Big Data

Big Data

5G illustration

The fifth-generation cellular network technology known as 5G provides broadband access, and is engineered to greatly increase the speed and responsiveness of wireless networks....
VPN

VPN is a virtual private network that provides freedom and security of work on the web. The main functions of a VPN are to...
Photo illustration NIST

There are about 40,000 sensors on an offshore drilling rig, and each collects information about how the rig's many machines are operating. But sensors...

Data analytics have become an essential factor in law enforcement operation, but further advances are still needed. Looking at past records to discover hot...

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
startup competition

This happens only once a year! iHLS’ unique Startup Competition is a one-time opportunity for startups - in one day you can get exposure to...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense, and HLS fields to take part in the prestigious iHLS...

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...
computer vision

Computer vision is a type of artificial intelligence that allows computers to interpret images and videos. Many law enforcement and public safety organizations already...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...
big data

Big data is now the basis for any activity in the business, government, and security sectors. However, in many cases the information streamed to...

Machine learning, deep learning, and other aspects of artificial intelligence (AI) have become major basis for advanced technologies in any field. In the defense...

For computer vision and facial recognition systems to work reliably, they need training datasets that approximate real-world conditions. Advances in computer vision approaches facilitate...
computing

A new supercomputer under development will have big data analytics and deep learning applications in the energy, defense and security, science, industry and many...
genetic

It is already obvious that 2019 is the year of privacy - from security technologies designed to thwart personal information hacking to public critic,...
sensor fusion

The global military sensor fusion market has reached $204 million, and is set to grow to $756 million by 2029, market research company Visiongain...
security

Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
idf portal

A new IDF technological internet portal reflects the fact that, at least from the aspect of innovation and technology, the Israeli army is currently...
public safety

Law enforcement agencies need proven technology-driven solutions that can increase response efficiency and change the trajectory of a single moment, while in the moment....
big data

All the speakers agreed that big data technologies are at the midst acceleration and form a growth engine in any organization. Big data field...
autonomous cars

Autonomous cars are still being developed, and this means that an ever growing quantity of data is a massed through cars' navigational technologies. Recently,...
big data

The screening process for the US Air Force’s elite Special Warfare troops is highly selective, and the training course candidates face a gantlet of...

iHLS Events