The six-month effort not only includes an app store, but a place where developers and customers can get together.
Modern RFID tags are only a few millimeters in size and comprise a chip, antenna and in some cases a battery (active). Some forms of RFID tags (passive) have no battery, but actually take power from the electromagnetic beams of a reader, and then send data back to the source. These tags can theoretically last forever, since they only send data or require power when actually being pinged by a reader device. Almost all RFID tags can be inserted into almost anything and do not require line of sight back to a reader. Some tags are so tiny that they have been glued to the backs of ants to track their behavior.
A real-time system that connects medics on the battlefield with surgeons at a hospital would save lives, if it can be made to work.
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
The device's portability, features and security could fit the service's requirements.
Unmanned ocean-going Wave Gliders proving useful for research and, perhaps, much more.
The Nautiz X1 from the Handheld Group also is surprisingly small and light for a rugged phone.
The improved robotic "pack mule" can carry a lot of gear for soldiers, follow them in the field and even charge their radios.
A worst-case scenario could take out parts of the grid for years, according to some studies, and although equipment exists that can prevent such damage, Congress and the power industry cannot agree on action.
Symantec says the well-funded hackers behind the 2009 Google attacks are still very active in gathering intelligence, while an NSA official says nations are getting "reckless" with their attacks.
Acknowledging Congress' failure to pass cybersecurity legislation, Democrats assert the president’s willingness to act on his own through executive order.
Iowa State's Information Assurance Center's test bed simulates complex networks and cyberattacks, making it a trusted source for information on the reliability and effectiveness of security products.