Niklas ElmqvistProfessor, College of Information Studies, University of Maryland
Deep Learning has revolutionized the fields of computer vision, speech recognition and control systems. Can Deep Learning work for scientific problems?
The NIST Public Safety Communications Research (PSCR) Program has funded R&D grants in several research organizations under its Public Safety Innovation Accelerator (PSIAP) to support research in emerging analytic technolo
The Federal Computer Security Program Managers' Forum (Forum) is an informal group sponsored by the National Institute of Standards and Technology (NIST) to prom
Twenty-first century science and engineering (S&E) research continues to be transformed by the increasing availability and scales of computation and data, and national cyberinfrastructure (CI) ecosystem is a key catalyst f
The White House has released a new Executive Order on America’s Cybersecurity Workforce
Join NIST leadership to discuss the latest on the NIST Privacy Framework effort.
Electronic device manufacturers should find it less time-consuming to bring their wares to both the U.S.
In the past few years, networks of optical parametric oscillators (OPOs) have been successfully used to simulate the classical Ising Hamiltonian leading to a platform that may be used as a special-purpose computer.
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car.
The Spring 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government develo
D.C. Area Crypto Day is a bi-annual, one-day regional meeting of cryptographic researchers to promote research collaborations and disseminate fresh, state-of-the-art results in cryptography. Previous D.C.
In accordance with the Federal Advisory Committee Act (FACA), Public Law 92-463, as amended (5 U.S.C. Appendix 2), the U.S.
In late Fall 2018, NICE staff participated in a convening of experts from corporate, academic, nonprofit, and government backgrounds to consider new ideas and implementable strategies to bring women into and up through cyberse
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process.
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect sensitive information, and plan for potentially significant changes in the
Join the Cybersecurity for IoT Program as we discuss our thoughts on considerations for a core cybersecurity capabilities baseline for IoT devices.
After over two decades of relative architectural stability for distributed memory parallel computers, the end of Dennard scaling and the looming end of Moore's "law" is forcing major changes in computing systems.
FIPS 201, Personal Identity Verification (PIV) for federal employees and contractors will be going through a third revision soon.
Latest updates: All visitors to the NIST campus must be pre-registered. There is no onsite registration for meetings at NIST.
The need for effective human-robot interaction (HRI) continues to present challenges for the field of robotics. As new technologies are integrated into human-robot teams in a myriad of application domains, exposures to and ex
The NICE Program Office will be participating in the RSA Conference next week in San Francisco, California. See below for ways you can connect with us. We hope to see you there!