chip

Scientists develop chips for super fast cloud data transfers

The technology could download an ultra-high definition 4K movie or 40,000 songs from the cloud in seconds at speeds of 200 to 400 gigabit/sec, IBM said.

DARPA

DARPA seeks to automate battlefield decision aids

Advanced algorithms, software and human-machine interfaces are needed to help battlefield commanders manage the growing scale and complexity of operations.

flooding

Flood-risk planners await next-generation laser mapping

USGS, NOAA and FEMA use LiDAR elevation mapping technology to improve flood-risk assessments.

Navy virtual reality

Virtual reality headset helps Navy simulate future workspaces

The Office of Naval Research, working with USC's Institute for Creative Technologies, has developed a way to give Naval leaders a virtual view of their operational future.

Army CoCreate

Army taps crowd for rapid, tactical tech solutions

The Army's Rapid Equipping Force partnered with Local Motors to develop ArmyCoCreate, an online platform that lets soldiers and civilians collaborate on Army solutions.

ladee

NASA readies laser comm for lift off

As radio frequency communications near the limit for sending data in outer space, NASA says ultra-fast laser-based technology is ready to fill the role.

data

Lawrence Livermore explores the shape of data, expanding query-free analytics

The national lab is using a new technique, topological data analysis, to extract meaning from large and varied data sets through a collaboration with commercial DARPA spinoff, Ayasdi Inc.

password

2014: A tipping point for password authentication

With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.

chess

Cyberthreats for 2014: Not just the usual suspects

Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.

DARPA vacuum tube based amplifier

DARPA innovation could spawn ultra-fast wireless nets, sensors that see through clouds

Defense Advanced Research Projects Agency researchers have broken a barrier in the use of solid-state electronics that could lead to gigabit-speed networks and sensors that see through clouds.

Watson

IBM introduces Watson to the public sector cloud

The IBM Watson Developers Cloud could help agencies tap the cognitive computing for fraud analysis, intelligence surveillance and more.

plant

DLA using botanical DNA to prevent tech counterfeiting

The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.