Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 11 results for Cyber + Resources RSS
04/13/2018
Norman A. Whitaker is a Microsoft distinguished scientist and managing director of Microsoft Research Special Projects. As head of that group, he provides a structure for projects with focused objectives aimed at altering and expanding what people imagine is possible with technology.
05/18/2015
How can society responsibly reap the benefits of big data while protecting individual privacy?
| Cyber | Data | ISR |
05/18/2015
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information is essential, particularly for national security. The Information Innovation Office (I2O) sponsors basic and applied research in three thrust areas to ensure information advantage for the U.S. and its allies:
01/01/1969
ARPA research played a central role in launching the “Information Revolution,” including developing or furthering much of the conceptual basis for ARPANET, a pioneering network for sharing digital resources among geographically separated computers. Its initial demonstration in 1969 led to the Internet, whose world-changing consequences unfold on a daily basis today. A seminal step in this sequence took place in 1968 when ARPA contracted BBN Technologies to build the first routers, which one year later enabled ARPANET to become operational.
01/01/2016
The 21st century has brought with it the ever more urgent need for automated, scalable, machine-speed vulnerability detection and patching as more and more systems—from household appliances to major military platforms—get connected to, and become dependent upon, the internet. Finding and countering bugs, hacks, and other cyber infection threats have effectively been artisanal: professional bug hunters, security coders, and other security pros work endless hours, searching millions of lines of code to find and fix vulnerabilities that those with ulterior motives can exploit. This is a sluggish process that can no longer can keep pace with the relentless stream of threats.