Search Results for "" Intelligence ""
Not finding what you’re looking for?
10 of 25000 Results
Tactical Networking Program Takes Aim at Mobile Targets
The U.S. Air Force is investigating the feasibility of a coordinated precision engagement system that will enable airborne units to more accurately target an adversary's mobile ground and surface units. Using advanced sensor systems designed for next-generation fighter and surveillance aircraft, service officials hope to combine capabilities in existing air-to-ground missile systems to detect and track seagoing or land-based vehicles from long range, in any weather.
Goalkeeper Blocks Incoming Submarine Shots
The U.S. Navy is developing a weapon that could someday protect submarines and surface ships from enemy torpedoes. Designed to serve as the last line in a layered defensive system, the device is a specialized small-diameter torpedo that tracks and destroys incoming underwater projectiles.
Air Force Researchers Set Stratospheric Goals
Autonomous batwing aircraft, boomerang-shaped surveillance vehicles, hypersonic exoatmospheric bombers and rapid-turnaround space launchers may be leading Air Force wings in this new millennium. As the F-22 becomes operational and the Joint Strike Fighter undergoes selection testing, Air Force scientists are pursuing extraordinary new vehicles that reflect the service's maturing mission as well as revolutionary capabilities.
Sensors Take on Multitasking Activities
Future U.S. Air Force sensors will serve multiple roles as detectives, guards, messengers and avengers. New active and passive systems will network, exchange information, formulate opinions and even lead the fight against adversaries on the ground and in the air.
Software System Slices Search Time
The U.S. Air Force is spearheading the joint community's pursuit to meet the need for speed-in a realm other than aircraft. A Web-based system developed by the service is providing the boost that commanders and intelligence specialists need to attain the goal of striking a target within seven minutes of a command to attack.
Intelligence Enters the Fray
U.S. Air Force intelligence, surveillance and reconnaissance is relinquishing its separate identity and becoming an integral part of air combat operations. Sensor advances and the advent of network-centric warfare have both increased the discipline's importance and compressed the time required to carry out its mission taskings.
Military Aims to Cache in on Stored Data.
Although it is not as glamorous as smart weapons or miniaturized sensors, data storage is emerging as an increasingly important issue in the U.S. military. As the services continue to move toward a networked force, U.S. Defense Department leaders are beginning to pay close attention to how and where to store the data and images that sophisticated technologies are gathering in enormous quantities. After all, it not only has to be kept somewhere, but it also must be readily accessible to be valuable.
Bend Light, Store Bytes
From clay tablets to magnetic tape, civilizations have found ways to store important information; however, the silicon revolution has led to an overabundance of data. While existing electronic media have kept pace with this demand, new technologies could offer massive storage coupled with fast retrieval.
Digital Storage Dynamos Ease Data Deluge
The increasingly heavy flow of data within organizational networks is driving the search for better methods to store actively used information and archives. Advances in optical-disc technology are producing greater versatility in multimedia hardware and software. As a result, consumers will soon achieve increased systems interoperability through a more refined focus on equipment compatibility.
Insider Cybercrime Finds No Place to Hide
Advances in computer network security are empowering network-dependent organizations to address the sobering fact that a majority of threats to proprietary information today originate within the pool of authorized users. A new off-the-shelf software application that monitors the flow of data through a network enables organizations to counter internal threats to sensitive information by identifying the source of a violation. The U.S. Defense Department is exploring the software as a way to address its security concerns.