Software

Software

Cyber security. image by pixaby

A new tool has been unveiled that can supposedly reverse engineer IoT devices. A tool for analyzing firmware, the foundational software that underpins any...
Future City. image by pixabay

How can you train increasingly complicated neural network models faster with less materials? Some researchers suggest investing in a new branch of artificial intelligence...
Underwater. image by pixabay

Innovative underwater 3D visualization and vehicle control technology was recently showcased by the St. Petersburg’s Maritime and Defense Technology Hub. Advanced augmented and virtual...
AI. image by pixabay

Retail companies have begun employing AI boxes as a means of bettering their businesses. These AI boxes can help with many aspects of these...
telecoms. image by pixabay

Fraud has become an ongoing threat and concern for the telecom industry. Approximately 40B$ are lost annually to fraud in telecoms worldwide, and this...
Robot. image by pixabay

The ever-increasing danger of cybercrime has motivated companies to look at different solutions. The massive number of threats, cyber criminals and skill shortages have...
Stop Suicide. image by pixabay

As of today, suicide by firearm is by far the most lethal method of ending your own life, especially in the US. In 2020,...
training

A contract between a private company and the British Army will help the development of a cloud-distributed simulation demonstrator. This project will include cloud-based...
Atomic Bomb. image by pixabay

The final test of a B-2A bomber radar aided targeting system has been conducted by the US Air Force. The system will enable weapon...
Fire fighters. image by pixabay

Two US firefighters developed a situational awareness application critical to saving lives. In recent years, the world has seen and suffered many lethal fires,...
IT Repair. image by Pixaby

This new development aims to make IT repair so much easier and accessible – the first augmented reality app for IT repair! Dell Technologies...
Mars Rover. Image by Pixabay

An autonomous security platform that protects IoT devices has been unveiled! This software will prevent hackers from gaining unauthorized access and executing cyberattacks against...
Target Sniper. image by Pixabay

A new development in the world of autonomous technology has been announced. An advanced machine learning software will be developed by BAE Systems as...
Photo illus. cyber security by Pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
photo illust. classroom by pixabay

On November 30th, a 15-year-old student shot 11 people at Michigan’s Oxford High School, killing four students. To reduce the possibility of mass shootings...
Photo illus. mapping by Piqsels

Google decided to temporarily disable live traffic data on its Maps app in Ukraine following reports that people around the world were using the...
Photo quantum by Pixabay

Quantum technology is expected to revolutionize information processing across a range of military and civilian applications – from artificial intelligence, to supply chain optimization,...
Computer screen illustration by PIXABAY

The information issue is at the center of a new US Terrorism Threat bulletin. Threat levels throughout the US remain heightened due to mis-,...
Photo illustration airport by PIXABAY

Weather conditions such as fog and low stratus clouds over airports are responsible for severe flight delays translating into heavy costs for airlines. Determining...
Photo illus. university campus by PIXABAY

A smart campus uses advanced network infrastructure and internet-connected devices joining people, devices, and applications and allowing universities to make insight-driven decisions to improve...

Operational, intelligent swarming aircraft autonomy will be integrated into US Air Force unmanned platforms. The combat-proven Hivemind autonomy software will advance the autonomous collaboration...
cybersecurity

More than a month after the Log4Shell critical vulnerability was first spotted, stakeholders in the tech industry attended a White House cybersecurity meeting to...