e-authentication

E-authentication: What IT managers will be focusing on over the next 18 months

The moves to cloud computing and shared databases are among the factors driving e-authentication.

Close up of an iris scan with a PIV card in the pupil

Smart ID to offer options for iris scanning, on-card fingerprint matching

Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.

A quad rotor vehicle flying to validate research on elements of a futuristic control system

The FAA's rules on domestic UAV flights

The agency is selecting sites for UAV tests that could eventually open up the airways, but for now there are two paths to getting authorization for unmanned flights.

NASA Dryden DROID small unmanned research aircraft

The tech that will make drones safe for civilian skies

Sense-and-avoid technologies are close to ensuring safe UAV flights on a large scale. It's mostly a matter of time, standards and FAA rules.

Warrior Web prototype studies the stress on soldiers

Army's exoskeleton to help soldiers carry the load

In order to reduce soldiers' fatigue and injury, the Warrior Web prototype reduces the stress on the troops who carry 100 pounds or more of equipment.

Wi Vi system detects motion on the other side of a wall

Using Wi-Fi signals to see through walls

MIT researchers' Wi-Vi system uses two transmitters and a single receiver to detect motion on the other side of a wall or door.

Abstract image depicting satellite communications

Tapping satellite spectrum could greatly expand, improve Wi-Fi service

Globalstar and research organization Jarvinian have successfully tested Terrestrial Low Power Service, which adapts satellite communications spectrum for Wi-Fi.

A lithium ion battery the size of a grain of sand printed out of electrochemical inks

Tiny 3D printed battery could power devices of the future

A research team prints a lithium ion battery the size of a grain of sand out of electrochemical inks, opening the door for microscopic medical implants, communications devices and other gear.

Ballista allows a single operator to simultaneously manage multiple unmanned vehicles

New drone OS allows control of multiple types of UAS

DreamHammer's Ballista is the first commercial software that can be integrated into the military's UCS architecture.

Augmented reality view of people in an airport

Augmented reality comes into focus for government

Advances in AR technology are opening up the field to a wide array of public-sector uses, a Deloitte report says.

Labor iPhone app can help employees keep the boss in check

Labor Department's smart phone application helps workers keep track of hours.

Concept of global internet

Cybersecurity's best bet: An Internet that learns to defend itself

During the first 40 years of the Internet, security has been about patching mistakes; the future will be about creating an environment that is secure by design and protected by big data.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.