Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
Army Makes a Point of Putting Lasers on Vehicles
Warfighters gain speed-of-light firing and pinpoint precision.
Image

Weaving a Web of Synthetic Persistence
The latest trend in intelligence requires a broad range of cooperation among government, industry and academia.
Image

Command Swells With New Responsibilities
In the cell phone business, it’s all about the network, but in the military world, it’s about the information that rides on that network. The type commander in charge of the U.S. Navy’s networks set sail a mere five years ago, but in that short period of time, its mission has grown and shifted with equal emphasis on the security of the systems and the intelligence they carry. Along the way, the command has picked up a few new responsibilities, including becoming the primary authority to ensure the homogeneity of the service’s communications systems.
DARPA to Increase Artificial Intelligence IQ
Researchers wrestle with how to represent human knowledge in a machine.
Image

AI/ML, More Than Buzzword Bingo
Defense speakers discuss the realities of artificial intelligence and machine learning.
Image

Recent Events Test Pacific Command Agenda
New threats vie with old challenges in a time of shrinking resources.
Image

Innovation, Diversification Define CENTCOM Communications
The U.S. Central Command is juggling new technologies with new missions amid joint and coalition environments as it fights adversaries that change tactics quicker than the command can upgrade equipment. Many of the command’s communication and information system requirements mirror those of other U.S. commands. However, the acid test of combat is highlighting capabilities and drawbacks of many new tactical systems in ways that could change long-range planning for defensewide communications.
Debunking Information Security Myths
Viruses, worms, hackers, spam, disgruntled employees, flawed software, terrorists-cyberspace is rife with danger, but defending information has some pitfalls of its own. Information security specialists are the front-line warriors in this battlespace, and they may be making important decisions about which weapons to use based on misconceptions often promulgated by security product vendors. Industry experts have taken a closer look at some commonly held information assurance beliefs and claim that many are little more than myths.
Collective, Connected, But Not Co-Located
I Corps Distributed Mission Command concept enables decision-making speed at a Pacific scale.
Image
