Not finding what you’re looking for?
Technology Provides Dynamic Bandwidth In Wireless Broadband Access Systems
An evolving technology promises efficient spectrum use to enable bandwidth on demand in wireless broadband access systems. The technology is being implemented in point-to-multipoint systems operating across the millimeter wave region to provide wireless communications transmissions.
Digital Libraries Extend Longevity of Programmable Communication Tools
Internet accessible data libraries are looming as an important element in the continuing evolution of communications devices. By being able to hold a variety of waveform and signal processing algorithms on chips and in databases, these information storehouses give users enhanced flexibility in selecting specific material when and where they need it.
Evolving Procurement Products Transform Business Operations
While blazing a trail on the frontier of paperless contracting, the U.S. Defense Department is discovering that a new set of opportunities and challenges emerges from change in the workplace. As in any formidable military operation, its leaders are striving to complete the mission successfully, while gathering information to share with others who are sure to follow the path to more efficient business practices.
The World Needs an International Approach to Information Security
If knowledge is power and information is a force multiplier, then security is the key to defense and commercial supremacy in the information age. Any kind of strength, whether military or economic, represents a target for adversaries or competitors. Information, however, is to modern civilization what fire was at the dawn of humankind: an unlimited asset that, if not controlled, quickly can be turned against its user.
Hidden Hazards Menace U.S. Information Infrastructure
The greatest threat to U.S. security may come from internal software or hardware trapdoors lying dormant in the nation's critical infrastructure. The digital equivalent of Cold War moles, these hidden threats would serve as access points for criminals, terrorists or hostile governments to extort money, impel foreign policy appeasement or ultimately launch crippling information attacks on the United States.
Minuscule Combination Lock Safeguards Silicon Capital
The mechanical principles that protect personal belongings inside a high school locker may hold the key to guarding digital assets. Creators of a miniature combination lock, which consists of six gears that together are the size of a shirt button, believe the device guarantees that systems can be shielded from invasions with a one-in-a-million chance that an intruder can break the code.
Digital Credentials Kick Off New Commerce Procedures
The company that created the secure sockets layer to manage network message transmission security, and today opens the Internet to tens of millions of people around the world, is now collaborating with the U.S. Defense Department to secure cyberspace communications and transactions.
Adaptive Response Tool Foils Hacker Intrusion
Software designers are applying artificial intelligence principles to new computer security systems. These tools and protocols create the potential for agile software capable of quickly identifying and responding to new threats.
Trading Partners Clash On Data Privacy Policy
The debate between the European Union and the United States over protecting personal information represents a fundamental cultural difference that could alter the future growth of electronic commerce. Throughout this debate, these differences have threatened to bring data transfers from within the European Union to the United States to a grinding halt.
British Command and Control Moves Into the Fast Lane
Monitoring force status, planning campaigns and disseminating orders soon may take minutes instead of hours as the British Army implements a new command support system. Its two-dimensional map display and manipulation features graphic task organization, drag-and-drop document and message handling, operational log keeping, extensive database reference, and task planning and management. A mouse would be used as a primary interface to activate functions or show whatever is desired on top of displayed mapping.