Example Technical Inquiries (TIs)

Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Has the Defense Modeling and Simulation (M&S) catalog been updated since 2018, and is this an effort that the Defense M&S Coordination Office is still updating/overseeing?

Has the Defense Modeling and Simulation (M&S) catalog been updated since 2018, and is this an effort that the Defense M&S Coordination Office is still updating/overseeing?

How can someone access Defense Technical Information Center manuscripts in batches at a speed usable for training embedders for use with large language models?

How can someone access Defense Technical Information Center manuscripts in batches at a speed usable for training embedders for use with large language models?

Are there any active, ongoing kill chain/web simulations using U.S. Army-validated red-threat communication or C3/4 digital-twin models utilizing the Advanced Framework for Simulation, Integration, and Modeling; Integrated Threat Analysis and Simulation Environment; or Overarching Dynamic Electronic-Warfare System Standard Architecture?

Are there any active, ongoing kill chain/web simulations using U.S. Army-validated red-threat communication or C3/4 digital-twin models utilizing the Advanced Framework for Simulation, Integration, and Modeling; Integrated Threat Analysis and Simulation Environment; or Overarching Dynamic Electronic-Warfare System Standard Architecture?

Can CSIAC provide access to use the Defense Modeling and Simulation Office Master Environment Library?

Can CSIAC provide access to use the Defense Modeling and Simulation Office Master Environment Library?

How do the origin, integrity, and substitutability of intellectual property blocks in communications hardware affect firmware security and trustworthiness?

How do the origin, integrity, and substitutability of intellectual property blocks in communications hardware affect firmware security and trustworthiness?

What are the steps for receiving approval to use NotebookLM on closed-loop U.S. Department of Defense computers?

What are the steps for receiving approval to use NotebookLM on closed-loop U.S. Department of Defense computers?

Ready to submit a technical inquiry?

Receive free information research on technical topics