The SIGNAL Blog

Closing the Computer-Human Gap in Object Recognition

November 2, 2016
By Julianne Simpson

Over the next five years, Sandia National Laboratories will oversee the brain replication work of three university-led teams who aim to close the computer-human gap in object recognition.

New Era of Complex Military Operations Brings Cyber Concerns to Forefront

November 1, 2016
By Sandra Jontz
E-mail About the Author

Today’s young soldiers don’t want cutting-edge mobile technology in their warfighting platforms; they want that to be their warfighting platforms, says Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA. He spoke Tuesday on the inaugural day of MILCOM 2016. This year's theme, Securing Communications at the Speed of Cyber, digs into the competing priorities of speed, security and cost amid emerging challenges. 

Autonomous Systems to Surge for Defense Operations

November 1, 2016
By Sandra Jontz
E-mail About the Author


Over the next decade—if not sooner—the U.S. Defense Department wants more of its military systems to operate autonomously, capable of independently determining the right course of action no matter the situation. The Defense Science Board predicts the department will get there. 

AAI to Support Shadow UAS in Australia

November 1, 2016

AAI Corp., a Textron company, Hunt Valley, Maryland, was awarded a $206,561,704 cost-plus-fixed-fee foreign military sales (Australia) contract for contractor logistics sustainment services for Shadow RQ-7B unmanned aerial systems. Bids were solicited via the Internet with one received. Work will be performed in Hunt Valley, Maryland, with an estimated completion date of October 31, 2017. Fiscal 2017 other funds in the amount of $3,705,107 were obligated at the time of the award. The Army Contracting Command, Natick, Massachusetts, is the contracting activity (W911QY-17-C-0013).

Securing the Infrastructure Within the Nation's Critical Infrastructures

October 31, 2016
By David Young

November marks the Critical Infrastructure Security and Resilience month. The strongest assembled securities available today can't fully safeguard the nation's critical infrastructure assets. But the good news is that these vulnerabilities are front and center on official radars and primed for increased attention. 

IARPA Pursues Virtuous Computing

October 28, 2016



IARPA recently released the Virtuous User Environment broad agency announcement. The goal of the program is to create and demonstrate a more secure interactive user computing environment by leveraging the federal government’s impending migration to commercial cloud based information technology infrastructures and the current explosion of new virtualization and operating system concepts.

 

Simple Steps for Social Media Security

October 26, 2016
By Julianne Simpson

Social networks are a great way to stay connected with others, but users, particularly millennials, should be wary about how much personal information they post.

Millennial Cyber Behaviors Threaten Federal IT Systems

October 25, 2016
By Sandra Jontz
E-mail About the Author

Millennials could just pose as grave a cybersecurity risk to enterprise networks as cyber criminals, according to one recent study. With more of them entering the federal workplace, they bring along technology preferences and bad behavior that threaten security of federal IT systems, according to cybersecurity developer Forcepoint.

Pages