Large Hadron Collider Photo by Maximilien Brice/CERN

Internet2 backbone serving national supercomputer network

The XSEDE research network operators say bandwidth and networking tools are key to moving large files between high-performance systems.

PhoneSat 1 during high altitude balloon test

NASA's smart-phone satellites launch new era in space communications

The small satellites built around Android phones, launched Sunday, mark a trend toward small, inexpensive satellites for a variety of uses.

Matterform 3D scanner

Scanner to provide 3D printing's missing link

The Photon scanner uses laser lines and an HD camera to create the CAD files needed for 3D printing.

Rescue squad interoperable communications

Ultimate public safety network is far off, but there are comm options

While first responders wait for the creation of a single nationwide public safety network, a variety of technologies are already providing interoperability.

Gamer in office

Agencies should know the 4 types of gamers

Agencies getting into gamification need to know their audience, starting with which of the four types of gamers they want to attract.

Liquid Robotics Wave Glider SV3

Upgraded aquatic robot 'a server rack at sea'

The Wave Glider SV3, with room for an 8U rack, not only takes sensor readings but processes the data, only sending back the results.

Wisconsin National Guard member training on core leadership skills using the Virtual Battlespace 2

High score: Gaming moves to the forefront in government

It was viewed not long ago as the violent realm of teenage activity, but agencies are embracing gamification as a powerful tool for education, training and outreach.

NASA Curiosity game

How NASA puts Earth-bound explorers in the driver's seat on Mars

Scientists at NASA's JPL are using gaming to build tele-exploration platforms, letting PC and Xbox Kinect users drive the rovers that navigate the Red Planet.

Agile development graphic

Agile is key to making the most of public-sector IT

Agile development tactics break projects into smaller chunks, let IT teams keep up with changes, and prevent “scope creep.”

Machine learning digital face

Machine learning a growing force against online fraud

Sift Science uses new machine learning techniques to spot unusual fraud patterns as soon as they appear on the network.

Fingerprint electronic matching AFIS

Law enforcement, NIST making fingerprint files easier to search

Group has developed a standard features set to use for fingerprint identification, and NIST now has the technical specs to make searches interoperable.

Machine language of 1s and 0s

What is M2M, and why is it the future of code?

The Internet of things will soon contain 50 billion devices, and machine-to-machine programming is how they will talk to each other.

Topic Resources

  • Three Essential Steps in Navigating the Unified Communications Landscape

    Unified Communications (UC) enables a wealth of opportunity for federal, state and local governments, allowing agencies to be more mobile and flexible than ever before. Join us for an informative discussion about how to navigate the UC landscape.

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • Securing the Mobile Workforce: Device Security is Not Enough

    For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.