Pi Day: How the 'irrational' number pushed the limits of computing

The never-ending number has led to ingenious algorithms used to calculate it with precision, in the process expanding the boundaries of what computers can do.

After 244 years, Encyclopedia Britannica closes the book on print editions

In an era when even on-disk encyclopedias seem to be passé, Britannica's move to all-digital editions was inevitable.

NASA's new trajectory: Angry Birds in space

NASA is going into outer space again, but this time instead of launching a spaceship, it's sending some Angry Birds.

Wolfram Alpha Pro

Wolfram Alpha Pro runs rings around today's search engines

More concierge than search engine, Wolfram Alpha Pro will analyze a query, perform high-end math calculations and even analyze images.

DARPA's cheetahbot breaks speed record for legged robots

The Cheetah, part of the agency's research into all-terrain robots, is designed to move like the speedy hunting cat.

IBM achieves quantum computing milestone

Researchers at IBM have developed new error-correction and fabrication processes that greatly increase processing times for quantum computers.

Windows Kinect

Microsoft Kinect takes a swipe at visualization, geospatial apps

Microsoft's Kinect can take inputs from a mouse, stylus, touch, voice or a motion-sensing device.

CIA wants big data, petascale computing to speed info analysis

The agency is looking at new information processing and networking technologies to dramatically reduce the time it takes to analyze data.

2012 outlook for mobile data traffic

This year, the number of mobile-connected devices will exceed the world's population, according to a new forecast, continuing a trend that will help push global mobile data traffic to 10 exabytes by 2016.

PlayStation Vita: Ready for your network?

Almost anything these days could become a client on your network, even a portable gaming console such as the Vita, with all the advantages and risks that entails.

Robot cars get the green light in Nevada

State becomes the first to allow self-driving vehicles -- for testing, at the moment -- which Google says can increase safety.

DARPA's $40K 'quest' tests social media's ability to help in emergency

The CLIQR Quest Challenge asks participants to use their social media skills to locate QR codes that represent resources crews would need in an emergency.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.