Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5254 Results
Defense Builds Teams to Mine Data
The U.S. Defense Department is wrestling with a multitude of issues to provide the right people with the means to access different forms of data. Complicating potential solutions is the fact that the types of potential users are as varied as the types of data, which makes access and verification exponentially difficult.
Smart Companies Dig Data
Boosting business by improving customer service requires a bit of digging, but the information gold mine already is in place. With the aid of a few algorithms, companies are excavating data to unearth insights about their customers that emerge when small particles of information are fused into a gold nugget.
Silent Knight Shines In the Dark
Flying at very low altitudes at night or in bad weather entails a range of challenges not encountered in other types of military missions. Whether an operation involves a strike aircraft penetrating heavily defended national airspace or special operations forces covertly inserting personnel, these flights require highly capable radar equipment designed to guide pilots over and around terrain they cannot see. A new tactical radar system will help warfighters navigate safely through hostile terrain under a variety of atmospheric conditions.
Deep Green Helps Warriors Plan Ahead
Uncertainty has challenged military operations since the days of the ancient Greeks. An experimental decision-making technology could help future commanders see through some of the fog of war by helping them plan operations, recognize when a plan is not working and develop alternatives to keep ahead of the enemy.
Solution Delivers Information to Analysts
Investigators performing computer forensics can now do their jobs from the beach—or anywhere else. An emerging technology eliminates the need for experts to have hardware in hand before examining a system and works around legalities that prohibit the transport of information across borders. The technology has applications across law enforcement, the military, the intelligence community and private industry.
Employee Transfer Effort Taps Technical Expertise
A unique exchange program permits government and private sector organizations to exchange high-tech workers. The goal of the Information Technology Exchange Program (ITEP) is to provide both sectors with an opportunity to share best practices and to better understand each other’s operating practices and hurdles.
Agencies Review Effect Of Government Oversight
A new report grades the graders as computer security officers share how federal guidance and reporting are affecting their organizations. Many believe the regulations have improved their organizations' safety measures, but there is a disparity of opinion about effectiveness, and some contend that funding should be tied to the process.
Cyberspace Command Logs In
The U.S. Air Force seeks to dominate networked warfare through a new command specializing in cyberspace operations. The organization will enable U.S. strategic efforts by providing a variety of services and capabilities from information assurance and network security to intelligence gathering and defensive and offensive cyber activities.
Capital Region Forges Wireless Way
The U.S. seat of power will be home to the country's first regional communications network of networks to link police, firefighters and first responders. Working with its geographic neighbors, Washington, D.C., begins acceptance testing of the network within the district next month. Once fully in place, the system will enable emergency personnel throughout the National Capital Region to communicate and share information seamlessly with each other.
Handheld Gadget Ensures Safe Sharing
A portable device that will be among the first of its kind to incorporate secure voice capability as well as e-mail and personal digital assistant functionality is on schedule for distribution by the end of the year. The device's features will include secure transmission up to Top Secret level for voice and up to Secret level for data. Its small, integrated package will enable troops to take advantage of these features while they are mobile.