Category AI & IT

NASA’s Software Assurance through Software policies, engineering practices and software standards

NASA Software

As computing devices become more pervasive, the software systems that control them have become increasingly more complex and sophisticated. Computers are increasingly being introduced into safety-critical systems, and, as a consequence, have been involved in accidents. The world has become reliant…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AISS program to develop tools for automatic design of secured System on Chip (SoC) for Military IoT

AISS

A system on a chip or system on chip (SoC) is an integrated circuit (also known as a “chip”) that integrates all components of a computer or other electronic system on a single circuit die. Similar to how a microcontroller…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s Intent-Defined Adaptive Software (IDAS) seeks technologies to make DoD Software adaptive for ever-changing military mission demands

agile

The Department of Defense (DoD) is highly dependent on software. The increasing complexity and scale of this software is creating new attack surfaces for adversaries and reducing the DoD’s ability to react to new threats. Some examples of these complex…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Virtual design and construction (VDC ) is being used by companies around the world to improve business performance objectives like keeping projects on time and on schedule.

VDC

Virtual Design and Construction (VDC) is a service that uses digital tools to create virtual models of buildings. These digital models are then evaluated before ground is even broken, allowing project teams to optimize the way a building is constructed.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China’s rapidly growing IoT market driving smart cities and industrial automation, becoming a global leader

internet of things corporate presentation 10 638

The Fourth Industrial Revolution describes a dramatic step change in all of our lives. The confluence of high internet speeds, big data, the Internet of Things (IoT), analytics and artificial intelligence (AI) will fundamentally alter the way we live and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Covid-19 is accelerating the transition to smart and safe cities with technology to build resilience

smartcities

Cities are powerful engines of economic growth, , more than half of the world’s population lives in an urban area or city and it is estimated 70 per cent of the world’s population will live in cities by 2050.  Urbanization’s…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Software is becoming more vulnerable to cyber attacks, CVE identifies common vulnerabilities exploited by state and nonstate actors

vulnerabilites

In computer security, a vulnerability is a flaw or weakness in a system or network that could be exploited by a threat actor, such as an attacker, to manipulate or cause damage to the system in some way.  To exploit a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s RTML to automatically create novel chip designs of Application-Specific Integrated Circuits (ASICs) for defense machine learning systems

RTML 619 316

A grand challenge in computing is the creation of machines that can proactively interpret and learn from data in real time, solve unfamiliar problems using what they have learned, and operate with the energy efficiency of the human brain. While…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Game theory uses mathematics to model human decisionmaking in competitive situations. It is ideally suited for analyzing military situations

Game theory decision tree from the 2005 2006 analysis

Game theory is a theoretical framework for conceiving social situations among competing players. According to game theory, the actions and choices of all the participants affect the outcome of each. In some respects, game theory is the science of strategy,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SIGMA deployed city wide Internet of Things (IoT) network to provide real time situational awareness of CBRNE threats

darpasigma 1

Since the invention of nuclear power, there have been numerous “accidents.” From Three Mile Island and Chernobyl to the more recent problems in Fukushima, it would seem nuclear power is not fully under our control. Recently  a Chinese scientist  has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here