emerging technology
 
  • PhoneSat

    Latest PhoneSats will test cross-satellite data sharing, space weather monitoring

    NASA's PhoneSats will demonstrate how off-the-shelf consumer devices can lead to a new, distributed means of problem-solving in space.

  • FAA releases road map for domestic drones

    The Federal Aviation Administration released its plan for drone integration into civilian airspace.

  • mobile devices

    Some hidden pitfalls of government BYOD

    How competition among smartphone makers might pose problems for government mobile device management.

  • Titan supercomputer

    Oak Ridge gets help to manage Titan's massive data stream

    National lab installs smaller supercomputers whose sole purpose is to sift through the massive amount of data being generated by Titan.

  • social monitoring

    Police get tool for patrolling social media

    Social Media Monitor helps police use social media for investigations and to look for signs of criminal activity such as gang violence, drug dealing, crimes against children and human trafficking.

  • Dell fully rugged notebook

    Theater of the not-so-absurd: Dell dramatizes Mil-Std testing

    With its comic video depicting an unlucky lawyer running laptop endurance tests, Dell hopes to inspire its users to share their stories of rugged gear.

  • Motorola brings modular phones closer to reality

    Motorola will work with the Phonebloks community to help design and build an open hardware platform for creating highly modular smartphones.

  • Google barge

    Google's mystery barges keep world guessing

    If Google is involved, is a floating data center that far-fetched?

  • power lines

    Threats to privacy become a focus of Smart Grid planning

    NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

  • binary

    How quantum key distribution works

    QKD uses a photon's polarization and spin to verify an unobserved key transmission.

  • photon

    Can quantum cryptography work in the real world?

    Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

  • Flirtey Zookal

    Literary drones ready to drop books instead of bombs

    In some parts of the world, drones overhead can send people diving for cover. But in Australia, drones may soon be delivering books and other reading materials across the continent.

  • LADEE launch

    NASA sets a record with laser space communications

    The agency's Lunar Laser Communication Demonstration sends data back from lunar orbit at 622 Mbps.

  • Kyocera glass

    Revolutionary way to transmit sound is being heard

    Kyocera’s proprietary Smart Sonic technology transmits sounds via the air and through body tissue -- mitigating background noise and traveling through ear plugs.

Topic Resources

  • Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

    This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

    Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.