Trending News
Home / 2022 / August (page 4)

Monthly Archives: August 2022

Ultra-Wideband Underwater Backscatter via Piezoelectric Metamaterials

Researchers are developing the Internet of Underwater Things (IoUT), a worldwide network of smart interconnected underwater objects that would transmit data from existing and planned roaming, autonomous vehicles, and underwater sensor networks to networks above the surface in real-time.   DARPA launched the “Ocean of Things” program in 2017 to …

Read More »

Best quantum bit or Qubit technology Race for realization of quantum computers and sensors

Quantum technology (QT) applies quantum mechanical properties such as quantum entanglement, quantum superposition, and No-cloning theorem to quantum systems such as atoms, ions, electrons, photons, or molecules. Quantum bit is the basic unit of quantum information.  Whereas in a classical system, a bit is either in one state or the another. …

Read More »


Militaries are facing complex operational and tactical environments such as the increasing challenge of non-state/lone actors; persistent rapid technological development along with its broad availability via the internet; and the advent and expansion of new domains of possible threat such as information systems, space, cyberspace, electronic warfare, and autonomous weapons. …

Read More »

Growing Cyber threats to commercial aviation require cyber risk management, and resilient systems

Cyber attacks are growing in number and sophistication affecting large corporations, critical infrastructures of all kinds, governments to SMEs, and increasingly the aviation industry.   Commercial aviation plays a central role in our daily lives and is an essential part of the national economy. The number of passengers rose from …

Read More »

DARPA RTRA developing array processors reconfigurable with missions

All modern personal computers including desktops, notebooks, smartphones, and tablets, are examples of general-purpose computers. General-purpose computing incorporates ‘Von Neumann’ approach, which states that an instruction fetch and a data operation cannot occur simultaneously. Therefore, being sequential machines, their performance is also limited.   On the other hand, we have …

Read More »

DHS Cybersecurity Strategy for full spectrum of response options

President Biden has made cybersecurity, a critical element of the Department of Homeland Security’s (DHS) mission, a top priority for the Biden-Harris Administration at all levels of government. To advance the President’s commitment, and to reflect that enhancing the nation’s cybersecurity resilience is a top priority for DHS, Secretary Mayorkas issued …

Read More »

Emerging Quantum data centers

Quantum computing has the potential to create new machines that can vastly exceed the capabilities of today’s most powerful supercomputers. A quantum computer harnesses quantum mechanics to deliver huge leaps forward in processing power. Instead of the binary bits used by digital computers, quantum computers use qubits – subatomic particles …

Read More »

Molecular electronics for Next generation military signal processing, data storage, and communication devices

As the complexity and volume of global digital data grow, so too does the need for more capable and compact means of processing and storing data. At present, traditional electronic devices based on semiconductor materials face severe challenges, not only technical and technological limitations but also key theoretical limitations.   …

Read More »

Hardware verification, testing and validation

Design in any discipline – electronics, mechanical, aerospace, etc. – begins with a specification that captures what the end product should do and essentially drives the entire development cycle.  Verification is intended to check that a product, service, or system meets a set of design specifications. Validation is intended to …

Read More »

Cyberwarfare among US, China and Russia driving Secure Internets cyber technologies

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks will be a necessary component of any future military campaign, …

Read More »
error: Content is protected !!