power lines

Threats to privacy become a focus of Smart Grid planning

NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

photon

Can quantum cryptography work in the real world?

Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

Kyocera glass

Revolutionary way to transmit sound is being heard

Kyocera’s proprietary Smart Sonic technology transmits sounds via the air and through body tissue -- mitigating background noise and traveling through ear plugs.

BOLD

Rice University researchers take "BOLD" approach to big data

With NSF-backed funding, researchers will create energy-efficient optical network -– with silicon photonic switches –- to handle massive amounts of data.

D-wave

Quantum computing explained: D-Wave on NASA's system

D-Wave's Eric Ladizinsky explains how "we are harvesting the parallel worlds to solve problems in this one."

3D printing

Army preps on-the-spot 3D printing process for the battlefield

The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.

Cyber tools sniffs malware on network traffic

New cyber tool learns network behavior to sniff out malware

Researchers from Georgia Tech demonstrate a prototype tool, ExecScent, that learns a network's normal traffic patterns to spot the command and control traffic from infected hosts. In live tests it identified dozens of new C&C domains and discovered hundreds of infected computers.

Savannah

Energy lab's wireless system secure enough for classified data

The Savannah River National Lab’s prototype hardware, designed in collaboration with NSA, uses Suite B cryptography for a system that could be adapted for other uses.

e-authentication

E-authentication: What IT managers will be focusing on over the next 18 months

The moves to cloud computing and shared databases are among the factors driving e-authentication.

Close up of an iris scan with a PIV card in the pupil

Smart ID to offer options for iris scanning, on-card fingerprint matching

Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.

A quad rotor vehicle flying to validate research on elements of a futuristic control system

The FAA's rules on domestic UAV flights

The agency is selecting sites for UAV tests that could eventually open up the airways, but for now there are two paths to getting authorization for unmanned flights.

NASA Dryden DROID small unmanned research aircraft

The tech that will make drones safe for civilian skies

Sense-and-avoid technologies are close to ensuring safe UAV flights on a large scale. It's mostly a matter of time, standards and FAA rules.

Topic Resources

  • Improve Agency Processes -- Focus Here First

    View this on-demand presentation to learn how agencies can use process improvement to put the U.S. Digital Services Playbook into action. Leading experts used real-world case studies to illustrate how Business Process Management (BPM) can help agencies save resources and meet customer expectations, regardless of location, device, or communication method.

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • Securing the Mobile Workforce: Device Security is Not Enough

    For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.