You are here
The Award database is continually updated throughout the year. As a result, data for FY23 is not expected to be complete until September, 2024.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
SBC: ATTOLLO ENGINEERING, LLC Topic: AF16AT22
Current scene projection hardware is challenged to simultaneously meet the requirements for high peak temperature (> 2000K), high resolution (2Kx2K), response time < 4 ms, cryogenic and temporally uniform photon flux. MEMS, Resistor arrays, liquid cr...STTR Phase I 2016 Department of DefenseAir Force
Validation Experiments to Measure Transient Aerothermoelastic Response of a Curved Panel to Hypersonic FlowsSBC: METROLASER, INCORPORATED Topic: AF16AT24
An experiment to obtain validation data on the transient aerothermoelastic response of a curved panel in hypersonic flows will be designed and evaluated for its feasibility. Significant challenges must be overcome for a successful experimental campaign i...STTR Phase I 2016 Department of DefenseAir Force
SBC: ASSURED INFORMATION SECURITY, INC. Topic: AF16AT11
AIS proposes the Thunderlane effort to define a new operating system model that radically dissolves the boundary between hypervisor and operating system, and leverages state-of-the-art software diversity techniques. In concert, these capabilities provide unparalleled resistance against reverse-engineering, and ensure the reliability and security of application and system software. The Thunderlane ...STTR Phase I 2016 Department of DefenseAir Force
SBC: TIER 1 PERFORMANCE SOLUTIONS LLC Topic: AF16AT08
There are many challenges in creating Air Force systems that are resilient against cyber threats. The cyber environment and its threats are highly dynamic, requiring practices and training to be dynamic as well. Cyber threats must be considered during th...STTR Phase I 2016 Department of DefenseAir Force
SBC: GLOBAL AEROSPACE CORPORATION Topic: AF16AT24
The Air Force is interested in developing technology that would enable long duration hypersonic flight with reusable aircraft. Hypersonic flow presents many design challenges that can be encapsulated into an aerothermoelastic problem, i.e., a complex dyn...STTR Phase I 2016 Department of DefenseAir Force
SBC: Third Dimension Technologies LLC Topic: AF16AT07
The Air Force has identified a need for the creation of a common streaming model for 3D data that is agnostic to the display technology. To address this need, Third Dimension Technologies (TDT) and Oak Ridge National Laboratory (ORNL) propose to form a c...STTR Phase I 2016 Department of DefenseAir Force
SBC: CFD RESEARCH CORPORATION Topic: AF16AT14
Next-generation turbulent combustion models must enable accurate prediction of lean blow-out and flashback for complex geometries, fuels and operating conditions relevant to the Air Force. Improved models are needed to better predict kinetically and hydr...STTR Phase I 2016 Department of DefenseAir Force
SBC: METACOMP TECHNOLOGIES INC Topic: AF16AT14
The ability of Large-eddy simulation (LES) techniques to accurately predict combustion instabilities and the onset of lean blow-out is not yet firmly established, especially in realistic operating conditions. A number of modeling choices play an importan...STTR Phase I 2016 Department of DefenseAir Force
SBC: VESCO-NM, LLC Topic: AF16AT25
Molecular beam epitaxy has become essential technique to produce high quality materials and complicated structures. Competing with other growth techniques, such as MOCVD, it has demonstrated higher materials quality and better film uniformity. These adva...STTR Phase I 2016 Department of DefenseAir Force
SBC: GRAMMATECH INC Topic: AF16AT19
GrammaTech proposes WARP, a tool for Weaving Application-specific Runtime Policies into embedded systems binaries.Perimeter defenses such as firewalls or network filters provide insufficient security and generic inline defenses such as control flow or ...STTR Phase I 2016 Department of DefenseAir Force