Defense IT


Big data's big question: Where are the data scientists?

The move to big data requires a different skill set, experts say, as they try to define the role of data officer or data scientist.

DOD aiming to lift restrictions on unmanned flights in US airspace

The department is working with the FAA to develop tracking and collision-avoidance technologies to enable more domestic unmanned flights.

Air Force strikes deal for 18,000 iPads

Service wants to use the tablets to replace paper flight manuals and navigation charts.

DARPA's cheetahbot breaks speed record for legged robots

The Cheetah, part of the agency's research into all-terrain robots, is designed to move like the speedy hunting cat.

Desktop virtualization: Is the future now?

As smart phones and tablets redefine personal computing, agencies across the United States are giving desktop virtualization a fresh look. Could yours be next?

Can NSA be trusted to oversee public networks?

A lack of transparent oversight of the agency charged with snooping on foreign communications makes it a poor choice for handling domestic security.

Smart-grid security delayed by questions of government regulation

With billions of dollars being invested a smart electric grid, its security still is being debated by a Congress divided politically over the role of government in securing critical infrastructure.

NSA: Inconsistent products preventing secure Android phones

The agency wants to enable top-secret security on commercial smart phones but can't find the standards-based commercial products that meet its needs.

DOD wants in on protecting civilian infrastructure

Defense Deputy Secretary Ashton B. Carter calls for support of greater info sharing between government and the private sector at the 2012 RSA Conference.

DARPA's $40K 'quest' tests social media's ability to help in emergency

The CLIQR Quest Challenge asks participants to use their social media skills to locate QR codes that represent resources crews would need in an emergency.

Which is the bigger threat, missiles or hackers?

In a study on cybersecurity attitudes, one-third of security officials rated computer security higher than missile defense.

Could you continue to operate under cyberattack?

In the cybersecurity world, the military model of mitigating damage when operating in degraded conditions is increasingly applicable.