Windows 8 secure boot: Is it really Microsoft vs. Linux?

A "secure boot" feature that Microsoft will require of computer makers with Windows 8 continues to draw controversy, particularly among the Linux community.

Can computers really predict the Super Bowl?

Our computer tells us who will win the Super Bowl. What about the real world?

DARPA seeks ways to rebuild space junk

DOD is developing new ways to get high-resolution images of spacecraft as part of a plan to build new satellites in orbit from parts salvaged from deactivated crafts.

Ultrabooks and smart TVs are fine, but holographic talking windshields?

From ultra notebooks, smart TVs and windshields that let you know you're passing your favorite Tex-Mex place, CES was filled with gadgets that are becoming all-too-human.

Will Facebook Timeline put your job in jeopardy?

Facebook Timeline is becoming mandatory for the social network's users soon, and with it comes an array of new headaches for federal executives.

NEC breaks long-range speed record with terabit transmission

The company combined four superchannels to simultaneously transmit 4 terabits/sec over 6,213 miles.

Why ultrabooks actually could be the Next Big Thing

They promise a lot of what's new in user experience -- including a Siri-like voice interface and gesture recognition -- along with a treasured oldie.

Kinect for Windows, free software kit to drop Feb. 1

Along with the retail version of Kinect for Windows arriving Feb. 1 (for $249), a free commercial software development kit will also be available for download.

AT&T shows off Windows Phone-powered HTC Titan II at CES

According to AT&T, the phone carrier will carry the HTC Titan II with the Windows Phone operating system in the next few months.

A space-time cloak? Time holes? It's not science fiction anymore.

New research in creating time holes to cloak events sounds esoteric, but hackers might be able to use it to mask online intrusions into IT systems.

3 reasons to beware of the hype at CES

Although a lot of buzz will come from CES, the hot new product doesn't always do so well in the real world. Here are three past "darlings" that didn't catch on.

Non-Latin Top Level Domain names grew in 2011

The number of country code Top Level Domains using non-Latin scripts and alphabets rose with the addition of 26 to 30 names in the last year.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.