Jul 01, 2012 14:18 UTC
US ORNL laser test
Readers who follow the tech press may be familiar with the concept of quantum computing. Computers use binary bits: on/off, yes/no, represented by 0 or 1. A quantum bit, or qubit, can be 1, or 0… or both. Whereas 111 = 7 in binary, and each number is a single choice among all the possibilities in the number of binary digits, 3 qubits can hold all 8 possibilities (0-7), which means you can do calculations on all of them at once. The more qubits used, the more computation, so 32 qubits theoretically gets you 2 to the 32nd power computations (about 4.3 billion) at once – much more power than conventional computing, and it keeps on rising exponentially.
It’s worth noting that quantum computing has limits, and areas where it will not be suitable for computing tasks. They are not fully understood yet, but have been shown to exist at the theoretical level. So far, all we can say is that certain kinds of problems will be solved much, much more quickly. The uses of such a system for searching large domains of information, cracking codes, creating codes, or running simulations that include the quantum level (as a number of modern physical and medical science applications do) are clear. As an additional benefit, quantum cryptography methods benefit from quantum principles. Eavesdropping is not only incredibly difficult, it will create noticeable interference.
Various American agencies continue to be interested in the field, which has also begun finding commercial applications.
Continue Reading… »
Feb 16, 2012 13:25 UTC
Latest updates: Next-Gen Missile Termination.
AARGM Concept
(click to view larger)
In early FY 2011, DARPA awarded a pair of initial contracts for something called the Triple Target Terminator. In their own words:
“The Triple Target Terminator (T3) program will develop a high speed, long-range missile that can engage air, cruise missile, and air defense targets. T3 would be carried internally on stealth aircraft or externally on fighters, bombers and UAVs. The enabling technologies are: propulsion, multi-mode seekers, data links, digital guidance and control, and advanced warheads. T3 would allow any aircraft to rapidly switch between air-to-air and air-to-surface capabilities. T3′s speed, maneuverability, and network-centric capabilities would significantly improve U.S. aircraft survivability and increase the number and variety of targets that could be destroyed on each sortie.”
Oddly, T3 sounds very similar to an ongoing Air Force Research Laboratory project – and seems to confirm a trend toward multi-guidance, multi-role smart weapons. But can the USAF develop and field its desired Next Generation Missile from among these development programs? Seems not.
Continue Reading… »
Feb 13, 2012 11:30 UTC
We welcome the Department’s better performance in controlling project-level cost increases, but remain concerned that total costs of the top 15 projects continue to rise for other reasons each year. Projects approved since 2002 have shown significantly lower overall cost growth than those approved before this date and since 2008 there has been no overall cost increase from project-specific technical issues. However, in 2010-11 the forecast costs to complete the 15 largest defence projects still increased by £466 million overall [DID: about $735M], and the Department continues to struggle to live within its means.
A note on variables that a Department cannot control: macro-economic factors such as exchange rate changes accounted for 38% of the 2010-2011 increase. Meanwhile the National Audit Office (NAO) reviewed the way the Ministry of Defence is handling reductions in the size of its workforce.
Continue Reading… »
Nov 08, 2011 23:30 UTC
Latest updates: DARPA’s programs.
Taking on the Cyber Enemy
In response to the growing threats to US military and civilian networks, the Pentagon has unveiling its first formal cyber strategy.
This follows a series of events over the last few years that have escalated cyber attacks against networks and infrastructure to warlike events. For example, an unidentified foreign national penetrated the internal networks of the Department of Defense (DoD) with an infected thumbdrive in 2008. In 2009, a virus known as Stuxnet, suspected of being the product of Israeli-US government collaboration, shutdown an Iranian nuclear power plant. And in 2011, defense contractor Lockheed Martin suffered a major cyber attack that was suspected of being carried out by the Chinese government.
While the Pentagon has struggled to combat these threats, it has also had to fight some within its own ranks, as well as other agencies, for authority in cyberspace. This article focuses on the growing cyber threat to US military and civilian infrastructure and the efforts being made by the Pentagon to deal with these threats.
Continue Reading… »