Defense Advanced Research Projects AgencyTagged Content List

Software Programming

Pushing the boundaries of computer coding, including language development

Showing 14 results for Programming RSS
I2O explores game-changing technologies in the fields of information science and software to anticipate and create rapid shifts in the complex national security landscape. Conflict can occur in traditional domains such as land, sea, air, and space, and in emerging domains such as cyber and other types of irregular warfare. I2O’s research portfolio is focused on anticipating new modes of warfare in these emerging areas and developing the concepts and tools necessary to provide decisive advantage for the U.S. and its allies.
05/18/2015
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information drives success. This is not lost on military leaders who well appreciate the critical importance of information for national security. As Sir Francis Bacon wrote in 1597, “Knowledge is power.”
05/01/2002

DARPA established its High-Productivity Computing Systems (HPCS) program, with a goal of revitalizing supercomputer research and markets, and incubating a new breed of fast, efficient, easier-to-use and affordable machines. DARPA made initial grants to five key players: IBM, Cray, Hewlett-Packard, Silicon Graphics, and Sun Microsystems.

03/19/2013
Machine learning – the ability of computers to understand data, manage results, and infer insights from uncertain information – is the force behind many recent revolutions in computing. Email spam filters, smartphone personal assistants and self-driving vehicles are all based on research advances in machine learning. Unfortunately, even as the demand for these capabilities is accelerating, every new application requires a Herculean effort. Even a team of specially-trained machine learning experts makes only painfully slow progress due to the lack of tools to build these systems.
03/06/2014
During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct, especially at scale. Unfortunately, in spite of developers’ best efforts, software errors are at the root of most execution errors and security vulnerabilities.