Search Results for "" Technology ""
Not finding what you’re looking for?
10 of 25516 Results
Biometric Defense In Depth
A recently developed software application will allow organizations to design layered access systems that scan individuals to recognize facial features, voices and lip movement characteristics. The program permits the deployment of a variety of digital-camera-based devices in kiosks and stations or desktop and laptop computers to control and monitor admittance to secure areas, networks or individual pieces of equipment.
Governments, Industry Must Coordinate Homeland Security Measures
The terrorist attacks of September 11 put the nation's critical information infrastructure to the test, and members of industry, the military and all levels of civil government came away from the experience with a new sense of urgency to work cooperatively to address the challenges revealed that day. According to security experts, existing emergency response infrastructures must be strengthened, critical information infrastructures must be protected and information exchange among federal, state and local law enforcement organizations must be expedited.
Potent Guns, Peering Dragons
Unmanned aerial vehicles the size of model airplanes, ruggedized minicomputers that automate calls for air support and remotely controlled rifled mortar capabilities will change the way the U.S. Marine Corps fights on future battlefields. Armed with information they can safely gather about what lurks over the next hill, front-line troops will be able to send accurate data to pilots and commanders so they can respond expeditiously with appropriate fire support.
Keeping the Lines of Communication Open
Although industry shoulders the ultimate responsibility for the health and well-being of the U.S. telecommunications infrastructure, the federal government is working to ensure the continued operation of systems that touch almost every aspect of life-from emergency services to economic stability. Key among the government's concerns are the security and reliability of the systems on which national security and emergency preparedness depend.
U.S. Forces Face Transformation Amid Combat
The military services must accelerate their incorporation of new technologies and methodologies to ensure victory in the war on terrorism, and information systems lie at the heart of these efforts. These technologies are likely to be the glue that bonds conventional and unconventional forces, the cornerstone of homeland security and the basis for ensuring continued military supremacy in all situations around the globe.
Planting Our Seed Corn
As the world barrels headlong into the information age, a growing trend is beginning to alarm many experts in academia, industry and government. Despite the attractiveness of information technology (IT) as a profession, our prime stock of engineers and IT professionals has, by and large, been in our industry for more than 15 years.
Ultrawideband, Free But Not Clear
After considerable interagency debate, the U.S. government has approved ultrawideband radio technology for commercial use. Ultrawideband devices operate across a wide spectrum range instead of a specific frequency. This allows for more efficient spectrum use at lower power levels and presents a possible solution for bandwidth-starved wireless providers. Other applications include ground-penetrating radar, imaging, surveillance and medical systems. However, issues such as possible interference with navigation and commercial aviation systems must be resolved before the technology gains wider acceptance.
Technology Enables Multichannel Satellite Links
The Internet protocol revolution is reaching satellite video communications with a new system that permits transmitting tens of thousands of channels over a single orbital transponder. Users can leapfrog existing satellite video limitations with two-way virtual private networks that can carry streaming video without a hitch.
Free World Nations Face Multifaceted Threats
Networked terror groups, domestic radicals, renegade states and terror for profit all threaten Western democracies to an unprecedented degree. Prospective targets might be high-profile infrastructure assets with the potential for high casualty totals, or they might simply take the form of attacks on public institutions to rapidly erode confidence in governments.
Legacy Organizations Hinder Intelligence Effectiveness
As successful as operation Enduring Freedom has been on the battlefields of Afghanistan, the lack of organizational reform in domestic U.S. agencies threatens the battle on the war's other front-the United States. Despite increased security measures and the heightened state of alert on the part of the public, the country is still highly vulnerable to further attacks by terrorists.