Organizations constantly are seeking new ways to address workload-specific storage demands in terms of performance and capacity while also meeting service-level agreements, response-time objectives and recovery-point objectives.
Just in time for Valentine's: a science love story. George and Marlene Bachand, a married couple working at Sandia National Laboratories, have partnered on more science projects than they can recall.
The U.S. Defense Department announced that in October 2016 it successfully demonstrated one of the world’s largest microdrone swarms at China Lake, California.
Thanks to an award from the Department of Homeland Security Science and Technology Directorate, Brigham Young University is developing a web middleware tool that will improve the Internet website authentication process and online security.
Calling all codebreakers. The National Institute of Standards and Technology, or NIST, needs the public's help to head off what officials say is a looming threat to information security: quantum computers.
Federal employees are frustrated by slow and unreliable applications, a quandary they say impedes them from getting their work done and diminishes confidence in information technology modernization efforts, according to survey results released today by Riverbed Technology, an application performance company.
Keeping the U.S. military ready to fight takes more than hard work and training. Troops need a work-life balance as much as civilians, which means enjoying time spent with family and friends. High-speed Internet connectivity ranks high on a list of priorities because little boosts morale more than staying connected with loved ones, particularly when serving thousands of miles away, writes blogger Tony Bardo.
The Defense Advanced Research Projects Agency (DARPA) has kicked off the Consortium for Execution of Rendezvous and Servicing Operations (CONFERS) to tackle the lack of clear, widely accepted technical and safety standards for responsible performance of on-orbit activities involving commercial satellites.
Engineers at the Massachusetts Institute for Technology, with support from the Office of Naval Research, have developed a portable measurement system to precisely and inexpensively monitor the amount the electricity used by individual household appliances, lighting fixtures and electronic devices.
While it’s clear the cloud is the future of government IT, concerns surrounding cloud security continue to abound. Some agency IT personnel remain skittish about handing over data to cloud service providers and skeptical that the data will remain out of the hands of bad actors. As a result, they’re more comfortable housing information in legacy IT systems, even if those systems are, in some cases, decades old and prone to security vulnerabilities, writes SolarWinds blogger Joe Kim.
When we think about critical infrastructure, specifically the sectors the Department of Homeland Security has deemed essential to the well being of the country, rarely does the idea center on public networking assets to support critical infrastructure. But a rapid transformation of network technology and security improved processes so that agencies now can take advantage of combined public and private networking to accomplish information technology goals.
It seems like a simple choice. You need to upgrade a platform’s computing capabilities but some of the existing hardware still is salvageable. Rather than do a complete upgrade from scratch, it is possible to retain much of the existing technology in the retrofit. But a closer inspection might reveal a different answer. Let’s peel back a few layers and see why—and when—it might make sense to throw away existing equipment and start over.
Cindy Moran, former director for network services at the Defense Information Systems Agency (DISA), told the audience at the AFCEA TechNet Asia-Pacific conference in Honolulu that it is time to build networks for maximum performance and to find other ways to build in security.
To obtain mission success, the U.S. military must maintain an emphasis on distributed operations that rely heavily on technological capabilities offered through cyberspace, said Brig. Gen. Brian Cavanaugh, USMC, deputy commander, U.S. Marine Forces, Pacific, during AFCEA TechNet Asia-Pacific 2016.
Critical Infrastructure Security and Resilience month serves as a reminder to not only understand, but appreciate, the various critical infrastructure sectors that play vital roles in the national and economic security of the United States. How can networking capabilities within these sectors improve? How can innovation continue? One key approach is to address the vast complexities of the networks, guest blogger David Young writes.
The dependence on connectivity for critical services between government branch offices and data centers is increasing the need for networks to have improved reliability, scalability and flexibility. A solution brief provides more information on how to keep distributed organizations up and running.
The Intelligence Advanced Research Projects Agency (IARPA) announced the public release of the Accurate Events from Natural Text (ACCENT) technology.
More than a decade ago the Defense Department announced plans to convert its network to the Internet Protocol version 6 (IPv6) standard. Today, the wait continues. The department no longer can afford to cite the re-occurring mantra “if it ain’t broke, don’t fix it.” Today’s military simply cannot overlook the need to transition, writes Joe Kim, SolarWinds' senior vice president and global chief technology officer.
The history of the Internet as we know it today doesn’t really date back that far. Some 25 years, really. But what is both enticing and concerning is that the rate of change in this arena constantly is speeding up, making it difficult to forecast where technology will go next.
Over the next five years, Sandia National Laboratories will oversee the brain replication work of three university-led teams who aim to close the computer-human gap in object recognition.