Plan X: DARPA's Revolutionary Cyber Security Platform - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity
News
4/21/2015
07:00 AM
Joe Stanganelli
Joe Stanganelli
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Plan X: DARPA's Revolutionary Cyber Security Platform

DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
2 of 6

Plan X Leverages Touch Interface
On the day of the Christian Science Monitor event, Pound showed up with his right arm in a cast.
That didn't do much to slow him down. During his demo of Plan X's GUI, Pound seamlessly demonstrated Plan X's smooth drag-and-drop, touch-based interface on a large monitor -- even marveling to himself about how easy and 'great' the touch-screen interface is to use.
'Touch has become a native, intuitive interface where people are … using these things effectively,' Pound told event attendees, noting that DARPA had conducted numerous usability studies to determine how to proceed with Plan X.
Traditionalist users aren't tied to the touch interface, however. Pound said they can still use a keyboard and a mouse if they prefer.
(Image source: DARPA)

Plan X Leverages Touch Interface

On the day of the Christian Science Monitor event, Pound showed up with his right arm in a cast.

That didn't do much to slow him down. During his demo of Plan X's GUI, Pound seamlessly demonstrated Plan X's smooth drag-and-drop, touch-based interface on a large monitor -- even marveling to himself about how easy and "great" the touch-screen interface is to use.

"Touch has become a native, intuitive interface where people are … using these things effectively," Pound told event attendees, noting that DARPA had conducted numerous usability studies to determine how to proceed with Plan X.

Traditionalist users aren't tied to the touch interface, however. Pound said they can still use a keyboard and a mouse if they prefer.

(Image source: DARPA)

2 of 6
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
4/27/2015 | 8:54:02 AM
Re: Dispelling the Myth of Difficulty is key
Mike,

I knew I could always count on you to say something so basic,so true ,so Simply!

Simply Brilliant,Brilliant stuff!

What I would also like to add here is that with the Increasing amount of automation happening today in the IT-Security stuff;you don't really need Hard-core Super-trained Security Ninjas to run IT Security Shops enterprise-wide.

Sure its always good to have extra skills on board but the Companies/Organizations which provide most of these Security Tools have very-very good Customer Service Reps(who are all very well-versed in the art of Security today).

So if a Company has employees who may/may not be at cutting-edge its perfectly allright today;they can still manage comfortably.

On the other side,I also buy the Assertion(not entirely though) that a large part of the increased Security Awareness/Fear is just the result of more Connectivity (and/or media scaremongering) on part of Security Providers???

Good Post!

Regards

Ashish.
macker490
50%
50%
macker490,
User Rank: Strategist
4/21/2015 | 8:30:30 AM
Dispelling the Myth of Difficulty is key
I read way too many essays which claim encryption, or authentication -- is too complex for ordinary people

eau contraire!

I could teach most folks familiar with eMail to use PGP or GnuPG via Thunderbird's plug-in ENIGMAIL is an hour or so.  

the take-away from this note is simple:   as soon as we have better packaging for this technology ( PGP; GnuPG ) everyday computer users will be able to make advantage of it in most everything they do

PGP/GnuPG provides real authentication, integrity, and security: when you need it.

authentication : proving your signature on a digital document

intergity : proving the validity of a digital document

security : restricting the content of a digital document to authorized personel

 
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll