One of the greatest security challenges for mobile apps running on mobile end points is attestation. In the context of secure mobility, the goal of attestation is to prove to a third party—an app or user—that a computing system is intact and trustworthy, an endeavor that is harder than it sounds, especially if you don’t “own” the end point device. How can you know it hasn’t been modified or infected by a bad actor, asks blogger Justin Marston. You can ask the system, but how do you know it isn’t lying to you, and the attacker cunningly covered his or her tracks?
The U.S. Navy’s fourth Mobile User Objective System (MUOS-4) satellite is communicating from space to the satellite control team after its Florida launch this morning.
Electrical and computer engineers at North Carolina State University have developed prototypical embedded computing devices that use little power and cost less than current devices.
While federal agencies undertake laudable efforts to consolidate and modernize data centers, security remains an underlying concern that keeps information technology administrators awake at night. Professionals reportedly believe the government’s data center modernization process increased cybersecurity challenges—an assessment, says blogger Bill Lemons, that is hardly surprising.
Inmarsat Incorporated plans to launch the anticipated third satellite of its Global Xpress network August 28 from Kazakhstan, a re-do launch after a previous attempt this summer was delayed. The third satellite is needed for complete coverage of the international company’s program to heighten global communication capabilities on land, at sea and in the air.
The future for battlefield robotics is now, and many countries are committing to automated warfighting in a bid to catch up to the United States.
The 5G mmWave Channel Model Alliance will focus on 3D channel modeling at high frequencies, or millimeter wavelengths, addressing how a wireless signal would propagate in different bands of the spectrum. The alliance will also focus on directional channel sounding, which involves measuring whether signals are distorted or lost in a given channel.
The Department of Defense plans to leverage open source solutions and services to meet mission requirements, no matter where the tactical edge lies. Guest blogger Bob Kimball highlights how providing connectivity that enables high-performance, assured networking is not only critical, but the reason why defense and civilian agencies are closely examining software-defined networking as a solution.
The Commerce Department’s Public Safety Communications Research program is signing up a new round of industry collaborators for the test bed used to evaluate advanced broadband equipment and software for emergency first responders.
Just as when the Soviet Union launched Sputnik nearly 58 years ago, the science community in the United States must rise to the occasion in a national security effort for information technology.
The Information Age is on the brink of a new revolution as quantum mechanics begins to influence its developments. But, uncertainty reigns when it comes to predicting what will emerge and how it will affect the world.
Sandia National Laboratories and the Georgia Institute of Technology signed a five-year memorandum of understanding that enables them to collaboratively solve science and technology problems of national importance.
A NATO coalition of scientists and researchers recently experimented with a variety of underwater robots in a joint scientific mine countermeasures sea trial.
The national capital region may receive its own joint information environment, or JIE. It would generate many advantages for its users, but some others might suffer from the new environment.
As the Internet of Things takes shape, it will generate a new phenomenon—the Complexity of Things.
Mobile data traffic generated by cellphones and tablets will approach almost 197,000 petabytes by 2019, according to Juniper Research.
Giddy up! Military and civilian bomb squad operators are taking to a capabilities exercise robot rodeo to showcase proficiencies and uses of robotics in the field. For the first time in nearly a decade, organizers included unmanned aerial vehicles in the competition.
It all began with Dolly, the first animal to be cloned from an adult somatic cell. While technical advances continued to make the news, their effects and the possibilities they created did not reach lawmakers or the legal profession.
Guest blogger Justin Marston tackles the reality that is the current state of classified mobility across the U.S. government—voice and basic email. It’s not what senior leaders want, he writes. They want apps, just like everyone else, but their (justified) level of paranoia has neutered most mobile devices.
In December 2014, Stephen Hawking, the renowned theoretical physicist, warned the world that true artificial intelligence (AI) could mean the death of mankind. Well, that got my attention.