Communications

Communications

This last weekend was a highlight for 23 teams from around the world that took part in the Defence Advanced Research Projects Agency contest....

The Israeli air force was one of the first to use targeting pods. First these were the ones that were supplied with the American...
video

Interview with Arie Kalo ,Director UTC - divers communication system Under water communication problems UCT's new system overcomes under water communication problems The reasons for the importance of...

Irvine, California-based USMobile, a developer of private mobile phone services, launched the Scrambl3 app yesterday , a smartphone app that enables users to create...

The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...

The daily routine of the emergency service personnel, cops, fire fighters and emergency medicine doctors, is packed full with a wide variety of events,...

You are standing by a white, shiny, family car. This car looks just like the car next door. You are going past a new SUV,...

Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...

These days, we finished building the command post vehicle for the firefighting services, which is the national command post. The vehicle was built in...
video

Interview with Gil Friedman from RED WAVES What is Red Waves' main contribution ? The role of  manpower in such a system The main challenges in the development process The challenges Rad Waves faces in...

Israeli experts say that this claim has to be investigated further but add that is was clear the the connectivity on passenger aircraft is...

Hezbollah's open preparations for another round against Israel are extremely worrying. They are not only worrying due to the dozens of rockets the terror...

Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence IBM (NYSE: IBM)...

Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

Real time systems are software and hardware that must operate according to a set sequence, with no diversions. In comparison to a home computer,...

Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

The Penn State College of Engineering has been the target of two sophisticated cyber attacks conducted by so-called “advanced persistent threat” actors. Experts have confirmed...

Chinese technology is accelerating into worrying new arenas, warns the Pentagon’s annual report on Chinese military power. But that doesn’t mean China is overtaking...

Four Australians were among 21 people arrested as part of a six-month international Homeland Security sting. Two people from the were charged with buying illegal...

The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...

Israel Aerospace Industries (IAI) has acquired a full independent capability for UAS payload simulation by purchasing TView, a 3D image generator for simulation and...

The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China...