CIA wants big data, petascale computing to speed info analysis

The agency is looking at new information processing and networking technologies to dramatically reduce the time it takes to analyze data.

2012 outlook for mobile data traffic

This year, the number of mobile-connected devices will exceed the world's population, according to a new forecast, continuing a trend that will help push global mobile data traffic to 10 exabytes by 2016.

PlayStation Vita: Ready for your network?

Almost anything these days could become a client on your network, even a portable gaming console such as the Vita, with all the advantages and risks that entails.

Robot cars get the green light in Nevada

State becomes the first to allow self-driving vehicles -- for testing, at the moment -- which Google says can increase safety.

DARPA's $40K 'quest' tests social media's ability to help in emergency

The CLIQR Quest Challenge asks participants to use their social media skills to locate QR codes that represent resources crews would need in an emergency.

DARPA wants high-bandwidth communications without infrastructure

The Defense Department's research arm is developing new methods to provide cell tower-grade communications to warfighters, even in remote and rugged areas.

'Janitor satellite' would clean up space junk

The Swiss Space Center's CleanSpace One project aims to help sweep the orbital paths of dangerous debris, but let's hope it's not one piece at a time.

Einstein still right: CERN cites flaw in neutrino experiment

Problems with the experiment in which neutrinos exceeded the speed of light may have thrown off the results, CERN says. So for now, Einstein's still undefeated.

A self-healing network and other new technology for government

Federal officials and industry representatives got together at AFCEA's Emerging Technology Symposium to go over the latest tools.

Single-atom transistor: The future of computing?

A transistor on a single atom raises tantalizing possibilities for quantum computing, though maybe not soon.

IPv6 networks face aggressive attacks for first time

According to respondents to Arbor Networks' Worldwide Infrastructure Security Report, cyberattacks are now targeting IPv6 networks more intensely, although the Internet protocol started implementation last year.

Two states climb aboard new, 100-gigabit fast train

Indiana and Ohio have announced links from academic research networks to the high-speed prototype network being built out by Internet2 with the Energy Department.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.