Rajesh Uppal

Rajesh Uppal

Global threat of landmines and IED that kill thousands of people every year require new technologies for detection

bab2d5d59ac444db8043a4f3e32c9f0e

Landmines are a global threat. Several countries suffer from the existence of millions of buried landmines in their territories. These landmines have indefinite life, and may still cause horrific personal injuries and economic dislocation for decades after a war has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SSPARC developed spectrum-sharing technologies between military radars and communication systems for assured access to contested electromagnetic environment

f9a9b7c9f33a923e5475b478a62125ae

Spectrum congestion is a growing problem. It increasingly limits operational capabilities due to the increasing deployment and bandwidth of wireless communications, the use of net-centric and unmanned systems, and the need for increased flexibility in radar and communications spectrum to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries race to employ Blockchain, the virtual currencies technology, for tamper-proof military systems and cybersecurity

blockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Propulsion motors are enabling stealthy warships and submarines  propelled with an electric propulsion system

permpropmotor

Navies of various countries have announced making their warships and submarines  propelled with an electric propulsion system. Instead of driving the ship’s propellers directly, diesel engines turn electric generators, which in turn power electric motors that drive the propellers. This arrangement…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Supercomputers can assist in Cyber Security by Identifying threats, detecting anomalous behaviour and finding software vulnerabilities

Threats 1000x600 3

Supercomputers have  become essential for National Security, for decoding encrypted messages, simulating complex ballistics models, nuclear weapon detonations and other WMD, developing new kinds of stealth technology, and cyber defence/ attack simulation. Because of the expense, supercomputers are typically used…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Air Force testing tactical data links gateway for communications between F-22 and F-35 aircraft enabling Network centric systems

gateway

NCW is theory of warfare in the information age which hypothesizes that forces which are networked will outperform forces that are not. NCW is an ‘integration of sensors, decision-makers, weapons platforms and support capabilities to enable agility’ providing ‘interoperability and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries upgrading Counter Rocket, Artillery, and Mortar systems to counter threats like drones, helicopters, fixed-wing aircraft and cruise missiles

bushmasterantidrone

As the threat for Rocket, Artillery, and Mortar (RAM) increases around the world, the need for a system to detect and alert Soldiers of incoming rounds for military locations becomes vital to mission success and force survivability. Military installations such…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

NATO refocussing on development of Electronic Warfare to match sophiticated capabilites of its adversaries

NATOEW

For NATO forces, the Electromagnetic spectrum (EMS) is an essential part of military operations, so much so that many Allied leaders now see the EME as an operational environment and a part of the battlespace where friendly forces manoeuvre in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US, Russia, and China are developing next generation nuclear submarine fleets, other countries are also mastering nuclear submarine technology

UK Nuclear Submarine

A nuclear submarine is a submarine powered by a nuclear reactor. The performance advantages of nuclear submarines over “conventional” (typically diesel-electric) submarines are considerable. Nuclear submarines are more powerful than diesel-powered submarines because nuclear reactors powering them can run for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry developed new approach to protect against advanced ‘ROP’ Cyberattacks

ROP

Today’s cybersecurity playing field is fundamentally asymmetric. Attackers are easily able to identify weaknesses in a target system once they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up to secure…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here