Home / Technology / AI & IT (page 51)

AI & IT

DARPA’s Dispersed Computing (DCOMP) aims to dynamically boosts computing power for real-time battlefield understanding

In military applications, particularly those oriented toward real-time battlefield understanding, synthesis of actionable information from diverse data sources in near real-time becomes an important requirement. In the current art, users with significant computing requirements have typically depended on access to large, highly shared data centers to which they backhaul their …

Read More »

DARPA’s 1000X efficient graph analytics processor enables real-time identification of cyber threats, and vastly improved situational awareness

Today large amounts of data is collected from numerous sources, such as social media, sensor feeds (e.g. cameras), and scientific data. There are over 1 billion websites on the world wide web today and the Annual global IP traffic will reach 3.3 ZB per year by 2021, or 278 exabytes …

Read More »

DARPA’s N-ZERO extends the lifetime of IoT devices and remote sensors from months to years

Today U.S. soldiers are being killed because the Defense Department cannot deploy all the sensors it would like to. DoD could  deploy sensors every few yards to detect  buried  improvised explosive device (IED). As it is, every sensor deployed today has to be battery powered, so even if vast sensor nets …

Read More »

DARPA’s Fast Lightweight Autonomy (FLA) program is advancing autonomy to aid military operations in dense urban areas or heavily wooded forests

“The goal of Fast Lightweight Autonomy (FLA)  is to develop advanced algorithms to allow unmanned air or ground vehicles to operate without the guidance of a human tele-operator, GPS, or any datalinks going to or coming from the vehicle,” said JC Ledé, the DARPA FLA program manager. Autonomous flight capabilities …

Read More »

DARPA creating a Secure, Private Internet and Cloud for Warfighters at the tactical edge to quickly share current intelligence information and imagery on their mobile devices

Warfighters at the tactical edge are generally required to communicate with base facilities in order to report and retrieve new information about their locations, missions, and potential threats. With current communications technology, this critical operational content is not always immediately accessible nor distributable for warfighters who are outside of the …

Read More »

More than Moore ( MtM) technologies required for Internet of Things and Next Generation Defense Systems

Moore’s Law which stated that the number of transistors on a chip will double approximately every two years has been the driver of semiconductor industry in boosting the complexity, computational performance and energy efficiency while reducing cost. It has led to substantial improvements in economic productivity and overall quality of …

Read More »

Real-time behavioral analytics, new tool for detecting advanced external and internal Cyber threats and mental health, employed by Intelligence agencies to DOD

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially …

Read More »

DARPA’s Colosseum, world-unique wireless testbed shall catalyze the advent of autonomous, intelligent, and collaborative radio technology

In March 2016, DARPA officials launched the Spectrum Collaboration Challenge (SC2), an initiative designed to ensure that the exponentially growing number of military and civilian wireless devices will have full access to the increasingly crowded electromagnetic spectrum particularly  between 9 kHz and 275 GHz,  the range allocated by the Federal …

Read More »

DARPA’s Wireless Network Defense program seeks to develop new technologies to help make wireless networks more resilient to unforeseen scenarios and malicious compromise

When in the field, military service members rely on their mobile devices to provide access to wireless networks in areas lacking a communications infrastructure. The protocols used for these networks determine the best config urations, and therefore trust all information shared about the security and operational state of each node. …

Read More »

DARPA Next Generation Social Science program seek new models, theories, and tools for predictive science of social phenomena

Military commanders require means for detecting and anticipating long-term strategic instability. They have to get ahead and stay ahead of conflicts, whether those conflicts are within nation states, between nation states, and/or between non-nation states. In establishing or maintaining security in a region, cooperation and planning by the regional combatant …

Read More »
error: Content is protected !!