Sensors on Delay Compared with Algorithms

0
A new development that may boost facial recognition technology enables secure biometric authentication for a variety of banking, e-government and enterprise applications. However, sensor...

Next Cyber Threats – 2019 Forecast

0
As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity teams do their best to confront...

Will the Polygraph be Replaced by Eye-Scanners?

0
Eye-scanners that detect deception appear to hold much promise, and are faster and cheaper than traditional polygraph tests, for example during employee recruitment processes....

Microsoft Calls for Regulation on Facial-Recognition Technology

0
Microsoft President Brad Smith calls for government regulation on facial-recognition technology. With the aid of smart camera systems governments and companies could track our...

Game-Changing Combination of Recognition Technologies

0
The recent “Yellow Vest” riots in Paris bring into mind the potential power of the combination of high-resolution digital video capture of protesters and...
fingerprint

Your Smartphone Fingerprint Identification is Not So Safe

0
Smartphone makers like Apple and Samsung typically use biometric technology in their phones so that people can use fingerprints to easily unlock their devices...

Sixth Cycle Opens Soon: Apply to iHLS Security Accelerator

0
Are you developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We invite...
face recpgmotopm

Face Recognition – New Horizons

0
New face recognition capabilities will help streamline post-event investigations, support rapid response to situational changes, and derive richer operational intelligence for data-driven decision making....
security accelerator

Accelerate Your Startup! Apply to iHLS Security Accelerator

0
Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
identifitu

The Way You Walk will Reveal Your Identity

0
China’s surveillance efforts have hit a new level with a technology that can apparently identify individuals based on their body shape and the way...
terrorism

New Device Challenges Terrorists

0
Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...

World’s Largest Deployment of Biometric Systems

0
Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as...
AI-Human

AI-Human Hybrid Soldiers in Rapid Development

0
U.S. defense intelligence is becoming increasingly concerned by a new technology rapidly emerging in the Chinese military - AI-human hybrid soldiers. Earlier this month, Intelligence...
airport security

Five Leading Airport Security Technologies by 2030

0
The protection of passengers, staff and aircraft in the airport and its vicinities from crime, terror and other threats has always been on high...
Artificial Intelligence

Artificial Intelligence Now Protects Students

0
Video Artificial Intelligence (AI) and Deep Learning is now being used to help schools across the U.S. rapidly and cost-effectively enhance safety and security...
Machine Learning

Your Guide to Machine Learning

0
As technology evolves, terms such as artificial intelligence, machine learning and deep learning quickly penetrate public discourse. This guide will help clarify possible confusion...
search and rescue

Unexpected Communication Channel for Search and Rescue

0
First responders, soldiers, hazard material teams, etc. need hand-free communications equipment in order to be able to concentrate more on their missions. The development...
facial recogntion

Did Tech Giant Cross the Line in Facial Recognition?

0
Facial recognition systems are a highly efficient public security solution. However, this field remains controversial, mainly due to privacy issues. Facial recognition has been...

Smart City Security Technologies Continue To Evolve

0
The definition of a smart city is rather diverse and encompasses any technology that can help a city become smarter, more efficient, more resilient,...

12 HLS Verticals Impacted by Emerging Technologies

0
With the advent of technologies such as artificial intelligence, robotics, quantum computing, the Internet of Things, augmented reality, materials science, 3-D printing, and data...

Who Will Be World Leader in Face Recognition Technology?

0
A recent research evaluates that China will become the biggest player in facial recognition technology both as a consumer and a provider. By 2023,...

Biometric Tech to Improve IoT Security

0
Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...