Trusted Computing

ID 305586413 © Liliia Kanunnikova | Dreamstime.com
Industry's help needed in artificial intelligence (AI), cyber warfare, and information security
Computers

Wanted: new enabling technologies in artificial intelligence (AI), cyber warfare, and information security

Dec. 11, 2024
Project seeks capabilities in information and computer technologies able to surprise adversaries and maintain advantages for national security.
The Mercury HDVR avionics high-definition video recorder is for high-speed data and video recording of flight incidents and mission data.
Computers

Navy orders video recorders data storage systems for U.S. and Australian F/A-18 jet fighter-bomber avionics

Dec. 11, 2024
40-Watt, 11-pound design offers seamless on-the-fly rerouting and data translation of input to and from the recorder irrespective of interfaces.
ID 229393285 © Hrishchenko Oleksandr | Dreamstime.com
Electronic warfare (EW) and spectrum warfare are the focus of upcoming industry briefings by the Air Force
Sensors

Air Force to brief industry on technical challenges in electronic warfare (EW), spectrum warfare technologies

Dec. 10, 2024
Officials want to foster collaboration between the Air Force and the defense industry to provide more opportunities for future innovation.
ID 343200152 | Ai © Justlight | Dreamstime.com
DARPA SAFE-SiM should enable faster-than real-time simulation and modeling for military CONOPS
Computers

Radiance Technologies to refine faster-than-real-time simulation and modeling for evolving military CONOPS

Dec. 9, 2024
SAFE-SiM to develop enabling technologies to enable military commanders to conduct theater-wide, multi-domain, mission-level modeling and simulation.
ID 342080440 © Andrei Dzemidzenka | Dreamstime.com
Air Force researchers are focusing on technologies that support hardware and software for high-assurance, trusted, and secure computers.
Trusted Computing

Air Force asks industry for enabling technologies in trusted computers and software for the military

Dec. 6, 2024
This project has two technical areas: trusted, secure, and resilient computational systems; and trusted and assured software.