Access Control

Access Control

big data for homeland security

111
iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...
operating UAVs

96
New rules for commercially operating UAVs in the U.S. relate to flying in the vicinity of electric power utilities. They have been published by...
blockchain

102
The emerging blockchain technology represents an innovative leap forward that has many uses and applications across multiple sectors of the economy. But is it...
safe city solutions

67
Technological solutions by themselves are useful, but their real value is found when they complement one another. A wide array of homeland security technologies...
biometric identification

146
The Australian Department of Immigration and Border Protection has sought technology that would abolish incoming passenger cards, remove the need for most passengers to...
HLS

99
The backgrounds of the members of the team that President-elect Donald Trump is picking to shape the Department of Homeland Security suggest he will...
gaze detection

108
Monitoring and analyzing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a "remote gaze detection technology" that...
homeland security

401
The US Department of Homeland Security (DHS) is preparing to utilize Blockchain technology, an approach in technology that replaces data managers with encrypted blocks...
safe city

159
Various measures will be involved in the securing of the upcoming US Presidential inauguration event, turning Washington, DC into a platform for Safe City...
thermal cameras

128
Over the backdrop of the shootout attack carried out in a public domain, the city of New Orleans has been considering the use of...
id verifying

93
Law enforcement agencies and businesses have started using the Age ID app to combat the use of fake IDs. The ID verifying app uses...
airport security

346
The 21st century has been presenting more and more challenges in securing crowded areas. Technologies have been developed due to, among other reasons, terrible...
emotion recognition

120
Emotion recognition technologies can advance researchers’ ability to get deep insights into consumer behavior, but it seems that they could also be applied to...
vehicle ramming attacks

201
A terrorist attack carried out by a lorry driver ramming into the crowd is very hard to prevent, it can cause untold damage and...
terrorist attack

432
By Arie Egozi “In a state where one can purchase almost any type of weapon just as you buy a hamburger, it has been reasonable...

101
Radio-frequency identification (RFID) tags have begun appearing everywhere. When one looks carefully, it’s easy to notice them in passports, credit cards, library books, office...

169
The 9/11 attacks are among the most well-known security threats, and they upended how we travel. To protect passengers and crews, airports have made...

128
A remote ‘kill switch’ to immobilise HGVs is being secretly developed by UK government scientists who fear a Nice-style ISIS massacre in the UK....

129
Iris biometric recognition is an automated method of biometric identification, that uses mathematical pattern-recognition techniques on video images of one or both of the...

91
A new Technology will replace access cards.  The technology manufacturer Gallagher recently announced the global release of its latest mobile security solution, the Gallagher...

84
AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...

332
A new lie-detecting kiosk that can spot changes in physiology and behaviour during interviews with travelers is currently being tested. It could be used...

iHLS Events