Networking

Networking

information

The video field is currently going through an accelerated revolution. All the information is web-based and accessed by users through smart devices. The amount...
first responders

Since the entrance of body-worn cameras to first responders’ work, developers and engineers have been trying to find the optimal system to relay the...
authentication technology

Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
drone identification

As drones have become an everyday tool for professional and personal use, authorities want to be sure they can identify who is flying near...
situational awareness

The flow of critical information in emergency situations is not always efficient and clear, a problem that might interfere with first responders’ operations.  A...
intelligent cars

Intelligent vehicles get their intelligence from cameras, Light Detection and Ranging (LIDAR) sensors, and navigation and mapping systems. But there are ways to make...
gps capabilities

The U.S. Air Force declared the first Lockheed Martin-built GPS III satellite "Available for Launch." GPS III SV01 will bring new capabilities to U.S....
emergency

The Georgia Institute of Technology has recently stated in a media release that according to a study it’s conducted, edge computing and fog networks...
battlefield

The US military has been facing various challenges in internet-connected, robot-rich congested and contested battlefields. In search for solutions, the U.S. Army Research Laboratory...
situational awareness

A new development in situational awareness technology would support operations in harsh environments such as the arctics. Finnish maritime innovators Fleetrange, a maritime startup and...
blockchain

More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
Iot technologies

The US has been harnessing IoT technologies in attempt to advance a wide array of Smart City applications as well as in response to...
intelligence

The US intelligence community guards some of the most closely held secrets and helps defend the country from attacks. However, even it needs protection,...
AUS&R

The leading conference and exhibition in the field of unmanned systems and robotics, AUS&R, has been gaining more momentum in the world and in...
ISIS

The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...
c4isr

The growing demand from coastal agencies and navies from the point of view of the missions’ volume and variety requires the development of upgraded...

Sensitive information conveyed by military mobile communication networks requires high levels of protection. A new cybersecurity software will secure mobile devices in the battlefield....
wearable sensor

One of the risks evolving during police operations is that when an officer is injured, the period of time until help arrives might be...
cloud computing

When disaster strikes, it’s crucial that first responders have reliable access to a controlled network, allowing them to receive and deliver critical information while...
original approach to cyber security

New methods for cyber security have been trying to offer an original approach to cyber security. Cyber behavioral pattern analysis, a state-of-the-art commercial method,...
autonomous vehicle

With the autonomous vehicle frenzy everywhere, so it’s no surprise that Apple is putting some of its efforts in the subject. The company has...
self-driving cars

The global campaign for the promotion of autonomous vehicles to the streets seems to be everywhere. Now, 3M, the worldwide famous company behind inventions...