Next-Generation Mobile Connectivity In Maritime Vessels
Vessels require a network connection for reporting, automation, improving safety, autonomous navigation, IoT monitoring or remote operations at sea. For decades, satellite-based solutions have...
How Can Quantum Machanics Be Used in The Military?
Quantum technology translates the principles of quantum physics into technological applications. In general, quantum technology has not yet reached maturity; however, it could hold...
Elovating Cyber Security In UAVs
Unmanned aerial vehicles face a wide range of threat vectors in cyber space while they are in flight, including the potential for an adversary...
Is This The World’s First AI Accelerator Chip?
AI accelerators are a class of hardware that are designed, as the name suggests, to accelerate AI models. By boosting the performance of algorithms,...
Protection Against Ransomware In The Medical Sector
Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2022....
New Partnership Promises to Secure Information
In uncontrolled environments, secure communications can be jeopardized by RF signals that are almost impossible to manually find and identify in real-time. New technology...
New Device to Register How Many Shots Fired
In current practice after a police shooting, crime scene and county attorney investigators track down every shell casing and spent slug, count rounds remaining...
New Futuristic Vehicle Will Be Shown During 2024 Olympic Games
Are flying cars an idea that merely lives in science fiction? It is possible that we might still see this fictional idea come into...
AI Powered Smart Cities – Developments Underway
A comprehensive security solution for smart cities is currently under development. An Integrated city-scale portfolio of AI-powered, end-to-end automated security screening solutions will be...
What are IoT Devices Most Vulnerable To?
The threat of internal cyberattacks, from suppliers or employees, continues to be a global concern, with IoT devices being especially vulnerable. wInternal personnel are...
Data At The Forefornt of National Defense
It is official, the US defense establishment will be focusing their future efforts on data research. The Pentagon is implementing new policies and procedures...
New Development Will Enhance Robotic Exoskeletons
A new development will enable human-scale dexterous robotic systems. It will serve as an opportunity to leverage a robotic system that is equivalent to...
Cyber Security On The Battlefield – From AI To Autonomy
Artificial intelligence software in battlefield autonomous systems can be vulnerable to cyber attacks. Researchers are looking for ways to make the systems’ machine learning...
Military Focuses On Operational Biometric Authentication
Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
Friend or Foe Technology In The Cities
The US DoD wants to develop surveillance technology for the urban setting. The Pentagon is looking to fund research into technological capabilities that can...
US Army Responds To Increased Riots
Over the course of the last few years, the US had seen a rise in the number of riots and political activism. As a...
New Solution For Common Army Base Issue
In the case of spare parts and components, snapping a photo of the part is much more effective than conducting a text search, that...
Critical Infrastructure Secured Via Artificial Intelligence
A new project launched in Japan aims at improving the security of critical infrastructure using artificial intelligence solutions. The non-profit organisation IOTA Foundation, developing...
Unexpected Cyber Security Issue Emergers
The United States needs immediate and sustained improvements in its cyber security workforce, as there are an estimated 299,000 active openings for cyber security-related...
Top Secret Networks Are Protected Using This Tool
With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
New Robots Inspired By Nature
A new 3D-printing method will make it easier to manufacture and control the shape of soft robots, artificial muscles and wearable devices. Researchers at...
New Encryption Method To Fight Crime
The Council of the European Union is on the lookout for secure encryption and lawful data access. The organization has adopted a resolution calling...












































