Tag Archive for: radical

DARPA moves ahead with radical vertical takeoff aircraft

The Defense Advanced Research Projects Agency took one step further in building a radically different vertical take off and landing or VTOL aircraft that can fly fast and carry a big load.

Specifically DARPA awarded Aurora Flight Sciences the $ 89 million prime contract for Phase 2 of the agency’s Vertical Takeoff and Landing Experimental Plane (VTOL X-Plane) program which looks to:

  • Achieve a top sustained flight speed of 300 kt-400 kt
  • Raise aircraft hover efficiency from 60% to at least 75%
  • Present a more favorable cruise lift-to-drag ratio of at least 10, up from 5-6
  • Carry a useful load of at least 40% of the vehicle’s projected gross weight of 10,000-12,000 pounds

+More on Network World: The iconic Boeing 747 is almost 50!+

To read this article in full or to leave a comment, please click here

Network World Security

Army to take on cyber warfare in radical shake-up of its priorities … – Irish Independent


Irish Independent

Army to take on cyber warfare in radical shake-up of its priorities
Irish Independent
The army is being promised a restoration of personnel levels, investment in new communications, surveillance and defence systems as well as the enhanced roles in anti-cyber warfare and intelligence. The Air Corps has a commitment to ongoing fleet …
New plans to fight growing menace of cyber attacks – Herald.ieHerald

all 4 news articles »

cyber warfare – read more

FBI opens malware tool to public as part of radical crowdsourcing plan

The FBI is close to allowing anonymous outsiders to use its Malware Investigator tool for the first time through a dedicated crowdsourcing portal, an official reportedly confirmed at last week’s Virus Bulletin conference.

News of the malwareinvestigator.gov initiative emerged earlier this year, at which point the plan was to give state investigators and enterprises – the FBI’s ‘community of interest’ – the ability to submit malware samples for rapid assessment.

To read this article in full or to leave a comment, please click here

Network World Security