News

Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
YEARS AS AN ENGINEER: 17 COLLEGE (S) ATTENDED: University of Virginia COLLEGE MAJOR/DEGREE: Master of Engineering in Mechanical and Aerospace Engineering EXPLAIN YOUR CURRENT JOB ROLE: I work at ...
International Secretary, Vice President HR/Support, Vice President, AFCEA Educational Foundation ...
BEYOND MACH 5: HYPERSONIC WEAPONS AND THE MASINT SOLUTION DIA TECHINT 2025 co-sponsored by the Defense Intelligence Agency and AFCEA International, DIA TECHINT brings together leaders and experts from ...
YEARS AS AN ENGINEER: 2 COLLEGE ATTENDED: Virginia Tech COLLEGE MAJOR/DEGREE: B.S. Mechanical Engineering EXPLAIN YOUR CURRENT JOB ROLE: I am a mechanical design engineer for an HVAC construction ...
Data classification and its close cousin, asset identification, are the gnarly knot of security programs. Are there any data or servers that are *not* critical on a program? Probably not. Every risk ...
Today, with almost infinite sources and publicly available sensors, open-source intelligence (OSINT) collection has achieved high sophistication and allows, for example, the ability to follow ...
With the current war in Ukraine, it’s clear that Russia’s modernization program has involved electronic warfare and signals intelligence and played a huge part in Russia’s combat advances and overall ...
Drug traffickers expand the use of submersible vessels to transport illicit substances as states struggle to detect them. This whack-a-mole game sees cartels improve the seaworthiness and technologies ...
Researchers at the New Mexico Institute of Mining and Technology who have converted dead birds into flying drones are now considering the possibility of adding an array of technologies, including ...
At its core, CHSS builds on the seL4 microkernel as a secure foundation and root of trust. seL4 is formally verified, which is a powerful but labor-intensive process to mathematically prove the ...
China’s rule by law seemed far from the rule of law. Still, the regulation demands that content creators clearly indicate on the material, with a label or watermark, that it is a computer-generated ...