Technology

Technology

drone

Once again, drones are being operated by insurgency groups against military targets in the Middle East. Houthi Ansarullah fighters launched drone attacks against the...
identifitu

China’s surveillance efforts have hit a new level with a technology that can apparently identify individuals based on their body shape and the way...

Drone technology adoption is having an impact across industries, from inventory tracking in manufacturing environments, to inspection of power lines and wind turbines by...
radar

A new radar under development is expected to detect low observable (stealth) targets under electronic warfare conditions and identify stealth aircraft and missiles. Radar...
smart prison

Prison installations in Hong Kong will implement advanced video analytics technologies within the framework of the “smart prison” project – a move to modernize...
control drones

The quality and precision of drone flying depend to a large extent on the controller system. A first-of-its-kind single-handed controller can now increase flight...
tiny bots

From conducting reconnaissance in advance of missions through to searching for survivors in collapsed, unstable buildings in humanitarian operations, the potential on future bee-sized...
mail bombs

Screening inbound mail against postal IEDs and other personal harm devices is becoming a standard practice in organizations. The past series of mail bombs...
combat drone

China has exported numerous drones to countries across the Middle East, presenting them as comparable to US products with less restrictions and for a...
communications

The United Nations has been upgrading its communications network. Currently, there are 14 peacekeeping operations around the world led by the United Nations. These...
bullet

New bullets would be a better match for the threats soldiers will likely face in future conflicts. The US Army has been working on a...
accurate rifle

Britain’s Army has been upgrading its weapons. More than £5 million were spent on the upgrading of the SA80 rifle to give it enhanced...
drone swarms

The U.S. Military has been facing the threat of drones, including commercially available ones, capable of spying on and attacking U.S. forces. The threat...
encryption

Military communications can be targeted by enemy forces operations in an attempt to learn about intentions and gain superiority at the battlefield this way....
diamonds

Various models of drones have the same weak point: their battery. They are capable of flying for only around 15 minutes at a time...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
big data

Ground-breaking research recently used big data analysis and machine learning to develop a model in order to predict the development of pressure injuries among...
armor-piercing bullets

With the advancements in weapon technology and the emergence of new models of bullets, soldiers and law enforcement officers need more advanced bulletproof vests....
uav operator

In the growing marketplace of UAV operators, there is a need for high standards of safety and professionalism. A new certification program available to...
iron dome

Dozens of rockets fired from the Gaza Strip during the recent 24-hours to Israel’s territory were intercepted by Iron Dome system. This world's only...

According to Israel's Home Front Command directions: When the siren is sounded or an explosion is heard, enter the protected space within the amount of...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...

iHLS Events