Engineering competition challenges middle school, high school and college students to identify a problem or process that needs improvement and offer solutions using a wireless technology.
Cyber attackers might have compromised computer files of more than 40,000 employees following an attack on federal contractor KeyPoint Government Solutions, according to the Office of Personnel Management.
Industry and academia are gearing up to showcase some of the most advanced robotics and research work at the Defense Advanced Research Projects Agency (DARPA) Robotics Challenge, a competition of robotic systems and software teams developing robots with a goal of helping humans respond to natural and man-made disasters.
The Defense Information Systems Agency (DISA) has released a draft of suggestions and recommended revisions to its cloud computing security requirements guide (SRG), which documents the agency’s cloud security requirements for the Defense Department. When accepted, the new SRG would supersede and rescind the previously published cloud security model.
The U.S. lead in military technology is too great, not enough or disappearing, depending on which expert is speaking. And, all three statements might be accurate in their own ways.
The traditional paths to innovation may not be enough to maintain U.S. leadership in that endeavor. So, innovative ideas may be necessary for pursuing innovation.
For years, the United States maintained economic and military superiority through technological innovation. Now, that lead is diminishing, and the country must find the resources to respond.
The technology gap caused by the growing sophistication of U.S. defense communications and networking systems threatens to leave less advanced nations unable to participate effectively in coalitions. One approach to mitigate the gap is to have allies work with the United States on establishing standards for new systems and capabilities.
Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.
If cyberspace is a warfighting domain, then warfighters should expect that it will not perform as desired. The same maneuver warfare skills common on the battlespace need to be applied to cyberspace.
"Call of Duty" may be a sleeper introductory tool for future military personnel, according to a Marine Corps general.
As the U.S Marine Corps returns to its roots as a rapidly deployable amphibious force, it needs better communications and networking gear that is small and lightweight for the amphibious mission.
Being longtime allies does not give U.S. forces carte blanche in Australia. The Southern Hemisphere ally is hosting a U.S. Marine Corps detachment, but U.S. forces are treading carefully so as not to upset relations as a new relationship is built.
The U.S. Pacific Command (PACOM) increasingly is turning to technology to solve problems ranging from new threats to the tyranny of distance over the vast Asia-Pacific region. Cyberspace is both a source of challenges and a potential venue for addressing many of the challenges PACOM is facing as the pace of change picks up in the globe’s largest, most populous area of operations.
Some interoperability issues are cultural, not technical. Now, a new approach uses advanced virtual technology to help overcome cultural issues before a coalition is formed.
Many nations are loath to share data in a coalition operation, because they fear the wrong partner will access sensitive information. Now, a new system under development will allow countries to tag data for only the countries that they want to view it.
The U.S. Army Pacific has a plan—coordinated with an overall Army modernization effort—to incorporate commercial innovation into its force to overcome many of the challenges it faces in the vast Asia-Pacific region.
Truly effective leaders eschew digital media such as email and social media when they communicate with their workers. The best form of leadership communication is face to face, according to a panel of government, military and business leaders.
The deck is stacked in favor of cyber attackers against defenders. And, that trend is likely to worsen as the march of technology enables new capabilities that empower more cybermarauders.
While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.