Privacy accessories for the secure and stylish

Privacy wearables and accessories for the secure – and stylish

After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.

Argonne sets new marks for high-speed data transfer

Argonne sets new marks for high-speed data transfer

Argonne National Laboratory researchers moved 65 terabytes of data between storage centers in Ottawa and New Orleans in under 100 minutes.

Howe big science is cutting big data down to size

How science is cutting big data down to size

Researchers are developing set of data management tools that could be used across the scientific community.

DOD opens the hunt for disruptive tech

DOD opens the hunt for disruptive tech

The Defense Department issues a call for ideas and technologies for its Long Range Research and Development Plan.

Marines expand training field with augmented reality

Marines expand training field with augmented reality

The Marine Corps is testing an augmented reality system from the Office of Naval Research that is transforming the way Marines prepare for combat.

DARPA sees transparent IT as window on new threats

DARPA sees transparent IT as window on new threats

The DOD research agency wants to develop techniques for seeing more deeply into today’s opaque networks to more effectively combat advanced persistent threats.

5G wireless networking explained

5G will power the Internet of Things – and governments

Although 5G technology is still at a nascent stage of development, citizens and government will soon demand it to power a real-time connected world.

DARPA’s EDICT would boost WAN resilience

DARPA’s EDICT would boost WAN resilience

The Defense Advanced Research Projects Agency is expected to launch a research effort to strengthen the resilience and security of military wide-area networks.

Defense Secretary Chuck Hagel speaking at the 2014 Reagan National Defense Forum

Hagel outlines new Defense innovation efforts

Defense Secretary Chuck Hagel announced a new Defense Innovation Initiative that will identify and develop advanced technologies, ensuring that the United States has a competitive technological advantage.

Trans-Atlantic ESnet

High-speed transatlantic network supports faster data exchange

When the Large Hadron Collider comes back online in spring 2015, ESnet will be ready to handle the vastly increased data load.

Advanced tech saves agencies energy, costs

How the US will build a power-hungry future with less energy

Sensor networks, artificial intelligence and building simulators are helping agencies lower energy consumption and costs.

Researchers pilot future of air traffic system for drones

Researchers pilot air traffic control system for drones

NASA, industry and university researches race to find air traffic control systems best suited to managing unmanned vehicles in domestic airspace.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.