Home / Rajesh Uppal (page 127)

Rajesh Uppal

Remote Security Assessment System (RSAS)

Network vulnerabilities are an increasingly common issue in today’s highly complex computing environments. With exploit attacks appearing faster than ever before, it has become significantly more challenging for organizations to protect against attacks. Only if users could discover these vulnerabilities in their network and proactively get ready before attackers take action, can the losses …

Read More »

Lasers shape the world of quantum technologies

The quest for quantum computing supremacy is a geopolitical priority for Europe, China, Canada, Australia and the United States. The quantum computing market was valued at $472m earlier in 2021 and is expected to reach $1.7bn by 2026, according to a Markets and Markets projection. Boston Consulting Group’s 2018 report that estimates …

Read More »

DARPA Report Finds Vulnerabilities in Blockchain Crypto Transactions

Distributed ledger technologies commonly known as the blockchain, refer to software that stores information on a secure, decentralized network where users need specific cryptographic keys to decrypt and access data. Cryptocurrencies, such as the popular Bitcoin, are networks built on the blockchain, a financial ledger formatted in a sequence of …

Read More »

Modeling and Simulation are critical enablers for military training, analysis, decision-making and capability development

Conflicts unfold at an unprecedented rate and things can change in days if not hours, the amount of data available is overwhelming in both volume and complexity. We need new tools to make sense of it all. This is against a backdrop of rising costs and financial pressures, and so …

Read More »

Threat of Quantum computer to Blockchain , Researchers propose Quantum Resistant Ledger (QRL) and Quantum blockchain

Blockchain, is a growing list of records, called blocks, which are linked using cryptography. Blockchains which are readable by the public are widely used by cryptocurrencies. Private blockchains have been proposed for business use.  Blockchain a transformative decentralized digital currency, a secure payment platform free from government interference, is being considered …

Read More »

Rise of Narco-Terrorism require new Contraband detector technologies

Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC, ELN, AUC in Colombia, PCP-SL in Peru, Hamas, Hezbollah, and …

Read More »

Militaries deploying all terrain air-transportable light tanks with long-range, cyber-resilient, precision, direct-fire capability

Since the creation of the main battle tank during World War I, there has been a constant arms race between the development of anti-armor weapons and vehicle protection systems, however “Weapons’ ability to penetrate armor, however, has advanced faster than armor’s ability to withstand penetration”. The traditional protection technique depends on …

Read More »

High intensity warfare (HIW) and High Intensity Conflict (HIC) weapons and technologies

High-Intensity Warfare (HIW) or High-Intensity Conflict (HIC) refers to state vs state conflict with a modern, peer adversary – as envisioned during the Cold War period. As the name implies, the tempo of operations is greater, and the concentration of forces and firepower is also substantially greater. High-intensity war is …

Read More »

Photonic Integrated Circuits (PIC) technology enable optical signal processing, optical communication, biophotonics, and sensing

Photonics is a breakthrough technology as it uses photons (smallest unit of light) as the data carrier instead of electrons (smallest unit of electricity) used in electronic ICs. As light travels at very high speeds, photonics is widely used to transfer huge amounts of data at a very high speed.Thus …

Read More »

International cyber diplomacy and security

Information and communication technology present new challenges to international affairs.The scale and speed of technological advancements in cyberspace are unprecedented. As the fourth industrial revolution dawns, bringing with it the reality of big data, artificial intelligence, and quantum technology, the world is entering a new level of more sophisticated hypoconnectivity, …

Read More »
error: Content is protected !!