emerging technology
 
  • 3D mapping

    How 3D maps can get more accurate

    A research team solves a common problem with robotic 3D mapping, leading to clearer, more detailed maps.

  • atomic clock

    A clock that measures time to 18 zeros is no small thing

    NIST's ytterbium-based atomic clock measures the difference between seconds to the quintillions part, and could have practical applications.

  • BESD

    Marines using biometrics to ID friends, foes in Afghanistan

    The Biometric Enrollment and Screening Device uses a combination of facial, thumb and iris scans matched against an internal database to identify persons encountered on the battlefield.

  • 3D printing

    Army preps on-the-spot 3D printing process for the battlefield

    The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.

  • Cyber tools sniffs malware on network traffic

    New cyber tool learns network behavior to sniff out malware

    Researchers from Georgia Tech demonstrate a prototype tool, ExecScent, that learns a network's normal traffic patterns to spot the command and control traffic from infected hosts. In live tests it identified dozens of new C&C domains and discovered hundreds of infected computers.

  • 3D reef

    3D printings new frontier: Rebuilding lost reefs

    A project to restore lost reefs along the coast of the Arabian Peninsula is an example of what environmental agencies can do to reverse ecological damage.

  • fast

    Mix of tech brings warp speed to WANs

    Aspera and Intel combine technologies to get 10 gigabits/sec transfer speeds over a wide area network.

  • swimming robotos

    Swimming robots could enlist for Coast Guard duties

    The semi-autonomous Wave Gliders, which have performed well in rough conditions for NOAA, show potential for Guard duty.

  • Savannah

    Energy lab's wireless system secure enough for classified data

    The Savannah River National Lab’s prototype hardware, designed in collaboration with NSA, uses Suite B cryptography for a system that could be adapted for other uses.

  • e-authentication

    E-authentication: What IT managers will be focusing on over the next 18 months

    The moves to cloud computing and shared databases are among the factors driving e-authentication.

  • New ways to measure supercomputer performance

    A new way to measure the best supercomputers

    The creator of the venerable Linpack benchmark says its value as a proxy for real-world performance "has become very low," so he's created an alternative.

  • cloudhacker

    New program could foil hackers in the cloud

    MIT researchers show how one computer connected to a cloud can spy on every other computer in that cloud. But they have a solution.

  • Equipment on Voyager space craft

    Older technology catches the solar system by its tail

    The Voyager spacecraft, with their 36-year-old systems and 68KB of computing capacity, may soon exit the solar system.

  • Scorpius 2 0 laptop scores 4576 on Passmark Benchmarking

    Haswell chips can give a laptop workstation power

    The Scorpius 2.0 is an example of what's possible with Intel's new low-power, high-performance processors.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.