Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 25036 Results
Rapid Commercial Response Links Australian East Timor Forces
Faced with a burgeoning humanitarian crisis amid a virtually nonexistent communications infrastructure, Australian peacekeeping forces worked with private industry to establish a broadband network in the heart of East Timor that included connectivity with other peacekeepers as well as their own national headquarters in Australia.
Fusion Center Concept Takes Root As Congressional Interest Waxes
Creation of a national operations and analysis hub is finding grudging acceptance among senior officials in the U.S. national security community. This fresh intelligence mechanism would link federal agencies to provide instant collaborative threat profiling and analytical assessments for use against asymmetrical threats. National policy makers, military commanders and law enforcement agencies would be beneficiaries of the hub's information.
Security Product Trust Demands Laboratory Test and Evaluation
Uncertainty surrounding a patchwork of commercial information security products hurriedly placed in use on U.S. Defense Department computers and networks is reshaping policy. Successful test and evaluation of these products in specified laboratories will soon become a prerequisite for procurement by military services and defense agencies.
As evaluation policy emerges, the National Security Agency (NSA) is embarking separately on a major long-term program to modernize the inventory of high-grade cryptographic devices. The new cryptography will exploit technology to keep pace with modern communications as bandwidth applications change.
Layered Approach Security Planning Offers Best Defense Against Attacks
To protect information systems from security breeches, organizations increasingly are embracing a comprehensive strategy that relies on both technology and enforced policies. Meanwhile, the legal system has been hard pressed to keep pace with information system protection issues, leaving many questions unanswered about how far businesses may go to protect their systems.
Cable Company Maximizes Return on Network Investment
Jim Robbins, the Harvard-educated president of one of the nation's largest cable companies, was in southern California on a business trip when he decided to check his voice mail and got the stunning news that America Online had agreed to merge with Time Warner. The deal was not only the largest of its kind but one that promises to reshape how executives in a wide range of telecommunications businesses view the concept of convergence.
Futuristic Materials Inspired By Biological Counterparts
Researchers are tapping millions of years of biological evolutionary experience to develop the next generation of materials. This research, known as biomimetics, aims to incorporate properties unique to nature into manufactured devices.
Intelligence Is the Long Pole in The Information Operations Tent
Alarmed that its borders can easily be breached through technology in the hands of criminals, terrorists, nontraditional foes and even the merely inquisitive, the federal government has broadened the definition of national security. In doing so, it has established a timetable for erecting defenses, enlisted a host of recalcitrant bedfellows into its national security apparatus, and charged the intelligence and law enforcement communities to collaborate and perform what some believe without resources to be a near-Sisyphean task.
Tactical Radar System Adds Teeth To Perimeter Security Missions
A manportable sensor capable of detecting troops and vehicles up to 100 meters away offers commanders a variety of choices for defensive and surveillance operations. Consisting of a microwave Doppler radar unit and a passive infrared detector, the activated device transmits a message to a sentry who is equipped with a pager display that indicates the type of target and the direction it is moving.
Canada Harmonizes Score To Enter Digital Economy
The music of the e-commerce overture in Canada is getting louder and increasing in intensity. Even before year 2000 work began winding down, the country's government agencies began fine-tuning their ideas and following the lead of its prime minister in what has already become a global symphony of economic change.
Computing Opportunities Challenge Visionaries
Never before has the potential for significant sociological change resided so strongly-and so clearly-in the hands of technologists. Computers already are redefining virtually every aspect of human existence. The onset of the year 2000, along with Y2K computer bug concerns, caused many users to reflect on the importance of these information machines in their lives. In addition to streamlining many duties and opening up new applications, the ongoing evolution of computers also is changing the way that businesses, governments and their militaries interact with the people they serve.