Defense Advanced Research Projects AgencyTagged Content List

Analytics for Data at Massive Scales

Extracting information from large data sets

Showing 53 results for Analytics RSS
August 11, 2016,
George Mason University – Arlington, VA Campus (Founders Hall)
The Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO) is hosting a Proposers Day in support of the Hierarchical Identify Verify Exploit (HIVE) Program on August 11, 2016, at George Mason University – Arlington, VA Campus (Founders Hall), located at 3351 North Fairfax Drive, Arlington, VA, 22201, from 9:00 AM to 12:30 PM, Eastern Daylight Time (EDT).
December 14, 2015,
DARPA Conference Center
The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) is sponsoring a Proposers Day to provide information to potential proposers on the objectives of the anticipated Rapid Attack Detection, Isolation and Characterization (RADICS) Broad Agency Announcement (BAA). The Proposers Day will be held on Monday, December 14, 2015, from 9:00 AM to 11:30 AM (ET) at the DARPA Conference Center, located at 675 N. Randolph Street, Arlington, Virginia 22203. For more information, visit FedBizOpps.gov.
The United States Government has an interest in developing and maintaining a strategic understanding of events, situations, and trends around the world, in a variety of domains. The information used in developing this understanding comes from many disparate sources, in a variety of genres, and data types, and as a mixture of structured and unstructured data. Unstructured data can include text or speech in English and a variety of other languages, as well as images, videos, and other sensor information.
The Anomaly Detection at Multiple Scales (ADAMS) program creates, adapts and applies technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts. The initial application domain is insider threat detection in which malevolent (or possibly inadvertent) actions by a trusted individual are detected against a background of everyday network activity.
Expanded global access to diverse means of communication is resulting in more information being produced in more languages more quickly than ever before. The volume of information encountered by DoD, the speed at which it arrives, and the diversity of languages and media through which it is communicated make identifying and acting on relevant information a serious challenge. At the same time, there is a need to communicate with non-English-speaking local populations of foreign countries, but it is at present costly and difficult for DoD to do so.