Torpedoes are self-propelled guided projectiles that operate underwater and are designed to detonate on contact …
Read More »Masonry Layout
DARPA calls for Neurological and Internal Organ Regeneration Biotechnology for wounded warriors
Some parts of our bodies can repair themselves quite well after injury, but others don’t …
Read More »Rapid rise in drone operations require optimal mission-planning, Traffic Management, and drone management software
Drones are increasingly making an impact on society and economy. Drones are used by the …
Read More »Countries led by Russia, US and China employing Supercavitation technologies to develop supersonic Submarines, Vessels, and Torpedoes
One of the biggest problems with trying to get torpedos to travel faster is the …
Read More »Sense and Avoid (SAA) technologies for Safe integration of Unmanned Aircraft Systems (UAS) into Civil Airspace
Unmanned Aerial Vehicles (UAVs) are growing at frentic pace driven by civil, consumer and military …
Read More »DARPA Launch Challenge to enable US DOD’s Operationally Responsive Space (ORS) strategy for Space warfare
Military today is more reliant on space than ever before including ISR, Electronic warefare, Communications, …
Read More »US adding space-based computing and analytic capabilities to Space Sensors for Ballistic and Hypersonic missile defence
US, Russia and China are in race for Hypersonic Weapons that shall provide prompt global …
Read More »Military developing Free Space Optical(FSO) or Laser communications for ultrafast secure communications that are harder to detect and disrupt
Free Space Optical or Laser communications is creating a new communications revolution, that by using …
Read More »DARPA’s SHIELD developed technologies for secure reliable authentication for ICs subject to hardware Trojans, cloning, counterfeit or recycling in Military systems that pose critical National Security Risk
Outsourcing of integrated circuit (IC) and printed circuit board (PCB) design, fabrication, packaging, and testing …
Read More »Threats to ICT supply chains including Counterfeit electronic components and Hardware Trojans present critical risk to military and security systems
Information and communications technology, encompassing digital services and infrastructure, cybersecurity and software, is ubiquitous throughout …
Read More »