Business continuity, the process of ensuring that computer systems run in the event of an emergency, is receiving fresh attention in the government market, and not only because of the Sept. 11 terrorist attacks. In an increasingly networked world, business continuity has come to mean something new.
SRD Software of Las Vegas released a new version of ERIK, an identity recognition program that used to be called SI Warehouse. ERIK integrates data from disparate systems to match information about people and create a single profile.
	A recent study by Stamford, Conn.-based Gartner Research found that converging network technologies could lead to international cyberwar by 2009. The report cited voice over IP technology as particularly vulnerable to cyberassaults, such as distributed denial of service attacks.
In late January, the National Science Foundation flipped the switch on the first phase of its TeraGrid supercomputing project. By lashing together large-scale computing systems at research centers around the country, the TeraGrid project is capable of 4.5 teraflops of computing power that can be used for everything from astrophysics to biomolecular research.
As a storage option, a DVD has a lot to offer: durability, flexibility, convenience and price. The problem is how to manage that stack, and that is where the DVD jukebox comes in.
The National Science Foundation has launched the first phase of its TeraGrid project, making 4.5 teraflops of distributed computing power available to scientists across the country.
Government bookkeeping used to involve people in green eyeshades who painstakingly wrote transactions in heavy, lined ledgers. The eyeshades are gone, but not all the ledgers are, even in shops that long ago built mainframe accounting programs.
Interstate Electronics Corp., a subsidiary of New York-based L-3 Communications Corp., has built a new wireless mobile computing system for network-centric, predictive telemaintenance.
Visual Analytics Inc. of Poolesville, Md., said it will integrate name-recognition technology into its data mining and pattern-recognition solutions, which are used by law enforcement and intelligence agencies. The technology, from Herndon, Va.-based Language Analysis Systems Inc., may help agencies identify multicultural names in data such as watch lists.
	Researchers demonstrated an optical network provisioning protocol between systems at the Defense Department and the Naval Research Laboratory. It was the first real-world use of the Just-in-Time protocol across the optical Advanced Technology Demonstration Network.
There is a common misconception that wireless networks are, well, wireless. In fact, wireless networks are very wired. All those access points that transmit radio signals to and from mobile workers are connected to a wired network using -- you guessed it -- wires. And those fixed backhauls, as they're called, can be a significant hindrance to wireless network adoption.
Twenty of 24 federal agencies are investing about $1 billion in public key infrastructure activities, but challenges to PKI projects remain, according to a General Accounting Office report released this month.
A variety of mandates for improving accounting practices and the President's Management Agenda have government at all levels taking a hard look at upgrading their enterprise financial software.
Security concerns notwithstanding, the number of wireless LANs throughout government is growing. And WiFi, or wireless fidelity, is the global standard for wireless LANs.
Securify Inc. of Mountain View, Calif., has released version 4.0 of its SecurVantage network security software. SecurVantage works with Securify's monitoring devices to send real-time data to a centralized command and control center to identify vulnerabilities. The new version is more scalable than previous versions and adds an engine that scans a network's endpoints rather than only scanning data traffic.