Storm sensor system contributes to a 3D model of when Hurricane Isaac sent things in reverse.
The six-month effort not only includes an app store, but a place where developers and customers can get together.
Most agencies missed the Sept. 30 deadline, but industry observers say it's not the raw numbers but the shape of the curve that matters.
With just days to go before OMB's deadline for agencies to enable public facing resources with IPv6, the White House complies.
The Ask Patents website lets volunteers help determine the originality of an application.
The emerging WiFi standard could double the speed of your agency's wireless network ... once you have the equipment to take advantage of it.
A survey by the five Regional Internet Registries shows there still isn't a lot of IPv6 traffic, but the trend is upward.
PigTails offers a unique, clear way to label cords and cables.
Modern RFID tags are only a few millimeters in size and comprise a chip, antenna and in some cases a battery (active). Some forms of RFID tags (passive) have no battery, but actually take power from the electromagnetic beams of a reader, and then send data back to the source. These tags can theoretically last forever, since they only send data or require power when actually being pinged by a reader device. Almost all RFID tags can be inserted into almost anything and do not require line of sight back to a reader. Some tags are so tiny that they have been glued to the backs of ants to track their behavior.
A real-time system that connects medics on the battlefield with surgeons at a hospital would save lives, if it can be made to work.
Groovy, a subset of Java, is so easy to work with it, it could one day replace the ubiquitous programming language.
Lab officials expect the new tools to improve collaboration among its employees, helping them to share IT infrastructure, resources and applications.
A new report from FireEye details the dominant current trend in phishing, and the most common words and file attachments used in malicious e-mails.
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.