Over the next five years, Sandia National Laboratories will oversee the brain replication work of three university-led teams who aim to close the computer-human gap in object recognition.
The SIGNAL Blog
Efforts to modernize U.S. Marine Corps networks might have begun when the service worked to blur the lines between garrison and tactical networks, when nearly two decades of continuous war left the military with little opportunity for modernization beyond what troops needed immediately on the battlefield.
Today’s young soldiers don’t want cutting-edge mobile technology in their warfighting platforms; they want that to be their warfighting platforms, says Lt. Gen. Alan Lynn, USA, director of the Defense Information Systems Agency, or DISA. He spoke Tuesday on the inaugural day of MILCOM 2016. This year's theme, Securing Communications at the Speed of Cyber, digs into the competing priorities of speed, security and cost amid emerging challenges.
Over the next decade—if not sooner—the U.S. Defense Department wants more of its military systems to operate autonomously, capable of independently determining the right course of action no matter the situation. The Defense Science Board predicts the department will get there.
AAI Corp., a Textron company, Hunt Valley, Maryland, was awarded a $206,561,704 cost-plus-fixed-fee foreign military sales (Australia) contract for contractor logistics sustainment services for Shadow RQ-7B unmanned aerial systems. Bids were solicited via the Internet with one received. Work will be performed in Hunt Valley, Maryland, with an estimated completion date of October 31, 2017. Fiscal 2017 other funds in the amount of $3,705,107 were obligated at the time of the award. The Army Contracting Command, Natick, Massachusetts, is the contracting activity (W911QY-17-C-0013).
November marks the Critical Infrastructure Security and Resilience month. The strongest assembled securities available today can't fully safeguard the nation's critical infrastructure assets. But the good news is that these vulnerabilities are front and center on official radars and primed for increased attention.
IARPA recently released the Virtuous User Environment broad agency announcement. The goal of the program is to create and demonstrate a more secure interactive user computing environment by leveraging the federal government’s impending migration to commercial cloud based information technology infrastructures and the current explosion of new virtualization and operating system concepts.
Social networks are a great way to stay connected with others, but users, particularly millennials, should be wary about how much personal information they post.
Millennials could just pose as grave a cybersecurity risk to enterprise networks as cyber criminals, according to one recent study. With more of them entering the federal workplace, they bring along technology preferences and bad behavior that threaten security of federal IT systems, according to cybersecurity developer Forcepoint.