Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5231 Results
Technology Provides Dynamic Bandwidth In Wireless Broadband Access Systems
An evolving technology promises efficient spectrum use to enable bandwidth on demand in wireless broadband access systems. The technology is being implemented in point-to-multipoint systems operating across the millimeter wave region to provide wireless communications transmissions.
Evolving Procurement Products Transform Business Operations
While blazing a trail on the frontier of paperless contracting, the U.S. Defense Department is discovering that a new set of opportunities and challenges emerges from change in the workplace. As in any formidable military operation, its leaders are striving to complete the mission successfully, while gathering information to share with others who are sure to follow the path to more efficient business practices.
Turbo Codes Offer Broadcasting At Near-Channel Capacity
Engineers are using a new class of algorithms capable of encoding and decoding communications at speeds close to transmission channel maximum capacities, a feat that has eluded engineers since the 1940s when a theoretical limit to channel capacity was first defined. Under development since the early 1990s, these algorithms are now being tested in proof-of-concept devices.
Trading Partners Clash On Data Privacy Policy
The debate between the European Union and the United States over protecting personal information represents a fundamental cultural difference that could alter the future growth of electronic commerce. Throughout this debate, these differences have threatened to bring data transfers from within the European Union to the United States to a grinding halt.
Software Algorithms Add Fuel to Processor Speed
A new twist on age-old logarithms may hold the key to faster computer microprocessors. An improved approach to logarithmic arithmetic is finally allowing it to compete with current algorithms used in the central processing units of computers.
British Researchers Plan Future Electronic Society
The 2020 citizen returns home from an afternoon of outdoor recreation to resume work. Recognizing him as he strides up the walkway to his door, his house's computers unlock the door and activate hallway lighting systems. As he walks through the house, environmental controls that are sensitive to his presence switch lights on and off and adjust each room's temperature. Similarly, his intelligent clothing loosens and thins out for greater body heat dispersal as he cools down from exertion.
Electronic Devices Poised to Enter Self-Communication Age
Virtually any device employing semiconductor technology soon may be able to communicate with its electronic siblings, cousins and even distant relatives. Research underway at an engineering institute, supported by private industry funding, aims to empower electronic components and everyday hardware to communicate with one another during the course of routine operations.
Self-Inflicted System Malfunctions Threaten Information Assurance
While the security industry concentrates on protecting systems from external threats, a danger to information access is brewing from within organizations. The expansion of and growing reliance on networks is jeopardizing military information technology by exposing numerous sectors and even entire commands to errors that are introduced internally by a single entity.
Defense Department's Achilles' Heel Targeted for Heightened Protection
The U.S. Department of Defense is not fully exploiting information technology in military operations and departmental procedures. For an organization that relies on information superiority and technological capabilities to put U.S. national defense at an advantage, the department is lax in thwarting potentially devastating threats to its information systems.
Social, Criminal Protagonists Engage in New Information Age Battle Techniques
Just as information system users are becoming accustomed to the concept of cyberwar, a new form of information conflict is emerging that rests on a completely different set of principles. Popularly known as netwar, it is based on a strategy of accessing a network, not to destroy it but to maintain and operate it as a tool to gather support and maintain communications.