A mobile operations fusion kit that provides easy, rapid and on-the-go interoperability for mobile field operations and communications will be developed in European and Middle Eastern military markets as well as in the United States.
The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.
Students from 27 middle schools across New Mexico—some who might aspire to be automotive engineers—will vie this Saturday for top honors in the New Mexico Electric Car Challenge held in Albuquerque.
Northrop Grumman officials say they are developing a new kind of cyber system—a disposable system tailored for a single mission. The concept, they say, will make it more difficult for adversaries to penetrate or maneuver inside user networks.
Many information technology organizations are taking a different approach to cybersecurity that radically reduces the time to detect and respond to attempted cyber attacks.
A new program aims to help veterans seeking work in the field of cybersecurity earn certifications. "The scholarship opens doors for veterans seeking continued service to their country ... and at the same time helps to fill the growing need for cybersecurity professionals."
Time spent as a soldier, sailor, Marine, airman or Coast Guardsman—whether it’s four years or 40, on active duty or in the reserves—instills a sense of working toward a common goal that is often rare in the civilian world.
SIGNAL's real-time reporting will begin with the opening remarks by Gen. Vincent K. Brooks, USA, December 9, and will continue throughout the conference.
The U.S. Defense Department’s research agency has simplified the process for researchers trying to break into the federal marketplace and earmarked up to $700,000 in seedling funds for cutting-edge biotech ideas.
NC State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source. The technology is designed to help emergency personnel find and rescue survivors in the aftermath of a disaster.
Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.
You might hit the gym or stay active for your health, but do you exercise your brain? The scientifically designed program Lumosity provides personalized training to help you improve memory, attention and a wide variety of other cognitive skills.
Understanding how to communicate your story effectively is just one important skill for women, and really anyone regardless of gender, hoping to take risks and achieve results in the workplace, explained Shelley Smith, founder and president of Premier Rapport, during the inaugural Women in AFCEA fall event. Ask yourself, “Is the risk greater if I do or is the risk greater if I don’t?”
You would think it would go without saying, but apparently not. So a U.S. Transportation Security Administration representative wrote a brief blog on a few Halloween travel tips if travelers are taking flight with costumes in tow.
Engineers are packing more powerful sensors into smaller and smaller forms for use on lighter aircraft and unmanned aerial vehicles, giving the U.S. military unprecedented high-end multi-spectral capability from greater distances.
The National Institute of Standards and Technology (NIST) has published the final version of the "U.S. Government Cloud Computing Technology Roadmap, Volumes I and II," which focuses on strategic and tactical objectives to support the federal government’s accelerated adoption of cloud computing.
Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.
With the Ebola outbreak dominating headlines and flu season looming, it's difficult to know where to turn for fast, reliable health information. That's where the Centers for Disease Control and Prevention comes in, offering a variety of apps to help you protect yourself.
Network modernization is becoming a priority for defense agencies—and for good reason. Much of our defense network infrastructure was conceived 20 years ago and put into place almost a decade ago. While the networks remain the same, the technologies that depend on them have advanced, and innovation can no longer be supported by outdated and ineffective infrastructure.
Two researchers have won the first public challenge contest sponsored by IARPA to predict people's trustworthiness.