emerging technology
 
  • Cactus

    Could a cyber ecosystem automatically defend government networks?

    A multiagency group hopes to create a cyber ecosystem that could learn to automatically assess and respond to threats. Where would humans fit in the loop?

  • Mercury Wave Glider

    Wave Gliders survive Hurricane Sandy

    The folks over at Liquid Robotics, developer of the Wave Glider, are happy to report that one of their Wave Gliders named Mercury battled through Hurricane Sandy and successfully piloted through winds up to 70 knots, all the while transmitting weather data in real time.

  • Wave Glider

    NOAA aquatic bots break the ice on climate research

    Over the years, NOAA has sent various data-taking probes deep into the Arctic Ocean looking for answers about climate change. In this latest, extreme test of technology endurance, the agency's swimming robots deliver high science at low cost.

  • Windows 8 advanced options screen shot

    Is Windows 8's start-up too fast?

    The new OS's lightning fast start-up can leave little time -- like, 200 milliseconds of time -- for secure boot options.

  • Tianhe-1

    China plans 100-petaflop supercomputer, and exaflops are in sight

    The Tianhe-2 could achieve five times the speed of the Energy Department's new Titan, but it won't claim the top spot for long.

  • Titan supercomputer

    Energy's Titan supercomputer goes to 20 (petaflops)

    Oak Ridge National Labs' upgrade of Jaguar combines graphical processors with CPUs in a new low-power architecture that boosts performance tenfold.

  • Sandy

    NOAA, FEMA Twitter feeds can help navigate Frankenstorm

    Twitter feeds from federal, state and local agencies have become a prime source of helpful, up-to-the-minute news and tips.

  • Facebook Sponsored stories

    How Facebook could chase away government users

    The company wants to use your "Likes" to endorse products, whether you like it or not.

  • Dart code

    Is Google Dart a replacement for Java?

    Java’s security troubles have led some people to wonder whether the ubiquitous programming language is more trouble than it’s worth. Google offers an alternative.

  • Cash

    Intell community wants to show developers the money

    A coding pilot would pay full price for apps that meet agencies’ criteria, ODNI official says.

  • Innocon Mini Falcon UAV software

    UAV video quality gets a boost from new software

    Software such as Inmint’s Vidhance lets UAVs track objects, reduce blur and stabilize video feeds.

  • WiFi 11ac 60MHz beamforming

    High-wireless act: Can high-frequency WiFi be practical?

    The 60 GHz band to be used with the 802.11ac will add a huge amount of bandwidth, but risks signal loss over distance. "Beamforming" could solve the problem.

  • NASA X1 robotic exoskeleton

    NASA’s ‘Iron Man’ technology could help people walk again

    The X1 robotic exoskeleton, which fits around the body, can help a user stand, walk and, importantly, stop.

  • Maryland online voter registration

    Report: 2 states' online registration systems vulnerable to hackers, fraud

    Flaws in the voter databases in Mayland and Washington state would allow hackers to effectively prevent people from voting, the New York Times reports.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.