Technology Today - Home
 
on Technology

Information Systems and Computing

RedWolf Mission-Driven Technology Advancement

The name RedWolf may not be well known to the public, but it is known and highly respected by agencies tasked to protect the U.S. homeland and perform other lawful surveillance functions.

The engineers and managers of the Telecommunications Surveillance Products program, part of Raytheon’s Intelligence and Information Systems business, have directly supported the missions of their criminal investigation community customers for over a decade. These developers of the RedWolf product line of audio and electronic data surveillance systems often work on site with customers to ensure the peak performance of operational systems, as well as to derive requirements for the continued enhancement of RedWolf products. This on-site presence can lead to challenging assignments for the RedWolf development team, whose members were on the ground in New York City just days following the Sept. 11, 2001 terrorist attacks.

read more …

Mission Systems Integration

Cyberspace 101: Internet Basics

The Web is increasingly important to Raytheon’s customers and businesses. Now, with Web-based applications being posed as an alternative to PC-based applications, and with cloud computing potentially enabling entire computer services to be outsourced, this might be a good time to remind readers of some Internet basics.

How Did It Develop?
The concept of the Internet — using packet switching rather than circuit switching — came from a study done for the U.S. Air Force to create a highly robust, survivable network. BBN Technologies was awarded the Air Force contract in April 1969.1 Breaking data into packets enables more efficient use of a shared circuit, and improves robustness because each packet's arrival at a destination can be confirmed. When failure occurs, a missing or corrupt packet can be re-sent to ensure successful reception. Because packets can take different routes to a destination, a packet-switched network can overcome data congestion by routing packets around "traffic jams." This ability to determine different routes for packets to follow enables the network to survive loss of physical circuits without interruption.

read more …