Counter GPS Spoofing Measures
Because of the widespread use of GPS-style technologies – in navigation, mobile phone networks etc. – false signals have the potential to cause widespread...
Innovation in VTOL Field
Vertical take-off and landing aircraft (VTOL) aircraft offer many advantages, mainly the capability to take-off and land without a runway. A new VTOL unmanned...
Israeli RAFAEL Expanding Operations in India
Astra Rafael Communication System (ARC), a Joint Venture between Astra Microwave and RAFAEL Advanced Defense Systems of Israel, inaugurated their state-of-the-art facility at Hardware...
Geofencing for Information Security
Safeguarding IT requires a multi-layered approach that incorporates security technologies and user training.
Geofencing creates a virtual fence on a user's network access. This limits...
Data Collection and Text Analysis at Military Environment
Large volumes of data, managed properly, are a boon for many industries and sectors, including the military. It would not be possible to mount...
Smart Campus Access Enabled by Smart Watch
A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...
Interactive Map Shows Where Disasters Are Happening
Recently, the Hillsborough River in Florida was flowing at more than 3,020 cubic feet per second, with the river’s surface being at 31.48 feet...
Dual-Use Solution for Extreme Weather Operations
One of the biggest issues for soldiers operating in a cold environment is the loss of hand function and dexterity. The U.S. Army has...
Software Giant to Help Reduce Soldier Heavy Load
A new, web-based modeling app developed by Microsoft will allow soldier equipment officials in the US to see how hanging new pieces of kit...
Cyber Situational Awareness Needed
The US army is interested in cyberspace situational understanding. Situational awareness tools allow soldiers and commanders to track the progress and operations of cyber...
Register Now to AUS&R 2019 Unmanned Systems and Robotics Conference!
Attend the seventh Conference and Exhibition on Unmanned Systems and Robotics - AUS&R 2019.
Register!
Representatives from government, leading defense industries, military, security forces and law...
Predictive Maintenance Enables Major Advantage to Military Forces
Advancements in technology are spurring US Special Operations Command to examine how it can improve its artificial intelligence capabilities on a data-driven battlefield. One...
Portugal Looking to Purchase small UAVs
In an effort to enhance the situational awareness of its troops, the Portuguese Army has been looking to acquire additional hand-launched unmanned aircraft systems....
Egozi: Explosive Drones are Small but Dangerous
By Arie Egozi
During recent years, the drone threat has evolved at a record rate. Cheap, small drones which can be easily turned into lethal...
New UUV Model Upgraded
A Chinese startup company has recently developed its newly upgraded underwater unmanned drone for consumer use. Youcan Robot has recently been at work developing...
Mobile Device Optimized for Police Missions
Smartphones offer much potential in public safety missions. The Chicago Police Department is piloting Samsung DeX In-Vehicle Solution designed to give officers more tools...
This Technology will Secure Digital Weapons
Cybersecurity is the name of the game when talking about future weapon systems. The Pentagon is exploring how artificial intelligence can help build more...
iHLS INNOFENESE Innovation Center – Call for Startups for Ministry of...
iHLS INNOFENSE - Innovation program for technological startups in the civilian and security sector, which will be operated by iHLS in collaboration with the...
Meet this Dual-Use GPS Tracking Technology
GPS technology has been around for quite some time, ever since 1973 when the US Department of Defense (DoD) created a satellite system that...
Device Can Detect Humans Through Walls
In most emergency situations having good and reliable situational awareness is the difference between a successful and unsuccessful operation for first responders. In almost...
Anomaly Detection as Advanced Cybersecurity Strategy
Most cybersecurity vulnerabilities today are unknown until an attack takes place, as conventional cybersecurity measures can only detect and prevent known threats. AI-based anomaly...
No. 1 Innovator in Quantum Technology
Hacking-resistant communications networks, sensors that see through smog and around corners, and prototype computers that may someday smash the computational power of any existing...

















































