Category AI & IT

DARPA SSITH developed secure hardware architectures for Unhackable Military systems, FETT testing exploits to thwart Tampering

SSITH

As 5G and IoT proliferation sweep across the planet, businesses and consumers are benefiting greatly from increased connectivity. However, this connectivity is also introducing greater risks and security concerns than ever before. As the Military and civilian technological systems, from…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA IP2 seeks In Pixel Intelligent Processing tech

videoanalytics

The AIE program is one key element of DARPA’s broader AI investment strategy that will help ensure the U.S. maintains a technological advantage in this critical area. Past DARPA AI investments facilitated the advancement of “first wave” (rule based) and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SocialSim developing effective Information warfare analysis tools for social media

DARPA Mind Control Social Media

A rapidly increasing percentage of the world’s population is connected to the global information environment. At the same time, the information environment is enabling social interactions that are radically changing how and at what rate information spreads. Both nation-states and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF’s ISR dominance strategy for A2/AD environments based on disruptive technologies and the use of multi-role, cross-domain ISR collection capabilities

ISR

The U.S. military could suffer unacceptably high casualties and struggle to win, or perhaps lose, a war against China or Russia. This implication by the National Defense Strategy Commission stands in contrast to the past several decades during which the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Human Factors in Human-Machine Teaming is critical for efficient and effective integration of soldiers with complex machines.

HMT

Interactions with technologically sophisticated artificial intelligence (AI) agents are now commonplace. We increasingly rely on intelligent systems to extend our human capabilities, from chatbots that provide technical support to virtual assistants like Siri and Alexa. Examples of such systems include…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Transforming Multiphysics Simulations using Quantum Computing

quantummultiphysics

Modelling is the process of representing a model (e.g., physical, mathematical, or logical representation of a system, entity, phenomenon, or process) which includes its construction and working. This model is similar to a real system, which helps the analyst predict…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SAVaNT employing atomic vapors to develop Quantum Sensors at Room Temperature

SAVaNT 619x316 1

We are in midst of the second quantum revolution moving from merely computing quantum properties of systems to exploiting them. Researchers are developing new capabilities in secure communication, ultra-sensitive and high signal-to-noise physical sensing of the environment and Quantum Information…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

AFRL’s Golden Horde program—developing networked, collaborative, autonomous (NCA) systems like swarming drones or “fire and forget” weapons

CollaborativeAI scaled 1

Current weapons generally fly a pre-designated mission. If the enemy does something unexpected, preprogrammed weapons are ineffective, and additional weapons may be required to complete the mission. Networked, collaborative and semi-autonomous weapons are advantageous since they observe and react to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA TRIAD to apply AI/ML to phased array antennas for Military Wireless communications and radar systems

DARPATRIAD

The demands on Wireless communications and radar systems have been continuingly increasing as the need for accuracy, efficiency, and more advanced metrics become increasingly important.  Many new applications will only be possible with antennas that consume less power in a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hardware-in-the-loop simulation

HIL

Modeling and simulation (M&S) is the use of models as a basis for simulations to develop data utilized for managerial or technical decision making. Modeling is the process of representing a model (e.g., physical, mathematical, or logical representation of a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here