Home / 2022 (page 11)

Yearly Archives: 2022

DevOps running on Kubernetes, and Containers, is the Future of Software

DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops) and removing the traditional barriers between the two.  DevOps is an ideology comprising three pillars—organizational culture, process, and technology and tools—to help development and IT operations teams work collaboratively to build, test, …

Read More »

Cyber Security of Industrial control systems (ICS) and SCADA systems

Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes. Depending on the industry, each ICS functions differently and are built to electronically manage tasks efficiently. …

Read More »

Topological Materials promising for scalable and fault tolerant quantum computers, Microsoft  building one on topological qubits

Quantum technology (QT) applies quantum mechanical properties such as quantum entanglement, quantum superposition, and No-cloning theorem to quantum systems such as atoms, ions, electrons, photons, or molecules. Quantum bit is the basic unit of quantum information.  Whereas in a classical system, a bit is either in one state or the another. …

Read More »

Internet evolving from Globally conscious entity to consciousness of its own

In the last 30 years, the internet has become the main interface for publishing, accessing, and sharing information.  Access to the internet can provide an instant connection between any two conscious human minds almost anywhere on the planet. Smartphones and social media are enhancing and accelerating the internet’s ability to …

Read More »

DARPA Underminer enabled rapid Drilling of Tactical Tunnels in Battlefield

In transport, tunnels can be connected together to form a tunnel network. These can be used in mining to reach ore below ground, in cities for underground rapid transit systems, in sewer systems, as maintenance access routes beneath sites with high ground traffic such as airports and amusement parks, or …

Read More »

Mobile security

The future of computers and communication lies with mobile devices, such as laptops, tablets and smartphones with desktop-computer capabilities. Their size, operating systems, applications and processing power make them ideal to use from any place with an internet connection. And with the expansion of ruggedized devices, the Internet of Things …

Read More »

Tethered Drones or UAS, Hovering platforms, and Towed parafoil system provide long range Communications and Surveillance for Combatting terrorism

Militaries have long recognized the  advantages of height for surveillance platforms to overcome the Horizon limitations because of curvature of earth, therefore it has been using many such platforms like baloons, and aerostats. Security forces have also found that countering today’s asymmetric threats, which can occur at any time and …

Read More »

Stealthy Air-launched cruise missile

Cruise missile is any weapon which automatically flies an essentially horizontal cruise flight profile for most of the duration of its flight between launch and its terminal trajectory to impact. The hallmark of a cruise missile is its incredible accuracy. A common statement made about the cruise missile is, “It …

Read More »

5G is a game changer for the military

Mobile communications systems have evolved through wireless technology innovation into 2G, 3G, and then 4G to keep pace with ever increasing voice and data traffic. 5G is the latest iteration of cellular technology that is providing seamless coverage, high data rate, low latency, and highly reliable communications. It will increase …

Read More »

DARPA CFIP Countering Risk of Foreign Influence on US military research

U.S. Congress has directed the Defense Advanced Research Projects Agency (“DARPA”), the research and development agency of the U.S. Department of Defense, to secure its funded research from undue influence through the establishment of an initiative and relevant policies.   According to Research and Development National Security Policy, “Unfortunately, some foreign governments, …

Read More »
error: Content is protected !!