Tech Success: EMC helps Pentagon keep running

Business continuity, the process of ensuring that computer systems run in the event of an emergency, is receiving fresh attention in the government market, and not only because of the Sept. 11 terrorist attacks. In an increasingly networked world, business continuity has come to mean something new.

Business service management

	Omaha, Neb.-based MSI Systems Integrators Inc. signed on to become the first reseller of BMC Software tools for managing Linux servers.

Identifying who's who

SRD Software of Las Vegas released a new version of ERIK, an identity recognition program that used to be called SI Warehouse. ERIK integrates data from disparate systems to match information about people and create a single profile.

Prepare for cyberwar

	A recent study by Stamford, Conn.-based Gartner Research found that converging network technologies could lead to international cyberwar by 2009. The report cited voice over IP technology as particularly vulnerable to cyberassaults, such as distributed denial of service attacks.

Return of the supercomputers

In late January, the National Science Foundation flipped the switch on the first phase of its TeraGrid supercomputing project. By lashing together large-scale computing systems at research centers around the country, the TeraGrid project is capable of 4.5 teraflops of computing power that can be used for everything from astrophysics to biomolecular research.

Jukebox hero: The best way to handle DVDs

As a storage option, a DVD has a lot to offer: durability, flexibility, convenience and price. The problem is how to manage that stack, and that is where the DVD jukebox comes in.

TeraGrid supercomputer goes live

The National Science Foundation has launched the first phase of its TeraGrid project, making 4.5 teraflops of distributed computing power available to scientists across the country.

Online extra: Financial management systems make the upgrade

Government bookkeeping used to involve people in green eyeshades who painstakingly wrote transactions in heavy, lined ledgers. The eyeshades are gone, but not all the ledgers are, even in shops that long ago built mainframe accounting programs.

Tech Success: State Department recruits GovDocs

How can an agency communicate with citizens who may visit occasionally, but don't regularly check the agency's Web site? Through targeted e-mail.

New telemaintenance tool

Interstate Electronics Corp., a subsidiary of New York-based L-3 Communications Corp., has built a new wireless mobile computing system for network-centric, predictive telemaintenance.

The name is the game

Visual Analytics Inc. of Poolesville, Md., said it will integrate name-recognition technology into its data mining and pattern-recognition solutions, which are used by law enforcement and intelligence agencies. The technology, from Herndon, Va.-based Language Analysis Systems Inc., may help agencies identify multicultural names in data such as watch lists.

Networking at the speed of light

	Researchers demonstrated an optical network provisioning protocol between systems at the Defense Department and the Naval Research Laboratory. It was the first real-world use of the Just-in-Time protocol across the optical Advanced Technology Demonstration Network.

Wireless gets connected

There is a common misconception that wireless networks are, well, wireless. In fact, wireless networks are very wired. All those access points that transmit radio signals to and from mobile workers are connected to a wired network using -- you guessed it -- wires. And those fixed backhauls, as they're called, can be a significant hindrance to wireless network adoption.

PKI spending hits $1B

Twenty of 24 federal agencies are investing about $1 billion in public key infrastructure activities, but challenges to PKI projects remain, according to a General Accounting Office report released this month.

Fresh tech for financial management

A variety of mandates for improving accounting practices and the President's Management Agenda have government at all levels taking a hard look at upgrading their enterprise financial software.

Wireless access points provide versatility, flexibility

Security concerns notwithstanding, the number of wireless LANs throughout government is growing. And WiFi, or wireless fidelity, is the global standard for wireless LANs.

Online extra: Utility computing -- IT on a meter

None

Tech Success: The paper chase stops here

Making a business case for government information technology can be a challenge, but sometimes the solution makes a case for itself.

Brief: Proactive network security

Securify Inc. of Mountain View, Calif., has released version 4.0 of its SecurVantage network security software. SecurVantage works with Securify's monitoring devices to send real-time data to a centralized command and control center to identify vulnerabilities. The new version is more scalable than previous versions and adds an engine that scans a network's endpoints rather than only scanning data traffic.