Category Strategy, Policy & Governance

China J-20 stealth fighter’s combat missions in the South China Sea, advancing China’s A2/AD strategy

j 20 image30

China’s progress toward military superpower status continues to accelerate. According to the latest one, the People’s Liberation Army Air Force (PLAAF) now ranks as the third-largest air force in the world with 2,250 combat aircraft. The People’s Liberation Army Navy…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SCEPTER

Militaries are facing complex operational and tactical environments such as the increasing challenge of non-state/lone actors; persistent rapid technological development along with its broad availability via the internet; and the advent and expansion of new domains of possible threat such…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyberwarfare among US, China and Russia driving Secure Internets cyber technologies

russia internet isolated

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Product Requirements Document (PRD)

The Product Requirements Document or PRD describes all aspects of a new idea required or desired to make its realization a success. The PRD is the bridge between the often vague project briefing and the highly detailed engineering implementation plan.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Russia’s DARPA, the Advanced Research Foundation aims breakthrough high-risk research and development

russiahumanoid 1

Emerging technologies such as space technology; 5G, Cloud computing, IoT, “big data” analytics, artificial intelligence, robotics, photonics, materials, nanotechnology; biotechnology; and quantum computing, have significant potential to create, significant social, economic, and military benefits. Therefore countries led by US, China and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Model-Based Systems Engineering (MBSE) for Satellites and Aerospace

Model Based Systems Engineering MBSE

A system is defined by NASA as  a construct or collection of different elements that together produce results not obtainable by the elements alone. Systems Engineering (SE) is defined as: The process by which a customer’s needs are satisfied through…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Contract Management of commercial and Government agencies

the government contract lifecycle graphic

When two companies wish to do business with each other, a contract specifies the activities entered into by both organizations and the terms through which they will each fulfill their parts of the agreement. Contracts affect business profitability in a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Product Lifecycle Management (PLM) in Aerospace and Defense

Product Lifecycle Management PLM

In the electronics industry, the majority of new products are an enhancement of an existing product. Typically new models are developed to be faster, smaller, lighter, or include additional functionality. However, occasionally an innovative, original concept will be conceived to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Transfer of Technology (ToT) best practices and tools.

technology transfer model

Technology transfer, or Tech Transfer a.k.a. transfer of technology (ToT), is a process in which technology or knowledge developed at one organization is transferred to another, typically for the purpose of commercialization.   Through this process, a donor site (either…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing security and military nexus between Pakistan, Turkey, Qatar and Malaysia may become threat to India in future

pakturkeyaz

Pakistan has managed to avoid being placed on the Financial Action Task Force (FATF) blacklist for now following support from all-weather ally China, traditional ally Turkey and Malaysia. The FATF charter mandates support of at least three member states to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here