San José, Calif., will be working with Facebook’s Connectivity Lab to pilot its Terragraph system, a 60-gigahertz wireless system for high-density areas.
The Army could soon be turning to avatars as a less expensive alternative for testing everything from military gear to medical applications.
By adding a laser sensor to a smartphone, researchers at MIT created a low-cost device that can deliver the high-resolution distance sensing required for robotic navigation.
Following a request for information asking for Soldier Borne Sensors for individual soldiers, military leaders addressed some configuration and procurement particulars.
Rather than trying to screen apps for malware, researchers suggest it may be more effective to monitor the behavior of installed apps for signs of improper behavior.
The technology that powers Bitcoin has the potential to address government trust and security issues.
GeoMesa distributes geospatial data processing over the scalable resources of Hadoop, virtually eliminating the limits to the amount of data that can be managed.
The Defense Advanced Research Projects Agency seeks proposals that convert commercial technologies into security threats.
From nearly 500 submissions, six finalist teams were selected at the D3 Innovation Summit for their solutions to that leverage technology to solve global problems.
New research demonstrating that quantum computing is now just an engineering challenge moves the possibility of encryption-cracking machines to the front burner.
A researcher presenting at the RSA Security Conference said he can hack and hijack a popular drone model via two separate system vulnerabilities.
Researchers at the University of Washington have developed a way that passive, or reflected, signals can help IoT sensors transmit data while using far less power than existing Wi-Fi devices.
While governments are eyeing increased use of robotics, a new report identifies five technological challenges limiting widespread adoption.
The research agency underwrites a project to help document a system's effectiveness at protecting user data.