Cloud, off-the-shelf gaming equipment expands flight training options

With virtual reality headsets, rubber pedal controls and video gaming chairs – along with cloud-based learning management -- the Air Force is building training systems that can be deployed to service members worldwide.

Los Alamos unwraps next-gen supercomputer

Crossroads will replace the existing Trinity supercomputer and will be used by scientists to support the Stockpile Stewardship Program.

When visual communication is mission-critical

In government, the right display technology can help agencies reopen safely now and support effective collaboration in the future.

Administration’s cyber defense plan stresses 'Made in USA'

To shore up the security of the energy sector, Department of Energy officials said they plan to replace foreign-made parts in U.S. bulk power systems that may pose a national security or economic risk.

Legacy systems: Too old to die?

Some legacy systems will likely never move to modern platforms, but agencies must get smarter about what to migrate and how.

Multifactor authentication critical as workplaces get more connected

The connected office means employees access more devices than ever before, increasing efficiency but introducing security vulnerabilities.

2D and 3D combo could keep Moore’s Law going

Ultra-compact, yet high-performing electronic chips could overcome the challenges that face conventional integrated circuits and maintain Moore’s Law indefinitely, researchers say.

How well do cops identify 'digital evidence'?

A new study examines how well police officers recognize digital evidence, as well as what to do with it.

Determined hackers will crack voting machines, security researchers say

Voting Village co-founders argue the myriad vulnerabilities that exist throughout a machine's lifecycle can be easily exploited by well-resourced and creative hackers.

Balancing risk management and digital transformation

Government agencies must update their policies so they can continue to leverage the flexibility of buying off-the-shelf products while still meeting stringent security requirements.

Why do people still use fax machines?

In many cases, faxing is more secure, easier to use and better suited to existing work habits than computer-based messaging.

Computing faces an energy crunch unless new technologies are found

The next generation of low-energy electronics devices will allow electricity to flow with minimal resistance, offering the possibility of a sustainable IT advances -- without the huge energy cost.

Open-source hardware could defend against the next generation of hacking

When devices' designs and components are open for public view, downstream customers could verify the security themselves.

With USB-C, even plugging in can set you up to be hacked

USB-C chargers can allow criminals to attack the computer of an unsuspecting user who is just trying to power up the device’s battery.

GSA's plans for modernizing IT infrastructure

The General Services Administration is leading IT modernization efforts by building out Centers of Excellence and administering the Technology Modernization Fund.

7 ways to minimize data loss after a storm

Agencies must ensure their employees know how to deal with to damaged devices to reduce the likelihood of data loss.

Energy Department launches new HPC initiative

The new program focuses on materials for use in severe environments, and is part of DOE's larger HPC4 Energy Innovation Initiative.