-
SyTech Corporation and communication interoperability, I
The lack of communication interoperability among first response, rescue teams, and law enforcement during the 9/11 attacks and Hurricane Katrina was only the most dramatic and poignant demonstration of a persistent and debilitating flaw in U.S. agencies’ planning for disaster — and performing during disaster; communication interoperability is essential not only in disasters, but for routine, every-day operations of law enforcement; SyTech’s comprehensive approach to interoperability offers a solution
-
-
Using emergency alerting systems to protect the U.S. critical infrastructure // by Simon Berman
Learning from the experiences of the U.S. Department of Defense
-
-
The WiMax interoperability solution // By Daniel Zubairi, CISSP
Conversation with Mark Adams, chief architect of mobility at Northrop Grumman, on using WiMax for public safety and civil defense
-
-
Business praises proposed foreign investment rules
The U.S. Treausry Department has proposed new rules to govern foreign investment in U.S. critical infrastructure assets; business and industry groups welcom new rules
-
-
Potholes wreak havoc on Ontario's infrastructure
Harsh winters, age, and neglect threaten Ontario’s infrastructure; potholes are created when moisture from rain and thawing snow finds its way into cracks and crevices in road surfaces and then expands during rapid freezes to damage the asphalt; potholes not only hamper traffic, but expose water mains and electrical wires buried beneath roads
-
-
Weather service offers Chicago HAZMAT support page
The U.S. National Weather Service offers Chicago-area critical infrastructure plants area-specific information on weather patterns so that can better cope with accidents and disasters
-
-
U.K. faces wave of data security breaches
The state of personal data security in the United Kingdom is not good; in the last six months, nearly 100 incidents of data security breaches by government agencies and private sector companies were reported
-
-
China may have back door into U.S. military computer networks
A technological sleeper cell: The Chinese have manufactured counterfeit Cisco routers and switches and offered them at exceedingly low prices; U.S. vendors upgrading or replacing U.S. government IT systems used these counterfeit devices — and the FBI and other government agencies are now worried that the gear offers the Chinese undetectable back-doors into highly secure government and military computer system; the FBI investigates
-
-
Wireless cyber security center opened
Lockheed Martin opens lab which will allow defense and intelligence agencies to test systems like 802.11 Wi-Fi or broadband satellite links on a Top Secret / Sensitive Compartmented Information (TS/SCI) network
-
-
How much water is needed to produce various types of energy?
Most of the energy we consume requires the use of water for its generation; water is a dwindling resource, so researchers wanted to know how much water is required to produce different types of energy
-
-
NTR invests in SES
Irish renewable energy company buys controlling interest in SES; SES is developing two of the world’s largest solar generating projects in the Imperial Valley and Mojave Desert
-
-
Sustaining bridge infrastructure through Bridge Information Modeling
Bentley offers end-to-end bridge solution which will allow bridge engineers to create and renovate bridge infrastructure
-
-
AWWA urges scientific approach to pharmaceuticals in drinking water
The sky may not be falling: Stories about pharmaceutical traces in U.S. drinking water abound, but an expert from Southern Nevada Water Authority testifies before Senate subcommittee that worries about the ill effects of such traces are exaggerated
-
-
Emerging water contaminants a growing worry
As worries about pharmaceutical contamination of U.S. drinking water increase, a non-profit organization increases its efforts to build a coalition of organizations to research the issue
-
-
New method for protecting private data
Researchers develop new method for protecting private data; called “functional encryption,” the new approach will not only help to simplify the encryption of data in servers but will also allow access to the data in an intuitive way, making it much harder for hackers to gain access to sensitive information but much easier for programmers to secure it
-