Chinese naval forces returned a U.S. Navy underwater, unmanned research vessel on Tuesday, near the location where it was unlawfully seized late last week, according to a U.S. Defense Department statement.
A Chinese military ship seized a U.S. underwater, unmanned research vessel, prompting the U.S. Defense Department to launch “appropriate government-to-government channels” with the Chinese government to immediately return the vessel. On Thursday, China unlawfully seized the unclassified ocean glider while sailing in the South China Sea, according to a Defense Department news release.
Richard Hale, the Defense Department chief information security officer, has retired after a long and distinguished career in public service. He will be missed, but he leaves a legacy of others following his model.
The Department of Homeland Security's Science and Technology Directorate has money to award for innovation and new technologies to help safeguard the homefront. The DHS seeks entrepreneurs with a passion for the mission, who demonstrate collaborative problem solving characteristics and who are poised for growth.
The Department of Homeland Security Science and Technology Directorate’s Homeland Security Advanced Research Projects Agency has announced that ZeroPoint, an exploit detection and analytics tool, has spun off as a startup company called ZeroPoint Dynamics.
Federal employees are frustrated by slow and unreliable applications, a quandary they say impedes them from getting their work done and diminishes confidence in information technology modernization efforts, according to survey results released today by Riverbed Technology, an application performance company.
U.S. Secretary of Commerce Penny Pritzker today announced that the Department of Commerce Digital Attaché Program will expand to six new markets: South Korea, Indonesia, Mexico, South Africa, Germany and France.
Keeping the U.S. military ready to fight takes more than hard work and training. Troops need a work-life balance as much as civilians, which means enjoying time spent with family and friends. High-speed Internet connectivity ranks high on a list of priorities because little boosts morale more than staying connected with loved ones, particularly when serving thousands of miles away, writes blogger Tony Bardo.
The Intelligence Advanced Research Projects Activity, or IARPA, has selected its winners from its crowd-sourced Multi-View Stereo 3-D Mapping Challenge—a contest to see who could best convert satellite photos into 3-D models to create more accurate maps.
Engineers at the Massachusetts Institute for Technology, with support from the Office of Naval Research, have developed a portable measurement system to precisely and inexpensively monitor the amount the electricity used by individual household appliances, lighting fixtures and electronic devices.
At AFCEA TechNet Asia-Pacific, a panel of U.S. military communications officers stationed in the Asia-Pacific region told the defense technology industry what they most need to accomplish the mission. The list included capabilities ranging from next-generation authentication tools to airborne command and control network modeling.
The Kill Chain Integration Branch at Hanscom Air Force Base has begun an experimentation campaign, known as Data-to-Decisions, to look at ways to provide warfighters data in the fastest and most efficient way possible.
The Defense Advanced Research Projects Agency (DARPA) has kicked off the Consortium for Execution of Rendezvous and Servicing Operations (CONFERS) to tackle the lack of clear, widely accepted technical and safety standards for responsible performance of on-orbit activities involving commercial satellites.
While it’s clear the cloud is the future of government IT, concerns surrounding cloud security continue to abound. Some agency IT personnel remain skittish about handing over data to cloud service providers and skeptical that the data will remain out of the hands of bad actors. As a result, they’re more comfortable housing information in legacy IT systems, even if those systems are, in some cases, decades old and prone to security vulnerabilities, writes SolarWinds blogger Joe Kim.
When we think about critical infrastructure, specifically the sectors the Department of Homeland Security has deemed essential to the well being of the country, rarely does the idea center on public networking assets to support critical infrastructure. But a rapid transformation of network technology and security improved processes so that agencies now can take advantage of combined public and private networking to accomplish information technology goals.
Operating in a relatively new operations domain, cyber fighters are coping with a wide range of challenges, including lack of training and still-to-be-defined policies, doctrines and authorities. Speaking at AFCEA TechNet Asia-Pacific, a panel of cyber experts agreed that the authorities to conduct cyber operations—along with policies, doctrine, tactics, techniques and procedures—still need to be defined even as technology advances rapidly.
It seems like a simple choice. You need to upgrade a platform’s computing capabilities but some of the existing hardware still is salvageable. Rather than do a complete upgrade from scratch, it is possible to retain much of the existing technology in the retrofit. But a closer inspection might reveal a different answer. Let’s peel back a few layers and see why—and when—it might make sense to throw away existing equipment and start over.
Hackers, take your mark. Building on the successes of the U.S. Defense Department’s “Hack the Pentagon” bug bounty program launched earlier this year, the Army now launches its own challenge. it’s now the Army’s turn.
This Giving Tuesday, AFCEA’s Educational Foundation will join the movement in support of teachers and students engaged in science, technology, engineering and mathematics (STEM) disciplines.
AFCEA’s Small Business Committee welcomed Marques Peterson and Kelly Buroker of Vedder Price to its November meeting to present on government contracts, with a focus on teaming agreements and bid protests.