emerging technology
 
  • DARPA sees transparent IT as window on new threats

    DARPA sees transparent IT as window on new threats

    The DOD research agency wants to develop techniques for seeing more deeply into today’s opaque networks to more effectively combat advanced persistent threats.

  • U.S.S. Arizona surveyed with 3D photogrammetry

    3D modeling, printing help preserve Pearl Harbor relics

    A team from Autodesk is integrating 3D technologies, including photogrammetry, LiDAR and SONAR, to create digital models of Pearl Harbor icon USS Arizona that will be used for 3D printing a model of the ship.

  • AcademyScope visualizes research library

    Picture this: AcademyScope visualizes research library

    The National Academies Press’s AcademyScope makes it easy to browse related research and to download reports in PDF format.

  • 5G wireless networking explained

    5G will power the Internet of Things – and governments

    Although 5G technology is still at a nascent stage of development, citizens and government will soon demand it to power a real-time connected world.

  • DARPA’s EDICT would boost WAN resilience

    DARPA’s EDICT would boost WAN resilience

    The Defense Advanced Research Projects Agency is expected to launch a research effort to strengthen the resilience and security of military wide-area networks.

  • battlespace awareness for the Navy

    Battlespace awareness through big data

    The Navy and Esri are combining the massive amounts of data available from satellite and other remote-sensing platforms with the analytic tools of geospatial information systems.

  • Defense Secretary Chuck Hagel speaking at the 2014 Reagan National Defense Forum

    Hagel outlines new Defense innovation efforts

    Defense Secretary Chuck Hagel announced a new Defense Innovation Initiative that will identify and develop advanced technologies, ensuring that the United States has a competitive technological advantage.

  • Expedition 39 flight engineer and NASA astronaut Steve Swanson activates the Veggie plant growth system and Veg-01 experiment in the Columbus module on the International Space Station.

    Galactic Grant Competition to fund space station research

    Massachusetts announced a Galactic Grant Competition for commonwealth-based life science companies to conduct research on the International Space Station.

  • Video game trains soldiers to work with dogs

    Video game trains soldiers to work with dogs

    Using the Virtual Battlespace platform and a Kinect controller, a computer scientist at the Naval Research Lab built ROVER, a simulator that allows human handlers to practice emergency response with canine partners.

  • Can quantum speed code-breaking tech?

    National Institute of Standards and Technology, University of Maryland and National Security Agency have formed a new center for quantum computing science.

  • Giving robots a (better than) human touch

    Giving robots a (better than) human touch

    Researchers have just demonstrated a device with an optical sensor that can grab an unattached USB cable and insert it into a USB port.

  • Trans-Atlantic ESnet

    High-speed transatlantic network supports faster data exchange

    When the Large Hadron Collider comes back online in spring 2015, ESnet will be ready to handle the vastly increased data load.

  • DARPA in search of universal translator tech

    DARPA in search of universal translator tech

    DARPA aims to dramatically advance computational linguistics and language technology to enable rapid, low-cost development of capabilities for low-resource languages.

  • RoadRunner traffic routing system

    Traffic cure? RoadRunner automates routing

    Researchers at MIT have demonstrated a simple system that uses virtual tokens tracked over wireless networks to detect traffic congestion and reroute traffic.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.