Information is as important as maritime trade for U.S. prosperity, and the U.S. Navy must ensure that both keep flowing freely.
Advanced manufacturing projects will be supported through high-performance computing.
Both the complexity and importance of cybersecurity are growing exponentially and are reflected in its designation as a critical element of national security (CENS).
The information technology infrastructure, processes and solutions that government agencies rely on are becoming less suitable for today’s operational, mission and business challenges, says Federal CIO Tony Scott, the government’s top chief information officer. As a result, networks within those agencies are, indeed, going through significant changes.
The English language is characterized by its flexibility in absorbing words from other languages. That capability has made it the de facto language of science and technology.
The Advanced Technology Academic Research Center has released a report that offers five recommendations for government to consider while developing big data strategies.
Moore's Law has been declared passé. Now, we are entering an age of quantum computing and artificial intelligence. Who knows where this will lead?
Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. Typically, the words "insider threat" might conjured up the likeness of Edward Snowden. But the reality is much scarier, writes blogger Eddie Garcia.
DARPA, the Defense Department’s primary research agency, seeks flat optics that could revolutionize a number of industries, from surveillance technologies to how autonomous systems sense obstacles in their surroundings.
The third Inmarsat Inc., Global Xpress satellite is now fully operational after reaching its final orbital position. Activation of the third satellite in a fleet of three provides complete global coverage of the company’s program to heighten global communication capabilities on land, at sea and in the air.
The National Institute of Standards and Technology (NIST) has created a robotic arm that is being used to measure the properties of antennas rapidly and accurately. The robot, formally named the Configurable Robotic Millimeter-Wave Antenna facility, may be the ultimate innovation.
The U.S. Army Pacific trains with limited—but not eliminated—communications capabilities to learn how to operate in a degraded environment, whether caused by enemy action or by shortcomings among allies and partners.
While military planners are worried about communications and networking degradation by enemy forces, they instead should turn their attention to already-extant degradation—the lack of effective interoperability in a coalition operation.
Dealing with a degraded communications environment may require commanders to make their intent clear to their warfighters before a network collapses.
Government and industry are hard at work in what will be a tough job to incorporate commercial solutions in mobile military networking.
The adage is true: What’s old is new again, and while we think the technology of today might cure the ills of yesterday, some problems persist. It might be time to explore how methods that helped isolate insider threats from history can succeed in protecting modern infrastructure.
Across the entire Defense Department, situational awareness is mission critical. Real-time understanding of mission activities and the information delivered by intelligence, surveillance and reconnaissance (ISR) systems, in particular, is crucial for military commanders to make key decisions.
Cryptography is an old game of secrecy with a storied history that millennia later, secures information in the digital age. Encryption, or the conversion of data into another form, plays a critical role in cryptography, with encryption algorithms protecting data on numerous devices across many networks. As many ways as there are to protect information, however, there are also those willing to crack the code.
What does the CIA's Project Acoustic Kitty have in common with zombie home appliances? The answer can be found in three letters: IoT. Left unchecked, the Internet of Things poses notable threats, both commercially and militarily.
Despite the fact that they supposedly are fighting against Syrian rebels employing relatively unsophisticated equipment, Russian forces have brought some of their most advanced electronic warfare (EW) capabilities to the fight.