News

Are there more efficient ways to streamline the ARTPC's data identification process, or would these just add layers to what is envisioned as an already more simplified effort? Discuss your ideas, ...
Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
BEYOND MACH 5: HYPERSONIC WEAPONS AND THE MASINT SOLUTION. DIA TECHINT 2025 co-sponsored by the Defense Intelligence Agency and AFCEA International, DIA TECHINT brings together leaders and experts ...
Connor Dolan worked at a company called Orbital Sciences before Boeing, and he got to work on a NASA satellite. They put it on a big table called a "shaker table" and shook it really hard to mimic the ...
EXPLAIN YOUR CURRENT JOB ROLE: I am a mechanical design engineer for an HVAC construction company. We design systems for heating, cooling, ventilating and conditioning the air in buildings. Our ...
Analysts have laid out three general criteria that would comply with international standards for collecting OSINT as evidence. The first is clear and lawful identification of the sources, especially ...
For PACAF, they demonstrated operational C2 prototypes, with industry representatives showing their technologies as well as Air Force exhibitions of in-house made software solutions, including a key ...
According to the Program Executive Officer Soldier within the Army, the Nett Warrior technology connects leaders in the field to the network in Brigade Combat Teams, allowing for soldiers to make ...
A system of systems: a possible self-service carryon luggage screening solution could have passengers inserting their suitcases into the device and walking through an advanced passenger screener ...
Researchers at the New Mexico Institute of Mining and Technology who have converted dead birds into flying drones are now considering the possibility of adding an array of technologies, including ...
Within two years, U.S. diplomats will receive unclassified/official use-only threat intelligenced through mobile devices. The move toward mobility is one piece of the State Department’s Bureau of ...
Chinese-backed attacks illustrate the U.S. vulnerability against the adversaries. In response, the Pentagon is fast-tracking its Cyber Command 2.0 review, expected to be completed soon, to counter the ...