News

Procurement officers can now browse and acquire sole-source eligible technology in one centralized place with SBIR Advisors’ creation of a Small Business Innovation Research (SBIR) Phase III catalog ...
Meet the AFCEA International Headquarters Leadership. Meet the executive team leading the way for the association's global membership.
BEYOND MACH 5: HYPERSONIC WEAPONS AND THE MASINT SOLUTION. DIA TECHINT 2025 co-sponsored by the Defense Intelligence Agency and AFCEA International, DIA TECHINT brings together leaders and experts ...
EXPLAIN YOUR CURRENT JOB ROLE: I am a mechanical design engineer for an HVAC construction company. We design systems for heating, cooling, ventilating and conditioning the air in buildings. Our ...
Connor Dolan worked at a company called Orbital Sciences before Boeing, and he got to work on a NASA satellite. They put it on a big table called a "shaker table" and shook it really hard to mimic the ...
PEO IEW&S personnel are also continuing to look for ways to improve the system. To ensure that Manpack is living up to its potential and meeting the needs of the warfighters, leaders have established ...
The United Kingdom Ministry of Defence has published its U.K. Strategic Defence Review (SDR), a government-led report that reassesses national security threats, sets long-term strategies and focuses ...
The National Security Agency (NSA) has validated Persistent Systems’ Wave Relay devices as IPsec VPN Gateway and MACsec components that can handle classified information, according to the mobile ...
While technology consortiums to advance emerging technologies are not new, the Quantum Economic Development Consortium (QED-C), headquartered in Arlington, Virginia, is unique. The QED-C is a first-of ...
Capt. Salvatore Calabro, Italian Navy Science and Technology Advice branch head, Office of the Chief Scientist, NATO, discussed quantum research projects currently underway, during TechNet ...
NASEM suggested the network include both the unclassified level to “maximize collaboration and sharing of scientific data, knowledge, and tools,” and the classified level to “enable secure analysis, ...
The increasing volume and sophistication of cyber threats have made semiautomated tools and techniques critical in detecting and responding to potential risks. Cybersecurity sensors are designed to ...