emerging technology
 
  • D-wave

    Quantum computing explained: D-Wave on NASA's system

    D-Wave's Eric Ladizinsky explains how "we are harvesting the parallel worlds to solve problems in this one."

  • Samsung smart watch

    Can the Galaxy Gear change the fate of wearable tech?

    Samsung's new smartwatch has a few things going for it, but the track record on wearable computers, in government or out, isn't promising.

  • NASA laser

    Moon beams: NASA set to test laser space communications

    A lunar mission launching this month will test two-way laser communications, which will transmit six times the data at 25 percent less power.

  • processor

    MIT's 110-core processor could help boost efficiency

    Chips that can effectively take advantage of multiple cores could be useful in government, giving agencies a way to downsize data centers and make them more efficient without losing processing capacity.

  • data center robot

    Next role for robots: data center diagnosticians

    EMC, IBM offer robots that rove data centers in search of temperature anomalies and other indicators of how well the center is maintaining an efficient power curve.

  • 3D mapping

    How 3D maps can get more accurate

    A research team solves a common problem with robotic 3D mapping, leading to clearer, more detailed maps.

  • atomic clock

    A clock that measures time to 18 zeros is no small thing

    NIST's ytterbium-based atomic clock measures the difference between seconds to the quintillions part, and could have practical applications.

  • BESD

    Marines using biometrics to ID friends, foes in Afghanistan

    The Biometric Enrollment and Screening Device uses a combination of facial, thumb and iris scans matched against an internal database to identify persons encountered on the battlefield.

  • 3D printing

    Army preps on-the-spot 3D printing process for the battlefield

    The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.

  • Cyber tools sniffs malware on network traffic

    New cyber tool learns network behavior to sniff out malware

    Researchers from Georgia Tech demonstrate a prototype tool, ExecScent, that learns a network's normal traffic patterns to spot the command and control traffic from infected hosts. In live tests it identified dozens of new C&C domains and discovered hundreds of infected computers.

  • 3D reef

    3D printings new frontier: Rebuilding lost reefs

    A project to restore lost reefs along the coast of the Arabian Peninsula is an example of what environmental agencies can do to reverse ecological damage.

  • fast

    Mix of tech brings warp speed to WANs

    Aspera and Intel combine technologies to get 10 gigabits/sec transfer speeds over a wide area network.

  • swimming robotos

    Swimming robots could enlist for Coast Guard duties

    The semi-autonomous Wave Gliders, which have performed well in rough conditions for NOAA, show potential for Guard duty.

  • Savannah

    Energy lab's wireless system secure enough for classified data

    The Savannah River National Lab’s prototype hardware, designed in collaboration with NSA, uses Suite B cryptography for a system that could be adapted for other uses.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • Securing the Mobile Workforce: Device Security is Not Enough

    For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.