Information Technology & Software

Displaying technologies 1 - 8 of 85 in total

ARC TITAN

ARC TITAN Provides: Radar Volume Processing, Visualization, and Data Distribution - Multiple Radar Types / Manufacturer Agnostic (NEXRAD, GEMATRONIC, EEC, ARC, etc.) - Multi-Radar Networks / 3D Mosaics Processing of Non-Radar Data - Aircraft tracks, lightning Sensors, satellite and model data Clutter and Anomalous Propagation Identification and Removal Meteorological Event Identification, Tracking, and Forecasting Precipitation Estimation, Vertically Integrated Liquid (VIL), Storm Severity Open Source Software supported via yearly license acquisition Roadmap I ntegration of 3rd Party Apps Visualization Enhancement OPIR Integration Open EWS Framework

Advanced Radar Company logo

Advanced Radar Company

Boulder, CO
arrow_forward

Atmospheric Optical Turbulence Monitoring and Prediction

Guidestar’s atmospheric optical turbulence sensing technology remotely measures atmospheric turbulence strength.  Guidestar uses these measurements in combination with a proprietary model to estimate a number of localized weather parameters to support operational decision making.  In addition, Guidestar’s model can use weather forecast data to predict atmospheric optical turbulence.

Guidestar Optical Systems, Inc. logo

Guidestar Optical Systems, Inc.

Longmont, CO
arrow_forward

Large-scale Secure Information Sharing (SIS)

Business collaboration is becoming increasingly digitized and automated. As organizations open up their computer systems to internal and external collaborations, security is an increasing concern. External partners and many internal employees must not be allowed to access certain sensitive data or applications.  Digital certificates are an existing tool to address this problem. However, managing the certificates can create a new problem for the IT department, especially in situations where there are many collaborators and roles change quickly. Dr. Edward Chow’s research group has built a system to enable Secure Information Sharing (SIS) at a very large scale with tools to simplify certificate management in dynamic situation. The technology was originally developed for the U.S. Military, which has the need for highly secure computer systems and also has many users with rapidly changing roles during times of crisis. 

arrow_forward

Measuring Voice Signal Enhancement

This technology measures the degree of enhancement made to a voice signal, reducing the need for human arbitrations and other various listening tests.  Statistically, voice signals are “non-stationary,” changing over time. The more a signal becomes corrupted, however, the more stationary its distribution of values becomes.  In this technology, the degree of reduction in the signal’s distribution indicates the degree of enhancement made to the signal. This invention quantifies the voice enhancement by comparing how stationary the distribution of values are between original and enhanced signals.

National Security Agency (NSA)- NSA Research Directorate logo

National Security Agency (NSA)- NSA Research Directorate

Ft. Meade, MD
arrow_forward

Efficient Asymmetric Secure iSCSI System

Dr. Edward Chow and Murthy Andukuri have designed an innovative efficient asymmetric secure iSCSI system to keep the data encrypted on a server, and to decrypt the data only when the client needs it. In this system, the iSCSI target saves the encrypted iSCSI payload generated by IPsec protocol to the target disk system, and returns the encrypted iSCSI content to the iSCSI initiator without additional IPsec encryption on the target site.  The solution is revolutionary in that it cuts the processing time significantly. The cut in processing time with the Asymmetric Secure iSCSI System will realize a large reduction in hardware costs. Most existing techniques utilize upper layer encryption and results in redundant encryption on the iSCSI payload if they use IPSec to protect the TCP/iSCSI header information. Expensive hardware accelerators would be needed to get the same performance out of these existing techniques. The design creates the encrypted iSCSI data without additional application layer encryption and significantly cuts total IPSec processing time. The iSCSI initiator can keep the encryption key and initial vector without having to share them with the iSCSI target applications. 

arrow_forward

Large-scale Secure Information Sharing (SIS)

Business collaboration is becoming increasingly digitized and automated. As organizations open up their computer systems to internal and external collaborations, security is an increasing concern. External partners and many internal employees must not be allowed to access certain sensitive data or applications.  Digital certificates are an existing tool to address this problem. However, managing the certificates can create a new problem for the IT department, especially in situations where there are many collaborators and roles change quickly. Dr. Edward Chow’s research group has built a system to enable Secure Information Sharing (SIS) at a very large scale with tools to simplify certificate management in dynamic situation. The technology was originally developed for the U.S. Military, which has the need for highly secure computer systems and also has many users with rapidly changing roles during times of crisis. 

arrow_forward

Whiddler Anti-Malware Scanner Software

Whiddler is a multi-threaded, multi-process, cluster-capable software scanning application tool that performs static analysis on files. After completing observations of the file, the software calculates the probability that the file is malicious or not malicious. The threshold level can be adjusted by the user. The current version (v3.2) utilizes Bayes Theorem to determine the overall statistical probability that the file is a threat. The next version of the software (v4.0) will incorporate additional calculation methodologies into the Whiddler software to further enhance capabilities. The Air Force’s software runs on 32/64 Windows and Linux systems.

Air Force Research Laboratory- Information Directorate (RI) logo

Air Force Research Laboratory- Information Directorate (RI)

Rome , NY
arrow_forward

Identifying Connected Data in a Relational Database

This technology leverages Structured Query Language (SQL) in relational databases to discover connected data. Because the data does not need to be transformed, the algorithm is able to operate in the database’s natural information storage format.  This also enables efficient discovery of connected data and easy identification of common labels.  This approach is limited only by the processing capacity of the database and delivers results faster and more accurately than other methods.

National Security Agency (NSA)- NSA Research Directorate logo

National Security Agency (NSA)- NSA Research Directorate

Ft. Meade, MD
arrow_forward

Join the Community!

The Technology Marketplace is a community of individuals, government agencies, businesses, and academic institutions working together to advance innovation. Discover new technology, license it, connect with others, and bring your product to life.

Sign up