Big Data

Big Data

facial recognition

10
Facial recognition technologies are not new. However, what about identifying the actual identity of people under disguise? Researchers from the University of Cambridge are...
big data

17
With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of...
security technology

289
iHLS is happy to announce the establishment of the company’s new Advisory Board, led by Brig. Gen. (res.) Giora Inbar, who will be the...
valuable information

58
Huge amounts of data are collected by drones during their various missions. Turning the data into valuable information is a complex task. Intel has been...
cyber security

45
The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
blockchain

136
The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
information security

77
By Ilan Segelman VP Sales & Business Development, Power Communications, and Operation Manager, Sophos Israel Machine Learning has become a buzzword that many suppliers use as...
patterns in crowds

19
Security cameras are everywhere - in malls, stadiums, train stations, parking garages, airports. But with so much information flowing in, it can be challenging...
hacking

24
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
future battlefield

63
The future battlefield is at the center of a new US Army study about the warfare over the next few decades. Soldiers can expect...
video streaming

13
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
anti terror

35
Australia’s counter-terrorism police are using various means to enhance their capabilities against attempted terror attacks. These include, for example, drones the size of flies...
secure authentication

38
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
accelerator

24
Side by side with the impressive weapon systems presented at the exhibition of the IAMD Missile Defense Conference, the hundreds of visitors had the...
unmanned systems

26
Unmanned systems may now  be in use against friendly forces. Terrorists as well as nation-states are striving to employ these systems, especially airborne platforms,...
face recognition

30
Facial recognition startups have lately been popping up in more and more airports. A  new one is supposed to be the fastest and most...
airport security

17
Conducting airport security missions can be a complex task, which sometimes results in more than a few missed threats. Now, machine learning might help...
bodycam

7
Criminal justice experts at Washington State University (WSU) are developing innovative technology to improve police–community relations, officer training and public safety. Researchers in the new...
cybersecurity law

17
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
smart city

40
When video systems first moved from analogue to digital and then became part of the IoT world, they were primarily used to provide visual...
crime prediction

29
A new crime prediction technology has been creating controversy. Brett Goldstein, an ex-cop, founded CivicScape, a technology company that sells crime-predicting software to police...
securing sporting events

96
Predictive technology will play a vital role in securing future major sport events. During a keynote speech on smart cities and the future of...

iHLS Events

5

1009