Skip to main content

Home/ OARS funding Space/ Group items matching "business" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
MiamiOH OARS

No Gimbal Internet Nodes in Space (NoGINS) Study Breadboard Prototype - Federal Business Opportunities: Opportunities - 0 views

  •  
    The selected topic in this special notice is designed to identify research directions in the area of Space, Future Space Operations and Architectures. The resulting studies will perform applied research and analysis to determine the state-of-the-art, identify technology gaps, execute trade studies, develop concepts and performance metrics, and test concepts using a breadboard setup in a controlled and measureable laboratory environment.
MiamiOH OARS

Capabilities for Cyber Resiliency - Federal Business Opportunities: Opportunities - 0 views

  •  
    The Air Force Research Laboratory's (AFRL's) strategic vision for cyber superiority is to ensure the success of cyberspace-dependent missions in air, space, and cyberspace. The purpose of this BAA is to develop the next-generation technologies necessary to achieve this vision, so that they can be integrated and transitioned into warfighting capabilities. Providing mission assurance in an Air Force context means supporting the notions of Global Vigilance, Global Reach, and Global Power across the five enduring AF core missions: air and space superiority; intelligence, surveillance, and reconnaissance; rapid global mobility; global strike; and command and control
MiamiOH OARS

Configuration Security (ConSec) - Federal Business Opportunities: Opportunities - 0 views

  •  
    The ConSec program will develop a system to automatically generate, deploy, and enforce configurations of components and subsystems for use in military platforms. These configurations should address system vulnerabilities and minimize attack surfaces while maintaining expected functionality and performance. By viewing each individual component's configuration as elements of the composed system's behavior and security, more secure configurations can be developed and deployed to enhance security without requiring new software development or large hardware changes.
‹ Previous 21 - 23 of 23
Showing 20 items per page