Dodiac.dtic.mil is a subdomain of dtic.mil, , It has several subdomains, such as discover.dtic.mil apacs.dtic.mil , among others.
Description:Learn about the Defense Information Analysis Centers (IACs) operated by the Department of Defense (DoD), providing specialized technical support and research services....
Keywords:DoD IACs, Defense Information Analysis Centers, technical support, research services, Department of Defense, contracting, technology solutions....
Discover dodiac.dtic.mil website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 269.752 KB |
Page Load Time: 0.289001 Seconds |
Website IP Address: 192.0.66.51 |
Index | DOD CIVILIAN CAREERS godefense.cpms.osd.mil |
DoD Cyber Exchange public.cyber.mil |
DoD Open Government open.defense.gov |
DoD Service Monitoring – Defense Information Systems Agency portal.apps.isitdown.mil |
DoD/VA and Gov Health IT Summit | DEFENSE STRATEGIES INSTITUTE | Advancing The Mission. Supporting iehrsummit.dsigroup.org |
Military Families Eligible for DoD Tutoring Program military.tutor.com |
Inside DOD wallawalla.armylive.dodlive.mil |
DOD Cybersecurity Compliance Services | Cybersheath info.cybersheath.com |
VA DoD eBenefits - Disability Compensation, Health Care, and More benefits.military.com |
DOD Tech USA Online Store - DOD Tech USA store.dod-tech.us |
Core Services - DoD IACs - DTIC https://dodiac.dtic.mil/core-services/ |
April 2019 - DoD IACs - DTIC https://dodiac.dtic.mil/2019/04/ |
November 2018 - DoD IACs - DTIC https://dodiac.dtic.mil/2018/11/ |
Resources Phase 2 - DoD IACs - DTIC https://dodiac.dtic.mil/resources-copy/ |
DSAIC Post - DoD IACs - DTIC https://dodiac.dtic.mil/category/dsiacpost/ |
September 2018 - DoD IACs - DTIC https://dodiac.dtic.mil/2018/09/ |
HDIAC Post - DoD IACs https://dodiac.dtic.mil/category/hdiacpost/ |
CSIAC Post - DoD IACs - DTIC https://dodiac.dtic.mil/category/csiacpost/ |
CBRNE - DoD IACs - DTIC https://dodiac.dtic.mil/tfa/CBRNE/ |
DTIC MIPR GUIDANCE https://dodiac.dtic.mil/wp-content/uploads/2020/10/21-01_FY21-DD448-MIPR-GUIDANCE_v1_201001.pdf |
BEGINNING IN FY22 ALL TASK ORDER FUNDING WILL BE ACCEPTED DIRECT ... - DTIC https://dodiac.dtic.mil/wp-content/uploads/2023/01/FY23-MIPR-Guidance_v3.3_230105.pdf |
DTIC MIPR GUIDANCE Block 4 Block 5 Block 6 Block 7 Block 8 Block 9b https://dodiac.dtic.mil/wp-content/uploads/2022/02/01_FY22-MIPR-Guidance_v1_22-2-02.pdf |
Department of Defense Information Analysis Centers (DoD IAC ... - DTIC https://dodiac.dtic.mil/wp-content/uploads/2018/10/IAC-MAC-ordering-guide_v1.pdf |
DoD IAC Multiple Award Contract - DTIC https://dodiac.dtic.mil/wp-content/uploads/2021/12/IACMAC-OnePager_FINAL_211221-1.pdf |
BEGINNING IN FY22 ALL TASK ORDER FUNDING WILL BE ACCEPTED DIRECT CITE ... https://dodiac.dtic.mil/wp-content/uploads/2023/10/FY24-MIPR-Guidance_v3.4_231001_FINAL-1.pdf |
Server: nginx |
Date: Sat, 11 May 2024 12:00:58 GMT |
Content-Type: text/html; charset=UTF-8 |
Transfer-Encoding: chunked |
Connection: keep-alive |
Vary: Accept-Encoding |
X-hacker: "If youre reading this, you should visit wpvip.com/careers and apply to join the fun, mention this header.", X-Powered-By: WordPress VIP https://wpvip.com |
Host-Header: a9130478a60e5f9135f765b23f26593b |
X-Frame-Options: DENY |
Link: https://dodiac.dtic.mil/wp-json/; rel="https://api.w.org/", https://dodiac.dtic.mil/wp-json/wp/v2/pages/17; rel="alternate"; type="application/json", https://dodiac.dtic.mil/; rel=shortlink |
x-cache: UPDATING |
cache-control: max-age=300, must-revalidate |
accept-ranges: bytes |
x-rq: bur5 123 242 443 |
charset="utf-8"/ |
content="width=device-width, initial-scale=1.0" name="viewport"/ |
content="IE=edge" http-equiv="X-UA-Compatible"/ |
content="noindex, nofollow" name="robots"/ |
content="WordPress 6.5.3" name="generator"/ |
Ip Country: United States |
City Name: San Francisco |
Latitude: 37.7506 |
Longitude: -122.4121 |
HOME TECHNICAL FOCUS AREAS DOD IAC NEWS RECENT PUBLICATIONSDIRECTOR BIO MISSION AND VISION ABOUT DoD IAC DoD IAC FUNCTIONS DoD IAC VALUE DoD IAC HISTORY CONTRACT VEHICLES SERVICES RA SERVICES OVERVIEW TECHNICAL INQUIRIES AGILESCALABLE CONTRACTING IAC MAC TASK ORDER IAC TASK ORDER RESOURCES DoD Cybersecurity Policy Chart DEADLINES AND POLICY UPDATES TEMPLATES, SAMPLES, AND GUIDANCE ARCHIVE FAQs CONTACT US CONTACT INFORMATION SEND US A MESSAGE Submit/Approve STI Ask a SME FY24 PROV CSDC: 0.4% Menu HOME TECHNICAL FOCUS AREAS DOD IAC NEWS RECENT PUBLICATIONSDIRECTOR BIO MISSION AND VISION ABOUT DoD IAC DoD IAC FUNCTIONS DoD IAC VALUE DoD IAC HISTORY CONTRACT VEHICLES SERVICES RA SERVICES OVERVIEW TECHNICAL INQUIRIES AGILESCALABLE CONTRACTING IAC MAC TASK ORDER IAC TASK ORDER RESOURCES DoD Cybersecurity Policy Chart DEADLINES AND POLICY UPDATES TEMPLATES, SAMPLES, AND GUIDANCE ARCHIVE FAQs CONTACT US CONTACT INFORMATION SEND US A MESSAGE Submit/Approve STI Ask a SME FY24 PROV CSDC: 0.4% Extension Award 774 ESS FOE for FA8075-18-D-0004, FA8075-19-FA027, Force Development Analysis Support for Joint Staff J7, Exercise Support for J7 Please follow link here for more information on SAM.gov ELIMINATE REDUNDANCY FOSTER COLLABORATION STIMULATE INNOVATION RESEARCHANALYSIS SERVICES AGILESCALABLE CONTRACTING SERVICES REDUCE SPENDINGCAPITALIZE ON PREVIOUS INVESTMENTS EXPEDITE DEVELOPMENTDEPLOYMENT OF SOLUTIONS Learn More Learn More TECHNICAL FOCUS AREAS The DoD IAC's services span across 22 Technical Focus Areas, each critical to the needs of the Department and mapped to one of the three corresponding primary domain areas: Defense Systems, Cyber-Security and Information Systems, and Homeland Defense and Security. Click the icons below for more information: × ❮ CBRN DEFENSE CBRN Defense is composed of defense against (actual or potential) weaponized chemical, biological, radiological or nuclear agents. CBRN refers to deliberate use of these agents to cause significant harm. ❯ ❮ WEAPONS OF MASS DESTRUCTION Weapons of Mass Destruction (WMD) are defined as chemical, biological, radiological, or nuclear weapons or devices capable of a high order of destruction and/or causing mass casualties. ❯ ❮ SOFTWARE AND DATA ANALYSIS Software and Data Analysis is defined as the process of inspecting, cleaning, transforming, and modeling data with the goal of highlighting useful information, suggesting conclusions, and supporting decision making. ❯ ❮ KNOWLEDGE MANAGEMENT AND INFORMATION SHARING Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes. ❯ ❮ MODELING AND SIMULATION Modeling and Simulation (MS) is defined as the use of models, including emulators, prototypes, simulators, and stimulators, either statically or over time, to develop data as a basis for making managerial or technical decisions. ❯ ❮ CULTURAL STUDIES Cultural Studies is composed of cultural and sociological analysis – research into the ideology, political and economic nature of a culture in order to better understand its people and Government for national security purposes. ❯ ❮ WEAPONS SYSTEMS Weapons Systems refers to any integrated system, usually computerized, for the control and operation of weapons; this includes strategic and tactical, offensive and defensive weapons. ❯ ❮ HOMELAND SECURITYDEFENSE Homeland SecurityDefense is composed of Counterterrorism, Environmental Security, Aviation Security, Law Enforcement, Fraud Protection, Building and Facilities Security, Border Security, Disaster/Emergency Response and Recovery, and Cyber Security/Information Management. ❯ ❮ NON-LETHAL WEAPONS Non-Lethal Weapons consists of two sub areas: non-lethal weapons and information operations. Non-lethal weapons are weapons, devices and munitions that are explicitly designed and primarily employed to incapacitate targeted personnel or materiel immediately, while minimizing fatalities, permanent injury to personnel, and undesired damage to property in the target area or environment. Information Operations is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operations to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting your own. ❯ ❮ CYBER SECURITY Cyber Security (CS) (formerly referred to as information assurance(IA)) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation. ❯ ❮ AUTONOMOUS SYSTEMS Autonomous Systems is composed of ground, air, or sea-launched kinetic munitions that utilize on-board sensors, algorithms, and control methods to improve estimates on the target state, to understand the implications of the engagement situation/environment, or to develop engagement geometries that are otherwise unavailable to a conventional weapon. ❯ ❮ ADVANCED MATERIALS Advanced Materials is composed of traditional material and processes science, engineering and technologies in the context of defense systems and military applications. ❯ ❮ SURVIVABILITY AND VULNERABILITY Survivability and Vulnerability refers to the science and technology for remaining mission- capable after a military engagement; to avoid or survive a hostile threat (survivability of platforms and ability against specific threats). This subcategory comprises four elements: Susceptibility, Vulnerability, Recoverability, and Lethality. ❯ ❮ DIRECTED ENERGY Directed Energy includes weapons that emit energy in an aimed direction without the means of a projectile. ❯ ❮ CRITICAL INFRASTRUCTURE PROTECTION Critical Infrastructure Protection (CIP) is the protection of infrastructure and resources critical to national security, and is composed of National Infrastructure, Physical and Virtual Systems, Cyber Infrastructure and Continuity of Operations (COOP). ❯ ❮ ENERGETICS Energetics refers to the scientific study of energy under transformation in the context of defense systems and military applications. ❯ ❮ BIOMETRICS Biometrics is the automated methodology to uniquely identify humans using their physiological or behavioral attributes. ❯ ❮ MEDICAL Medical is composed of any facet of medical research relating to homeland defense and security, public health/global health or military operations. ❯ ❮ MILITARY SENSING Military Sensing includes all sensing applications that apply to the defense of the United States of America. ❯ ❮ RELIABILITY, MAINTAINABILITY, QUALITY, SUPPORTABILITY, AND INTEROPERABILITY Reliability, Maintainability, Quality, Supportability, and Interoperability (RMQSI) is composed of how well each weapons system is designed and manufactured, and its maintainability over time. ❯ ❮ ALTERNATIVE ENERGY Alternative Energy is composed of novel, non-traditional and emerging sources and technologies for harvesting, generating, storing, transmitting/transporting and reusing energy. ❯ ❮ COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) refers to systems, procedures, techniques, and equipment used to collect, analyze, disseminate and translate information into actionable intelligence, principally through cyber and electromagnetic activity. ❯ DOD IAC NEWS Enhancing IAC MAC Competition Memorandum...