Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25000 Results
Express Launch To Space
Within the next decade, the U.S. Air Force plans to field a rapidly deployable satellite launch capability to support joint and coalition operations around the world. By working with the national research and development community, the service aims to identify and nurture technologies that will enhance the nation's military space efforts.
Mobile Robots Learn Self-Reliance
A new generation of autonomous, problem-solving robots will soon be entering commercial service. Recent advances in computer processing power have allowed researchers to design prototype machines that can navigate in unfamiliar surroundings unassisted. Using a variety of sensors, the robot creates a constantly updated three-dimensional map as it goes through its routine. It is this self-navigation that is finally placing mobile robotic systems on the verge of commercial viability, scientists say.
Shrewd Acquisitions Grow Business
Ken Dahlberg sometimes likens his burgeoning high-technology business to a high-speed ride at a Disney theme park. No, he is not being sarcastic-far from it.
In just six years, Dahlberg's information systems and technology (IS&T) group at General Dynamics has become one of the largest and most respected outfits selling technology services to the nation's defense and civilian agencies.
Re-engineering Defense Research And Development
U.S. Defense Department science and technology investment is transcending the requirements model of the past in a shift from threat-based to capabilities-based thinking. While researchers are examining areas such as avionics, materials and nanotechnology, military leaders are exploring how cutting-edge developments can move more quickly from the laboratory to the field.
Computer Language Seeks Deeper Meaning
U.S. Defense Department researchers are developing software that may be capable of accurately understanding the nuances of human language. The technology promises to greatly enhance a spectrum of computer-based systems-from commercial Web browsers and personal virtual assistants to advanced intelligence gathering and command and control systems.
Information Assurance—Train Now or Pay Later
Last year, I discussed in my commentary how information must be available-as freely as oxygen in the air-to virtually everyone. In presenting this point of view, I offered that power lies in how one uses information.
Information Technology Drives Tip of Airborne Spear
The deep thrust into Iraq by the U.S. Army's 101st Airborne Division in operation Iraqi Freedom was enabled as much by kilobytes as by helicopters. An advanced command, control and communications architecture allowed the geographically dispersed mobile forces to remain in contact with their individual commanders as well as with the division headquarters.
Complexity, Flexibility Enable Air Assault Network
The battlespace network trialed in the woods of Kentucky and grown from the sands of Kuwait provided the necessary connectivity for the U.S. Army's 101st Airborne Division (Air Assault) to strike deep into Iraq. Not all of the assets assembled and deployed by the division's 501st Signal Battalion were exploited to their fullest, and some proved more important than originally envisioned. Yet, the network linked the air assault division as its location and mission changed with the flow of battle.
Guarding Virtual Borders
Sky marshals, metal detectors and multiple identification checks may increase security in the corporeal world, but guarding the nation's information superhighway requires different tactics. And in the information age, homeland security must extend into the digital realm, or even a tiny crack could allow adversaries into some of the most important systems in the world today.
Protecting America With Information Technology
The U.S. Defense Department is introducing a new tool to protect military installations by transforming force-protection information sharing from a hierarchical, service-centric model to a network-centric model. The system will allow subscribers to have a common awareness of all suspicious events that are taking place in their vicinity.