Jul 01, 2012 14:18 UTC
US ORNL laser test
Readers who follow the tech press may be familiar with the concept of quantum computing. Computers use binary bits: on/off, yes/no, represented by 0 or 1. A quantum bit, or qubit, can be 1, or 0… or both. Whereas 111 = 7 in binary, and each number is a single choice among all the possibilities in the number of binary digits, 3 qubits can hold all 8 possibilities (0-7), which means you can do calculations on all of them at once. The more qubits used, the more computation, so 32 qubits theoretically gets you 2 to the 32nd power computations (about 4.3 billion) at once – much more power than conventional computing, and it keeps on rising exponentially.
It’s worth noting that quantum computing has limits, and areas where it will not be suitable for computing tasks. They are not fully understood yet, but have been shown to exist at the theoretical level. So far, all we can say is that certain kinds of problems will be solved much, much more quickly. The uses of such a system for searching large domains of information, cracking codes, creating codes, or running simulations that include the quantum level (as a number of modern physical and medical science applications do) are clear. As an additional benefit, quantum cryptography methods benefit from quantum principles. Eavesdropping is not only incredibly difficult, it will create noticeable interference.
Various American agencies continue to be interested in the field, which has also begun finding commercial applications.
Continue Reading… »
Jun 19, 2012 14:19 UTC
In June 2012, US Space and Naval Warfare Systems Center Atlantic in Charleston, SC issued 14 multiple-award contracts to help secure and defend American military networks and data. These 14 contractors may compete for the task orders under the indefinite-delivery/ indefinite-quantity, cost-plus-fixed-fee, performance-based, multiple award umbrella contract, with provisions for fixed-price-incentive and firm-fixed-price orders.
Contract options which could bring their cumulative value to $98.7 million, and extend the timeframe from June 2013 to June 2017. The winning firms were all small business qualifiers under US government rules, and include:
Continue Reading… »
Dec 30, 2011 07:45 UTC
DID would like to wish all of our readers a Happy New Year!
- So, what milestones does India’s Ministry of Defence want to highlight from 2011?
- Dynamint Nobel is still working on its classic Panzerfaust, whose modern versions have proven quite popular. The lightweight versions are strong urban warfare weapons, and the next step is integrating them with remote weapons stations for roles like harbor defense.
- Switchblade UAVs to launch from subs? While they could retain their kamikaze capabilities, the reality is that sub-launched UAVs are going to be 1-shot items at first. Why not adapt an existing UAV designed for that?
- InnoCentive offers a $15,000 reward for a concept or design of a medical transportation device that would enable a rescuer to quickly and safely transport an injured person away from an active combat site.
- Range remains a significant challenge for nonlethal weapons.
- Aviation Week Intelligence Network really doubts that the US Navy will be able to keep its resolutions about fielding modernized DDG-51 Flight III destroyers. Worse, operations and maintenance costs are going to be a problem for the existing fleet. Meanwhile Walter Pincus is challenging the Navy’s numbers and Bloomberg View bemoans how LCS has turned out so far.
- At least the US Navy is not facing a fire on one of its nuclear submarines, unlike its Russian counterpart yesterday.
- Thursday was not a good day for the Russian military since they also had a Su-24 crash. These crashes have happened like clockwork over the years [in Russian]. Nobody died in either incident yesterday though some people appear to have been injured in the submarine fire.
- Yet another cybersecurity acquisition for Raytheon: Henggeler Computer Consultants, Inc. It’s the 2nd this month and the 10th in the last 4 years.
Nov 08, 2011 23:30 UTC
Latest updates: DARPA’s programs.
Taking on the Cyber Enemy
In response to the growing threats to US military and civilian networks, the Pentagon has unveiling its first formal cyber strategy.
This follows a series of events over the last few years that have escalated cyber attacks against networks and infrastructure to warlike events. For example, an unidentified foreign national penetrated the internal networks of the Department of Defense (DoD) with an infected thumbdrive in 2008. In 2009, a virus known as Stuxnet, suspected of being the product of Israeli-US government collaboration, shutdown an Iranian nuclear power plant. And in 2011, defense contractor Lockheed Martin suffered a major cyber attack that was suspected of being carried out by the Chinese government.
While the Pentagon has struggled to combat these threats, it has also had to fight some within its own ranks, as well as other agencies, for authority in cyberspace. This article focuses on the growing cyber threat to US military and civilian infrastructure and the efforts being made by the Pentagon to deal with these threats.
Continue Reading… »
Nov 08, 2011 18:07 UTC
The steady rise in the number and variety of electronic systems in military equipment has spawned 2 trends. One has been reduced readiness, as multiplying points of failure consistently push readiness rates down and maintenance costs up, for each successive generation of advanced equipment. The other is a security issue, as equipment “obsoletes itself every 18 months, is made in unsecure locations and [in an industry where] we have absolutely no market share influence [any more].”
The defense industry that played such a big role in building Silicon Valley now grapples with ways to ensure that chips and circuits don’t have hidden design codes in them. They’re also grappling with the issue of counterfeit electronics.
Continue Reading… »