Windows Phone 8 secrets leaked

If the latest details are true, the Windows Phone 8, code-named "Apollo," will integrate the phone with the core Windows 8 operating and restore enterprise-focused features to Microsoft's smart-phone platform.

New rules of cyber-crime engagement needed to protect US now

Targeted cyber crime threats are on the rise and cause real concern for U.S. national security secrets, intell chiefs testified at a recent Senate hearing.

DARPA developing contact lenses with 'Terminator'-like abilities

The Defense Department wants to give warfighters science-fiction grade contact lenses that would allow them to magnify distant objects and overlay their vision with battlefield data.

Do candles hold the cure for touch-screen smudges?

The product of an old-world technology, simple candle soot, just might be the answer to a 21st-century scourge, according to German researchers.

NOAA app lets you track aurora from solar storms

If the aurora from coming solar storms will bring Northern (or Southern) Lights to your latitude, OVATION can let you know ahead of time.

Cleversafe targets big data with 10 exabyte storage

Cleversafe debuts "dispersed storage" system capable of holding 10 exabytes of data, a scale required by new methods for analyzing big data streams.

Powering and empowering the virtual worker in 2012

As 2012 takes off, agencies are shifting their focus to telework technologies and tools in an effort to foster greater collaboration between the virtual and physical work environment.

Windows 8 secure boot: Is it really Microsoft vs. Linux?

A "secure boot" feature that Microsoft will require of computer makers with Windows 8 continues to draw controversy, particularly among the Linux community.

Can computers really predict the Super Bowl?

Our computer tells us who will win the Super Bowl. What about the real world?

DARPA seeks ways to rebuild space junk

DOD is developing new ways to get high-resolution images of spacecraft as part of a plan to build new satellites in orbit from parts salvaged from deactivated crafts.

Ultrabooks and smart TVs are fine, but holographic talking windshields?

From ultra notebooks, smart TVs and windshields that let you know you're passing your favorite Tex-Mex place, CES was filled with gadgets that are becoming all-too-human.

Will Facebook Timeline put your job in jeopardy?

Facebook Timeline is becoming mandatory for the social network's users soon, and with it comes an array of new headaches for federal executives.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.