top of page
Untitled design (57)_edited_edited.png
website background (2).png

Zaden Tech & UAH Strategic Partner, Awarded MDA STTR Phase I for THAAD Software Modernization

Zaden Technologies has been awarded a Phase I STTR contract by the Missile Defense Agency (MDA) to advance an AI-powered approach for modernizing the software foundation of the Terminal High Altitude Area Defense (THAAD) system. Through this effort, Zaden will explore the use of artificial intelligence and machine learning to automatically convert legacy Ada code into modern C++ and restructure it into secure, containerized microservices. This work leverages Zaden’s Vulcan Code Engine and supports the DoD’s broader push toward rapid, reliable modernization of critical defense software.



Why It’s Important

Securing this Phase I STTR award marks a significant step in Zaden Technologies’ mission to deliver AI-driven modernization across national defense systems. THAAD—one of the most critical components of U.S. missile defense—relies on millions of lines of legacy Ada code that must evolve to meet next-generation performance, scalability, and interoperability requirements.

Zaden’s approach focuses on integrating AI/ML into the software transformation pipeline to accelerate modernization timelines, reduce long-term sustainment costs, and improve system resilience. By exploring automated Ada-to-C++ conversion and containerized architectures, this effort aims to provide MDA with a repeatable, scalable path forward for updating mission-critical codebases across the missile defense enterprise.

This award reinforces Zaden’s leadership in AI-powered software transformation and strengthens the company’s role in supporting the defense community’s shift toward modular, maintainable, and future-ready digital systems


WhAt's Next

During Phase I, Zaden Technologies will work closely with MDA and the University of Alabama in Huntsville (UAH) to evaluate the feasibility of AI-driven code transformation techniques tailored for THAAD. Activities will focus on model development, testing, and early validation of automated conversion pipelines that preserve reliability, security, and mission performance.

If successful, Phase I will lay the foundation for expanded work in Phase II—advancing prototype development, scaling automation capabilities, and maturing containerized microservice architectures aligned to THAAD modernization priorities. In parallel, Zaden will continue leveraging these advancements to pursue broader DoD, NASA, and commercial applications where legacy software modernization remains an urgent challenge.

Get the latest tech and product updates. 

What is DevSecOps, Infrastructure-as-Code, Software Factory, Software-as-a-Service (SaaS), Day 2 operations, Kubernetes, Continuous Integration/Continuous Delivery (CI/CD), Software Scalability, Cloud Transformation, Machine Learning, Cyber Hardened, End-to-end automation, Artificial Intelligence (AI), Compliance regulations, Agile Methodologies, AI, Amazon Cloud Security Issues, API, Application Programming Interface, Application security assessment, Application security requirements, Art of the Possible, Artificial Intelligence, Attack surface, Auditability, Automation, AWS, AWS DevSecOps, Azure, B2B, Back End, Big Data, Blockchain, Build, Business to Business, Canary Build, Chain of custody, Checkmarx Gartner, CI/CD, Cloud Native, Cloud Transformation, Code Dependencies, Collaboration, Compliance, Compliance regulations, Configuration drift, Containerization, Continuous Delivery, Continuous Integration, Continuous security testing, Cost reduction, Culture, Customer Experience, Cyber Hardened, Dashboards, Data loss prevention, Day 2 operations, Deep Learning, Defense Industry, Delivery, Development, DevOps, DevSecOps aws, DevSecOps Consultants, DevSecOps tools, DevSecOps wiki, Digital Core, Digital Journey, Digital Transformation, Docker, DoD, Domain Transformation, Embedded Security, End-to-end automation, End-to-end-flexibility, Endpoint security, enterprise application security, Enterprise Solution, Front End, Fullstack, Future Proof, Gartner DevSecOps, Google Cloud, Governance, Holistic automation, Identity and access management, Infrastructure-as-a-Platform, Infrastructure-as-Code, Innovation, Internet of Things, Instantly Depolyable, IoT, IT Infrastructure, Jenkins, Kubernetes, Lifecycle management, Linux, Machine Learning, Maturity model, Microservices, Monitoring, Monolith, Observability, On-Premise Development, Operations, Passwordless authentication, Penetration testing, Perimeter security, Product, lifecycle, Python, Resiliency, Risk management, SaaS, Scalable Solution, SDLC, SecDevOps, Security, Security conscientious, Security information and event management, Security posture, Security-as-code, serverless, Shift Left, Siloed security, Software, Software Architecture, Software Consultants, Software Development, Software Development LifeCycle, Software Factory, Software planning and design, Software Platform, Software Scalability, Software-as-a-Service, Speed, Speed of Delivery, Strategic Agility, Technology Insights, Threat modeling, Threat vectors, Time-to-Delivery, Time-to-Market, Toolchain, Traceability, Version Control, Visibility, Vulnerabilities in web application, What is DevSecOps, Zero Trust Provisioning, Agile Methodologies, AI, Amazon Cloud Security Issues, API, Application Programming Interface, Application security assessment, Application security requirements, Art of the Possible, Artificial Intelligence, Attack surface, Auditability, Automation, AWS
AWS DevSecOps, Azure, B2B, Back End, Big Data, Blockchain, Build, Business to Business, Canary Build, Chain of custody, Checkmarx Gartner, CI/CD, Cloud Native, Cloud Transformation, Code Dependencies, Collaboration, Compliance, Compliance regulations, Configuration drift, Containerization, Continuous Delivery, Continuous Integration, Continuous security testing, Cost reduction, Culture, Customer Experience, Cyber Hardened, Dashboards, Data loss prevention, Day 2 operations, Deep Learning, Defense Industry, Delivery, Development, DevOps, DevSecOps, DevSecOps aws, DevSecOps Consultants, DevSecOps tools, DevSecOps wiki, Digital Core, Digital Journey, Digital Transformation, Docker, DoD, Domain Transformation, Embedded Security, End-to-end automation, End-to-end-flexibility, Endpoint security
enterprise application security, Enterprise Solution, Front End ,Fullstack, Future Proof, Gartner DevSecOps, Google Cloud, Governance, Holistic automation, Identity and access management, Infrastructure-as-a-Platform, Infrastructure-as-Code, Innovation, Internet of Things, Instantly Depolyable, IoT, IT Infrastructure, Jenkins, Kubernetes, Lifecycle management, Linux, Machine Learning, Maturity model, Microservices, Monitoring, Monolith, Observability, On-Premise Development, Operations, Passwordless authentication, Penetration testing, Perimeter security, Product lifecycle, Python, Resiliency, Risk management, SaaS, Scalable Solution, SDLC, SecDevOps, Security, Security conscientious, Security information and event management, Security posture, Security-as-code, Serverless, Shift Left, Siloed security, Software, Software Architecture, Software Consultants, Software Development, Software Development LifeCycle, Software Factory, Software planning and design, Software Platform, Software Scalability, Software-as-a-Service, Speed, Speed of Delivery, Strategic Agility, Technology Insights, Threat modeling, Threat vectors, Time-to-Delivery, Time-to-Market, Toolchain, Traceability, Version Control, Visibility, Vulnerabilities in web application, Zero Trust Provisioning

bottom of page