Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25000 Results
Smart Software Sniffs Out Trouble
A security management system allows administrators to track computer network threats by providing near-real-time alerts from remote sensors on the network. Software agents, tailored to be expert monitors of specific programs and devices, use rules sets to sift through data before sending reports to a central management engine that tracks and correlates the information. Thousands of potential alerts then are analyzed and reduced to one or two dozen incidents that require immediate attention.
Asymmetric Threats Dominate Defense Planning
U.S. military forces face diverse challenges as they defend national security in the post-Cold-War ear. Dealing with these threats will require both technological solutions and new tactics and techniques. These were some of the views expressed at Tampa TechNet 2001, co-sponsored by the Tampa-St. Petersburg Chapter and AFCEA International.
Battlefield Cognizance Tool Points to Future
A prototype personal communications and situational awareness system may provide U.S. warfighters with an advantage in tactical combat. The device will link soldiers to a mobile voice and data network with the capability to share important information among individuals and entire units. A built-in inertial geolocation subsystem will enable troops to determine their location even if global positioning system signals are jammed or unavailable.
Making the Whole Greater Than the Sum of Its Parts
The ongoing revolution in battlefield information systems has generated an intriguing irony. Information technology is empowering individual warfighters far more now than ever before, yet at the same time it is tying them together to an unprecedented degree. On the one hand, soldiers, sailors and airmen are able to serve more roles and to undertake actions of greater significance, as they are both armed with increased amounts of information and capable of providing more vital data to other warfighters and decision makers. On the other hand, these individuals are tied to each other to a greater degree in the network-centric battlefield. As their importance as individuals has increased, so has their importance as nodes in a network. This opens up a host of challenges in areas ranging from technology to doctrine and culture.
Military Marches Toward Harmonized Acquisition Processes
As the Standard Procurement System reaches the installation halfway point, U.S. Defense Department officials are highlighting how the technology makes the department more responsive to Congress and the American taxpayer. Although some personnel are still wary of the new system, the department is forging ahead, and the U.S. Army has adopted additional capabilities that save time and money.
Security Concerns Grow as Technology Tools Shrink
Although good things may come in small packages, a handheld device that carries the power of a personal computer raises large information security issues. As more military service members employ cellular telephones, pagers and personal digital assistants to keep track of schedules or to perform duties, their leaders must address the new threats these pocket-sized devices pose in the workplace.
Dawn of the Refuelable Laptop
Miniature fuel cells are poised to replace batteries as the power source of choice for handheld communications and electronics equipment. Tests with prototypes indicate that these devices can generate more power, last longer and remain more environmentally friendly than existing batteries.
Reasoning System Thinks One Step Ahead of Adversary
A probability analysis program could enable surface and air military units to better predict a vehicle's or a missile's next move by discerning the likelihood that its track will either change or remain constant. Applying the same reasoning formula to study an entire mission, the system could combine factual and hypothetical data to predict the direction an enemy will take and produce theoretically sound solutions to tactically complex scenarios.
Internet to Deliver Ubiquitous, Invisible Connectivity
The worlds of wireless and Web-based technology are converging in a new generation of linked networks that could produce a vast computing and communications infrastructure based on the interaction of currently exclusive technologies. The integration of these independent communication architectures will result from a gradual dissolution of the physical boundaries of today's Internet, enabling the realization of a broader view of everyday computing.
What Sank Internet Commerce?
The economic wave that started out as a Tsunami has lost momentum, and the high tide of World Wide Web surfers as devoted consumers is beginning to ebb. Online start-up company owners who thought they would catch a wave and be sitting on top of the world have been caught in an undertow. Established firms that poured millions of dollars into creating an online presence are discovering that the same tried-and-true business practices that keep traditional business afloat are just as necessary in the cybermarketplace.