Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.
The National Cancer Informatics Institute is launching NCIP Hub, an online collaborative forum based on HUBzero, a platform for creating dynamic websites for researchers.
While big data tools are very powerful, the results they deliver tend to be only as good as the strategy behind their deployment.
The company’s system will help public health departments and health care providers quickly identify and predict sources of foodborne illnesses.
Delivered in the IBM SmartCloud, the Intelligent Operations Center (IOC) helps users monitor citywide operations by collecting, visualizing and analyzing operational data from multiple sources.
The open data challenges will use the Open NASA Earth Exchange (OpenNEX), an Amazon Web Services data and supercomputing platform where users can share knowledge and expertise.
A group of computer scientists at the University of California, San Diego, have developed a tool that lets designers and system builders test embedded hardware security, a first in the field.
Built near the network perimeter, a Science DMZ is a portion of the network optimized for high-performance scientific applications rather than for general-purpose business systems.
The Commerce Department's acting deputy secretary pledges to put more useful data into the hands of business and industry.
The Alabama Medicaid Agency is using a visual analytics tool from SAS that helps analysts quickly find patterns and explore trends in the state's population health data.
Built with cost and performance in mind, interconnected systems contain vulnerabilities that are increasingly attractive to attackers looking for protected information or who want to disrupt public services. Some tools are emerging to help.
An industry analysis firm sees growth driven by advanced geospatial products and a strong demand for 3D geospatial technology.
Unisys U-LEAF platform helps investigators quickly document and log evidence and intelligence related to criminal investigations with a single, browser-based interface.
Understanding the impact of four revolutionary technologies will help IT managers and developers consider new ways to attack their own problems and build better software faster.