HLS

HLS

airport. image by pixabay

Drones continue to concern law enforcement and security authorities charged with protecting critical infrastructure and large public events. Drones have become a genuine threat...
Smart city traffic. image by pixabay

High-rise buildings require regular inspections. With accelerating digitization, the need for structural scans is growing while pilot availability is limited. A new drone charging...
Danger of violence. image by pixabay

Crimes are solved by law enforcement following up on intelligence information from ballistic imaging technology. Who is the shooter and how did they get...
woman screaming. image by pixabay

Drones are ideal responders to a disaster, especially when comparing advanced drones and human capabilities. While sending a human onto freshly collapsed rubble risks...
Bio Hazard. image by pixabay

Following several biohazard epidemics, the COVID-19 pandemic and the 2001 anthrax attacks in the US, a critical infrastructure biodefense program will be established at...
airport security. image by pixabay

Passenger screening automation at airports will create the next-generation screening experience to improve security and decrease the amount of time passengers spend being screened....
police. image by pixabay

Nowadays, body camera footage is essential for any proper execution of a security mission. It is a rarity to find a police officer not...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
metaverse. image by pixabay

Through virtual reality headsets or augmented reality glasses, people will be able to live their whole lives in environments where the boundaries between the...
surveillance camera. image by pixabay

The second generation of a security app transforms a smartphone or tablet into a video surveillance camera, which becomes a part of an existing...
smart city. image by pixabay

A new LiDAR perception system delivers highly accurate object detection, tracking, and classification, bringing the enhanced capabilities that enable autonomous vehicles to new industries. Endeavor...
fake news. image by pixabay

Artificial intelligence systems promise to identify who, or what, authored any specific text, a game-changing technology for tracking disinformation campaigns and other malicious activities...
photo illus. first responders by Pixabay

Tracking survivors in the aftermath of a disaster or during an emergency event is a major challenge for first responders, especially in an indoors...
terrorist attacks

Satellites have played an important role in disaster monitoring from space since the 9/11 terrorist attacks which resulted in the loss of life of...
weapon hiding. image by pixabay

Mass shootings have become a critical problem in the US. 611 mass shootings occurred in the US in 2020, a 47% increase from 2019,...
security. image by pixabay

As body-worn cameras (BWC) become more and more prevalent in the public safety sector, there has been a steady migration of these devices to...
image by pixabay

Call for Innovation:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...
image by pixabay

While artificial intelligence offers the power to drive a vast array of analytics solutions, many of the newest technology developments have been driven by...
image by pixabay

A new wireless AI blockchain technology is going to change the way airports manage security checks. Smart security trays will connect with passengers without...
Image by pixabay

When there is a gas leak in a large building or at an industrial site, human firefighters need to go in with gas sensing...
image by pixabay

Call for startups:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...
image by pixabay

Heightened concern over a critical vulnerability in widely used software. The flaw lets internet-based attackers easily seize control of everything from industrial control systems...