The Defense Department's Self-Service Logon system met a growing need for authenticated access to defense websites by service members and their families unable to use the Common Access Card.
The Long-Term Evolution network lets personnel on the two ships receive real-time video streaming from air nodes mounted on helicopters, which in turn allows officers to make quicker and more accurate decisions based on what advance units are doing.
The tactical intelligence network in Afghanistan has essentially unlimited capacity.
The Army's DSC, the first tactical deployed cloud in a war zone, gives soldiers in Afghanistan full access to intelligence and fast response to queries.
An Air Force Academy team has won a finalist spot in an international cybersecurity contest for the third year in a row, continuing a record of success in hacking competitions.
The group invests in two cloud-based technology providers to automate the work of data scientists and improve application testing.
IRS's Werfel, Professional Services Council's Soloway and the National Defense University's Childs are honored for their accomplishments and vision in using IT for public-sector progress.
The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.
DNSSEC can be an effective tool -- but only one tool -- in preventing redirection attacks such as those carried out recently by the Syrian Electronic Army.
JKO releases a mobile app for DOD’s Trafficking in Person’s general awareness training.
The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.
The popular game’s new versions features tactical missions with small, self-contained units, reflecting the present-day Army.