Military Embedded Systems

Company Directory

U.S. Department of Defense (DoD)

1400 Defense Pentagon
Washington, DC 20301-1400
U.S. Department of Defense (DoD)
Articles related to U.S. Department of Defense (DoD)

Oman will upgrade software subsystems on its F-16 - News

January 08, 2018
WASHINGTON. State Department officials approved a possible Foreign Military Sale to Oman of items and services to support an incremental Operational Flight Profile (OFP) software upgrade for F-16 subsystems, as well as Identification Friend or Foe (IFF), and secure communications equipment for Mode 5 operations for an estimated cost of $62 million.

Defense Dept. mounts initiative to support university-industry research and cooperation - News

January 04, 2018
ARLINGTON, Va. The U.S. Department of Defense (DoD) has announced an award competition for the Defense Enterprise Science Initiative (DESI), a pilot program that supports university-industry collaboration in the area of use-inspired basic research. DESI is sponsored by the Basic Research Office, Office of Assistant Secretary of Defense for Research and Engineering, and executed in collaboration with the Air Force Office of Scientific Research, the Air Force Research Laboratory, and the Army Research Office.

Fiscal 2018 defense bill authorizes an increase in pay and troops - News

December 14, 2017
MCLEAN, Va. The Fiscal 2018 National Defense Authorization Act (NDAA) authorizes an estimated $700 billion for the Defense Department,'s Amy Bushatz reports. The bill includes $634 billion for the base budget and $66 billion for the war budget. President Donald Trump formally signed the 2018 defense bill earlier this week and Congress still needs to pass the accompanying appropriations bill to keep the government up and running.

Qatar FMS approved to include cybersecurity & F-15QA aircraft infrastructure - News

November 06, 2017
WASHINGTON. State Department officials approved a possible Foreign Military Sale (FMS) to Qatar for support of its F-15QA multi-role fighter aircraft program for an estimated cost of $1.1 billion.

DARPA's Electronics Resurgence Initiative addresses eventual saturation of Moore's Law - Story

October 05, 2017
In an effort to address Moore's Law before engineers run out of time, Defense Advanced Research Project Agency (DARPA) officials recently launched the Electronics Resurgence Initiative (ERI). The initiative consists of six programs in which engineers from government, industry, and academia, will spend the next four years scrutinizing the three pillars of the program - materials and integration, circuit design, and systems architecture - to ensure that technological progress continues at the same rapid pace. Moore's Law - the prediction that the number of transistors in a dense integrated circuit doubles approximately every two years - has held true in the microelectronics world over the past five decades. Now, however, engineers realize that the fast clip of technological innovation will eventually outpace Moore's Law.

DoD establishes Joint Interagency to facilitate information sharing - News

September 15, 2015
SCHRIEVER AIR FORCE BASE, Colo. The Department of Defense with U.S. Strategic Command, Air Force Space Command, and the intelligence community will establish a Joint Interagency Combined Space Operations Center (JICSpOC) to be located at Schriever Air Force Base in Colorado Springs, Colorado. The goal of the center will be to create unity of effort and facilitate information sharing across national security space enterprise.

DoD's new cyberstrategy includes academia partnering - Story

June 10, 2015
The U.S. Department of Defense (DoD) operates the world's largest network - a diffuse patchwork of thousands of networks - and, as you can imagine, it's a giant target for state-sponsored and other malicious cyberattackers. One of the biggest factors enabling cyberspace attacks is the fact that security simply wasn't factored in when the Internet was designed. It was intended to serve as an open system to allow scientists and researchers around the world to connect and share data quickly and easily, which it does, but at the same time it creates an Internet-security "Achilles' heel" that allows attackers to do the same.