In materials science, enhancing one characteristic of a material will see a decline in a different characteristic. Strength and toughness are a pair like...
Online terrorist content has been fueling violent attacks in recent years. For example, ISIS’s recovering media network has been used to call on its supporters...
Latvia’s Ministry of Defense signed an agreement for the supply of the Spike missiles developed by Rafael, in a 108 Million Euro deal. The missiles will be...
Flying drones through cluttered environments like cities is complicated. The ability to avoid obstacles while traveling at high speeds has computational limits, especially for...
The proliferation of radios, handheld smart devices, GPS, and other personal electronic devices supporting the “future soldier”’s operation has been prompting the examination of...
Powered exoskeletons are, according to Wikipedia, wearable machines that are mobile and powered using a system of hydraulics, electric motors, pneumatics, levers or a...
Soldiers in combat situations have to constantly scan their surroundings for improvised explosive devices (IEDs), a signature weapon of modern guerrilla warfare. These homemade...
We are inviting ground-breaking startups in the security, defense and homeland security (HLS) fields to take part in a first-of-its kind startup competition.
iHLS is...
Servers are increasingly becoming the heart of any geospatial analysis system. All face a similar challenge, whether the system is in the ‘cloud’, a...
Russia is now designing a new multi-use VTOL rocket that will also be environmentally friendly.
According to designers, unlike Elon Musk’s Space X Falcon 9,...
The IoT market is experiencing an explosion of GPS-based location-aware devices. However, security and privacy have become serious and significant concerns for consumers of...
When the desired target is not directly reachable over cyberspace, the kinetic engagement by military units equipped with the latest technological and tactical advancements...
New research from the University of Washington suggests that the Egyptian fruit bat is using similar techniques to those preferred by modern-day military and...
Military forces use computer simulations to prepare their personnel for real-life situations. The virtual reality technology is gradually used in the military virtual training,...
A new cybersecurity intelligence and analytics platform has been unveiled. Tech giant Alphabet, the parent company of Google, formed a security company that uses...