Technology Blog

Flash in the Enterprise Data Center

February 2, 2017

Organizations constantly are seeking new ways to address workload-specific storage demands in terms of performance and capacity while also meeting service-level agreements, response-time objectives and recovery-point objectives.

Behind the Science: The Science That Binds

February 13, 2017
By George I. Seffers
Sandia scientists Marlene and George Bachand show off their new method for encrypting and storing sensitive information in DNA. Digital data storage degrades and can become obsolete, and old-school books and paper require lots of space. (Photo by Lonnie Anderson)

Just in time for Valentine's: a science love story. George and Marlene Bachand, a married couple working at Sandia National Laboratories, have partnered on more science projects than they can recall.

U.S. Military Successfully Demonstrates Microdrone Swarm

January 9, 2017
Perdix microdrones launched from F/A-18 Super Hornets demonstrate advanced swarming capabilities, including collective decision making, adaptive formation flying and self-healing.

The U.S. Defense Department announced that in October 2016 it successfully demonstrated one of the world’s largest microdrone swarms at China Lake, California.

BYU Wins Award to Develop Cybersecurity Technology

December 21, 2016
By Julianne Simpson

Thanks to an award from the Department of Homeland Security Science and Technology Directorate, Brigham Young University is developing a web middleware tool that will improve the Internet website authentication process and online security.

Codebreakers Report: NIST Needs Solutions for Looming Quantum Computer Threat

December 21, 2016
By Sandra Jontz

Calling all codebreakers. The National Institute of Standards and Technology, or NIST, needs the public's help to head off what officials say is a looming threat to information security: quantum computers.

Sluggish Apps Foil and Frustrate Federal Employees, Study Reveals

December 13, 2016

Federal employees are frustrated by slow and unreliable applications, a quandary they say impedes them from getting their work done and diminishes confidence in information technology modernization efforts, according to survey results released today by Riverbed Technology, an application performance company.

Maintaining Warfighter Morale with High-Speed Internet

December 8, 2016
By Tony Bardo
A U.S. soldier talks with his wife on Facebook at an Internet cafe set up at Kandahar Airfield in Afghanistan.

Keeping the U.S. military ready to fight takes more than hard work and training. Troops need a work-life balance as much as civilians, which means enjoying time spent with family and friends. High-speed Internet connectivity ranks high on a list of priorities because little boosts morale more than staying connected with loved ones, particularly when serving thousands of miles away, writes blogger Tony Bardo.

DARPA Creates Space Robotics Consortium

November 29, 2016

The Defense Advanced Research Projects Agency (DARPA) has kicked off the Consortium for Execution of Rendezvous and Servicing Operations (CONFERS) to tackle the lack of clear, widely accepted technical and safety standards for responsible performance of on-orbit activities involving commercial satellites.

New Measurement System Can Help Navy Conserve Energy

November 29, 2016
By Julianne Simpson
With support from the Office of Naval Research (ONR), engineers at the Massachusetts Institute of Technology (MIT) have designed a portable measurement system to monitor the amount of electricity used by individual household appliances, lighting fixtures and electronic devices.

Engineers at the Massachusetts Institute for Technology, with support from the Office of Naval Research, have developed a portable measurement system to precisely and inexpensively monitor the amount the electricity used by individual household appliances, lighting fixtures and electronic devices.

Why Migrating to the Cloud is Great for Government IT Security

November 29, 2016
By Joe Kim

While it’s clear the cloud is the future of government IT, concerns surrounding cloud security continue to abound. Some agency IT personnel remain skittish about handing over data to cloud service providers and skeptical that the data will remain out of the hands of bad actors. As a result, they’re more comfortable housing information in legacy IT systems, even if those systems are, in some cases, decades old and prone to security vulnerabilities, writes SolarWinds blogger Joe Kim.

Leveraging Private and Public Networking to Support Critical Infrastructure

November 28, 2016
By David Young

When we think about critical infrastructure, specifically the sectors the Department of Homeland Security has deemed essential to the well being of the country, rarely does the idea center on public networking assets to support critical infrastructure. But a rapid transformation of network technology and security improved processes so that agencies now can take advantage of combined public and private networking to accomplish information technology goals.

Retrofit or Start From Scratch? It's Not a Simple Choice

November 22, 2016
By Ben Sharfi
A soldier from 2nd Brigade, 1st Armored Division demonstrates Warfighter Information Network-Tactical Increment 2 and Mission Command on the move applications during Network Integration Evaluation 12.1. , The Point of Presence (PoP) node acts as a mobile satellite communications link as well as a “healing” node for on-the-ground communications that become disrupted., The Soldier Network Extension (SNE) is a lower level network “healing” node that also passes messages and data up the chain of command.

It seems like a simple choice. You need to upgrade a platform’s computing capabilities but some of the existing hardware still is salvageable. Rather than do a complete upgrade from scratch, it is possible to retain much of the existing technology in the retrofit. But a closer inspection might reveal a different answer. Let’s peel back a few layers and see why—and when—it might make sense to throw away existing equipment and start over.

Network Security vs. Performance

November 17, 2016
By George I. Seffers
Cindy Moran, former director for network services at DISA, talks about network performance and security at TechNet Asia-Pacific. Photo by Bob Goodwin

Cindy Moran, former director for network services at the Defense Information Systems Agency (DISA), told the audience at the AFCEA TechNet Asia-Pacific conference in Honolulu that it is time to build networks for maximum performance and to find other ways to build in security.

Road to Mission Success Paved with Distributed Operations

November 15, 2016
By George I. Seffers
Brig. Gen. Brian Cavanaugh, USMC, deputy commander, U.S. Marine Forces, Pacific, addresses attendees at AFCEA TechNet Asia-Pacific 2016. Photo by Bob Goodwin

To obtain mission success, the U.S. military must maintain an emphasis on distributed operations that rely heavily on technological capabilities offered through cyberspace, said Brig. Gen. Brian Cavanaugh, USMC, deputy commander, U.S. Marine Forces, Pacific, during AFCEA TechNet Asia-Pacific 2016.

Simplifying Network Complexities Will Galvanize Critical Infrastructure Security

November 14, 2016
By David Young

Critical Infrastructure Security and Resilience month serves as a reminder to not only understand, but appreciate, the various critical infrastructure sectors that play vital roles in the national and economic security of the United States. How can networking capabilities within these sectors improve? How can innovation continue? One key approach is to address the vast complexities of the networks, guest blogger David Young writes.

Network Cost Saving and Scalability Through Virtualization

November 10, 2016

The dependence on connectivity for critical services between government branch offices and data centers is increasing the need for networks to have improved reliability, scalability and flexibility. A solution brief provides more information on how to keep distributed organizations up and running.

IARPA Releases ACCENT Technology to Research Community

November 9, 2016

The Intelligence Advanced Research Projects Agency (IARPA) announced the public release of the Accurate Events from Natural Text (ACCENT) technology.

Like Sands of Time: Shifting From IPv4 to IPv6

November 8, 2016
By Joe Kim

More than a decade ago the Defense Department announced plans to convert its network to the Internet Protocol version 6 (IPv6) standard. Today, the wait continues. The department no longer can afford to cite the re-occurring mantra “if it ain’t broke, don’t fix it.” Today’s military simply cannot overlook the need to transition, writes Joe Kim, SolarWinds' senior vice president and global chief technology officer.

Panel: Equipping the Cyber Force Means Giving Them Tools To Understand What They Manage

November 2, 2016
By Sandra Jontz
Panelists discuss efforts to equip the cyber force at MILCOM 2016. Photo by Mike Carpenter, Giorgio Bertoli is a senior scientific technical manager for offensive cyber at the Intelligence and Information Warfare Directorate (I2WD) at the Army’s Communications-Electronics Research, Development and Engineering Center (CERDEC). Photo by Mike Carpenter, Donald Coulter is a computer scientist and team lead for trusted systems and networks with CERDEC’s Space and Terrestrial Communications Directorate. Photo by Mike Carpenter, Giorgio Bertoli displays a rather recent history of the Internet during a panel discussion at MILCOM 2016.

The history of the Internet as we know it today doesn’t really date back that far. Some 25 years, really. But what is both enticing and concerning is that the rate of change in this arena constantly is speeding up, making it difficult to forecast where technology will go next.

Closing the Computer-Human Gap in Object Recognition

November 2, 2016
By Julianne Simpson
Sandia National Laboratories will oversee the brain-replication work of three teams who aim to map, understand and mathematically recreate visual processing in the brain.

Over the next five years, Sandia National Laboratories will oversee the brain replication work of three university-led teams who aim to close the computer-human gap in object recognition.

Pages