News
Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
BEYOND MACH 5: HYPERSONIC WEAPONS AND THE MASINT SOLUTION DIA TECHINT 2025 co-sponsored by the Defense Intelligence Agency and AFCEA International, DIA TECHINT brings together leaders and experts from ...
YEARS AS AN ENGINEER: 2 COLLEGE ATTENDED: Virginia Tech COLLEGE MAJOR/DEGREE: B.S. Mechanical Engineering EXPLAIN YOUR CURRENT JOB ROLE: I am a mechanical design engineer for an HVAC construction ...
Data classification and its close cousin, asset identification, are the gnarly knot of security programs. Are there any data or servers that are *not* critical on a program? Probably not. Every risk ...
YEARS AS AN ENGINEER: 17 COLLEGE (S) ATTENDED: University of Virginia COLLEGE MAJOR/DEGREE: Master of Engineering in Mechanical and Aerospace Engineering EXPLAIN YOUR CURRENT JOB ROLE: I work at ...
Researchers at the New Mexico Institute of Mining and Technology who have converted dead birds into flying drones are now considering the possibility of adding an array of technologies, including ...
As the Department of the Air Force pursues air- and space-related joint all-domain command and control, it is asking industry to provide capabilities that they can integrate. “If you are a company ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
There isn’t just one technology that can make quantum computing possible. Many of the selected companies are pursuing different ways of creating quantum bits (qubits), the building blocks of quantum ...
The 3-year-old Cybersecurity Directorate (CSD) at the 70-year-old National Security Agency/Central Security Service (NSA) is growing, especially in Texas. While the agency’s headquarters is at Ft.
At its core, CHSS builds on the seL4 microkernel as a secure foundation and root of trust. seL4 is formally verified, which is a powerful but labor-intensive process to mathematically prove the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results