Latest Stories
Articles AR/AI
Revolutionizing Electronic Warfare: Unleashing the Power of High-Performance Software-Defined Radios
In the ever-evolving landscape of electronic warfare (EW), the imperative for technological prowess has never been more pronounced. At the vanguard of this evolution stands a technological marvel — high-performance software defined radios (SDRs).
Articles Electronics & Computers
Deterministic and Modular Architecture for Embedded Vehicle Systems
The next generation of Army ground vehicle systems aim to provide the warfighter with advanced capabilities while ensuring cyber resiliency. One key technology, Ethernet, has enabled the modernization of military ground vehicles by providing a broad range of beneficial features. Read on to learn more.
Articles Information Technology
Design Approaches for Established and Emerging RF Receiver Architectures
Traditionally, heterodyne architectures have been the preferred choice for radio frequency (RF) and millimeter-wave (mmWave) receiver architectures, excelling in noise performance, dynamic range, frequency coverage, selectivity, and reduction of EMI. However, recent advancements in high sample rate analog to digital converters (ADCs) and embedded signal processing have prompted a reassessment of both architectures.
Articles Information Technology
Rydberg Technologies Shows Potential of Long-Range RF with Quantum Sensor at NetModX23
Rydberg Technologies demonstrated the use of an atomic receiver for long-range RF applications during the NetModX23 event. Shortly after the completion of the NetModX event, Aerospace & Defense Technology caught up with Rydberg CEO David Anderson to discuss the demonstration of their atomic receiver prototype and the future potential of quantum sensing in real-world military RF applications.
INSIDER Sensors/Data Acquisition
New Report Finds Need for Defense Laboratories to Improve Quantum Workforce Planning
Quantum technologies build on quantum physics to process and communicate information in ways that existing technologies can't. Nations leading quantum...
Articles Information Technology
FACE Technical Standard Offers MOSA Lessons for Safety-Critical Software in Any Sector
The FACE Technical Standard shows that the benefits of MOSA can be leveraged in practice. Automated tools, with which regression test can be automated as the same code is leveraged in a variety of tool chains, go a long way toward ensuring that reused modules are fit for purpose in their new environment.
Articles Information Technology
Adamant: A Soon-to-be Open Source, Mission-Critical Flight Software Framework Written in Ada
By embracing an open-source approach, Adamant opens the doors to wider collaboration, community contributions, and the exchange of best practices in the discipline of flight software. Adamant open-source on GitHub will be released later this year.
Articles Information Technology
Benefits and Challenges of Direct-RF Sampling for Avionic Platforms
Recent advances in the operation of advanced CMOS processes for extremely high-speed and high dynamic range analog-to-digital (ADC) and digital-to-analog (DAC) data converters has led to their use in directly sampling microwave and even millimeter wave signals.
Application Briefs Information Technology
5G OSIRIS Testing
Lockheed Martin delivered the final Phase 1 Initial Prototype 5G testbed variant for the Open Systems Interoperable and Reconfigurable Infrastructure Solution to the Marine Corps program management team aboard Marine Corps Base Camp Pendleton, CA, to begin mobile network experimentation.
Products Photonics/Optics
New Products
See the new products, including the NDT 1000 inspection system, a PU-5200 certifiable display computer, RJ45 connectors, servers, and more.
INSIDER Information Technology
Report Finds F-35 Program Cannot Track Millions in Spare Parts
A new 35-page report published by the Government Accountability Office (GAO) finds that the Department of Defense's (DoD) F-35 Joint Program Office has lost track of millions...
INSIDER Design
MIT Report Finds US Lead in Advanced Computing is Almost Gone
A new report from an MIT researcher and two colleagues sheds light on the decline in U.S. leadership in the development of domestically produced advanced computing. The...
INSIDER RF & Microwave Electronics
Army Gets a Clearer View of Multi-Domain Battlefield
The Assured Positioning, Navigation and Timing/Space Cross-Functional Team (APNT/Space CFT) takes a multi-dimensional approach to understanding and preparing for future warfare. The...
Articles Communications
Transforming Battlespace Communications
The Russian invasion in Ukraine has certainly raised the security stakes and intensified the need for simultaneous communications streams over a single platform.
Articles Electronics & Computers
The Next Generation of Mission-Critical Communications Infrastructure is Here
The critical role of spectrum superiority in the success of battlefield campaigns is evidenced by the enormous investments being made in electronic warfare (EW)...
Products Information Technology
New Products
Modeling and Simulation Software
COMSOL (Burlington, MA) announced a major update to the COMSOL Multiphysics ® software version 6.0. The update builds out the Model Manager server with a web interface — an...
Articles Communications
What is Pulse Shaping?
Pulse shaping, as it is done today, is an effort to fix fidelity issues caused by the transmitting amplifier and is accomplished by a combination of imperfect methods, most external to the amplifier. This article...
INSIDER Data Acquisition
Portable Servers Enhance Army Geospatial Intelligence Training
The Army Geospatial Center has assisted in further modernizing the 412th Theater Engineer Command’s Engineer-Focused Intelligence Training (ENFIT), geospatial intelligence...
INSIDER Information Technology
New Method Accelerates AI Decision-Making
A new solution compresses and offloads critical data from battlefield machines more efficiently, enabling faster AI processing and decision-making on the battlefield.
INSIDER Data Acquisition
Special Forces Get a Small, Powerful Cyber Support Device
U.S. Special Operations Forces have a new aid in the fight against cyber-attacks. The Tactical Key Loader (TKL) cryptographic key device, which answers the Army’s call for the...
INSIDER Defense
Creating Cross-Domain Kill Webs in Real Time
Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration of the...
INSIDER Data Acquisition
Short-Range Air Defense System Will Counter Small Unmanned Aerial System Threats
Northrop Grumman Corporation’s Forward Area Air Defense Command and Control (FAAD C2) system has been selected by the U.S. Department of Defense (DOD) as...
Briefs Information Technology
Covariance and Uncertainty Realism in Space Surveillance and Tracking
Characterizing uncertainty in estimating the state of a resident space object is one of the fundamentals of many space surveillance tasks.
Briefs Information Technology
Co-Prime Frequency and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing
A co-prime array uses two uniform linear subarrays to construct an effective difference coarray with certain desirable characteristics, such as a high number of degrees-of-freedom for DOA estimation. In this case, the co-prime...
Briefs Information Technology
Multi-Temporal Analysis of Underbody IED Theater Events on Ground Vehicles
Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved...
Briefs Aerospace
Ontology for Insider Threat Indicators
The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending...
Briefs Information Technology
Data Mining in Cyber Operations
Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the...
Briefs Information Technology
Framework for Resilient Remote Monitoring
This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.
System administrators and cyber defenders continue to face challenges in...
Briefs Information Technology
Communication Protocol for CyAMS and the Cyber Fighter Associate Interface
This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.
As the military adopts more networked...
Top Stories
INSIDERWeapons Systems
The B-21 Raider Starts Flight Testing - Mobility Engineering Technology
INSIDERTest & Measurement
Turkey's KAAN Combat Aircraft Completes First Flight - Mobility Engineering...
INSIDERRegulations/Standards
FAA Expands Boeing 737 Investigation to Manufacturing and Production Lines -...
INSIDERElectronics & Computers
New Video Card Enables Supersonic Vision System for NASA's X-59 Demonstrator -...
ArticlesPower
Rim-Driven Electric Aircraft Propulsion - Mobility Engineering Technology
INSIDERManufacturing & Prototyping
Army Ends Future Attack and Reconnaissance Helicopter Development Program -...
Webcasts
Automotive
How to Safely Control the Power to Your Vehicle
Software
Digital Twins and Simulation for Accelerated Automotive Product...
Automotive
EV Bodyshop Metrology: The Same but Different
Manufacturing & Prototyping
Integrating Additive Manufacturing Into Aerospace Production
Aerospace
From Data to Decision: How AI Enhances Warfighter Readiness