A China-based company has set up an OpenDaylight Lab in Shenzhen, China, joining an expanding global community effort aimed at creating open sources for companies to further software-defined networking.
The U.S. Navy has successfully demonstrated the Autonomous Aerial Cargo and Utility System (AACUS), which allows current, full-size helicopters to be remotely controlled by a tablet device. Rear Adm. Matthew Klunder, USN, chief of naval research, recently revealed that two young Marines at Quantico, Virginia, were able to land a full-size helicopter autonomously on an unprepared landing site with just one touch on a mini-tablet.
U.S. Army leaders of the Brigade Modernization Command (BMC) at Fort Bliss, Texas, supported middle and high school students vying for top spots in the fields of science and technology during a recent competition. Brig. Gen. John W. Charlton, USA, commanding general of the BMC, lent support by providing soldiers from his command to help judge the first 5-STAR Innovation Cup science, technology, engineering and mathematics (STEM) competition.
The Barack Obama administration has announced a series of efforts to promote successful entrepreneurship in the United States and around the world. The steps include the Presidential Ambassadors for Global Entrepreneurship, a group of successful American businesspeople who have committed to sharing their time, energy, ideas and experience to help develop the next generation of entrepreneurs.
Once the Joint Information Environment (JIE) is in place, the U.S. Defense Department may be able to deploy secure mobile apps much more quickly than it can with today’s cumbersome process, according to Teri Takai, Defense Department chief information officer.
The Federal Risk and Authorization Management Program (FedRAMP) may ultimately eliminate the need for an information security classification process specific to the U.S. Defense Department, according to Teri Takai, Defense Department chief information officer. FedRAMP seeks to provide a governmentwide, standardized approach to security assessment, authorization and continuous monitoring for cloud products and services.
A cybersecurity survey of federal information technology (IT) professionals revealed that 53 percent of the U.S. Defense Department IT professionals polled tagged careless and untrained insiders as their top cybersecurity threat source, a hazard that topped threats from foreign governments—with 48 percent of the vote—and terrorists—31 percent.
High school students from six schools across the nation will split $50,000 in scholarships after competing in the CyberPatriot VI competition, a culminating tournament in which participants tested strategies to defend computers and networks against cyber attacks. CyberPatriot kicked off in November with roughly 1,600 students from all 50 states and wrapped up March 29, 2014.
The Department of Veterans Affairs (VA) remains plagued by decades-old problems of unreliable and vulnerable networks and computer systems, putting the veterans they serve at risk, according to a recent government report. Despite years of documented weaknesses, the VA still has failed to shore up vulnerabilities, according to the Government Accountability Office (GAO) report.
The unemployment rate for veterans of recent conflicts—that is, those who served during the Iraq and Afghanistan conflicts—dropped a bit last year, according to Labor Department statistics.
Thales recently announced the company has signed a memorandum of understanding with the Qatar Armed Forces to assist in the development of an Optionally Piloted Vehicle-Aircraft (OPV-A), a high-performance intelligence, surveillance, target acquisition and reconnaissance system.
Defense industry leaders desire greater government involvement in the defense acquisition process, according to a recent survey released by the Government Business Council (GBC). Of the 340 survey participants, 85 percent of respondents noted positive outcome from more government involvement in the acquisition arena.
Changes–if any–to the U.S. military retirement system will be a long time in the making if they come at all, a senior military leader told his sailors.
Recent analysis of 2012 airborne radar data NASA collected remotely suggests the data could predict large sinkholes before they occur, such as one that caused evacuations near Bayou Corne, Louisiana.
Gen. Tom Lawson, RCAF, chief of the Defence Staff, outlined four priorities for the Canadian Armed Forces in a speech last month at the Centre for International Governance Innovation. The highest priority is delivering excellence in operations. That is followed, Gen. Lawson said, by preparing the armed forces for tomorrow’s challenges, providing warfighters with training and professional development, and caring for warfighters and their families.
Rep. Howard P. “Buck” McKeon (R-CA), chairman of the House Armed Services Committee, is requiring the U.S. Defense Department to rewrite and resubmit the Quadrennial Defense Review (QDR) for 2014, saying that it "has more to do with politics than policy and is of little value to decision makers."
The U.S. General Services Administration (GSA) is asking for the public’s help to create an online, interactive tool that uses federal travel data to increase government agencies’ budget transparency and accountability.
What if an algorithm existed that could identify neural, psychological, physiological and behavioral signals to determine a person's trustworthiness? Thanks to a new competition from the Intelligence Advanced Research Projects Activity (IARPA), that could be possible.
The Port of Honolulu will host a demonstration of a portable hydrogen fuel cell unit in 2015 with the goal of developing a commercial-ready technology to provide sustainable power to ports worldwide.
The Obama administration has launched a voluntary Cybersecurity Framework, meant to serve as a how-to guide for industry to manage cyber risks. The framework, developed by the Commerce Department’s National Institute of Standards and Technology during the past year with input from organizations and individuals from around the world, offers broad guidelines to strengthen “the security and resiliency of critical infrastructure in a model of public-private cooperation.”