canary

Supply

biometrics

think

Reembrace

Synbio

AV

  • A Microelectronic “Canary in a Coal Mine”

    A Microelectronic “Canary in a Coal Mine”A Call to a New Approach for National Security Introduction The United States no longer has the manufacturing capability or access to materials needed for continued economic growth and prosperity for our people. The United States is entering a period of increased national security risk due to lack of access to specific goods and products. One specific industrial sector—microelectronics—is emblematic of the issue. A similar argument could be posed…

    In Articles by Honorable Alan R. Shaffer
  • Securing Critical Supply Chains

    Strategies for Sovereignty Over Critical Supplies During times of crisis, such as the COVID-19 pandemic, the significance of securing critical supply chains to uphold national security becomes evident. How can the United States maintain sovereignty and protect its interests when our economy and national security are dependent on external, global supplies of services and products? We discuss three strategies that the United States can adopt to maintain full sovereignty over critical supply chains: Fully US…

    In Articles by Michael S. Swetnam and Jennifer Buss, PhD
  • Authentication Using Biometrics: How to Prove Who You Are

    It is increasingly important to be able to prove that you are who you say you are. Logging into a computer, operating an ATM, voting, and making purchases on credit all require authentication. The field of biometrics studies anatomical, physiological, and behavioral attributes of humans that can be used to distinguish one person from others. Historically, modalities like fingerprints have been used to uniquely identify a person. Biometric measures can be used to authenticate a…

    In Articles by Robert Hummel, PhD; Timothy W. Bumpus, PhD; Alyssa Adcock, PhD; and Sharon Layani

On April 18, 2016, DoD Chief Information Officer, Terry Halvorsen discussed the need to modernize DoD networks as part of the Department’s cybersecurity strategy. The DoD also aims to consolidate data centers, empowering mobile data access, and facilitating cooperation and short-term personnel trades between government and industry cybersecurity workers. The DoD is focused on their shift to the Joint Regional Security Stacks, a centrally managed, regionally based suite of security appliances, to secure networks and reduce the number of access points that can be attacked. See: http://www.defense.gov/News-Article-View/Article/723174/dod-cio-discusses-modernizing-networks-consolidating-data-centers.

From this Issue

Autonomous Vehicles: What’s the Deal?

Autonomous Vehicles: What’s the Deal?

Autonomous vehicle technology promises to make driverless vehicles a reality. Yet the introduction of commercial driverless vehicles has been delayed, and there are warning signals that perhaps the technology will not be ready any time soon. We...
Autonomous Vehicles: What’s the Deal?
Autonomous Vehicles: What’s the Deal?
Re-Embrace American Science and Technology Reimagine, Reinvent, Restart

Re-Embrace American Science and Technology Reimagine, Reinvent, Restart

America must invest in bold, imaginative, and inspirational endeavors to tackle the hardest challenges facing the world–challenges which may only be overcome through inspired scientific research and inventive technological development. As Americans...
Re-Embrace American Science and Technology Reimagine, Reinvent, Restart
Re-Embrace American Science and Technology Reimagine, Reinvent, Restart
Synthetic Biology

Synthetic Biology

Introduction The term “synthetic biology” was coined over a century ago. Since then, synthetic biology has grown into a diverse, multidisciplinary field that leverages tools, techniques, and ideas from biology, chemistry, engineering, computer...
Synthetic Biology
Synthetic Biology
Can Humans Think?

Can Humans Think?

In 1950, Alan Turing famously asked the question, “Can Machines Think?” His seminal paper, “Computing Machinery and Intelligence,” led to the introduction of the field of Artificial Intelligence (AI). Alan Turing did not answer his own question,...
Can Humans Think?
Can Humans Think?
Authentication Using Biometrics: How to Prove Who You Are

Authentication Using Biometrics: How to Prove Who You Are

It is increasingly important to be able to prove that you are who you say you are. Logging into a computer, operating an ATM, voting, and making purchases on credit all require authentication. The field of biometrics studies anatomical,...
Authentication Using Biometrics: How to Prove Who You Are
Authentication Using Biometrics: How to Prove Who You Are
Securing Critical Supply Chains

Securing Critical Supply Chains

Strategies for Sovereignty Over Critical Supplies During times of crisis, such as the COVID-19 pandemic, the significance of securing critical supply chains to uphold national security becomes evident. How can the United States maintain sovereignty...
Securing Critical Supply Chains
Securing Critical Supply Chains
A Microelectronic “Canary in a Coal Mine”

A Microelectronic “Canary in a Coal Mine”

A Microelectronic “Canary in a Coal Mine”A Call to a New Approach for National Security Introduction The United States no longer has the manufacturing capability or access to materials needed for continued economic growth and prosperity for our people....
A Microelectronic “Canary in a Coal Mine”
A Microelectronic “Canary in a Coal Mine”

Download PDF

Click to Download

©, 2016-2021, Potomac Institute for Policy Studies, All rights reserved.