Active Technical Inquiries

Active technical inquiries are designed to host collaborative discussions to help gather information in response to technical inquiries submitted by those in the DoD research and engineering community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

The Dashboard uses continually updated metrics, combined with colors indicating the level of readiness, to give detailed information as well as the big picture.
completed

What free or low-cost enterprise data solutions with AI/ML are available and used in the DoD?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify U.S. Department of Defense (DoD) enterprise data solutions that have artificial intelligence/machine-learning (AI/ML) capabilities; can support data analytics for decision making, train…

completed

What is the latest technology for flying ad-hoc networks?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on flying ad-hoc networks (FANETs) relating to scalability, connection strength, distance, and flight control software. Entities that can provide research and development support…

completed

What are some AI/ML tools that can analyze a wide range of data for the RAVEn Platform?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on artificial intelligence/machine-learning (AI/ML) tools that can analyze a range of data through large language models and generative AI capabilities. The tool will…

completed

Who has Risk Management Framework Authority to Operate permissions of extended reality technology within the Department of Defense ?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking information on Risk Management Framework (RMF) Authority to Operate permissions of extended reality (XR) technology and identifying requirements for using these technologies by surveying…

completed

What state-of-the-art COTS/GOTS communication surveillance kits are capable of noise limiting/filtering at the microphone portion of the device?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify information on advanced noise canceling headsets or surveillance kit (earphone and microphone) technologies that can be used for peer-to-peer communication and are…

completed

What relational database applications are authorized for use on systems at the Secret/Top Secret classification levels?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify examples of relational database applications authorized for use at the Secret/Top Secret classification levels. These databases should be capable of handling SQL-92,…

completed

What approved project management/CRM software is available for DoD systems within an IL6 boundary?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify examples of project management/customer relationship management (CRM) software that has been reviewed from a security standpoint and authorized to operate on U.S….

completed

What are the key technical considerations and best practices in integrating APIs in DoD Systems?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify specific examples of U.S. Department of Defense (DoD) application programming interface (API) integration, common approaches used by DoD organizations in enabling data…

completed

What AI/ML-assisted RPA, IDP, or other software, tools, or applications can handle unstructured data to automate the evaluation process of government forms for completeness and accuracy?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking commercial-off-the-shelf or government-off-the-shelf artificial intelligence (AI)/machine learning (ML)-assisted robotic process automation (RPA), intelligent document processing (IDP), or other software, tools, or applications that can…

completed

What government-owned artificial intelligence/machine-learning (AI/ML) software and tools can detect unique text and logos from a large dataset of images?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify government-owned AI/ML software, applications, and tools that incorporate natural language processing, name entity recognition, optical character recognition, and computer vision to conduct…

completed

What are viable solutions for nonperson entity authentication?

The Cybersecurity and Information Systems Information Analysis Center is seeking to identify automated nonperson entity (NPE) authentication approaches, structures, or tools that provide the same level of cyber traceability as two-factor authentication within a U.S….

completed

What guidance or policies identify cybersecurity requirements for third-party-funded energy systems?

The Cybersecurity & Information Systems Information Analysis Center is seeking to identify and understand the existing U.S. Department of Defense (DoD) policies currently addressing cybersecurity requirements for third-party energy projects (e.g., energy savings performance contracts,…