DARPA open catalog makes agency-sponsored software and publications available to all

Feb 05, 2014
The DARPA Open Catalog lists DARPA-sponsored performers with one row per piece of software or publication. Each piece of software has a link to an external project page as well as a link to the code repository for the project. The software categories are listed along with a description of the project and the applicable software license. The publications section lists author(s), title, and links to peer-reviewed articles related to specific DARPA programs.

DARPA has invested in many programs that sponsor fundamental and applied research in areas of computer science, which have led to new advances in theory as well as practical software. The R&D community has asked about the availability of results, and now DARPA has responded by creating the DARPA Open Catalog, a place for organizing and sharing those results in the form of software, publications, data and experimental details.

The Catalog can be found at go.usa.gov/BDhY .

Many DoD and government research efforts and software procurements contain publicly releasable elements, including . The nature of open source software lends itself to collaboration where communities of developers augment initial products, build on each other's expertise, enable transparency for performance evaluation, and identify . DARPA has an open source strategy for areas of work including big data to help increase the impact of government investments in building a flexible technology base.

"Making our open source catalog available increases the number of experts who can help quickly develop relevant software for the government," said Chris White, DARPA program manager. "Our hope is that the computer science community will test and evaluate elements of our software and afterward adopt them as either standalone offerings or as components of their products."

The initial offerings in the DARPA Open Catalog include software toolkits and peer-reviewed publications from the XDATA program in the agency's Information Innovation Office (I2O). The partially funded toolkits are designed to encourage flexible development of software that may enable users of targeted defense applications to process large volumes of data in a timely manner to meet their mission requirements.

Explore further: Games help improve software security

add to favorites email to friend print save as pdf

Related Stories

Games help improve software security

Dec 05, 2013

Ever more sophisticated cyber attacks exploit software vulnerabilities in the Commercial Off-the-Shelf (COTS) IT systems and applications upon which military, government and commercial organizations rely. ...

Cyber experts engage on DARPA's Plan X

Oct 18, 2012

When the team behind DARPA's Plan X mapped out where it wanted to go with research in the development of cyber capabilities and platforms, it knew the DARPA approach to problem solving included soliciting ...

There's no better time for governments to go open source

Feb 03, 2014

The UK government has revealed that it is considering ditching Microsoft software for open source alternatives. Cabinet minister Frances Maude has said he wants to see a range of software being adopted by ...

Recommended for you

Freight train industry to miss safety deadline

Apr 16, 2014

The U.S. freight railroad industry says only one-fifth of its track will be equipped with mandatory safety technology to prevent most collisions and derailments by the deadline set by Congress.

Gaza cops trade bullets for laser-tech in training

Apr 14, 2014

Security forces in the Hamas-ruled Gaza Strip are using technology to practice shooting on laser simulators, saving money spent on ammunition in the cash-strapped Palestinian territory.

User comments : 0

More news stories

Venture investments jump to $9.5B in 1Q

Funding for U.S. startup companies soared 57 percent in the first quarter to a level not seen since 2001, as venture capitalists piled more money into an increasing number of deals, according to a report due out Friday.

White House updating online privacy policy

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Hackathon team's GoogolPlex gives Siri extra powers

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Scientists tether lionfish to Cayman reefs

Research done by U.S. scientists in the Cayman Islands suggests that native predators can be trained to gobble up invasive lionfish that colonize regional reefs and voraciously prey on juvenile marine creatures.

Leeches help save woman's ear after pit bull mauling

(HealthDay)—A pit bull attack in July 2013 left a 19-year-old woman with her left ear ripped from her head, leaving an open wound. After preserving the ear, the surgical team started with a reconnection ...