News
Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
YEARS AS AN ENGINEER: 17 COLLEGE (S) ATTENDED: University of Virginia COLLEGE MAJOR/DEGREE: Master of Engineering in Mechanical and Aerospace Engineering EXPLAIN YOUR CURRENT JOB ROLE: I work at ...
International Secretary, Vice President HR/Support, Vice President, AFCEA Educational Foundation ...
BEYOND MACH 5: HYPERSONIC WEAPONS AND THE MASINT SOLUTION DIA TECHINT 2025 co-sponsored by the Defense Intelligence Agency and AFCEA International, DIA TECHINT brings together leaders and experts from ...
YEARS AS AN ENGINEER: 2 COLLEGE ATTENDED: Virginia Tech COLLEGE MAJOR/DEGREE: B.S. Mechanical Engineering EXPLAIN YOUR CURRENT JOB ROLE: I am a mechanical design engineer for an HVAC construction ...
Data classification and its close cousin, asset identification, are the gnarly knot of security programs. Are there any data or servers that are *not* critical on a program? Probably not. Every risk ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
At its core, CHSS builds on the seL4 microkernel as a secure foundation and root of trust. seL4 is formally verified, which is a powerful but labor-intensive process to mathematically prove the ...
The use of artificial intelligence (AI) in communications networks is quickly advancing, especially with AI applied to radio access networks, with so-called AI-RAN. At the core of mobile wireless ...
China’s rule by law seemed far from the rule of law. Still, the regulation demands that content creators clearly indicate on the material, with a label or watermark, that it is a computer-generated ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results