DARPA wants high-bandwidth communications without infrastructure

The Defense Department's research arm is developing new methods to provide cell tower-grade communications to warfighters, even in remote and rugged areas.

'Janitor satellite' would clean up space junk

The Swiss Space Center's CleanSpace One project aims to help sweep the orbital paths of dangerous debris, but let's hope it's not one piece at a time.

Einstein still right: CERN cites flaw in neutrino experiment

Problems with the experiment in which neutrinos exceeded the speed of light may have thrown off the results, CERN says. So for now, Einstein's still undefeated.

A self-healing network and other new technology for government

Federal officials and industry representatives got together at AFCEA's Emerging Technology Symposium to go over the latest tools.

Single-atom transistor: The future of computing?

A transistor on a single atom raises tantalizing possibilities for quantum computing, though maybe not soon.

IPv6 networks face aggressive attacks for first time

According to respondents to Arbor Networks' Worldwide Infrastructure Security Report, cyberattacks are now targeting IPv6 networks more intensely, although the Internet protocol started implementation last year.

Two states climb aboard new, 100-gigabit fast train

Indiana and Ohio have announced links from academic research networks to the high-speed prototype network being built out by Internet2 with the Energy Department.

New Windows logo adopts Metro style

Microsoft's reveal and explanation of how it devised its new logo for Windows 8 is bringing us one step closer to the new operating system.

Was technology's future written in 1960s TV shows?

In the '60s, TV shows let fly with high-tech gadgets and Space Age technologies. On the eve of the 50th anniversary of John Glenn's historic space flight, we ask: Which had the best idea of things to come?

Where does the IT money go in 2013 budget proposal?

Obama's 2013 budget proposal aims to cut federal IT but increase its use when it makes government more efficient. Here's where 10 departments stand.

Budget reflects shift in scientific R&D, education

Funding requests for scientific research and development, including clean energy, bio and nano research and education, would increase under the president's 2013 budget proposal.

Windows 8 and its power-saving promise

More details are emerging about the power-saving capabilities of Windows 8 and how it works with applications.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • Securing the Mobile Workforce: Device Security is Not Enough

    For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.