Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 5254 Results
Self-Inflicted System Malfunctions Threaten Information Assurance
While the security industry concentrates on protecting systems from external threats, a danger to information access is brewing from within organizations. The expansion of and growing reliance on networks is jeopardizing military information technology by exposing numerous sectors and even entire commands to errors that are introduced internally by a single entity.
Defense Department's Achilles' Heel Targeted for Heightened Protection
The U.S. Department of Defense is not fully exploiting information technology in military operations and departmental procedures. For an organization that relies on information superiority and technological capabilities to put U.S. national defense at an advantage, the department is lax in thwarting potentially devastating threats to its information systems.
Social, Criminal Protagonists Engage in New Information Age Battle Techniques
Just as information system users are becoming accustomed to the concept of cyberwar, a new form of information conflict is emerging that rests on a completely different set of principles. Popularly known as netwar, it is based on a strategy of accessing a network, not to destroy it but to maintain and operate it as a tool to gather support and maintain communications.
Military Research Reorganization Consolidates Technologies, Goals
Smart mobile mines, underwater attack trumpets and an artificial dog's nose are some of the products that may emerge from a newly reorganized defense research office. The reorganization reflects a growing interdependence among various electronics technologies, according to defense officials.
Remote Computing Utility Eases Interface Problems
Researchers at one federal agency are adding a new dimension to remote access computing via the Internet. A computer program created through research at the agency provides a web-based interface that simplifies command-driven queuing systems and applications environments. Without extensive expertise in complicated command language, users can now perform computing tasks on remote systems as if directly connected to them.
Commercial Components Feed Electronic Warfare Systems
Integrated signal processors are the buzzword for new electronic warfare suites designed for adaptability across a broad range of threat environments. Embedding these commercial off-the-shelf devices in sea- and airborne signals intelligence platforms both increases interoperability and reduces the likelihood of rapid obsolescence.
Information Age Warfare Must Enlist Civilian Partnerships
Not since the second American revolution has the United States had to defend its homeland, yet the country is not much better prepared today than it was when much of Washington, D.C., was torched by an invading military force during the War of 1812.
Scientists Search for Deep Ultraviolet Light Successor
Extreme ultraviolet lithography, a technology being developed by a consortium of U.S. national laboratories and the semiconductor industry, is a strong contender to produce new generations of computer chips with features perhaps as small as 30 nanometers.
Fourth Wave Advanced Technologies Affect Electronic Intelligence, Warfare
Next-century warriors will face a radically different electronic warfare and electronic intelligence environment in the information age battlespace. Rapid advances in technology will profoundly influence 21st century conflicts because highly advanced systems will provide greater situational awareness, higher quality threat assessment, and more accurate, timely automated matching of active signals with the resources of widely distributed libraries. Operators and analysts will be able to collaborate in real time within a distributed virtual environment. They will configure, launch and control highly efficient software agents to conduct geographically widespread tasks and accomplish complex analyses within a changing operational context efficiently and quickly.
Electronic Threats Fall Prey to Fast Moving Simulation Laboratory
As a first point in the United States' electronic combat test process, researchers strive to re-create electronic warfare accurately to challenge the effectiveness of hardware against hostile threats. A major link in this process is the U.S. Air Force Electronic Warfare Evaluation Simulator in Fort Worth, Texas, which can evaluate defensive systems against most known threats and can respond quickly to newly discovered threats.