Latest PhoneSats will test cross-satellite data sharing, space weather monitoring

NASA's PhoneSats will demonstrate how off-the-shelf consumer devices can lead to a new, distributed means of problem-solving in space.

Titan supercomputer

Oak Ridge gets help to manage Titan's massive data stream

National lab installs smaller supercomputers whose sole purpose is to sift through the massive amount of data being generated by Titan.


How quantum key distribution works

QKD uses a photon's polarization and spin to verify an unobserved key transmission.

power lines

Threats to privacy become a focus of Smart Grid planning

NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.


Can quantum cryptography work in the real world?

Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

Kyocera glass

Revolutionary way to transmit sound is being heard

Kyocera’s proprietary Smart Sonic technology transmits sounds via the air and through body tissue -- mitigating background noise and traveling through ear plugs.


Rice University researchers take "BOLD" approach to big data

With NSF-backed funding, researchers will create energy-efficient optical network -– with silicon photonic switches –- to handle massive amounts of data.


Quantum computing explained: D-Wave on NASA's system

D-Wave's Eric Ladizinsky explains how "we are harvesting the parallel worlds to solve problems in this one."

3D printing

Army preps on-the-spot 3D printing process for the battlefield

The Army Research Lab and Purdue University develop a process that would let soldiers repair damaged parts on aircraft and ground vehicles on the spot.

Cyber tools sniffs malware on network traffic

New cyber tool learns network behavior to sniff out malware

Researchers from Georgia Tech demonstrate a prototype tool, ExecScent, that learns a network's normal traffic patterns to spot the command and control traffic from infected hosts. In live tests it identified dozens of new C&C domains and discovered hundreds of infected computers.


Energy lab's wireless system secure enough for classified data

The Savannah River National Lab’s prototype hardware, designed in collaboration with NSA, uses Suite B cryptography for a system that could be adapted for other uses.


E-authentication: What IT managers will be focusing on over the next 18 months

The moves to cloud computing and shared databases are among the factors driving e-authentication.

Topic Resources

  • Improve Agency Processes -- Focus Here First

    View this on-demand presentation to learn how agencies can use process improvement to put the U.S. Digital Services Playbook into action. Leading experts used real-world case studies to illustrate how Business Process Management (BPM) can help agencies save resources and meet customer expectations, regardless of location, device, or communication method.

More from 1105 Public Sector Media Group