Innovation

Innovation

Image provided by pixabay

Global computing products giant Lenovo has established the Lenovo Cybersecurity Innovation Center (LCIC) in cooperation with the Cyber Security Research Center of Ben-Gurion University...

INNOFENSE Call for startups – Dual Use Technologies:   Following the immense success of the previous three cycles and their integration into the defense sector, iHLS...
Image provided by pixabay

Researchers at the University of Texas at Austin have developed a temporary "e-tattoo" for the palm that can track excitement and stress using the...
Image provided by pixabay

Imagine yourself as the manager of one of the biggest banks in the world right now – millions of customers, hundreds of millions of...
Image provided by pixabay

Following a successful launch meeting, we are delighted to announce the beginning of the third batch cycle of the INNOFENSE Innovation Center program. The...
Image provided by pixabay

The US Department of Defense releases its National Defense Strategy (NDS) every four years, in which it summarizes the key strategic principles that will...
Image provided by pixabay

Innovation has been the key word influencing the last few years, with 2022 making many science fiction ideas a reality. But which technologies are...
Military simulation. image provided by pixabay

As the military continues utilizing simulation technology as a way to train its recruits, legacy technologies might be holding back huge opportunities for collaboration...

Today, more and more systems are enveloping us in our daily lives. From autonomous cars to charging your phone, all these actions create information...
Quantum. image by pixabay

Random numbers are the basis of cryptography keys. These keys can in turn be used to encrypt critical data, by encoding information into an...
circuitry. image by pixabay

The microchip of tomorrow is small, economical, and can even retain memory during a power outage, new research suggests. The study published in the...
computing. image by pixabay

Overworked security operations teams, the increasing frequency of large-scale ransomware attacks, paired with the shift to a new era of hybrid work, have created...
critical infrastructure. image by pixabay

A new project launched in Japan aims at improving the security of critical infrastructure using artificial intelligence solutions. The non-profit organisation IOTA Foundation, developing...
beijing. image by pixabay

A former Pentagon software chief has stated that China has already won the artificial intelligence battle with the United States and is heading towards...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
image by pixabay

Call for Innovation:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...

The technology of telexistence enables a person to have a real-time sensation of being at a place other than where they actually exist, and...
image by pixabay

Call for startups:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...
image by pixabay

Call for startups:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...
Cyber Security. image by pixabay

What is the role of governments in the cybersecurity of organizations and companies? What is the extent of interference required? A new report from...
Future City. by pixabay

With a significant use increase of renewable energy sources, such as solar and wind power, more appropriate energy storage technologies are being developed to...
IDF's School for UAV operators, photo by IDF Spokesman

A new report assesses the evolving trends in the UAV industry in Israel, in the context of various geopolitical, economical and technological influences in...