emerging technology
 
  • plant

    DLA using botanical DNA to prevent tech counterfeiting

    The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.

  • cloud as a brain

    Cloud as a Brain gets real ... so let the AI race begin!

    The announcement by IBM that it would add Watson-like technologies as a cloud service signals the beginning of a race to build the brainiest cloud.

  • PhoneSat

    Latest PhoneSats will test cross-satellite data sharing, space weather monitoring

    NASA's PhoneSats will demonstrate how off-the-shelf consumer devices can lead to a new, distributed means of problem-solving in space.

  • FAA releases road map for domestic drones

    The Federal Aviation Administration released its plan for drone integration into civilian airspace.

  • mobile devices

    Some hidden pitfalls of government BYOD

    How competition among smartphone makers might pose problems for government mobile device management.

  • Titan supercomputer

    Oak Ridge gets help to manage Titan's massive data stream

    National lab installs smaller supercomputers whose sole purpose is to sift through the massive amount of data being generated by Titan.

  • social monitoring

    Police get tool for patrolling social media

    Social Media Monitor helps police use social media for investigations and to look for signs of criminal activity such as gang violence, drug dealing, crimes against children and human trafficking.

  • Dell fully rugged notebook

    Theater of the not-so-absurd: Dell dramatizes Mil-Std testing

    With its comic video depicting an unlucky lawyer running laptop endurance tests, Dell hopes to inspire its users to share their stories of rugged gear.

  • Motorola brings modular phones closer to reality

    Motorola will work with the Phonebloks community to help design and build an open hardware platform for creating highly modular smartphones.

  • Google barge

    Google's mystery barges keep world guessing

    If Google is involved, is a floating data center that far-fetched?

  • power lines

    Threats to privacy become a focus of Smart Grid planning

    NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

  • binary

    How quantum key distribution works

    QKD uses a photon's polarization and spin to verify an unobserved key transmission.

  • photon

    Can quantum cryptography work in the real world?

    Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

  • Flirtey Zookal

    Literary drones ready to drop books instead of bombs

    In some parts of the world, drones overhead can send people diving for cover. But in Australia, drones may soon be delivering books and other reading materials across the continent.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • 'Mocking' Reality: The Power of Service Virtualization

    A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.