Home Blog Page 315
security accelerator

Startup – Apply Now to iHLS Security Accelerator

0
Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
big data

Attend Big Data for Security and Intelligence Conference & Exhibition

0
The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...

DARPA Creating a Buzz

0
The US military is looking to expand its artificial intelligence operation, but it's not intending to start it up from scratch. Instead, in a...
military communications

Military Communication Just Got Simpler

0
Communication between commanders and forces on the field has become a crucial aspect of modern warfare. Because of this, the US Army is rolling...
drone ability

Digging – New Drone Ability

0
While drones are primarily known for what they can do in the sky, like aerial photography or gathering intelligence, a new project out of...

US Navy Investing in Unmanned Battleships

0
The US navy is investing in unmanned technologies due to the threats posed by its two significant rivals in global dominance - Russia and...
military uav market

Impressive Growth in Military UAV Market

0
Military Drone/Unmanned Aerial Vehicle (UAV) market was estimated to be over USD 5 billion in 2016, and will have a market value of more...

UUVs to be Equipped with Nuclear Capabilities

0
Russia has been making efforts to advance a nuclear-powered unmanned underwater vehicle program. The Russian Navy plans to place more than 30 Poseidon strategic...
smart cities

Smart Cities. Is it Wise to Get Smarter?

0
We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...

Further Step Towards Integration of Drones in Aerial Space

0
The US Department of Transportation announced it would allow drones to fly overnight and over people without waivers under certain conditions. “Drones…are well on...
quantum

Quantum Tech to Secure Financial Data

0
Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...

Future’s Tactical Assault Operator Suit

0
American war-fighters have long enjoyed a technological preponderance over their opponents. They are equipped with the best high-tech gear in the world, such as...

One of World’s Top Battlefields for Drones

0
Extremists continue to explore ways to surprise their enemies. The Iranian-aligned Shiite Houthi group in Yemen operated a drone strike on a attacked a...

Technology Has Adapted Itself to Users

0
CES 2019 electronics show reflected some major shifts that will characterize world technology in the near future. Four trends stood out above the others,...

Robotic Solution for Tunnel Warfare

0
Some U.S. Army leaders believe future wars will take place underground and in tunnels. A new Swiss robot may be a solution for this...

New Monitoring Network Increases Drone Awareness

0
New research achieved an unmanned aircraft systems (UAS) industry milestone in December 2018 with the first-ever drone test flights over a specially developed network. The...

2019 Looks Like a Year of Innovation

0
2018 was a pretty good year for military innovation, but it looks like 2019 is going to be even better. The Pentagon and other...

Ukraine Deploys Wide Array of Unmanned Vehicles

0
For several years, Ukrainian troops have been locked in a “frozen conflict” with Russian-backed separatists for control of the Donbas region in Eastern Ukraine....
drone payload

Unique Drone Payload Offers Long-Range Recognition and Low Signature

0
To achieve accurate recognition and high-resolution imaging, drones need to approach the target from a short range. But what if the drone is required...
data breach

Giant Data Breach: 773 Million Passwords and Email Addresses

0
More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

Cyber Trends and Threats – A Review of 2018 and Expectations...

0
Summary of 2018 2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...

Latest

The Future of Submarine Steering Starts Here

0
Modern submarines rely on increasingly complex control systems to maneuver safely in three dimensions, manage propulsion, and coordinate onboard sensors. As underwater missions expand...