Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5254 Results
Open Competition Accelerates Defense Innovation
The race is on for super-advanced, beyond-next-generation technologies. Vying for a cash prize of $1 million, teams of engineers, software developers and car enthusiasts are taking on the challenge to create totally autonomous robotic ground vehicles that can travel from Los Angeles to Las Vegas on a designated course within a specified amount of time. The competition is part of a new program the military has developed to tap into the ingenuity of inventors throughout the United States who will design seemingly impossible capabilities that one day may be as commonplace in military operations as Predators.
Document Exploitation Increases in Importance
New technologies that increase the ability to process and enhance text documents are giving a badly needed boost to intelligence experts fighting terrorists and their weapons of mass destruction. Many of these technologies are being employed overseas on the battlegrounds of Afghanistan and Iraq as well as in the pursuit of terrorists in other countries.
Mobile Robots Learn Self-Reliance
A new generation of autonomous, problem-solving robots will soon be entering commercial service. Recent advances in computer processing power have allowed researchers to design prototype machines that can navigate in unfamiliar surroundings unassisted. Using a variety of sensors, the robot creates a constantly updated three-dimensional map as it goes through its routine. It is this self-navigation that is finally placing mobile robotic systems on the verge of commercial viability, scientists say.
Re-engineering Defense Research And Development
U.S. Defense Department science and technology investment is transcending the requirements model of the past in a shift from threat-based to capabilities-based thinking. While researchers are examining areas such as avionics, materials and nanotechnology, military leaders are exploring how cutting-edge developments can move more quickly from the laboratory to the field.
Self-Managing Computers Come Online
Industry is focusing on how to reduce computer system complexity by modeling the human body's autonomic nervous system. From servers to software, researchers are building all components of the infrastructure based on the same characteristics-regulation and protection of key functions without conscious involvement. Autonomic computers will make more decisions on their own and require less human intervention.
Computer Language Seeks Deeper Meaning
U.S. Defense Department researchers are developing software that may be capable of accurately understanding the nuances of human language. The technology promises to greatly enhance a spectrum of computer-based systems-from commercial Web browsers and personal virtual assistants to advanced intelligence gathering and command and control systems.
Protecting America With Information Technology
The U.S. Defense Department is introducing a new tool to protect military installations by transforming force-protection information sharing from a hierarchical, service-centric model to a network-centric model. The system will allow subscribers to have a common awareness of all suspicious events that are taking place in their vicinity.
Navigating Against Terrorism
The U.S. Coast Guard is using a nautical tracking and collision avoidance system to monitor cargo ships entering American ports. Operating on internationally accepted standards, the technology permits law enforcement and intelligence agencies to automatically query data such as a vessel's cargo, crew roster, port of origin and destination.
Sound Surveillance Locates Shooters
The Washington, D.C., Beltway sniper shootings, military campaigns abroad and steadily increasing terrorist alerts have inspired the creation of a law enforcement tool that promises to improve security in local jurisdictions and on the battlefield.
Guarding Virtual Borders
Sky marshals, metal detectors and multiple identification checks may increase security in the corporeal world, but guarding the nation's information superhighway requires different tactics. And in the information age, homeland security must extend into the digital realm, or even a tiny crack could allow adversaries into some of the most important systems in the world today.