An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
5G and 6G networks will differ greatly in composition and services, compared to one-size-fits-all 4G networks. 5G and 6G networks must provide varying services
When infections spread, like malware in networks or diseases in society, not all individual cases are known. Networks may lack the latest detection means and
As 5G technology gets fully implemented over the next several years, cellphones and other wireless tech will grow more powerful with increased data flow and
In 6G Cognitive Information Theory: A Mailbox Perspective , published in MDPI , October 16, 2021, NIST and international researchers propose a "cognitive" 6G
On December 8, 2021, the IEEE Standards Association Standards Board approved the IEEE 2302-2021 Standard for Intercloud Interoperability and Federation produced
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Secure IPv6-Only Implementation in the Enterprise
On November 16, 2021, IEEE initiated the IEEE P1451.p working group, now identified as IEEE P3388 , chaired by NIST's Rick Candell and assisted by NIST's Kang
On December 2, 2021, over 180 experts from around the world participated in the first 5G-Blueprint Forum on Teleoperation , organized by the 5G-Blueprint
Time synchronization of sensor networks is critical to the Internet of Things (IoT). These sensor networks must provide real-time data in monitoring and
If someone sells you a luxury handbag from Paris, France, but it turns out be a forgery from Paris, Texas, the counterfeit item might cost you a thousand bucks
NIST researchers Rick Candell, Karl Montgomery, Mohamed Hany, and Kang Lee are providing technical leadership to the IEEE P3388 standard committee (previously
Researchers at the National Institute of Standards and Technology (NIST) have developed a modeling technique that can save time and money in estimating how to
NIST has released a new version of its measurement tools aimed at improving trust and confidence in emerging technologies for improving the security and
In high-end 21 st century communications, information travels in the form of a stream of light pulses typically traveling through fiber optic cables. Each pulse
Engineers at the National Institute of Standards and Technology (NIST) have built a low-cost computer system that connects older public safety radios with the
Researchers at the National Institute of Standards and Technology (NIST) have devised and demonstrated the output components of a novel, quantum-based, self
In November 2020, OMB issued memorandum M-21-07 " Completing the Transition to Internet Protocol Version 6 (IPv6) ", which outlines the Federal government's
Researchers at the National Institute of Standards and Technology (NIST) have devised and demonstrated a system that could dramatically increase the performance
DRAFT3 of USGv6 Revision 1 Specifications Available for Public Comment The first version of the of the USGv6 standards profile was published in 2008 and the
On a recent bright and sunny morning at the NIST Boulder campus, the Technology Partnerships Office (TPO) hosted the kickoff presentation of an impact study
Engineers at the National Institute of Standards and Technology (NIST) needed a way to secure smart manufacturing systems using the digital thread , so they
The squeeze is here, and the crunch is coming. Soon. Explosive demand for high-speed wireless communication is placing growing pressure on the limited frequency
DRAFT USGv6 Revision 1 Specifications Available for Public Comment The first version of the of the USGv6 standards profile was published in 2008 and the USGv6
It’s been called the “smart factory” and even given the lofty moniker of “the fourth industrial revolution.” The manufacturing operation of the just-around-the
Augmenting its efforts to protect the nation’s critical assets from cybersecurity threats as well as protect individuals’ privacy, the National Institute of