Home Blog Page 131
Maritime. image by pixabay

Next-Generation Mobile Connectivity In Maritime Vessels

0
Vessels require a network connection for reporting, automation, improving safety, autonomous navigation, IoT monitoring or remote operations at sea. For decades, satellite-based solutions have...
Image by pixabay

How Can Quantum Machanics Be Used in The Military?

0
Quantum technology translates the principles of quantum physics into technological applications. In general, quantum technology has not yet reached maturity; however, it could hold...
drone. image by pixabay

Elovating Cyber Security In UAVs

0
Unmanned aerial vehicles face a wide range of threat vectors in cyber space while they are in flight, including the potential for an adversary...
image by pixabay

Is This The World’s First AI Accelerator Chip?

0
AI accelerators are a class of hardware that are designed, as the name suggests, to accelerate AI models. By boosting the performance of algorithms,...
Medical Sector. image by pixabay

Protection Against Ransomware In The Medical Sector

0
Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2022....
AI. image by pixabay

New Partnership Promises to Secure Information

0
In uncontrolled environments, secure communications can be jeopardized by RF signals that are almost impossible to manually find and identify in real-time. New technology...
Bullet. image by pixabay

New Device to Register How Many Shots Fired

0
In current practice after a police shooting, crime scene and county attorney investigators track down every shell casing and spent slug, count rounds remaining...
flying transport. image by pixabay

New Futuristic Vehicle Will Be Shown During 2024 Olympic Games

0
Are flying cars an idea that merely lives in science fiction? It is possible that we might still see this fictional idea come into...
Smart city. image by pixabay

AI Powered Smart Cities – Developments Underway

0
A comprehensive security solution for smart cities is currently under development. An Integrated city-scale portfolio of AI-powered, end-to-end automated security screening solutions will be...
IoT. image by pixabay

What are IoT Devices Most Vulnerable To?

0
The threat of internal cyberattacks, from suppliers or employees, continues to be a global concern, with IoT devices being especially vulnerable. wInternal personnel are...
data and cyber. image by pixabay

Data At The Forefornt of National Defense

0
It is official, the US defense establishment will be focusing their future efforts on data research. The Pentagon is implementing new policies and procedures...
robot. image by pixabay

New Development Will Enhance Robotic Exoskeletons

0
A new development will enable human-scale dexterous robotic systems. It will serve as an opportunity to leverage a robotic system that is equivalent to...
Battlefield. image by pixabay

Cyber Security On The Battlefield – From AI To Autonomy

0
Artificial intelligence software in battlefield autonomous systems can be vulnerable to cyber attacks. Researchers are looking for ways to make the systems’ machine learning...
biometric. image by pixabay

Military Focuses On Operational Biometric Authentication

0
Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
friend or foe. image by pixabay

Friend or Foe Technology In The Cities

0
 The US DoD wants to develop surveillance technology for the urban setting. The Pentagon is looking to fund research into technological capabilities that can...
Riot. image by pixabay

US Army Responds To Increased Riots

0
Over the course of the last few years, the US had seen a rise in the number of riots and political activism. As a...
Army. image by pixabay

New Solution For Common Army Base Issue

0
In the case of spare parts and components, snapping a photo of the part is much more effective than conducting a text search, that...
critical infrastructure. image by pixabay

Critical Infrastructure Secured Via Artificial Intelligence

0
A new project launched in Japan aims at improving the security of critical infrastructure using artificial intelligence solutions. The non-profit organisation IOTA Foundation, developing...
Cyber Security. image by pixabay

Unexpected Cyber Security Issue Emergers

0
The United States needs immediate and sustained improvements in its cyber security workforce, as there are an estimated 299,000 active openings for cyber security-related...
Top Secret. image by pixabay

Top Secret Networks Are Protected Using This Tool

0
With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
robots. image by pixabay

New Robots Inspired By Nature

0
A new 3D-printing method will make it easier to manufacture and control the shape of soft robots, artificial muscles and wearable devices. Researchers at...
Cyber space. image by pixabay

New Encryption Method To Fight Crime

0
The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...

Latest