Was 'Sneakers' right about secret government IT?

The movie that inspired a lot of people to become government techies might have been real, just a little.

Panasonic soups up the Toughbook 19

The re-released rugged laptop includes has a faster chipset, expanded storage and an innovative light sensor.

3 simple tricks for defeating hackers on the road

In certain places, traveling feds can almost count on an attempt to steal information from their laptops. Here are ways to give them the old Willy Wonka.

5 keyboard shortcuts you won't find in Windows 8

The new Microsoft OS will kill some shortcuts you might be used to, but it's not all bad.

Bitter end: XP users grudgingly give way to Win 7

Many rejected Vista and resisted Windows 7; what will they make of Windows 8?

Magic log-in ring lets you use finger swipes for passwords

Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.

AI surveillance cameras can learn, remember ... and forget

The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.

The death of the PC: real or exaggerated?

PC sales have slowed and mobile mania continues to grow, which might make you think government PCs are heading the way of the typewriter. But maybe not.

Why 15 = 5x3 is a major quantum breakthrough

Researchers for the first time use a solid-state quantum processor in prime factoring (and get it right half the time), which could eventually have a big impact on security.

Is it data or deception? US-VISIT needs to know.

Of all immigrants coming into the United States, about 825,000 fingerprint records at US-VISIT have multiple names and inconsistent birth dates.

Mobile lab 3D-prints gear as needed in Afghanistan

The Army's new expeditionary lab develops and produces prototypes and other equipment on the spot.

Can game technology rock the vote?

Microsoft's "Election 2012 on xBox LIVE" aims to lure gamers into the political discourse, but there are reasons why it might not work.

Topic Resources

  • Best Practices in Web-based Application Security

    Security experts make it clear: The application is the new network perimeter. Agencies looking to ensure the security of their networks and systems need to ensure the security of the application layer. Fortunately, even as Web applications come under increasing attack, security professionals are developing strategies to address these vulnerabilities. In this webcast, a federal expert will share best practices and lessons learned in devising Web-based application security that is both robust and scalable.

  • High Speed Guard: Understanding the Business Case for Cross Domain Data Sharing Solutions

    The need for information sharing across operational domains has never been greater. Agencies in law enforcement, defense and other public sectors need to ensure that mission-critical data is available to users across network boundaries -- quickly, efficiently and cost-effectively. But they also need to ensure that those transfers happen securely. In this webcast, Shaheen Parks, an analyst with Forrester Research, will discuss the business case for an automated cross domain information transfer solution, such as Raytheon’s High Speed Guard.

  • GameChanger: NoSQL

    Big data is big business for government. It’s clear in the funding provided for big data-related projects, and it’s clear in the response from agencies at all levels of government. Download this informative whitepaper to learn how NoSQL can expand possibilities by tapping into the unrealized value of your organization’s big data.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • i2 Intelligence Analysis Platform

    IBM® i2® IBM® i2® Intelligence Analysis Platform is a scalable, extensible, service oriented intelligence analysis environment that is designed to provide organizations with access to intelligence when and where they need it, enabling faster, more informed decision making.