Infrastructure

  • Advertisement from 1957 for "America's Independent Electric Light and Power Companies" showing an autonomous car

    Event

    Self-Driving Vehicles

    Self-driving cars are in the news, on the road, and the future of driving. RAND information scientist Nidhi Kalra will lead a discussion of research on the potential benefits, drawbacks, and implications of driverless cars.

    Oct 28, 2014

  • U.S. Army soldiers, earmarked for the fight against Ebola, put on protective suits during training before their deployment to West Africa, October 9, 2014

    Blog

    Declaring War on Ebola

    Operation United Assistance, which includes the deployment of 3,000 U.S. military personnel to West Africa to respond to the Ebola crisis, is a welcome recognition of the range of missions the military is increasingly able to tackle, particularly in disaster-management assistance.

    Oct 10, 2014

  • A burial team wearing protective clothing prepares to enter the home a person suspected of having died from Ebola in Freetown, Sierra Leone, September 28, 2014

    Blog

    Ebola Outbreak: Putting the Public Back in Public Health

    Medical and public health systems are crucial to controlling the transmission of Ebola and treating patients. But the public's role in becoming aware and engaged, both in West Africa and the United States, cannot be overstated.

    Oct 9, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Graphic design with blue globe

    Project

    Examining the EU's Information Security and Data Protection Frameworks

    Has Brussels put its own house in order when it comes to information security and data privacy? RAND Europe research suggests that the EU institutions and agencies should review the rules that govern their information security and data privacy procedures if they want to be ahead of the ICT innovation curve.

    Sep 22, 2014

  • Testimony

    Strategic Planning for Border Security: Addendum

    Document submitted on September 18, 2014 as an addendum to testimony presented before the House Science, Space, and Technology Committee, Subcommittee on Research and Technology and Subcommittee on Oversight on July 31, 2014.

    Sep 18, 2014

  • Report

    Designing Unmanned Systems with Greater Autonomy: Using a Federated, Partially Open Systems Architecture Approach

    Many current unmanned systems (UxSs) employ different communication systems and have limited autonomy, which limit information sharing with warfighters and other UxSs. This report identifies ways to address these limitations.

    Sep 17, 2014

  • Russia's Prime Minister Medvedev and President Putin attend a meeting with members of the Russian Parliament in Yalta, Crimea, August 14, 2014

    Blog

    Crimean Adventure Will Cost Russia Dearly

    Moscow may have overreached, as it appears ill-prepared to come up with the necessary funds to cover Crimea-related costs. Infrastructure improvements, development aid, government operations, and other costs will be a multi-billion drain — as much as $4.5 billion per year — on Russia's already strained budget.

    Sep 8, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Blog

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Report

    Portfolio Assessment of the Department of State Internet Freedom Program

    Employing portfolio analysis techniques, the authors assessed the Bureau of Democracy, Human Rights, and Labor (DRL)'s Internet freedom program for FY 2012-2013 to determine its project portfolio's effectiveness in performance, balance, and synergy.

    Sep 4, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Report

    Ramifications of DARPA's Programming Computation on Encrypted Data Program

    RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.

    Aug 25, 2014

  • Report

    Measuring Cooperative Biological Engagement Program (CBEP) Performance: Capacities, Capabilities, and Sustainability Enablers for Biorisk Management and Biosurveillance

    This report describes a project to develop a comprehensive evaluation framework for the Cooperative Biological Engagement Program and recommends metrics for assessing and communicating progress toward the program's goals.

    Aug 21, 2014

  • Report

    Building Blocks for a Resilient City

    This infographic illustrates how communities can withstand and recover from disasters by building resiliency.

    Aug 18, 2014

  • Food court signs in Las Vegas

    Blog

    Always Hungry? Here's the Real Reason Why

    The problem of obesity cannot be attributed to a single dietary or physiological factor, like too much sugar, too much fat, or even factors like viruses, bacteria, and endocrine disrupters. The real problem is that Americans now live in a food swamp and there is just too much food easily available.

    Aug 15, 2014

  • recreational swimming in a Bristol, UK, lake

    Report

    The Health Risks of Bathing in Recreational Waters

    A rapid evidence assessment confirms an association between the quality of recreational bathing waters and the risk of gastrointestinal illness, particularly in fresh water, but there is insufficient evidence to determine whether a revision to the European Bathing Directive is needed.

    Aug 14, 2014

  • Medical staff put on protective gear before taking a sample from a suspected Ebola patient in Kenema, Sierra Leone, July 10, 2014

    Blog

    Six Takeaways from the Ebola Outbreak in West Africa

    No amount of research can save those who've already perished from Ebola in West Africa, but our capacity to learn from such tragedies is a silver lining that has historically enhanced global resilience to disease. With that in mind, here are six key lessons from the outbreak.

    Aug 8, 2014

  • Report

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    RAND Review Takes Measure of Cybercrime, Medical Innovation, U.S. Security Cooperation

    Stories in RAND's flagship magazine discuss the duel between cybercrime and the law, the gamble of medical innovation, and the fruits of U.S. security cooperation.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law

    The Internet has become a vast untamed territory for cybercriminals. But there are ways that private companies, defense contractors, law enforcement, and other government agencies can minimize the harmful influence of cyber black markets.

    Aug 7, 2014