Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3754 Results
Army Makes a Point of Putting Lasers on Vehicles
Warfighters gain speed-of-light firing and pinpoint precision.
Image
Weaving a Web of Synthetic Persistence
The latest trend in intelligence requires a broad range of cooperation among government, industry and academia.
Image
Command Swells With New Responsibilities
In the cell phone business, it’s all about the network, but in the military world, it’s about the information that rides on that network. The type commander in charge of the U.S. Navy’s networks set sail a mere five years ago, but in that short period of time, its mission has grown and shifted with equal emphasis on the security of the systems and the intelligence they carry. Along the way, the command has picked up a few new responsibilities, including becoming the primary authority to ensure the homogeneity of the service’s communications systems.
DARPA to Increase Artificial Intelligence IQ
Researchers wrestle with how to represent human knowledge in a machine.
Image
AI/ML, More Than Buzzword Bingo
Defense speakers discuss the realities of artificial intelligence and machine learning.
Image
Recent Events Test Pacific Command Agenda
New threats vie with old challenges in a time of shrinking resources.
Image
Innovation, Diversification Define CENTCOM Communications
The U.S. Central Command is juggling new technologies with new missions amid joint and coalition environments as it fights adversaries that change tactics quicker than the command can upgrade equipment. Many of the command’s communication and information system requirements mirror those of other U.S. commands. However, the acid test of combat is highlighting capabilities and drawbacks of many new tactical systems in ways that could change long-range planning for defensewide communications.
Debunking Information Security Myths
Viruses, worms, hackers, spam, disgruntled employees, flawed software, terrorists-cyberspace is rife with danger, but defending information has some pitfalls of its own. Information security specialists are the front-line warriors in this battlespace, and they may be making important decisions about which weapons to use based on misconceptions often promulgated by security product vendors. Industry experts have taken a closer look at some commonly held information assurance beliefs and claim that many are little more than myths.
Breaking the Mold for Contracting Related to the Army's NGC2
U.S. Army Futures Command leaders seek improvements to the contracting process for the new command and control architecture.
Image
Direct-to-Device Brings Seamless Satellite Service to End Users
The capability offers great promise to the U.S. military, but not without challenges.
Image