Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5231 Results
Coming Soon to a Computer Near You
Sights, sounds and searches will undergo vast improvements for computer users in the coming years as researchers’ imaginations and know-how take flight and new capabilities hit the marketplace. Novel data visualization tools will enable users to create photo compilations that produce three-dimensional virtual tours of a location. Communications devices will be embedded with arrays of microphones and speakers that craft sound bubbles. And tomorrow’s versions of today’s word processing software will lend a techno-helping hand by automatically searching out previously composed materials and making them available at the click of a mouse. In fact, plans for new man-machine interfaces may make even the mouse-click itself obsolete.
Web 2 the DANGER ZONE
Web 2.0 users beware: Social networking technologies may be fun and useful, but the one thing they are not is secure. For all the benefits it offers, the Web 2.0 world is still pretty rowdy, and the risk to enterprises is very serious. Experts warn that capabilities such as social networking and collaborative content sites are a wide-open window to hackers who are using their mega-networking appeal to spread malware and crack into systems. Unless organizations take precautions, not only do they put themselves at risk, but they also may inadvertently become members of a ring of thieves whose goal is to get their virtual hands on information, which equals riches.
Leaders Attack Spectrum Woes
Pentagon officials are aggressively tackling the spectrum supportability problems that plague the U.S. military both in the United States and abroad. In response to discussions at the Defense Spectrum Summit in December, personnel in the offices of the Joint Staff and the Assistant Secretary of Defense for Networks and Information Integration hammered out details and approved a long-awaited update to the department’s official instruction on management and use of electromagnetic spectrum. A number of new initiatives have been put into motion, and military leaders agree that if the momentum of the summit continues, severe problems with spectrum management could be a thing of the past.
Web 2.0 Means Business
Social networking and other Web 2.0 capabilities are creating new avenues for commerce by facilitating communication inside the corporate structure and extending collaboration beyond company walls. Key to making the most out of new technology, however, is determining corporate goals before throwing a new tool into the mix. When chosen and applied judiciously, nearly every Web 2.0 weapon—from del.icio.us to wikis—can play meaningful and profitable roles within any company.
Cognitive Radio Prepares for Action
An experimental radio technology could provide U.S. warfighters with assured access to voice, data and video communications. The prototype systems use an advanced wireless networking capability to link troops with larger networks such as the Global Information Grid. The radios also are capable of sensing the electromagnetic environment and selecting frequencies that are not in use automatically.
Governing in a Web 2.0 World
U.S. government agencies recognize the effect that Web 2.0 technologies are having on society, and some are eagerly incorporating them into their operations. However, unlike previous eras in which government embraced new capabilities routinely, today’s efforts go beyond merely adapting to innovative technologies. The Web 2.0 revolution is impelling cultural change faster and to a greater degree than ever experienced in recorded history, and democracies that answer to their populaces already are feeling the effects of that change—and ignore those effects at their own risk.
Small Atomic Clocks Chart New Horizons
A tiny device the size of a sugar cube may revolutionize military communications and sensor systems. The technology is a micro-scale atomic clock designed to help spectrum-hopping radios synchronize their frequencies and access signals from navigation satellites. This prototype time keeper is undergoing testing to determine its readiness for military applications.
Army Eliminates Enemies at Any Node
Technology resembling the human immune system is enhancing security for ad hoc mobile wireless networks on the battlefield. It will automate operations; offer unique, enhanced protection to communications assets; and relieve troops from constant network-monitoring. The result is increased user trust in the network.
Organizations Collaborate To Capture and Share Adversaries' Identity Traits
According to the military and its partners, for the United States to succeed in the Global War on Terrorism, they must be able to share biometrics information across a network-centric environment. To that end, personnel at various agencies are developing new architectures and streamlining methods to identify terrorists based on their unique characteristics, and they are putting systems in place to efficiently share that information. The most useful pieces of a variety of stovepipe systems already in place are being combined to create a synchronized joint program.
An Info-Centric Force Learns to Share
The U.S. Defense Department is developing an information sharing implementation plan based heavily on current need and impending reality. One foundational element of the department’s approach is that everyone agrees on the need to share information, but differences lie in how that goal is to be accomplished. The other factor is that new technologies and capabilities are changing the very nature of information access, and users ignore them at their own risk.