Computing

February 2000
By Henry S. Kenyon

Inexpensive processors and sensors coupled with improved computer codes lead to smart machines.

In the coming decades, autonomous robotic devices will patrol battlefields and vacuum the floors in homes. Recent advances in software and hardware are preparing the way for a generation of vehicles and tools able to operate with minimal human supervision for prolonged periods of time.

May 2000
By Sharon Berry

Innovative application deployment may save end-users money and time to focus on core business objectives.

A new method of delivering software promises to reduce the cost and time required for infrastructure setup, software installation, maintenance and support. Known as the application service provider model, the approach reduces the burden on internal information systems resources and enables a predictable cost model for running programs.

July 2000
By Sharon Berry

Despite growing Internet use and successes, designers’ patience shrinks with Web-page obstacles.

A growing industry and government effort to provide nationwide Internet services has created an intricate maze of accessibility, content and quality control challenges. With the number of Internet users now totaling 320 million, more than a score of browsers in use and the development of constantly changing Internet technologies, the online challenges are complex. Navigation has been difficult, errors continue to creep in, and many users are excluded from access to a large number of World Wide Web sites.

July 2000
By Henry S. Kenyon

Program targets word relationships in documents, provides concise summaries of requested material.

An information retrieval tool that is more powerful and accurate than standard search engines allows users to quickly retrieve information within several mouse clicks. The application combs through the “hits” produced by investigation programs to find documents based on specific word associations and creates a database from these results. By highlighting only specific paragraph-sized sections of text, the technology streamlines the research process by eliminating the task of scanning entire documents to find bits of relevant data.

October 2000
By Henry S. Kenyon

Software tool creates direct link from camera to monitor without format conversion or bandwidth delays.

The U.S. Defense Department has developed an imagery system that allows full-motion video inputs from unmanned aerial vehicles, handheld cameras and similar devices to move directly from a sensor to an analyst’s workstation. Based on recent advances in hardware and commercially available software, intelligence agencies can now capture and process uncompressed imagery in real time with sophisticated off-the-shelf products.

January 2001
By Maryann Lawlor

Bits and bytes recovery capability critical in resource-challenged regions.

A sinking feeling emerges when saved information cannot be retrieved or a hard drive is totally destroyed. The anxiety of data loss rivals the panic that sets in upon misplacing a treasured keepsake or losing a large sum of money. And, it is a deplorable reality in an age that is more dependent than ever on vulnerable devices that are relied upon from the dawn of an idea through storage for posterity.

May 2001
By Maj. Timothy R. Schmoyer, USA, and Maj. Bernard J. Jansen, USA

Coordinating service requests saves time, increases accountability.

An adaptive hypermedia system that streamlines and enhances work-order procedures demonstrates that technology can be profitably employed to achieve an organization’s customer support goals. Although the initial deployment of the technology was limited to building maintenance, the software could have far-reaching implications for improved customer relations and effective time utilization.

March 2003
By Sharon Berry

Scientists develop an Internet-scale persistent data store with the advantages of collaborative computing.

Researchers at the University of California–Berkeley have developed an approach to information security and sharing that combines the power of the Internet with a memory-sharing system and creates a globally distributed hard drive that is accessible to millions of users. The information would remain intact even when servers fail, natural disasters strike, malicious attacks are launched or all three occur simultaneously.

Pages