Technology Blog

NIST: Facial Recognition Technology Improving by Leaps and Bounds

September 24, 2019
By Shaun Waterman
Credit: Shutterstock/Andrey_Popov

Facial recognition technology has become “spectacularly” more effective at matching an individual with their photo in a gallery of millions of pictures.

Identification Verification Capabilities Shrink

September 19, 2019
By Maryann Lawlor
The wearable authentication tokens will enable soldiers at every echelon to prove their identity when operating systems, devices and applications on the Army tactical network. Credit: Spc. Dustin D. Biven, USA, 22nd Mobile Public Affairs Detachment, The Task ID and Access Management (TIDAM) program’s tokens are lightweight, flexible and rugged. They can be inserted in a pocket, attached to a sleeve or integrated into a wristband. Credit: Douglas Scott, Soldiers wearing TIDAM tokens could log in by getting near to a system, which would then prompt them to enter a PIN or a biometric as a second form of ID. They would be automatically logged out when they walk out of the system's range. Credit: Combat Camera, courtesy of CCDC C5ISR Center public affairs

U.S. Army's Combat Capability Development Command directorate fields a wearable ID token.

Seeing Infrared with Sandia’s Nanoantennas

September 16, 2019
Posted by: George I. Seffers
Sandia National Laboratories researchers are ready to commercialize a nanoantenna-enabled detector on an assembled focal plane array for a thermal infrared camera. The gold nanoantennas are too small to be visible on top of the detector array.    Photo courtesy of Sandia National Laboratories

Sandia is pursuing leads to establish a Collaborative Research and Development Agreement to start transferring the technology to industry.

 

Army Researchers Work To Combat Deepfake Videos

September 11, 2019
Computer scientists at the U.S. Army¹s Combat Capabilities Development Command at Aberdeen Proving Ground are working on biometric software systems to combat so-called "deepfake" or bogus media. Credit: Shutterstock/meyer_solutions

Computer scientists are employing biometric systems to battle bogus media and protect warfighters.

Robots Go Underground

August 23, 2019
By Kimberly Underwood
Timothy Chung, program manager, Tactical Technology Office, Defense Advanced Research Projects Agency (DARPA), briefs SIGNAL Magazine and other reporters on August 20 during DARPA's Subterranean Challenge at a coal mine research facility in Pittsburgh.,  Researchers from the Jet Propulsion Lab, California Institute of Technology, Massachusetts Institute of Technology and South Korea's KAIST Center, representing the CoStar Team, await to deploy additional ground robots into the coal mine tunnel on August 20 during DARPA's Subterranean Challenge.,  Team Pluto, with roboticists from the University of Pennsylvania, Exyn Technologies and Ghost Robotics, relied in part on Ghost's quadruped robot platform (pictured), as well as Exyn's advanced autonomous aerial robot.

Test of robotic systems in subterranean coal mine spells trouble for aerial systems.

Multidomain Operations Challenge Traditional Strategies

August 16, 2019
By Maryann Lawlor
During the radio rodeo, the C5ISR Center places industry radios into an operationally relevant field environment to assess their ability to operate on the move in a contested, multidomain environment. (Photo Credit: U.S. Army Photo Courtesy of PEO C3T), Warrant Officer Alan Mendoza, USA, an all-source intelligence technician assigned to the 2nd Battalion, 34th Armored Regiment, 1st Armored Brigade Combat Team, reviews significant activity during exercise Allied Spirit X in Hohenfels, Germany. The exercise included participants from 15 nations, enabling U.S. military participants to evaluate communications interoperability. (Photo Credit: Sgt. Thomas Mort, USA),  The C5ISR Center’s Radio Rodeo is an opportunity for U.S. Army personnel to communication openly about their requirements and for companies to demonstrate their mature solutions. (Photo Credit: C5ISR Center)

The modernization, proliferation and commoditization of electronics make contending with peer and near-peer adversaries more difficult, lethal and deadly.

Encrypted Data Prevails in Innovation Showcase

July 29, 2019
By Robert K. Ackerman
Judges and competitors gathering after the latest AFCEA innovation shark tank are (l-r) Robert Osborne, CTO of IMPRES Technology Solutions; judge Glenn Hernandez, national director of U.S. Cyber Challenge; judge Col. Laurie Moe Buckshot, USA (Ret.), president and CEO of Corvus Consulting; Nicholas Edwards, founder and CEO of winning company TunnelVue; Robert Stewart Jr., president and CEO of Federal Government Experts; and judge Bob Gourley, co-founder and CTO of OODA LLC.

The latest Innovation Showcase winner is a company that simplifies encryption methods to secure entire networks of data.

ARL Researches the Human Brain

July 17, 2019
By Robert K. Ackerman
Scientists at the Army Research Laboratory (ARL) monitor a soldier’s brainwaves as he operates systems in a simulated tank. The work seeks to understand thought patterns and physical states during combat pursuant to teaming the soldier with artificial intelligence.

The Army Research Laboratory is studying how the human brain functions under varying conditions so it can pair soldiers’ moods and perceptions with actions by AI.

Ant-Sized Robots Powered by Tiny Vibrations

July 17, 2019
Posted by Julianne Simpson
A micro-bristle-bot is shown next to a U.S. penny for size comparison. Credit: Allison Carter, Georgia Tech, Georgia Tech graduate student Zhijian (Chris) Hao is shown with a microscope image of a micro-bristle-bot on a U.S. penny. Credit: Allison Carter, Georgia Tech, Close-up photo shows a micro-bristle-bot, which is about 2 millimeters in length–about the size of the world’s smallest ant. Credit: Allison Carter, Georgia Tech

Researchers at Georgia Tech have created a new type of tiny 3D-printed robot that moves by harnessing the vibration from piezoelectric actuators, ultrasound sources or even tiny speakers.

Artificial Intelligence 101

June 26, 2019
By Kimberly Underwood
Ron Schmelzer and Kathleen Walch (r), who both are managing partners and principal analysts at Cognilytica and spoke at the recent AI World Government conference, advise that not every information technology problem can be solved by using artificial intelligence systems.

Experts make sense of the burgeoning industry and offer words of wisdom to AI users.

NSF and Federal Agencies Announce Update to National AI Plan

June 24, 2019
Posted by Gopika Ramesh
The Stampede supercomputer at the Texas Advanced Computing Center at the University of Texas in Austin is funded by the NSF and specializes in high performance research and development and data analysis. Credit: Texas Advanced Computing Center

2019 update to the National Artificial Intelligence Research and Development Strategic Plan refreshes 2016 version.

Metal Foam Stops Armor-Piercing Bullets

June 17, 2019
Posted by George I. Seffers
Afsaneh Rabiei examines a sample of composite metal foam. Her pioneering research has led to armor plating that weighs far less than steel and is capable of stopping armor-piercing .50-caliber bullets. Credit: North Carolina State University

The armor was tested using .50 caliber ball and armor-piercing rounds. The armor was tested with rounds fired at impact velocities from 500 meters per second up to 885 meters per second.

Hypersonic Weapon Passes First Flight Test

June 13, 2019
Posted by George I. Seffers
The U.S. Air Force has successfully launched the AGM-183A Air Launched Rapid Response Weapon from a B-52 Stratofortress for the first time. Credit: Airman 1st Class Victor J. Caputo/U.S. Air Force

A sensor-only version of the AGM-183A Air Launched Rapid Response Weapon prototype was carried externally by a B-52 during the test to gather environmental and aircraft handling data.

The Role of Chief Technology Officers in 2020

May 22, 2019
By Julianne Simpson
Yuvi Kochar, former chief technology officer for The Washington Post, speaks to attendees at the AFCEA-GMU C4I and Cyber Center Symposium about how CTOs can leverage technology to drive business outcomes.

Yuvi Kochar has been a chief technology officer for almost 20 years and has seen the job transform into a more business-centric role.

DISA Drafting Artificial Intelligence

May 16, 2019
By George I. Seffers
From l-r, Robert K. Ackerman, SIGNAL editor in chief, moderates a TechNet Cyber luncheon plenary with speakers Tony Montemarano, DISA executive deputy director, and Jeffrey Jones, executive director, JFHQ-DODIN. Photo by Michael Carpenter, At TechNet Cyber, Jeffrey Jones, executive director, JFHQ-DODIN, discusses how AI and machine learning can impact cybersecurity. Photo by Michael Carpenter, Tony Montemarano, DISA executive deputy director, discusses cyber, AI and data at TechNet Cyber. Photo by Michael Carpenter

"Artificial intelligence is probably the most significant technology we have to come to grips with," said Tony Montemarano, DISA executive deputy director.

The Dark Art of Artificial Intelligence

May 15, 2019
By George I. Seffers
From l-r, Mathew Gaston, director of the Emerging Technology Center at the Carnegie Mellon University Software Engineering Institute, Stephen Wallace, DISA’s systems innovation scientist with the Emerging Technology Directorate, and and Fletcher Previn, chief information officer at IBM Corp., discuss artificial intelligence during a session of TechNet Cyber. Photo by Michael Carpenter

Artificial intelligence will be the technology most critical to national security, experts say.

Mobile Device Protection Prevails in Shark Tank

April 26, 2019
By Robert K. Ackerman
From l-r, Lt. Gen. Robert Shea, USMC (Ret.), president and CEO of AFCEA International, presents the winner’s trophy to Mike Fong, CEO of Privoro, after his company’s technology was chosen as the top competitor in the championship round of AFCEA International’s small business innovative shark tank. Also present are John Kreger of MITRE, chairman of the AFCEA Homeland Security Committee and Tina Jordan, AFCEA vice president of membership.

Shielding smartphones from intrusion wins a small business shark tank competition.

Software Pipeline Open for Business, Air Force Squadron Says

April 23, 2019
Posted by Kimberly Underwood
Engineers from the 517th Software Engineering Squadron, including (l-r) Carl Stuck and Scott Vigil, project directors; David Jolley, director; and Brent VanDerMeide, flight director, have created a new software development platform. U.S. Air Force photo by Todd Cromer, A new development secure operations, or DevSecOps-based platform created by engineers from the 517th Software Engineering Squadron, will speed software tools to warfighters. U.S. Air Force photo by Todd Cromer

The squadron rolls out DevSecOps software development system.

$5.2 Million High Performance Computing Program Seeks Proposals

April 9, 2019
Posted by Kimberly Underwood
Industry solutions across manufacturing, materials and mobility applications are wanted for the government’s $5.2 million High Performance Computing Energy Innovation Program. Credit: Shutterstock

The Department of Energy and the Lawrence Livermore National Laboratory are working to advance high performance computing.

DISA Rolls Out milDrive Digital Storage Solution

March 28, 2019
Posted by Kimberly Underwood
The Defense Information Systems Agency’s (DISA's) new digital personal file storage service called milDrive will offer flexibility and reliability to warfighters, the agency says. Credit: Shutterstock/Andrey VP

The military IT agency’s cloud-based personal file storage service will give warfighters more flexibility, officials say.

Pages