Windows Phone 8 secrets leaked

If the latest details are true, the Windows Phone 8, code-named "Apollo," will integrate the phone with the core Windows 8 operating and restore enterprise-focused features to Microsoft's smart-phone platform.

New rules of cyber-crime engagement needed to protect US now

Targeted cyber crime threats are on the rise and cause real concern for U.S. national security secrets, intell chiefs testified at a recent Senate hearing.

DARPA developing contact lenses with 'Terminator'-like abilities

The Defense Department wants to give warfighters science-fiction grade contact lenses that would allow them to magnify distant objects and overlay their vision with battlefield data.

Do candles hold the cure for touch-screen smudges?

The product of an old-world technology, simple candle soot, just might be the answer to a 21st-century scourge, according to German researchers.

NOAA app lets you track aurora from solar storms

If the aurora from coming solar storms will bring Northern (or Southern) Lights to your latitude, OVATION can let you know ahead of time.

Cleversafe targets big data with 10 exabyte storage

Cleversafe debuts "dispersed storage" system capable of holding 10 exabytes of data, a scale required by new methods for analyzing big data streams.

Powering and empowering the virtual worker in 2012

As 2012 takes off, agencies are shifting their focus to telework technologies and tools in an effort to foster greater collaboration between the virtual and physical work environment.

Windows 8 secure boot: Is it really Microsoft vs. Linux?

A "secure boot" feature that Microsoft will require of computer makers with Windows 8 continues to draw controversy, particularly among the Linux community.

Can computers really predict the Super Bowl?

Our computer tells us who will win the Super Bowl. What about the real world?

DARPA seeks ways to rebuild space junk

DOD is developing new ways to get high-resolution images of spacecraft as part of a plan to build new satellites in orbit from parts salvaged from deactivated crafts.

Ultrabooks and smart TVs are fine, but holographic talking windshields?

From ultra notebooks, smart TVs and windshields that let you know you're passing your favorite Tex-Mex place, CES was filled with gadgets that are becoming all-too-human.

Will Facebook Timeline put your job in jeopardy?

Facebook Timeline is becoming mandatory for the social network's users soon, and with it comes an array of new headaches for federal executives.

Topic Resources

  • Best Practices in Web-based Application Security

    Security experts make it clear: The application is the new network perimeter. Agencies looking to ensure the security of their networks and systems need to ensure the security of the application layer. Fortunately, even as Web applications come under increasing attack, security professionals are developing strategies to address these vulnerabilities. In this webcast, a federal expert will share best practices and lessons learned in devising Web-based application security that is both robust and scalable.

  • High Speed Guard: Understanding the Business Case for Cross Domain Data Sharing Solutions

    The need for information sharing across operational domains has never been greater. Agencies in law enforcement, defense and other public sectors need to ensure that mission-critical data is available to users across network boundaries -- quickly, efficiently and cost-effectively. But they also need to ensure that those transfers happen securely. In this webcast, Shaheen Parks, an analyst with Forrester Research, will discuss the business case for an automated cross domain information transfer solution, such as Raytheon’s High Speed Guard.

  • GameChanger: NoSQL

    Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.