Applications

Applications

Drone industry

Last Monday, October 15, iHLS’s AUS&R conference hosted a plethora of startups, organizations and individuals from the industry of Unmanned Systems. A unique addition...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Pocket Notepad

The IDF’s training camp in the Negev, “Ir Habahadim” (the “City of Training Bases”), is known for its magnitude and innovation. The wide array...
Censorship

A new app has been recently launched by Google, aimed at protecting users from state-sponsored censorship and limitations on freedom of information. The app,...
navigation

The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been advancing wayfinding technology in order to improve travelers navigation experience...
tracking

For the first time, the NEON Personnel Tracker Solution was used to track personnel within challenging indoor, underground, and urban GPS-denied environments at the...

New wearable sensors allow clinicians to monitor multiple wounded military personnel at the same time through a smartphone or tablet. Philips Healthcare, a global leader...
ai-based malware

Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...
gps-denied

Various technologies might not work at a time of need in GPS-denied environments. A new mapping and location solution can overcome this problem. The...

When conducting prevention campaigns, US Department of Motor Vehicles investigators frequently encounter underage individuals with fake, out-of-state licenses and IDs. Law enforcement officers in...
ea

Mobile devices contain access to all of our personal and corporate data. Eavesdropping is a prevailing threat among many on mobile phones, with technology...
fitness watches

Are fitness applications the new threat to military officers and Pentagon officials? A recent memo from Deputy Defense Secretary, Patrick Shanahan, states the dangers of...
communication

Law enforcement officers coordinating and participating in dangerous operations to stop drug trafficking need reliable communications. The US Joint Interagency Task Force South (JIATFS),...

Ransomware cyber attacks are intensifying in scale and sophistication, and the perpetrators are better at evading countermeasures. A recent NTT Security survey revealed that...

During an emergency or disaster event, the response speed of the rescue teams and the coordination among the forces managing the incident are critical....
surveillance camera

A new technology allows public surveillance cameras to send personalized messages to people without knowing the address of the phone. The technology can be...
smartphone

Law enforcement teams can now determine if someone is carrying a weapon or explosive - all without the need for a physical search -...
facebook

By Vickie Zisman Well, in the wake of all Facebook scandals, it's an appropriate title, isn't it? And the answer to the question is? – Neither;...
airports

Airports around the globe are seeing dramatic increases in traffic, it increases complexity to ensure safe and reliable operations. A new smart airport technology...
UAS

The need for a system to provide UAS users in agriculture with a way to record information about their flights, sensors and maintenance issues...
emergency

A new service, Responder-to-Vehicle (R2V), protects first responders and motorists by delivering real-time alerts to drivers and connected cars via smartphone apps and in-vehicle...

Latest