DARPA seeks proposals for new software that can scour social media and other sites to predict cyberterrorism events.
With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.
It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.
Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.
The project is one of many at the U.S. Army's SouthCom that combines IT expertise from multiple agencies, including foreign ones, to support forces in the field.
SharePoint lets CECOM’s 13,000 employees share information across the command, within organizations and individually.
Data-storage requirements caused by the growth of remote sensors and the move to cloud forced the National Geospatial Intelligence agency to expand its data center footprint.
DOD aims to move the department's network applications from a "duplicative, cumbersome and costly set of application silos" to an environment offering greater agility and cost-effectiveness.
The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.
Tests show that drones guided by the system can detect and avoid other aircraft, which will allow unmanned training flights any time day or night.
The information-stealing Trojan attacks the recently discovered flaw in XML Core Services, as well as Flash Player, and might be coming from China.
Building an app store can be the best way to make sure employees are using the right mobile apps. Here's a checklist to help you get there.