Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25007 Results
Managing Performance in the Public Sector
Christopher Dorobek, writing in this month's Incoming column, addresses a major question for public managers: Just what is the best way to manage in the public sector? During the 1990s, many government agencies were trying valiantly to put performance standards into place, and took many cues from the private sector. But as Dorobek notes in Ending Government's Private-Sector Envy, government is very different from private industry.
Appliqués Speed New Technologies To the Front
U.S. Army researchers are speeding innovations to the battlefield by attaching them to system upgrades or adding them to large programs on the verge of fielding. The prevalence of software-driven systems allows for non-hardware improvements, and the modular nature of an increasing number of systems allows for new developments to be incorporated into them without adversely affecting their timeline or performance.
Echelons and Partners Soon Will Be on Common Ground
The U.S. military and its allies have embarked on a project to distribute and standardize geospatial information across all echelons of command. It is no secret that the United States and its allies are facing an agile, adaptive enemy. The danger of this reality is spurring coalition forces to alter how they disseminate information and intelligence, ensuring that commanders have the information they need in a timely manner.
Image Tagging Stores Vital Data
A data capture and marking technology permits images to describe where and by whom they were taken. The capability allows warfighters to take photographs on the battlefield that have embedded location coordinates and other data. These coded images then are loaded onto digital maps of a region. Studded with hyperlinked information, these maps provide commanders and analysts with immediate information about their operational zones.
Colossal Computing Power, Itty Bitty Storage Space
It’s a paperback! It’s a belt buckle! No, it’s a supercomputer! It’s a wearable supercomputer, actually, and it can clip onto a belt so users can take it anywhere they need to go. The product is part of a larger project designed to deliver the capabilities of a simulation center to warfighters instead of requiring them to travel to special facilities. If all goes according to plan, service members can expect the powerful new hardware as well as software and applications to transform their training when they receive the technology. And even if the plan goes awry, the open-source basis for the simulation still could benefit the military.
Blanketing The Ground With Sensors
The proliferation of inexpensive yet high-quality transducers for acoustic, seismic and optical images, along with inexpensive and low-power digital signal processing and radios, enable improved target detection, classification, tracking and even location prediction. These capabilities are being demonstrated now in the prototypes of the U.S. Army’s Future Combat Systems Tactical Unattended Ground Sensor Program.
Innovations Will Rock Commercial Sector
Businesses, be aware and prepare. The latest wave of digital disruptions is rolling in, and future success depends on being ready for them and their effects. A comprehensive yearlong study reveals that, in the next three to five years, emerging technologies will reshape industry and initiate new business models.
Launching Stealth Warfare
The next “shot heard ’round the world” may turn out to be the surreptitious movement of millions of bits and bytes careening through cyberspace. Suspicions already surround the cyberactivity that took place in the weeks before Russia launched a conventional military attack against Georgia last year. And in May 2007, the removal of a bronze statue of a World-War-II-era Soviet soldier from a park in Estonia resulted not in riots in the streets but rather in what has been described as the first war in cyberspace. These incidents may indicate how adversaries—and the United States military—could deploy cyberweapons as the first line of offense prior to traditional kinetic activity.
Changing Strategy for Computer Network Defense
Modeling initiatives and new research into predictive systems are required to thwart the increasingly aggressive, ever-evolving cyberattacks on both equipment and data. These efforts are part of the recommendations of a recent report by the U.S. Department of Energy that calls for a more scientific approach to cybersecurity. The report criticized U.S. government and private organizations for relying on outdated forms of cyberdefense that are a step behind the latest threats.
Government Works to Stop Actual Bad Guys In the Virtual Realm
The dark-hearted members of the human race have found ways to exploit innovations for their own selfish means throughout time. Now, with the ever-growing global dependence on computer networks, criminals are finding new ways to disrupt lives in the real world through enterprise in the cyber one. The U.S. Department of Justice and its allies have adapted their methods and techniques over the past decade and continue to adjust to prevent the morphing illegal activities in cyberspace, whether the computer crime itself is the full intent or only part of a larger scheme.