iHLS INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with the...
Big data and visual illustration tools supply a rare perspective on the complete picture of rocket attacks on Israel. An Israeli data scientist, Yoav...
The fifth-generation cellular network technology known as 5G provides broadband access, and is engineered to greatly increase the speed and responsiveness of wireless networks....
There are about 40,000 sensors on an offshore drilling rig, and each collects information about how the rig's many machines are operating. But sensors...
Data analytics have become an essential factor in law enforcement operation, but further advances are still needed. Looking at past records to discover hot...
We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense, and HLS fields to take part in the prestigious iHLS...
We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...
Computer vision is a type of artificial intelligence that allows computers to interpret images and videos. Many law enforcement and public safety organizations already...
We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...
Machine learning, deep learning, and other aspects of artificial intelligence (AI) have become major basis for advanced technologies in any field. In the defense...
For computer vision and facial recognition systems to work reliably, they need training datasets that approximate real-world conditions. Advances in computer vision approaches facilitate...
A new supercomputer under development will have big data analytics and deep learning applications in the energy, defense and security, science, industry and many...
It is already obvious that 2019 is the year of privacy - from security technologies designed to thwart personal information hacking to public critic,...
Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
A new IDF technological internet portal reflects the fact that, at least from the aspect of innovation and technology, the Israeli army is currently...