emerging technology
 
  • e-authentication

    E-authentication: What IT managers will be focusing on over the next 18 months

    The moves to cloud computing and shared databases are among the factors driving e-authentication.

  • New ways to measure supercomputer performance

    A new way to measure the best supercomputers

    The creator of the venerable Linpack benchmark says its value as a proxy for real-world performance "has become very low," so he's created an alternative.

  • cloudhacker

    New program could foil hackers in the cloud

    MIT researchers show how one computer connected to a cloud can spy on every other computer in that cloud. But they have a solution.

  • Equipment on Voyager space craft

    Older technology catches the solar system by its tail

    The Voyager spacecraft, with their 36-year-old systems and 68KB of computing capacity, may soon exit the solar system.

  • Scorpius 2 0 laptop scores 4576 on Passmark Benchmarking

    Haswell chips can give a laptop workstation power

    The Scorpius 2.0 is an example of what's possible with Intel's new low-power, high-performance processors.

  • Close up of an iris scan with a PIV card in the pupil

    Smart ID to offer options for iris scanning, on-card fingerprint matching

    Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.

  • A quad rotor vehicle flying to validate research on elements of a futuristic control system

    The FAA's rules on domestic UAV flights

    The agency is selecting sites for UAV tests that could eventually open up the airways, but for now there are two paths to getting authorization for unmanned flights.

  • NASA Dryden DROID small unmanned research aircraft

    The tech that will make drones safe for civilian skies

    Sense-and-avoid technologies are close to ensuring safe UAV flights on a large scale. It's mostly a matter of time, standards and FAA rules.

  • Warrior Web prototype studies the stress on soldiers

    Army's exoskeleton to help soldiers carry the load

    In order to reduce soldiers' fatigue and injury, the Warrior Web prototype reduces the stress on the troops who carry 100 pounds or more of equipment.

  • Young school boy contemplating sculpture of Rodin

    Print your own Venus de Milo, and add some arms!

    A 3D printing pioneer's project to create CAD files of some of the world's great sculptures could give students, and everyone else, a hands-on education in art.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.