binary

How quantum key distribution works

QKD uses a photon's polarization and spin to verify an unobserved key transmission.

power lines

Threats to privacy become a focus of Smart Grid planning

NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

photon

Can quantum cryptography work in the real world?

Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

Kyocera glass

Revolutionary way to transmit sound is being heard

Kyocera’s proprietary Smart Sonic technology transmits sounds via the air and through body tissue -- mitigating background noise and traveling through ear plugs.

BOLD

Rice University researchers take "BOLD" approach to big data

With NSF-backed funding, researchers will create energy-efficient optical network -– with silicon photonic switches –- to handle massive amounts of data.

D-wave

Quantum computing explained: D-Wave on NASA's system

D-Wave's Eric Ladizinsky explains how "we are harvesting the parallel worlds to solve problems in this one."

3D printing

Army preps on-the-spot 3D printing process for the battlefield

The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.

Cyber tools sniffs malware on network traffic

New cyber tool learns network behavior to sniff out malware

Researchers from Georgia Tech demonstrate a prototype tool, ExecScent, that learns a network's normal traffic patterns to spot the command and control traffic from infected hosts. In live tests it identified dozens of new C&C domains and discovered hundreds of infected computers.

Savannah

Energy lab's wireless system secure enough for classified data

The Savannah River National Lab’s prototype hardware, designed in collaboration with NSA, uses Suite B cryptography for a system that could be adapted for other uses.

e-authentication

E-authentication: What IT managers will be focusing on over the next 18 months

The moves to cloud computing and shared databases are among the factors driving e-authentication.

Close up of an iris scan with a PIV card in the pupil

Smart ID to offer options for iris scanning, on-card fingerprint matching

Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.

A quad rotor vehicle flying to validate research on elements of a futuristic control system

The FAA's rules on domestic UAV flights

The agency is selecting sites for UAV tests that could eventually open up the airways, but for now there are two paths to getting authorization for unmanned flights.

Topic Resources

  • Flash Storage: The Next Generation of Storage has Arrived

    Today, Government IT organizations are being forced to do more with less due to budget cuts and increased requirements for performance, features and scalability. Storage infrastructure is a key component of overall database, virtual server and VDI environments that has a direct influence on performance. But the complexity and cost of creating the best storage environment to support high performance architecture can be daunting. Join this webcast to learn how to take the complexity out of storage infrastructure and deliver breakthrough performance for your tier-1 applications.

  • How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

    Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.

  • Enabling Government to Citizen Engagement through Mobility and Identity Solutions

    In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.

  • Flash Storage: Optimizing the Infrastructure for Mission-Critical Operations

    Flash technology solutions are imperative in today’s mission-critical IT infrastructure. The requirements for performance, endurance, agility, scalability, security and reliability in the public sector are driving sophisticated flash memory solutions that require a new level of expertise. Join this webcast to learn how high-performance flash solutions can enable the warfighter’s data-focused, mission-critical applications from the core to the tactical edge.

  • Flash Storage: The Critical Piece in the Performance Puzzle

    Solid-state, flash-based storage promises relief from the ongoing purchase cycle of massive, expensive, low-performance disk. Flash is smaller, denser, more efficient, faster, and easier to manage than disk and is fundamentally changing how government agencies purchase and deploy storage systems. Join this webcast to help better position your organization to take advantages of the cost, performance, and simplicity benefits offered by flash-based storage systems.