Washington, D.C., September 26, 2022 — Today Dcode, the premier advisory firm connecting the tech industry and government to drive commercial innovation in the federal market, announced that Air Force Ventures awarded a Strategic Funding Increase Program (STRATFI) to scale technology development over the “valley of… Read More
Cutting-edge companies demonstrated intellectual property from top research universities commercialized for dual-use, civilian and military markets at NSIN Emerge Accelerator Showcase Day. Innovators with emerging technology at our nation’s top research universities pitched potential Department of Defense (DoD) and commercial investors at the National Security Innovation Network… Read More
Washington, D.C., July 8, 2022 — Dcode, the premier advisory firm connecting the emerging tech industry and government to drive commercial innovation in the federal market, today announced the award of a $45M Indefinite Delivery Indefinite Quantity (IDIQ) vehicle to support the DoD in driving technological innovation at… Read More
It’s hard to get emerging tech to engage with government solicitations. Once you’ve scoped your organization's problem sets and tech needs, here are some ways to tech scout like an investor, market like an accelerator, and engage with the right tech that can improve mission outcomes.
Government innovation efforts may look different in 2021. The good news is that federal agencies can learn from those that have done it before as well as private sector partners focused on federal. There’s no need to reinvent the wheel here.
The SBIR program is designed to encourage small businesses to go after federal contracts — it’s highly competitive nature and phasing purposely created to spur innovation. Read about the Dcode alumni with SBIRs and how to work with them.
The same way many emerging tech companies answered the call to help the government respond to the Covid-19 crisis, these fully Vetted for Federal™ alumni companies are using their tech to help the government maintain communication continuity, identify malicious software, and uncover new information related to the breach.