You are here

Information Technologies (IT)



Information technology is increasingly impacting almost every aspect of our lives, from communicating with friends and family to manufacturing of the products that we use, the efficient supply of food, the provision of healthcare services, and the performance of financial markets and our nation's economy.

The past decade has seen explosive growth in the generation of data and the creation of usable information from that data. This growth is expected to accelerate into the foreseeable future, fueled in part by the increasing interconnectedness of the products and services that we use.

This topic encourages the submission of proposals that present ground-breaking innovations in the generation, analysis, use, or protection of information, where such innovations offer the potential for substantial commercial returns and a positive impact on society and the world in which we live. The subtopics below provide specific examples of technologies and applications, although given the enormous range and diversity in the field of IT these examples are inevitably incomplete. Proposals are encouraged under any of the specific subtopics IT1 to IT12. Proposals that do not fit these subtopics can be submitted under the subtopic "IT13: Other".

IT1. Big Data; Advanced Data Analytics

This subtopic focuses on information technology innovations in the fields of big data and advanced data analytics. These fields cover a wide range of technical sub-specialties and applications, and the examples provided are indicative only.

Examples of relevant technical fields include (but are not limited to): predictive analytics; simulation; optimization; data visualization; network visualization; visual data analytics and optimization (image and video); data fusion and integration. Applications are many and varied - examples include (but are not limited to): predicting buying patterns and trends, insurance claims, mortality rates, tax fraud, traffic patterns and delays, equipment failure, election outcomes, criminal/terrorist activities, and the spread of disease; improving healthcare outcomes; optimization of equipment performance and maintenance scheduling; optimization of manufacturing processes; predicting and optimizing traffic flow (internet traffic, road traffic, etc.); internet search; business informatics; logistics management; supply chain management; visualization of utility networks; climate modelling; geographic information systems (GIS); crowdsourcing; detecting and preventing cyber-attacks.

IT2. Cloud Computing; High-Performance Computing

Cloud computing is characterized by the allocation of internet-based distributed computing resources on an as-needed basis across a shared platform. Multiple computing cores may be dedicated in parallel to achieve the required computing performance levels for a specific task. Similarly, high performance computing usually relies on the use of a large number of co-located or distributed cores running in parallel. To achieve the highest levels of performance, massively parallel supercomputers may employ many thousands of cores.

This subtopic focuses on innovations that result in substantial improvements to cloud computing or high performance computing platforms. These improvements may be in terms of computing power, energy management, network storage requirements, the use of hybrid clouds, latency, data integrity and availability, cost, or any other factor of importance in such platforms, and may result from software- or hardware-based innovations.

Examples of applications that typically require the levels of computing power available through cloud computing or high performance computers include (but are not limited to): stock market analysis and prediction; cryptanalysis; weather forecasting; fluid dynamic modelling, acoustic modelling and other computationally intensive engineering modelling; advanced speech processing; advanced video processing.

IT3. Cloud-based IT Services

This subtopic focuses on innovations that enable the provision of new or improved cloud-based IT services to address issues of commercial and societal importance. Such services may be directed primarily to businesses or consumers. Examples include (but are not limited to): processing of medical data such as Xray, ultrasound, MRI or CT scans; business data analytics; sentiment analysis; analysis of financial documents; customized alerts regarding news events or stock market announcements; translation services; document indexing and retrieval; computing services; location-based services; retail recommendations.

IT4. Artificial Intelligence; Machine Learning; Natural Language Processing

This subtopic focuses on information technology innovations in the field of artificial intelligence (AI), which refers to intelligence exhibited by machines or software. AI is usually limited or targeted in nature, with general machine-based intelligence remaining an elusive long-term goal.

There are many technical approaches to AI, and an even greater diversity of potential applications. Current fields of use include (but are not limited to): intrusion detection -- in software systems, communications networks, and sensor systems; the finance industry -- optimizing operations and stock investments; medicine -- clinical decision support, computer-aided interpretation of medical images; industry -- robotics and automation, process management, quality control; machine vision; cyber-physical control systems; improvements in human-computer interaction; automated assistants e.g. for online/telephone customer service.

This subtopic includes a particular focus on machine learning and natural language processing (NLP), both of which are disciplines within the broader field of artificial intelligence. Machine learning refers to processes in which an automated system can learn from data, rather than following a pre-specified set of rules, and in many cases can predict outcomes relating to the learned process. The aim of NLP is to extract information or derive meaning from human language (written or spoken) or to generate human language.

Examples of relevant technical fields within machine learning include (but are not limited to): supervised machine learning; semi-supervised machine learning; unsupervised machine learning; neural networks; machine learning algorithms -- e.g., decision tree learning; robot learning; pattern recognition; image recognition. Examples of technical fields within NLP include (but are not limited to): parsing; named entity recognition; data extraction from text; sentiment analysis; natural language understanding; natural language generation; automatic summarization; language translation; analysis of structured or unstructured text; speech recognition; speech analysis; speech processing.

Applications across both technical fields include (but are not limited to): automated manufacturing; selfdriving cars; analysis of online commentary; stock market analysis; healthcare -- analysis of structured and unstructured medical records, diagnosis support; document classification, indexing and retrieval; deduplication of stored data; customer recommendation systems; personalization of customer services; stock market analysis; search engines; fraud detection; translation services (including speech-to-speech translation).

IT5. Image and Video

This subtopic focuses on information technology innovations that enhance the acquisition, processing, interpretation and use of images or video. This includes both innovations in human perception and use of images or video, and innovations in machine vision (e.g., improved algorithms or hardware). The terms "image" and "video" should be interpreted in their broadest sense -- image or video simply refers to static or time-varying data (respectively) that are representative of certain properties of the subject and that may be acquired optically or via ultrasound, X-ray, MRI, PET, or any other observational measurement technique.

Applications are many and varied, ranging from cell-phone based 3D modeling to medical image processing for improved diagnostic accuracy and enhancements for robotic manufacturing systems. Deployment platforms may range from mobile devices (cell phones and tablets) to industrial settings (manufacturing plants).

Examples of relevant technical fields include (but are not limited to): automated image/video indexing and retrieval; object recognition; facial recognition; recognition of human actions and behavior (e.g., in video surveillance applications); automated video categorization; video summarization; generation and manipulation of 3D models; image/video enhancement; image/video feature extraction and identification; pattern recognition.

Many innovations in image and video processing rely on underlying methods developed more broadly in the field of artificial intelligence. Innovations employing artificial intelligence technologies should be submitted to this subtopic if they are primarily aimed at image or video based applications.

IT6. Cybersecurity; Authentication; Privacy

This subtopic is intended to cover the major aspects of security related to the internet (except for Internet of Things cybersecurity, which is covered under subtopic IT7).

Cybersecurity refers to security applied both to the internet (including servers and connected devices) and to data stored in or transmitted over the internet. Generally this refers to security against malicious attacks rather than security against (for example) inadvertent data leakage. Cybersecurity is growing in importance due to a confluence of factors, including (i) increased use of the internet to monitor and control critical infrastructure, (ii) increased incidence of cyber-attacks against government and major institutions, (iii) the growing reliance by the general public on internet-based services.

Personal authentication and privacy refer to the reliable authentication of persons using the internet, and the protection of personal data and user information against compromise.

Examples of relevant technical fields include (but are not limited to): detection of cyber vulnerabilities -- particularly related to critical infrastructure and financial networks; detection and prevention of cyberattacks; human factors analytics -- to assess people risk; mobile device security; device-cloud security infrastructure; cloud computing security; security/privacy policy compliance; security for BYOD (bring-yourown device) and BYOC (bring-your-own-cloud); big data security; data loss prevention; information assurance; data integrity; encryption; key generation, key management and key distribution; access authorization; identity management; personal authentication -- biometrics, multi-factor authentication.

IT7. Cybersecurity for the Internet of Things

The Internet of Things (IoT) is widely touted as the next wave of internet expansion, connecting embedded sensing and control electronics in everyday products ranging from cars to refrigerators, televisions, wearable electronics and other smart objects, as well as enabling new system visibility and control in industrial applications such as utility grids (the so-called "smart grid") and improved healthcare through smart health applications (e.g., heart monitoring implants and implanted continuous glucose monitoring sensors). ABI Research estimates that the number of active connected devices will exceed 40 billion by 2020, more than double the estimated number in 2014, with roughly 75% of the growth coming from sensor nodes and other network-edge devices -- i.e., IoT devices. Each IoT device provides an access point to the internet and therefore also offers an opportunity for cyber-attack. Currently most IoT devices incorporate little or no security, which combined with their increasing ubiquity presents an alarming scenario for future internet security, particularly because IoT devices are expected to influence or even control many aspects of our lives.

Most IoT devices operate in resource constrained environments. Usually they are subject to severe energy usage limits, with low bandwidth (and sometimes sporadic) communications to the internet, limited computing power and little on-board data storage. These characteristics present unique operational challenges and also unique challenges in providing an effective defense against cyber-attacks.

This subtopic calls for innovative new approaches to providing cybersecurity for IoT systems. Proposed solutions should not be limited to conventional cybersecurity techniques -- the unconventional characteristics of IoT systems are likely to require new and unconventional cybersecurity methods. Proposing companies are encouraged to think outside the box.

Note: This subtopic is focused on cybersecurity innovations pertaining to IoT. Hardware innovations related to IoT should be submitted to the Internet of Things (I) topic.

IT8. Human-Computer Interaction; Virtual Reality; Augmented Reality

These three closely related fields encompass technologies that facilitate interactions among humans, computers and the external world and thereby enable many societally beneficial uses of information technology. The field of Human-Computer Interaction (HCI) is focused on improving the efficiency and effectiveness of human-computer interfaces through the development of novel software and hardware designs to recognize and interpret human characteristics and behavior. Improvements in HCI technology can lead to enhanced virtual reality (VR) and augmented reality (AR) experiences by providing more natural and efficient ways for a user to interact with a real or virtual environment.

Technical sub-specialties within HCI are broad and varied, including (but not limited to): machine learning to anticipate and meet a user's needs; wearable devices -- smart watches, smart glasses, health trackers; speech recognition; voice control; gesture recognition (e.g., hand or eye tracking); behavior recognition; behavioral analytics; mood/emotion recognition; virtual assistants; visualization and display technology; tactile displays; haptics; biometric sensing; bioacoustic sensing; biosignal detection and processing.

Virtual Reality provides sensory input to a user that replicates being present in a real or imagined environment. Most commonly the sensory input is limited to sight and sound, but it can also include other senses such as touch. Augmented Reality, on the other hand, involves a live direct or indirect experience of an environment, overlaid with computer-generated sensory input usually in the form of graphics, video and/or sound. Possibly the best known application of AR is the yellow first-down line in televised football games.

Applications of VR and AR include (but are not limited to): education -- enhanced learning experiences; medical and healthcare -- treatments for PTSD, phantom pain, anxieties and phobias, autism in children; support for complex tasks such as surgery, equipment assembly, or maintenance and repair by adding relevant information to the field of view of the user; training for medical personnel, law enforcement, military, and emergency responders; architectural design -- experiencing a virtual building before it's built; engineering and design; telepresence -- for meetings and remote workers; market research -- experiencing a virtual product that doesn't yet exist; entertainment - cinema, music, and sports; tourism; product advertising and promotion; computer games.

IT9. Networking Technology

This subtopic focuses on information technology innovations that will enhance the performance, functionality and monitoring of information networks, with particular emphasis on the internet and Internet of Things (IoT) networks.

Examples of relevant technical fields include (but are not limited to): software-defined infrastructure -- including software defined networking and software defined storage; software-defined data centers; analytics to optimize network performance; network visualization; network protocols; technologies to reduce network congestion and improve network resiliency; machine-to-machine networks; network-based data storage and retrieval technologies; anywhere/anytime access to data and services; agile networking; networking technologies specifically for sensor-dense but resource-constrained environments such as in IoT applications.

Note: This subtopic includes IT-based innovations pertaining to IoT networking technology. Hardware innovations related to IoT should be submitted to the Internet of Things (I) topic.

IT10. Mobile Computing; Internet of Things

This subtopic focuses on information technology innovations that will improve the performance or functionality of mobile devices and devices that operate in resource-constrained environments -- such as in Internet of Things (IoT) applications. While there is some overlap with other subtopics, proposals submitted to this subtopic should be focused on innovations specifically intended for these platforms.

Examples of relevant technical fields include (but are not limited to): location technology; image recognition and processing; video processing; speech recognition and generation; translation services; improved human to mobile device interfaces; gesture and expression recognition and processing; bio-signal processing; crowdsourced storage; crowdsourced processing; peer-to-peer device networking; device-cloud architecture; context-relevant analytics and services -- i.e., involving situational and environmental information; mobile commerce; data analytics and data processing to facilitate the Internet of Things; vehicle-based computing platforms.

Note: This subtopic includes IT-based innovations pertaining to IoT devices. Hardware innovations related to IoT should be submitted to the Internet of Things (I) topic.

IT11. Social Media; Collaborative Networking

This subtopic focuses on information technology innovations that will add value to social, professional, business, or technical interactions over the internet.

Examples of relevant technical fields and applications include (but are not limited to): services based on crowdsourced information; collaborative healthcare; the sharing economy; professional networks; B2B networking; image and video centric networks; micro video; social media advertising and marketing; social networking tools; visual content optimization (image and video) for social media; video sharing.

IT12. Software

This subtopic focuses on information technology innovations that are embodied in software and provide important new or enhanced capabilities. Usually these capabilities will be generalized, rather than directed to a specific use case. Examples include (but are not limited to): enhanced computational speed or efficiency; new or improved functionality; improved or extended performance; increased ease of use and accessibility.

The range of possible innovations under this subtopic is too broad to attempt to describe here. Past examples of significant software innovations cover a wide range of technical approaches and resulting new capabilities, and include (but are obviously not limited to): Object-Oriented Programming; the GUI; HTTP; HTML; TCP/IP; SQL; internet search engine(s); the spreadsheet; word processing; MapReduce; virtualization.

IT13. Other

This general subtopic is intended to capture any information technology innovations that are not covered in the preceding subtopics and that have the potential to generate substantial commercial returns and lead to a positive societal impact.


Agency Contact(s)

General inquiries regarding this topic should be made to: Peter Atherton, (703) 292-8772,

US Flag An Official Website of the United States Government