raw numbers but the shape of the curve that matters.

White House follows its own order, gets to 'green' on IPv6

With just days to go before OMB's deadline for agencies to enable public facing resources with IPv6, the White House complies.

How crowdsourcing can help vet patent applications

The Ask Patents website lets volunteers help determine the originality of an application.

802.11ac WiFi could help agencies cope with BYOD

The emerging WiFi standard could double the speed of your agency's wireless network ... once you have the equipment to take advantage of it.

Use of IPv6 showing signs of life

A survey by the five Regional Internet Registries shows there still isn't a lot of IPv6 traffic, but the trend is upward.

Wires

Don't get your wires (and cables) in a twist

PigTails offers a unique, clear way to label cords and cables.

From shipments to socks and ants, RFID is tagging everything

Modern RFID tags are only a few millimeters in size and comprise a chip, antenna and in some cases a battery (active). Some forms of RFID tags (passive) have no battery, but actually take power from the electromagnetic beams of a reader, and then send data back to the source. These tags can theoretically last forever, since they only send data or require power when actually being pinged by a reader device. Almost all RFID tags can be inserted into almost anything and do not require line of sight back to a reader. Some tags are so tiny that they have been glued to the backs of ants to track their behavior.

Army puts a 4G battlefield telemedicine system to the test

A real-time system that connects medics on the battlefield with surgeons at a hospital would save lives, if it can be made to work.

Worried about Java? Get Groovy, baby

Groovy, a subset of Java, is so easy to work with it, it could one day replace the ubiquitous programming language.

DOE Idaho Lab moves to Google Apps for Gov

Lab officials expect the new tools to improve collaboration among its employees, helping them to share IT infrastructure, resources and applications.

The 20 most common words in phishing attacks

A new report from FireEye details the dominant current trend in phishing, and the most common words and file attachments used in malicious e-mails.

Can mobile devices work as ID cards, thin clients on a secure net?

DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.

Agencies yet to 'crack the code' on mobile management, security

Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.