Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 25035 Results
Testing and Evaluation Nurture Valuable Simulation Expertise
Engineers are applying information technology practices to create complex simulations that go beyond the reach of existing single systems. Extensive simulations that model large-scale military operations can be generated by networking established systems to produce data in near real time.
Turbo Codes Offer Broadcasting At Near-Channel Capacity
Engineers are using a new class of algorithms capable of encoding and decoding communications at speeds close to transmission channel maximum capacities, a feat that has eluded engineers since the 1940s when a theoretical limit to channel capacity was first defined. Under development since the early 1990s, these algorithms are now being tested in proof-of-concept devices.
Technology Provides Dynamic Bandwidth In Wireless Broadband Access Systems
An evolving technology promises efficient spectrum use to enable bandwidth on demand in wireless broadband access systems. The technology is being implemented in point-to-multipoint systems operating across the millimeter wave region to provide wireless communications transmissions.
Digital Libraries Extend Longevity of Programmable Communication Tools
Internet accessible data libraries are looming as an important element in the continuing evolution of communications devices. By being able to hold a variety of waveform and signal processing algorithms on chips and in databases, these information storehouses give users enhanced flexibility in selecting specific material when and where they need it.
Evolving Procurement Products Transform Business Operations
While blazing a trail on the frontier of paperless contracting, the U.S. Defense Department is discovering that a new set of opportunities and challenges emerges from change in the workplace. As in any formidable military operation, its leaders are striving to complete the mission successfully, while gathering information to share with others who are sure to follow the path to more efficient business practices.
The World Needs an International Approach to Information Security
If knowledge is power and information is a force multiplier, then security is the key to defense and commercial supremacy in the information age. Any kind of strength, whether military or economic, represents a target for adversaries or competitors. Information, however, is to modern civilization what fire was at the dawn of humankind: an unlimited asset that, if not controlled, quickly can be turned against its user.
Hidden Hazards Menace U.S. Information Infrastructure
The greatest threat to U.S. security may come from internal software or hardware trapdoors lying dormant in the nation's critical infrastructure. The digital equivalent of Cold War moles, these hidden threats would serve as access points for criminals, terrorists or hostile governments to extort money, impel foreign policy appeasement or ultimately launch crippling information attacks on the United States.
Minuscule Combination Lock Safeguards Silicon Capital
The mechanical principles that protect personal belongings inside a high school locker may hold the key to guarding digital assets. Creators of a miniature combination lock, which consists of six gears that together are the size of a shirt button, believe the device guarantees that systems can be shielded from invasions with a one-in-a-million chance that an intruder can break the code.
Digital Credentials Kick Off New Commerce Procedures
The company that created the secure sockets layer to manage network message transmission security, and today opens the Internet to tens of millions of people around the world, is now collaborating with the U.S. Defense Department to secure cyberspace communications and transactions.
Adaptive Response Tool Foils Hacker Intrusion
Software designers are applying artificial intelligence principles to new computer security systems. These tools and protocols create the potential for agile software capable of quickly identifying and responding to new threats.