Defense Advanced Research Projects AgencyTagged Content List

Software Programming

Pushing the boundaries of computer coding, including language development

Showing 17 results for Programming RSS
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information is essential, particularly for national security. To ensure information advantage for the U.S. and its allies, the Information Innovation Office (I2O) sponsors basic and applied research in three thrust areas: Symbiosis, Analytics, and Cyber.
05/18/2015
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information is essential, particularly for national security. The Information Innovation Office (I2O) sponsors basic and applied research in three thrust areas to ensure information advantage for the U.S. and its allies:
05/01/2002
DARPA established its High-Productivity Computing Systems (HPCS) program, with a goal of revitalizing supercomputer research and markets, and incubating a new breed of fast, efficient, easier-to-use and affordable machines. DARPA made initial grants to five key players: IBM, Cray, Hewlett-Packard, Silicon Graphics, and Sun Microsystems.
03/19/2013
Machine learning – the ability of computers to understand data, manage results, and infer insights from uncertain information – is the force behind many recent revolutions in computing. Email spam filters, smartphone personal assistants and self-driving vehicles are all based on research advances in machine learning. Unfortunately, even as the demand for these capabilities is accelerating, every new application requires a Herculean effort. Even a team of specially-trained machine learning experts makes only painfully slow progress due to the lack of tools to build these systems.
03/06/2014
During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct, especially at scale. Unfortunately, in spite of developers’ best efforts, software errors are at the root of most execution errors and security vulnerabilities.