Systems Interoperability for Physical and Digital Asset Tracking
14bis’ blockchain-powered middleware allows data to flow across disparate, often legacy software systems, eliminating data gaps. In military and commercial applications,14bis reduces complexity with: a) intuitive user interfaces that people WANT to use, b) full visibility of chain-of-custody and, c) richer data collection for better data quality and analytics.
A New Way to Dramatically Reduce the Size of Machine/IoT Data
AtomBeam uses machine learning to identify patterns in sample IoT data. The patterns are matched to indices stored in a Codebook. When the Codebook is installed on a source and destination, they can communicate using indices, which results in an average reduction of 70% or more.
StethAid
Our digital auscultation platform, StethAid, enables easy recording and analysis of heart and lung sounds using a novel smartphone-paired stethoscope. Embedded in the platform are artificial intelligent (AI) algorithms that help distinguish benign heart murmurs from serious ones with cardiologist-level accuracy. StethAid helps reduce unnecessary specialist referrals and healthcare costs.
Artificial Intelligence and Machine Learning as a Service
Agile AI and ML solutions provided as a service
Novel Platform for Visualizing Big Data In Virtual Reality
BadVR’s immersive data visualization and analytics platform allows users to see and explore their datasets in interactive ‘data environments.’ This allows users to more quickly and easily ingest complex information to discover insights faster and to then communicate them more effectively.
Cost Effective PFAS Destruction using Electrochemical Reactor Technology
Electrochemical reactor technology that breaks down per-and polyfluoroalkyl substances (PFAS) to less harmful or benign compounds in the water streams. Treatment process is intended to be placed after a PFAS removal operation, such as reverse osmosis (or other process), The system would receive PFAS-laden concentrate for destruction.
BluVector Advanced Threat Detection
BluVector is an Advanced Network Threat Detection Solution which detects unknown/zero-day threats without dependence on signatures or external threat intelligence. BluVector leverages patented AI/ML-based adaptive detection capabilities that can be enhanced by customers on premise (in-situ), We detect zero-day threats, pre-breach, at wire-speed, and all on premises.
Advanced error correction for enabling high-performance high-density flash storage with maximum endurance
Codelucida’s error-correction solutions support the next generation of densest flash memories (used in solid-state drives). As the densities of memories increase to enable higher storage capacities, the memories become more prone to errors with performance degradation. Codelucida’s solutions provide the strongest error-correction with highly scalable performance and reduced power.
Hardware Integrity and Authenticity through IoT Signed-at-Source™
The TFA Labs IoT-SAS™ microcontroller is embedded technology for industrial hardware that provides a secure tamper-proof digital identity backed by blockchain technology with low power requirements and small form factor. When coupled with W3C Digital Identity (DIDs) and Verifiable Credentials (VCs) this solution ensures hardware integrity and authenticity.
A cost effective NPMD and cybersecurity solution specifically built for smart cities
Cynamics is the only network performance monitoring & diagnostics (NPMD) company capable of offering 100 percent network visibility from small traffic samples, as well as providing optimization and cybersecurity protection specifically built for vulnerable and budget-strapped smart cities and municipalities.
Entrap 3.0 Hunt Tool
Entrap offers the ability to record the activity of known malware and create custom security rules that respond to malicious behavior before it can cause any damage. Entrap can stop or flag suspicious behavior for closer inspection allowing for active threat surveillance and mitigation.
Machine Learning Enhanced Object Recognition Used in Maintenance Training
Using Augmented Reality (AR) can help improve training efficiency for maintenance teams by overlaying digital procedure onto the physical systems. Improving object recognition using machine learning will greatly enhance the usability of AR and its broad application.
Neighborhood Intel
The Neighborhood Intel technology platform delivers workflow efficiencies and better decision making information for more powerful impact of expenditures and programming for local government staff focused on property compliance, community and economic development, housing, revitalization, grant writing, and GIS/IT.
Custom Software Applications for Complex DoD Workflows
Elder Tree develops DoD function-specific software workflow applications that seamlessly integrate directly into existing workflows (digital or manual) within the Department of Defense. All development and operation is conducted under the C-ATO authority of the USAF Chief Software Officer.
Gabriel the robocall blocker
Gabriel leverages blockchain, swarm intelligence, and real-time adaptive classification anomaly detection and clustering algorithms to block robocalls on all devices across all networks. Gabriel’s reduces the volume of robocalls and related fraud by $4 billion annually to make it safe for Americans to answer their phones again
CyberGraph: Graph AI for Cyber Threat Hunting
CyberGraph is a defensive cybersecurity application for protecting enterprise-level computer networks from traditionally challenging attacks such as APT campaigns, and the ever-present insider threat.
Laser intervention security system (MEDUSA)
MEDUSA provides a new paradigm in security that saves lives and protects assets by creating area denial through visual disruption. Using multiple beams of laser light, MEDUSA is a facility security system that will temporarily disrupt an intruder’s ability to target or enter an area.
IncludeHealth: Next Generation Musculoskeletal Care & Training
IncludeHealth provides a digital musculoskeletal platform pairing HIPAA compliant cloud software with small rechargeable sensors to digitize ANY existing cardiovascular or strength training equipment. This pairing enables centralized & mission-specific programming, autonomous delivery, and detailed performance data to quantify and qualify warfighter health ensuring mission readiness and longevity.
Mobi™
Mobi™ simplifies business intelligence with an open and non-proprietary knowledge graph platform for building solutions that link, model and explore the relationships in enterprise data.
Kana Actionable Analytics
The first Platform One-certified company serving Offutt AFB, Kana Systems delivers a website application + AI platform, automating a manual process for mission-critical decisions at the U.S. Nuclear Command, Control, and Communications Enterprise Center (NEC). A customer said “The Kana Systems' app is a quantum leap forward for the NEC.”
Scalable Analysis of Firmware for Android and iOS (SAFARI)
Kryptowire's automated firmware scanning is a comprehensive framework that enables analysts to automatically determine threat vectors stemming from prepositioned threats on mobile platforms. Our product covers the collection of personally identifiable information, software backdoors, inconsistent validation checks, ineffective security checks, and debug modes for mobile operating systems.
Harnessing big data and artificial intelligence for improved maritime situational awareness
The overall vision is to provide data-driven insights that make vessel behaviour understandable and actionable. The service will provide relevant and timely information to all decision-makers across sectors involved in maritime trade that need access to real-time data and insights.
STIGAssist
STIGAssist automates cybersecurity assessments according to DoD standards. Functionality includes accurate system discovery, automatically generated reports, scheduled monitoring and risk mediation. It’s components and functions are designed to accommodate Risk Management Framework (RMF) mandates with the ability for cybersecurity professionals to quickly and accurately run STIGs across an IT system.
MAKANA: A Machine Learning Platform for Automated AI
Our Machine Learning micro-services platform solves the national defense-related mission need in the area of Multi-INT data fusion and AI by providing a user-profile based search engine, to help DoD Data Analysts improve the speed and reliability of their text and image searches accross various data sources.
Mosha Online
An Online RPG game powerd by Blockchain.
Waste Powered Energy Microgrids for Mission Assurance
Energy security is national security. Our Waste Powered Energy Microgrid solution is designed to power an installation's critical infrastructure using the waste materials produced on the installation. Our solution provides an alternative to landfilling garbage, while also promoting mission assurance by leveraging this innovative technology.
NeuroFlow
A scalable care management solution helping providers and organizations deliver measurement-based behavioral health in all care settings to improve engagement, costs, and outcomes.
COMPUTATIONAL STORAGE
Computational storage enables complex applications such as machine learning to be executed in-storage where data resides. Leveraging a seamless programming model based on a Linux OS and high-level programming languages NGD’s solution enables higher capacities, higher energy efficiency and much lower TCO
Secure IoT®
Onclave, a Zero-Trust (military-grade) secure segmented network and communications platform, delivering enterprise-wide protection for all IoT/OT/IT assets regardless of age, operating system, or protocol. Cryptographically separated networks are established using Layer 2 over Layer 3 secure tunnels (same network wires). The system eliminates the attack surface making protected assets invisible/inaccessible.
Cybersecurity for Distributed Energy Resources
Onclave’s Trusted Communications Platform was developed to provide an easy-to-implement way to enforce authenticity, integrity, and security over IP based networks. Each enforcement function can act independently or work collectively as an end-to-end Trusted, Secure Communications Service. One offering is Secure IoT®, which cost-effectively secures Operational Technology.
Pixel8earth Platform
Pixel8earth creates precision 3D maps from commodity photos and videos to power augmented reality and autonomy applications.
Toronto, ON
Future Proof Data Security Made Practical
Quantum Bridge Technologies proposes a very realistic and quantum-safe communication system that can be cost-effectively integrated in the current Internet infrastructure. Our solution can distribute private cryptographic keys to any group of clients around the globe, and it is compatible with future developments in quantum communication technologies.
Rapid Radicals Technology (RRT): High-rate, end-of-pipe wastewater treatment system
RRT is a climate-resilient, decentralized, and affordable wastewater treatment alternative to spending billions of dollars annually on capital investment projects when untreated wastewater discharges still occur and threaten human and environmental health.
SAFIRE
Through the use of machine learning and natural language processing, SAFIRE helps Users define requirements, converts those requirements into agile sprint packages, obfuscates any proprietary information, defines test objectives, and leverages a broad network of freelance software engineers to build a product or components of a product.
Odysseus: a DOD Procurement Framework Technology
Odysseus is a procurement framework technology solution for the US Department of Defense. We layer emergent technologies of blockchain and a CNC IoT environment in a proprietary A.I. construct utilizing encrypted data transfer protocols to more securely and efficiently drive the procurement process.
Defensive Charging
The technology protects the security of users from attacks that exploit the measurements made while the device is being charged. This technology augments the circuitry of traditional chargers and disrupts patterns in the currents being drawn. The charger has been designed to carry out these operations while imposing minimal overhead.
IP Marketplace and Technology Scouting Platform
Our platform helps companies commercialize their own IP portfolios and scout for new technology at startups, Universities, government labs, and Fortune 500 companies. Our SW automatically scores technologies on strength and market demand, and predicts which companies are the ideal licensors / partners.
Secure Biometric Authentication/Identification Using Hashed Biometric
Trust Stamp has developed hashing technology that mathematically transforms biometric data into an irreversible hash that cannot be used to reconstruct a biometric template. Our deep neural network examines hashed biometric data and is able to match data 1:1 or 1:n to accurately determine identity.
Mixed reality civil infrastructure inspection
A smart, human-centered technique that uses artificial intelligence (AI) and mixed reality (MR) to accelerate essential tasks of civil infrastructure inspection such as cracks and spall (defect) detection, measurement, condition assessment and data processing.
MaterIQ: An AI-based software tool for materials-by-design
MaterIQ is a user-friendly software tool which harnesses cutting-edge AI to design engineered microstructures to produce novel, multifunctional, high-performance materials. MaterIQ can be used to design and optimize the structure and performance of a wide class of materials of interest to DoD, including lightweight structures, composites, foams, propellants and explosives.