Technology Blog

Promoting Industry Adoption of Supercomputing

September 16, 2015
By George I. Seffers
The Lawrence Livermore-Rensselaer Polytechnic Institute agreement to promote supercomputing supports President Barack Obama's plan to spur the economy.

Lawrence Livermore and Rensselaer Polytechnic Institute sign a memorandum of understanding to help industry adopt supercomputing in an effort to spur the economy.

Electronic Warfare Is the Teeth-Clenching Defense of the Last Mile

September 16, 2015
By David E. Meadows
Two soldiers practice using electronic warfare equipment during a joint training exercise. EW often is overlooked, but its importance is increasing with advances in electronics.

With all the focus on cyber, electronic warfare (EW) often is overlooked. But its importance is increasing with the advances in electronics.

The Bottom Line: 5 Ways Technology Has Changed the World

September 14, 2015
Maryann Lawlor

Cyberspace already is the new battlefield. Is the military ready?

Video Analytics Challenges: Finding the Needles in the Haystack

September 11, 2015
By B. Scott Swann
Courtesy CanStockPhoto via MorphoTrak

Processing massive amounts of video and images has become a daunting task for many law enforcement agencies, which are turning to technology for help. The solution sets alone won't solve crime, writes blogger B. Scott Swann, but video analytics will play an increasingly important role in the daily lives of those who protect U.S. citizens.

Attestation and Inception: Deciphering Secure Reality from a Dream

September 8, 2015
By Justin Marston

One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?

MUOS-4 Satellite Up and Running

September 2, 2015
By George I. Seffers
MUOS-4 will enable near-global coverage for a new secure military communications network offering enhanced capabilities for mobile forces.

The U.S. Navy’s fourth Mobile User Objective System (MUOS-4) satellite is communicating from space to the satellite control team after its Florida launch this morning.

Researchers Develop Low-Cost, Low-Power Embedded Computers

September 1, 2015
By George I. Seffers

Electrical and computer engineers at North Carolina State University have developed prototypical embedded computing devices that use little power and cost less than current devices.

Four Core Attributes Federal Data Centers Need for Cost-Effective Security

September 1, 2015
By Bill Lemons

While federal agencies undertake laudable efforts to consolidate and modernize data centers, security remains an underlying concern that keeps information technology administrators awake at night. Professionals reportedly believe the government’s data center modernization process increased cybersecurity challenges—an assessment, says blogger Bill Lemons, that is hardly surprising. 

Inmarsat to Launch Third Global Xpress Satellite Aug. 28

August 17, 2015
By Sandra Jontz

Inmarsat Incorporated plans to launch the anticipated third satellite of its Global Xpress network August 28 from Kazakhstan, a re-do launch after a previous attempt this summer was delayed. The third satellite is needed for complete coverage of the international company’s program to heighten global communication capabilities on land, at sea and in the air.

Military Robotics Is Moving Into Position

August 13, 2015
By David E. Meadows

The future for battlefield robotics is now, and many countries are committing to automated warfighting in a bid to catch up to the United States.

NIST Forms International Telecommunications Alliance

August 12, 2015

The 5G mmWave Channel Model Alliance will focus on 3D channel modeling at high frequencies, or millimeter wavelengths, addressing how a wireless signal would propagate in different bands of the spectrum. The alliance will also focus on directional channel sounding, which involves measuring whether signals are distorted or lost in a given channel.

Military Networks Embracing SDN to Gain Visibility and Control

July 29, 2015
By Bob Kimball

The Department of Defense plans to leverage open source solutions and services to meet mission requirements, no matter where the tactical edge lies. Guest blogger Bob Kimball highlights how providing connectivity that enables high-performance, assured networking is not only critical, but the reason why defense and civilian agencies are closely examining software-defined networking as a solution. 

Government Seeks Advanced Broadband Research Partners

July 14, 2015

The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.

STEM Is a 21st Century Critical Element of National Security

July 9, 2015
By David E. Meadows

Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.

The Clash of Two Physics

June 11, 2015
By David E. Meadows

The Information Age is on the brink of a new revolution as quantum mechanics begins to influence its developments. But, uncertainty reigns when it comes to predicting what will emerge and how it will affect the world.

Sum Will Be Greater Than the Parts

June 9, 2015
By Maryann Lawlor
Sandia researchers work with new imaging techniques to view cell-level activity with unprecedented detail. (By Randy Montoya)

Sandia National Laboratories and the Georgia Institute of Technology signed a five-year memorandum of understanding that enables them to collaboratively solve science and technology problems of national importance.

NATO Research Vessel Alliance Conducts Underwater Robot Research

June 1, 2015
By George I. Seffers

A NATO coalition of scientists and researchers recently experimented with a variety of underwater robots in a joint scientific mine countermeasures sea trial.

The Dawn of the Joint Information Environment for the National Capital Region

May 27, 2015
By Allan L. Mink

The national capital region may receive its own joint information environment, or JIE. It would generate many advantages for its users, but some others might suffer from the new environment.

The Complexity of Things (CoT)

May 19, 2015
By David E. Meadows

As the Internet of Things takes shape, it will generate a new phenomenon—the Complexity of Things.

Mobile Devices Drive Data Surge

May 19, 2015

Mobile data traffic generated by cellphones and tablets will approach almost 197,000 petabytes by 2019, according to Juniper Research.

Pages