A recently released report from researchers at Georgia Institute of Technology, Atlanta, Georgia, predicts an explosion of cell phone threats in the coming months and reveals newly emerging vulnerabilities, including weaknesses in mobile device browsers.
A new U.S. Army generator technology is saving fuel and lives in the rugged terrain of Afghanistan. Known as a microgrid, the technology links smart generators to provide the appropriate amount of power when it is needed.
Naval Special Warfare (NSW) Group 4 has reduced its time to process Government Purchase Card acquisitions from months to 3.2 days with a combination of technology and employee involvement. The resulting system not only lessens the time from request submission to purchase completion, it also walks users through processes to eliminate mistakes and can create various reports automatically for a variety of purposes.
Corporate membership has doubled in the past five years—now topping 2,000. Corporate members benefit from a high degree of visibility in the command, control, communications, computers, intelligence and information technology military and government arenas.
A researcher at the University of Texas at Dallas has discovered a new way to anticipate the actions of computer viruses, possibly heralding a new generation of tools and strategies to combat malware that attacks networks, servers and individual personal computers.
From the first graphical user interface to high-definition video streaming over handheld devices, computing has advanced exponentially during the last 30 years. Though the current application space enables individuals or small groups with little capital to become big players, two of Ma Bell’s titan offspring are setting trends as well.
Modern computer software, airborne combat simulation systems and a plethora of advanced Russian surface-to-air radar and missile hardware are melding air forces and ground-based air defense systems into a seamless air combat exercise that simulates ground and air combat. Friends are able to know immediately how their simulated fight against various foes is progressing, and after-action reviews can examine tactics and weapon performance in a multilevel security environment.