This is a good first step towards securing battlefield communications. As was mentioned, soldiers post about their movements, situations, etc. without regard to operational security. Hopefully, the secure access mechanisms will help prevent this. Does anyone know of a similar safeguard for the IPhone? I would think they are just as popular.
One main result of the COTS movement a few years back was that the military depended on leaky, hackable commercial software, as well as hardware, and then spent zillions trying to secure it. The problem has proliferated even more with solders' use of mobile devices. A ton of money has also been spent on attempts to design and/or retrofit secure embedded real-time OS. As Beth points out, remote wiping is not a new idea. OTOH, I'd assume that they've built in various military-specific secure access mechanisms.
I suspect this would also monitor what the users access, send or their contacts.
From what I've read, there were some missteps in the early days of the current war. Many would post messages on facebook and other places about what they were doing, where they were, etc, just as many young poeple do at home. But, in war, that info is more critical.
Security issues are the biggest problem for companies as they deal with the barrage of employee-owned mobile devices coming into the workplace and onto the corporate network. Obviously, the stakes are much higher when the phones are privvy to military applications or even just used in military environments. I'm wondering what this OS brings to the table, though, beyond any of the mobile device management (MDM) platforms that are widely available. Seems like capabilities like remote wiping of devices if they are lost or stolen is pretty commonplace. What would this offer beyond that?
Robots that walk have come a long way from simple barebones walking machines or pairs of legs without an upper body and head. Much of the research these days focuses on making more humanoid robots. But they are not all created equal.
The IEEE Computer Society has named the top 10 trends for 2014. You can expect the convergence of cloud computing and mobile devices, advances in health care data and devices, as well as privacy issues in social media to make the headlines. And 3D printing came out of nowhere to make a big splash.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.