emerging technology
 
  • Gesture controlled computer

    Gesture control: Great innovation or Tower of Babel?

    Operating a computer with no-touch hand gestures is the hot new thing in user interfaces, but without standards we'll need to know a different "language" for every device.

  • Man looks quizzically at VHS tape

    Oklahoma jail's lesson: Don't get fooled by familiar tech

    Too many agencies stick with the tried, true and the outdated rather than upgrading to more efficient new technology.

  • LG OLED TVs

    Are ultra high-res OLEDs finally ready for their close-up?

    The thin, flexible light screens with 4K resolution are four times sharper than LED or LCD monitors, but they could find limited use at first.

  • Abandoned trucks rusting in a ghost town

    A once mighty supercomputer to be dismantled, sold for parts

    New Mexico's Encanto, which five years ago was the third fastest machine in the world, is now practically on the scrap heap.

  • Router

    Wi-Fi service to monitor, reallocate local router usage

    Qualcomm's cloud-based service could keep wireless applications from using more bandwidth than they need.

  • Raspberry Pi

    $25 computer could help create the techies of tomorrow

    The Raspberry Pi, a small single-board computer that can teach kids the basics of computer science, is also a robust computer, now with its own app store.

  • HTML 5 sample code

    HTML 5 ready for prime time

    The new version of the markup language serves up multimedia content without the need for plug-ins and could help agencies built more secure websites.

  • Robot looking into the future

    5 fearless tech predictions for 2013

    Here's what to look for in emerging technology for government during the next year.

  • Army robot

    Past robots show significance of the Navy's breakthrough

    Most machines we think of as robots actually are Waldos, which makes the X-47B drone's autonomy all the more impressive.

  • Parrot AR Drone 2.0 flying in hallway

    Drone hacker infects other competitors

    The winning entry connected wirelessly with other drones, prompting them to "run amok."

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.