The Pentagon expects to have its own network up and running by next year, as part of its new push for better cybersecurity.
A Naval Research Lab team develops a more efficient set of algorithms to increase the resolution of its maps.
Metadata is valuable for extracting knowledge from smaller subsets of data for intelligence-gathering as well as for energy, weather and public safety research, experts say.
The intell community's two-pronged approach will free agencies from the "tyranny of the one," the CIA's chief technology officer says.
While marking GCN's 30th year, we're taking a look at how far computing has progressed in three decades. Here's a look at the most powerful supercomputers of 1982 and 2012.
DreamHammer's Ballista is the first commercial software that can be integrated into the military's UCS architecture.
The agency gets ready to fire up the world's third largest data center, with zettabytes of capacity, as it begins work on another new high-performance center.
A year after the global launch, traffic using IPv6 has doubled, with some mobile networks, university campuses and government agencies driving the switch.
Mobile technology has changed a lot in the past 30 years. It may change even more in the next five.
DISA specifies required capabilities for secure use of two more mobile operating systems on DOD networks.
The agency approves security guidelines for Android and iOS operating systems, expanding the range of new devices in a market dominated by BlackBerry.
The growth in cyberattacks and the theft of intellectual property has prompted calls for more aggressive cyber defense. The Pentagon and an independent commission are taking up the cause.