When it comes to STEM, it is time to stop talking about the need and the gap and the possible solutions and start doing something about them. Action not only requires that more students and future teachers major in STEM fields but also that governments and the private sector put their money where their mouths are by providing financial support to these students.
The Defense Advanced Research Projects Agency (DARPA) put a call out for technology that can detect and identify from great distances dangerous biological and chemical substances.
Military experts and defense contractors are testing technologies in Georgia to thwart the preponderance of roadside bombs that hamper U.S. military and coalition forces' combat and resupply missions. Participating defense contractors are competing for an existing $49.5 million contract.
Calling all mathematicians: DARPA, the Defense Department’s main research arm, seeks help in developing a program that essentially would lead to "unhackable" computer software programs.
House Homeland Security Committee chair proposes technology mix for securing the southern border.
How many days equal a billion hours? Researchers from the U.S. Army Research Lab are about to find out. This week, they began modeling the engine spray mixture formation process using access to one billion hours of supercomputing time on some of the world's fastest computers.
(ISC)² is offering a series of tips to educate the public for National Cyber Security Awareness Month.
Multiple autonomous underwater vehicles equipped with modern sensors relevant to NATO minehunting missions are being employed at sea during the Multinational AutoNomy Experiment (MANEX ‘14), held September 22 to October 13, 2014, along the Italian coast, between Framura and Bonassola, in the Ligurian Sea.
Massive tents housed booths with roughly 400 companies pitching the up-and-coming technology to approximately 8,000 attendees at the 2014 Modern Day Marine event held at U.S. Marine Corps Base Quantico in Virginia. Much of the technology focused on equipping expeditionary forces.
The Defense Department is planning a pilot study to determine the feasibility of a bring-your-own-device program within the department, says Terry Halvorsen, acting chief information officer.
Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.
The FBI is focusing on cyberspace both as a tool for crime detection and prevention and as a venue for operations.
Always dependent on vital information for crime-fighting, the FBI has transformed itself into an integrated intelligence organization.
The global network that serves the U.S. Air Force also provides the connectivity it needs for intelligence operations.
The U.S. Navy is expanding its intelligence activities into areas that traditionally have been the purview of other services.
Because it operates in the same realms as all the other military services, the U.S. Marine Corps counts interoperability as its intelligence.
The U.S. Coast Guard brings new capabilities to defense intelligence as it integrates operations with the other services.
The U.S. Army is expanding its intelligence activities both within its own forces and interoperably with the other services.
The growing customer list for defense intelligence is blurring traditional lines of distinction among activities and missions.
New threats such as cyberterrorism complement traditional threats such as weapons of mass destruction among the defense intelligence capabilities underpinning future intelligence activities.