Army tests driverless vehicles in 'living lab'

Federal installations and universities are test beds for implementing autonomous vehicles in public environments.

HP Apollo 8000 water-cooled system packs more power, less heat for data centers

Water-cooled system packs more power, less heat for data centers

Because of its cooling power, the HP Apollo 8000 can pack more servers in a smaller space than traditional systems – up to 144 servers per rack.

RFID and NFC enabled government identification

The future of government ID cards

Employee IDs cards are incorporating some relatively mature technologies that increase the level of interaction and tracking potential.

3D printed model of an influenza virus

NIH launches 3D print exchange

The public website lets users share, download and edit biomedical 3D print files that can be used to print custom laboratory equipment or models of bacteria and human anatomy.

A convoy of driverless U.S. Army trucks uses Lockheed Martin AMAS technology to move along a South Carolina roadway at 40 mph.

Unmanned convoy passes second driving demo

The Army’s Autonomous Mobility Appliqué System successfully completed the latest round of tests validating the concept of driverless military-truck convoys.

Robotics Assisted Bridge Inspection Tool

Robots stand guard on bridges and ports

The attributes of precision, repetition and scale make robots ideal for tackling one of the country's biggest economic challenges: maintaining the deteriorating infrastructure of the U.S. highway system.

robot built by NASA Jet Propulsion Laboratory for DARPA Robotics Challenge

Robots step up for government work

As robots have gotten more sophisticated and their costs have dropped, they are now taking on new roles in the broader civilian government workspace.

DaVinci Surgical system

Hands-on robots: From surgery to bomb disassembly

Although robots are not yet "smart," a new breed is emerging that can reach out and manipulate its environment in routines so precise and synchronized that a form of electronic intelligence seems to be at work.

Man testing ULTRA Vis heads up display at DARPA Demo Day

DARPA shows 100+ projects at Demo Day

The all-day event showcased the wide array of DARPA projects addressing national security challenges posed by the information revolution and the availability of sophisticated information technologies.

Robonaut 2 with legs

Robonaut 2 gets its space legs

Robonaut's new legs have prehensile feet, which will give it an edge over humans, letting it climb ladders while its hands are free to work or hold objects.

Context aware security with software defined networking

Software-defined computing enables context-aware IT

Move to SDN said inevitable in new world of mobility, social, big data and cloud computing.

Entrepreneur speaking with mentors

The 1776 crew marches into FOSE

In partnership with Booz Allen Hamilton, the 1776 group helps startups tackling important challenges in government connect with established firms that are seeking new ideas and opportunities.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.