Networking

Networking

intelligence

66
The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
AUS&R

26
The leading conference and exhibition in the field of unmanned systems and robotics, AUS&R, has been gaining more momentum in the world and in...
ISIS

34
The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
c4isr

22
The growing demand from coastal agencies and navies from the point of view of the missions’ volume and variety requires the development of upgraded...

65
Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
wearable sensor

65
One of the risks evolving during police operations is that when an officer is injured, the period of time until help arrives might be...
cloud computing

182
When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...
original approach to cyber security

104
New methods for cyber security have been trying to offer an original approach to cyber security. Cyber behavioral pattern analysis, a state-of-the-art commercial method,...
autonomous vehicle

77
With the autonomous vehicle frenzy everywhere, so it’s no surprise that Apple is putting some of its efforts in the subject. The company has...
self-driving cars

75
The global campaign for the promotion of autonomous vehicles to the streets seems to be everywhere. Now, 3M, the worldwide famous company behind inventions...
mobile connectivity

86
The city of Greenville, S.C. is projected to welcome upwards of 100,000 to 500,000 visitors arriving to watch there the solar eclypse. The city’s...
asymmetric warfare

57
The US defense R&D establishment has been seeking new ways to preserve the American advantage in asymmetric warfare. DARPA’s Strategic Technology Office (STO) unveiled...
targeting

49
The US Army recently demonstrated a breakthrough in soldier weapons targeting. The development features a tiny, weapon-mounted thermal sight designed to communicate wirelessly with...
military amphibious operations

41
Autonomous vehicles, augmented reality systems, and advanced wireless networks were among over 50 new technologies showcased during a recent US military amphibious operations exercise....
drone detection tools

38
Alongside the new opportunities offered by drone technology, people become concerned about their security and privacy. There has been a growing need for drone...
video streaming

13
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
3d printing technology

38
The benefits of 3D printing technology are known, but less frequently discussed are the dangers. The open and accessible nature of the technology means...
social media

27
During emergency situations like severe weather or terrorist attacks, local officials and first responders have an urgent need for accessible, reliable and real-time data....
electronic warfare

20
The US Army Research Lab has been increasingly focusing on fighting land wars against far more technologically sophisticated adversaries than it has in the...
monitor communication

25
Austria, like several other European countries, is pursuing plans to give the police the right to monitor communication apps such as WhatsApp and Skype...
the islamic state

80
Police in Northern Ireland are leading a bid to improve the detection of terrorist content on the internet. Project TENSOR is aimed at tackling...
electronic warfare

53
U.S. Army trainers have successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise. The...

iHLS Events

5

1007