BlackForest, an open source intelligence gathering system, aims to give cybersecurity teams advance warning of pending attacks.
For a shared service to work, it should meet a requirement that most agencies have – yet isn't a core competency of any of them – such as human resources, payroll and procurement.
The State Department wants to build a web-based databank of foreign countries' performance indicators to be used for data-driven problem solving.
Government agencies should anticipate the security implications of the Internet of Things and identify how to leverage this revolution for the benefit of all.
The Talend Big Data Sandbox is a preconfigured, ready-to-use big data integration environment designed to quickly get big data projects off the ground.
UBIC software speeds the archiving and retrieval of historical information related to the legal discovery process.
A research group defined six major challenges to future IT infrastructures: data acquisition, computing platforms, data storage architectures, compute management and provisioning, networks and communication and data analytics.
Researchers will use vehicles' sensor data and Internet2 resources to broaden understanding of the Internet of Things.
A Web-based dashboard developed by a Carnegie Mellon University team shows that energy may be used more efficiently when end users are handed control.
Using tablet-based software designed by the Centers for Disease Control, Brazilian public health experts tested a disease detection system that gives researchers the ability to identify outbreaks earlier and with more precision.
App for iPhone and iPad lets Splunk Enterprise users access operational intelligence from iOS devices.
The National Nuclear Security Administration (NNSA) and Cray Inc., have agreed on a contract for NNSA to acquire a next generation Cray supercomputer, called Trinity, to advance the Stockpile Stewardship Program.
Despite the controversy it sparks, artificial intelligence is no longer an exotic rarity that only thrives in research labs and ivory towers; instead, AI applications are becoming mainstream in the public and private sectors.
Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.