HOME
*



picture info

GTRI Information And Communications Laboratory
The Information and Communications Laboratory (ICL) is one of eight labs in the Georgia Tech Research Institute. Along with the GTRI Cyber Technology and Information Security Laboratory, it is part of the Information and Cyber Sciences directorate. It conducts a broad range of research in areas of computer science, information technology, communications, networking, and the development of commercial products from university research. Research areas ICL conducts research that solves complex problems involving information processing, storage, representation and exchange; Internet and database technologies and applications; information security and assurance; along with privacy, knowledge management, data visualization, mapping/geographical information, distributed simulation and enterprise information systems. ICL is responsible for the development and maintenance of FalconView. Researchers work in broadband telecommunications, wireless access systems, multimedia information system ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

GTRI ICL Logo
The Georgia Tech Research Institute (GTRI) is the nonprofit applied research arm of the Georgia Institute of Technology in Atlanta, Georgia (U.S. state), Georgia, United States. GTRI employs around 2,400 people, and is involved in approximately $600 million in research annually for more than 200 clients in industry and government. Initially known as the Engineering Experiment Station, (EES) the organization was proposed in 1929 by W. Harry Vaughan as an analog to the agricultural experiment stations; the Georgia General Assembly passed a law that year creating the organization on paper but did not allocate funds to start it. To boost the state's struggling economy in the midst of the Great Depression, funds were found, and the station was finally established with United States dollar, US$5,000 (equivalent to $ in ) in April 1934. GTRI's research spans a variety of disciplines, including national Defense (military), defense, homeland security, public health, educati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * identify ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Functional Requirements
In software engineering and systems engineering, a functional requirement defines a function of a system or its component, where a function is described as a specification of behavior between inputs and outputs. Functional requirements may involve calculations, technical details, data manipulation and processing, and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describe all the cases where the system uses the functional requirements, these are captured in use cases. Functional requirements are supported by non-functional requirements (also known as "quality requirements"), which impose constraints on the design or implementation (such as performance requirements, security, or reliability). Generally, functional requirements are expressed in the form "system must do ," while non-functional requirements take the form "system shall be ." The plan for implementing functional requirements is detailed in the system design, wh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Public Policy
Public policy is an institutionalized proposal or a decided set of elements like laws, regulations, guidelines, and actions to solve or address relevant and real-world problems, guided by a conception and often implemented by programs. Public policy can be considered to be the sum of government direct and indirect activities and has been conceptualized in a variety of ways. They are created and/or enacted on behalf of the public typically by a government. Sometimes they are made by nonprofit organisations or are made in co-production with communities or citizens, which can include potential experts, scientists, engineers and stakeholders or scientific data, or sometimes use some of their results. They are typically made by policy-makers affiliated with (in democratic polities) currently elected politicians. Therefore, the "policy process is a complex political process in which there are many actors: elected politicians, political party leaders, pressure groups, civil serva ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


GTRI Office Of Policy Analysis And Research
The GTRI Office of Policy Analysis and Research is a division of the Georgia Tech Research Institute that focuses on policy analysis, particularly in fields where GTRI has science and technology experience. OPAR assists the Georgia General Assembly The Georgia General Assembly is the state legislature of the U.S. state of Georgia. It is bicameral, consisting of the Senate and the House of Representatives. Each of the General Assembly's 236 members serve two-year terms and are directly ... and publishes briefs on relevant issues, including how other states treat various issues. In particular, OPAR hosts an annual "Legislative Roundtable" that brings together interested state representatives, prominent members of Georgia industry, and Georgia Tech students and faculty. References {{reflist External links Official website Office of Policy Analysis and Research Think tanks based in the United States Science and technology think tanks ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Broadband
In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals at a wide range of frequencies and Internet traffic types, that enables messages to be sent simultaneously, used in fast internet connections. The medium can be coaxial cable, optical fiber, wireless Internet (radio), twisted pair or satellite. In the context of Internet access, broadband is used to mean any high-speed Internet access that is always on and faster than dial-up access over traditional analog or ISDN PSTN services. Overview Different criteria for "broad" have been applied in different contexts and at different times. Its origin is in physics, acoustics, and radio systems engineering, where it had been used with a meaning similar to " wideband", or in the context of audio noise reduction systems, where it indicated a single-band rather than a multiple-audio-band system design of the compander. Later, with the advent of digital telecommunications, the term was ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


FalconView
FalconView is a mapping system created by the Georgia Tech Research Institute. It was initially developed for the Microsoft Windows, Windows family of operating systems; however, versions for Linux and mobile operating systems are under development. It displays various types of maps and geographically referenced overlays. Many types of maps are supported, but the primary ones of interest to most users are aeronautical charts, satellite images and DTED, elevation maps. FalconView also supports a large number of overlay types that can be displayed over any map background. The current overlay set is targeted toward military mission planning users and is oriented towards aviators and aviation support personnel. FalconView is an integral part of the Portable Flight Planning Software (PFPS). This software suite includes FalconView, Combat Flight Planning Software (CFPS), Combat Weapon Delivery Software (CWDS), Combat Air Drop Planning Software (CAPS) and several other software packages bu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Data Visualization
Data and information visualization (data viz or info viz) is an interdisciplinary field that deals with the graphic representation of data and information. It is a particularly efficient way of communicating when the data or information is numerous as for example a time series. It is also the study of visual representations of abstract data to reinforce human cognition. The abstract data include both numerical and non-numerical data, such as text and geographic information. It is related to infographics and scientific visualization. One distinction is that it's information visualization when the spatial representation (e.g., the page layout of a graphic design) is chosen, whereas it's scientific visualization when the spatial representation is given. From an academic point of view, this representation can be considered as a mapping between the original data (usually numerical) and graphic elements (for example, lines or points in a chart). The mapping determines how the a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Processing
Information processing is the change (processing) of information in any manner detectable by an observer. As such, it is a process that ''describes'' everything that happens (changes) in the universe, from the falling of a rock (a change in position) to the printing of a text file from a digital computer system. In the latter case, an information processor (the printer) is changing the form of presentation of that text file (from bytes to glyphs). The computers up to this period function on the basis of programs saved in the memory, having no intelligence of their own. In cognitive psychology Within the field of cognitive psychology, information processing is an approach to the goal of understanding human thinking in relation to how they process the same kind of information as computers (Shannon & Weaver, 1963). It arose in the 1940s and 1950s, after World War II (Sternberg & Sternberg, 2012). The approach treats cognition as essentially computational in nature, with ''mind'' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Not-for-profit Corporation
A nonprofit organization (NPO) or non-profit organisation, also known as a non-business entity, not-for-profit organization, or nonprofit institution, is a legal entity organized and operated for a collective, public or social benefit, in contrast with an entity that operates as a business aiming to generate a profit for its owners. A nonprofit is subject to the non-distribution constraint: any revenues that exceed expenses must be committed to the organization's purpose, not taken by private parties. An array of organizations are nonprofit, including some political organizations, schools, business associations, churches, social clubs, and consumer cooperatives. Nonprofit entities may seek approval from governments to be tax-exempt, and some may also qualify to receive tax-deductible contributions, but an entity may incorporate as a nonprofit entity without securing tax-exempt status. Key aspects of nonprofits are accountability, trustworthiness, honesty, and openness to ev ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Science
Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to practical disciplines (including the design and implementation of hardware and software). Computer science is generally considered an area of academic research and distinct from computer programming. Algorithms and data structures are central to computer science. The theory of computation concerns abstract models of computation and general classes of problems that can be solved using them. The fields of cryptography and computer security involve studying the means for secure communication and for preventing security vulnerabilities. Computer graphics and computational geometry address the generation of images. Programming language theory considers different ways to describe computational processes, and database theory concerns the management of repositories ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

GTRI Cyber Technology And Information Security Laboratory
The Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER) is one of eight labs in the Georgia Tech Research Institute. It was created on October 1, 2010 and focuses on cyber security. Along with the GTRI Information and Communications Laboratory, it is part of the Information and Cyber Sciences directorate. GTRI CIPHER is known for its commitment to Open Source Software It will feature existing business areas such as secure information systems and resilient command and control with emerging areas such as cyberwarfare. The laboratory will additionally be a part of the Georgia Tech Information Security Center. References External links CIPHER official website {{GTRI CIPHER In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ... Computer security ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]