Latest stories

  • Christian Roth: Lockheed Arm, Copenhagen Airport Form Analytics Consulting Service
    in ,

    Christian Roth: Lockheed Arm, Copenhagen Airport Form Analytics Consulting Service

    A Lockheed Martin subsidiary has partnered with the Copenhagen Airport in Denmark to provide a data insights consulting service to other airports to use for support operational planning. Lockheed said Friday its BEONTRA subsidiary and CPH will jointly work with airports to analyze and optimize their data as they seek to manage costs in airport operations. “After working closely with Copenhagen Airport and […] More

  • Padmasree Warrior: Cisco, Red Hat Expand Cloud Deployment Partnership
    in ,

    Padmasree Warrior: Cisco, Red Hat Expand Cloud Deployment Partnership

    Cisco and Red Hat have introduced a new suite of integrated infrastructure service to deploy cloud environments for customers. Padmasree Warrior, chief technology and strategy officer at Cisco, said Thursday that the companies are also “expanding their relationship and accelerating collaboration around OpenStack, Application Centric Infrastructure and Intercloud.” Cisco’s UCS integrated infrastructure services work to streamline OpenStack-based private cloud operations for customers […] More

  • DRS Completes Design Review for ‘Mojave’ TLDS Precision Targeting Tool
    in ,

    DRS Completes Design Review for ‘Mojave’ TLDS Precision Targeting Tool

    DRS Technologies moved closer to contracting its Target Location Designation System with the recent conclusion of the product’s critical design review. The milestone finalizes the engineering and production processes of the TLDS, dubbed the Mojave, designed to speed up and refine target engagement in battlefield operations, DRS said Tuesday. “[The DRS team] is actively working toward […] More

  • Unisys’ Francis Ofungwu: Data Discovery, Monitoring Are Protection ‘Building Blocks’
    in ,

    Unisys’ Francis Ofungwu: Data Discovery, Monitoring Are Protection ‘Building Blocks’

    All network security strategies are centered on protecting sensitive data and the success of such a measure relies on organizations’ understanding of both internal and external interactions with the data, according to Francis Ofungwu of Unisys. Ofungwu, director of network security services at the company, writes in a post published Thursday that organizations must perform data discovery, data isolation and monitoring […] More

  • Dave DeYoung: Boeing, Army Test High Energy Laser Demonstrator in ‘Challenging’ Weather
    in ,

    Dave DeYoung: Boeing, Army Test High Energy Laser Demonstrator in ‘Challenging’ Weather

    Boeing and the U.S. Army have tested a company-built laser system to evaluate how the technology targets aerial objects through rough conditions. The High Energy Laser Mobile Demonstrator used an Oshkosh-vehicle-installed laser to destroy targets during the demonstration at Eglin Air Force Base in Florida, Boeing said Thursday. “Under windy, rainy and foggy weather conditions in Florida, these engagements […] More

  • FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments
    in ,

    FireEye Threat Analysis Seeks to Reduce Alert Noise; Grady Summers Comments

    FireEye has unveiled a new threat analysis tool for Amazon Web Services that is designed to filter security alerts during event data monitoring. The FireEye Threat Analytics Platform uses the company’s intelligence technology to provide context to event data, FireEye said Wednesday. Insights from the security analytics tool then give clients the opportunity to prioritize suspected […] More

  • Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool
    in ,

    Rob Lipowski: Piedmont Healthcare Selects Lexmark Image Mgmt Tool

    Lexmark will work with Piedmont Healthcare to consolidate the healthcare system’s medical image management by deploying the company’s content and process management tool. Atlanta-based Piedmont Healthcare selected Lexmark’s Perceptive Acuo Vendor Neutral Archive to manage diagnostic imaging studies and migrate existing research into Perceptive Acuo, Lexmark said Wednesday. “The Perceptive Acuo Vendor Neutral Archive was selected to initially work with Piedmont Healthcare’s radiology and cardiology […] More

  • Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface
    in ,

    Dell-HP-Intel-Emerson Alliance Develops Data Center Mgmt Interface

    A consortium comprising of Dell, Hewlett Packard, Intel and Emerson‘s network power business has developed a technical industry standard to help administrators manage, secure and modernize data center systems. Redfish network interface is designed to make different server platforms interoperable and extract insights from big data to improve system monitoring, the companies said Thursday. The […] More

  • HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines
    in ,

    HumanTouch’s James Benson: Agencies Wary of Risk in IT Procurement Timelines

    Platform-as-a-service gives federal agencies a tool to support their initiatives on cloud computing and data center consolidation but many have not embraced PaaS due to several reasons, James Benson of HumanTouch says. Benson, a HumanTouch senior vice president, wrote in a post for GCN published Thursday that he believes some system integrators are hindering federal adoption of PaaS despite its functions in application […] More

  • Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms
    in ,

    Verizon’s Kevin King Outlines Strategies to Counter Cyber Attacks on Cloud Platforms

    Kevin King, external communications director at Verizon Enterprise Solutions, has laid out strategies for enterprises to protect their cloud infrastructure from cyber attacks. King wrote in a blog post published Wednesday that businesses must develop security protocols such as multifactor authentication, role-based access controls, log monitoring, application vulnerability scanning and security governance. He urged enterprises to provide information on […] More

  • RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts
    in ,

    RSA, TeleSign Combine Authentication Tools to Protect Online User Accounts

    RSA and TeleSign have partnered to add a phone-based verification service to an RSA technology offering that works to help organizations prevent fraudulent transactions on their web portals. Telesign said Wednesday it will provide voice or SMS one-time passwords for users of RSA’s Adaptive Authentication fraud detection platform. Adaptive Authentication is designed to evaluate login […] More