Applications

Applications

The evacuation of residents threatened by natural disasters such as wildfires, flooding and debris flows is challenged by psychological and logistical obstacles. People typically...

Unauthorized drones entering secure perimeters have made the news regularly in recent months, with unmanned aerial vehicles interrupting airplane traffic at airports in London,...
supply chain

US warfighters expect that their field equipment have the same functionality and capability as their personal, commercial mobile devices. Consequently, rugged mobile computing is...
gps-denied

Operating in GPS-denied environments, such as indoors, underground and in areas where GPS may be intentionally denied, has become a serious challenge. A new...
smart roads

Getting drivers to change their behavior on roadways is a complex task. A smart road tracking and public safety technology could contribute to this...
location platform

Sometimes, rescuing efforts of people lost in an unaccessible area or having a seizure are hampered by non-accurate enough location information. A new system...
military communications

Communication between commanders and forces on the field has become a crucial aspect of modern warfare. Because of this, the US Army is rolling...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

By 2021, there will be close to 13 connected devices per person in North America, according to Cisco’s estimate, and many consumers don’t have...

A unique mobile app designed to alert residents in Los Angeles County of an earthquake has been unveiled. The ShakeAlertLA app is designed...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...
at battlefield

Two widely used American war-fighting mapping applications are marked vulnerable to cyberattacks by hostile actors. After a year...

A pilot project will digitally map New Jersey county schools and other public buildings as part of a...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...

The physical driver’s license is probably here to stay, but there are also other options that make identification and authentication more efficient, such as...

A technology originating in the US military sector is being tested in order to help save firefighters' lives. The ATAK - Android Team Awareness...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
pilot

An off-the-shelf commercial helicopter was recently modified to fly itself in typical military missions, including supply runs, medevac, and reconnaissance. The long-term goal: Design...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....

A development by a US-based Israeli company was successfully applied by first responder teams during the recent Hurricane Michael events in Florida. The platform...
Processor

The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...
AI

New cooperation in the field of artificial intelligence (AI) is intended to result in advanced AI systems in unmanned surface vehicles (UUVs). The goal:...