The Sniper Advanced Targeting Pod (ATP) that, combined with a navigational pod, makes up the latest version of the low-altitude navigation and targeting infrared...
Canine’s’ sense of smell is more than a million times stronger than a human’s, making them excellent partners for explosive locating. Many detection canine...
A virtual wall using computer technology and thousands of portable sensors is offered as a solution for stopping illegal immigration and drug smuggling along...
A new physical security technology has been taking the management of sensors further. Siemens’ Siveillance Viewpoint for physical security information management (PSIM) is part of...
A new technology searches the Twitter firehose for emergency situations throughout New York City, and channels news alerts to first responders. The system introduced...
US Special Operations Command (SOCOM) science and technology is looking for equipment that weighs less, is more flexible and comes at an affordable price....
Machine learning is the field of study that gives computers the ability to learn without being explicitly programmed. It has numerous applications, from data...
An Israeli cyber group is paying dividends while guarding secrecy concerning its products. NSO Group developed a software which assists governments and security organizations...
The UK government is looking to meet with biometric technology firms to help determine existing marketplace capacity to provide fingerprint devices and capture software,...
The Future Forces Conference and Exhibition, organized by iHLS for already the fourth year, will present the trends and the most advanced solutions to...
The proliferation of real-time data from a wealth of sources such as mobile devices, web, social media, sensors, log files and transactional applications, has...
Lockheed Martin’s Hydra Fusion Tools drone software enables drones to form three-dimensional terrain maps as they fly, providing real-time tactical information and mapping data...
By Arie Egozi
This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes.
Hackers exploiting malicious...
A software company that’s developed a deep learning network software that makes smart products like robots and drones more autonomous and useful recently announced...