Defense Advanced Research Projects AgencyTagged Content List

Network Technology

Relating to nodes in a connected architecture

Showing 9 results for Networking + ISR RSS
05/18/2015
The mission of the Information Innovation Office (I2O) is to ensure enduring advantage for the U.S. and its allies across a broad range of information technologies through the advancement of core technical foundations as well as the design of novel application concepts based on these foundations. I2O’s core technical work ranges from artificial intelligence and data analysis to secure engineering and formal methods.
I2O explores game-changing technologies in the fields of information science and software to anticipate and create rapid shifts in the complex national security landscape. Conflict can occur in traditional domains such as land, sea, air, and space, and in emerging domains such as cyber and other types of irregular warfare. I2O’s research portfolio is focused on anticipating new modes of warfare in these emerging areas and developing the concepts and tools necessary to provide decisive advantage for the U.S. and its allies.
01/10/2017
Troops in remote regions around the world often struggle to operate with limited networks for data sharing and communication—an encumbrance that is amplified when U.S. troops need to share classified or otherwise secure data with each other and coalition partners. The usual process for sharing such information requires an end-to-end connection to secure servers via a dedicated digital “pipe” approved for the specific security level of data being transmitted.
January 31, 2017,
MITRE Corporation
DARPA will host a Proposers Day in support of DARPA HR001117S0009, Secure Handhelds on Assured Resilient networks at the tactical Edge (SHARE) program on January 31, 2017 at The MITRE Corporation, 7515 Colshire Dr, McLean, VA 22102 from 9 a.m. to 2 p.m. Advance registration is required.
The security of communications and information for troops operating in tactical warfighting environments is limited. At the tactical edge, end-to-end connections on secure servers are typically unreliable, negatively impacting operations and coordination with coalition partners.