Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5247 Results
Determining What Is Secure or Not Secure: That Is the Challenge
Are there more efficient ways to streamline the ARTPC's data identification process, or would these just add layers to what is envisioned as an already more simplified effort? Discuss your ideas, express your concerns here. We welcome your unclassified data input.
Guest Post: Network Virtualization
Paul Strassmann offers his insights on network virtualization as an answer to cyber security concerns about the proliferation of things contributing to the "attack surface," such as networks, circuits and computers.
Cool App-titude: Aiming for Accuracy
The creator of an app called BulletFlight claims it could improve the accuracy of military snipers in training by calculating the trajectory of a bullet's flight path to ensure users hit the target.
Hackers Go Global for Disaster Relief Efforts
Over the next two days, hackers from across the globe will team up on nearly every continent for the second Random Hacks of Kindness (RHoK) event aimed at finding solutions to real-world problems in areas affected by natural disasters.
Hruby Now a Sandia VP
Sandia National Laboratories, Albuquerque, New Mexico, has named Jill M.
Cool App-titude: The Untappable Apps
Early last week, an independent computer security researcher known as Moxie Marlinspike launched two apps that they claim make phones untappable. The free, public betas for Google's Android mobile platform are called RedPhone and TextSecure.
Googlizing Intelligence
Actionable knowledge will be available to commanders at lightning speed as the U.S. military and industry institute more adept methods to sift through terabytes of raw intelligence data. With the help of language-crunching software, intelligence analysts will be privy not only to crucial data about people, organizations, locations and weapons but also to the relationships among them. The key that unlocks the door to this obscure information is technology that enables computers to recognize and collate words and their meanings. In a matter of minutes, it then organizes the data in a way that would take weeks for a human analyst to accomplish.
Guest Blog: Gentlemen Do Not Open Attachments
DoD policy recently opened access to Internet web pages from NIPRNET computers. This policy is unenforceable and is insecure. It allows the inadvertent inclusion of attachments for downloading of malware from where it can further propagate across DoD networks to subvert security.
Managing Controlled Unclassified Information Creates Challenges
The ultimate goal is to create an overarching framework that standardized CUI infomation to promote the sharing of data.
Defense Department CIO Stresses the Benefits of Change
"If you imagine Second Life is just a game, you're missing the point."--David Wennergren, Defense Department Chief Information Officer