Rajesh Uppal

Rajesh Uppal

DARPA BRASS creating centenarian, survivable, hackproof, scalable and adaptive military software

BRASS NEW

As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid obsolescence—if at some cost in terms of frustration. In the case of the U.S. military,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Columbia Engineers Revolutionize Augmented Reality (AR) Glasses through novel engineered optical materials (EnMats)

1 columbiaengi

Imagine driving along the highway with directions and other pertinent information (think gas stations) appearing “on” your glasses so you ,don’t have to look away from the road. Or building a complicated DIY project with step-by-step instructions appearing “on” your…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China AI enabled, ultraquiet diesel and nuclear ballistic missile submarines with capability to strike Hawaii and Alaska, has graduated to major naval power

chinasubmarine

China has boosted its submarine force over the last 20 years, building a modern, flexible force that now has more total ships than the US. The force currently numbers 56 subs – four nuclear-powered missile subs, five nuclear-powered attack subs,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

syntheic fraud

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

AFRL is seeking Multi-INT Fusion to implement US Airforce ISR strategy for A2/AD environments

ISRUSAF

ISR is one of the  US Air Force’s five enduring core missions along with air and space superiority, rapid global mobility, global strike, and command and control. AF ISR is integral to Global Vigilance for the nation and is foundational…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technologies to secure future Billions of Every day and Military “Internet of Things” and enabling new industrial revolutions such as Industry 4.0

iot security problems challenges and solutions 17 638

By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability. These devices shall comprise of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Space security cooperation between Canada, U.S., U.K. and Australia , to counter threats

7f2cd38b7681e6e2ef83b5a7a5385264

As the space is getting weaponized, countries are evolving new space strategies, space command and forces and space situational awareness and space weapons. There is also ongoing Space security cooperation between Canada, U.S., U.K. and Australia to counter the threats. In…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Recent reports find rising insider cyber threats, rising Gray / Black Hats, with US & UK topping in number

081011 scaryhacks 1 100541046 gallery.idge

Black hat hackers  are  responsible for writing malware, which is a method used to gain access to these systems. They usually have extensive knowledge about breaking into computer networks and bypassing security protocols. Their primary motivation is usually for personal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Breakthroughs enable Spintronic devices

nanomagnetism spintronics

Spintronics is an emerging field of nanoscale electronics which uses not only the charge of electrons but also the spin of electrons. The technology doesn’t require a specialized semiconductor material resulting in reduced manufacturing costs. Other advantages include less energy requirement,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New field “Electron Quantum Metamaterials” giving rise to “Twisted electronics” wherein new materials can be created by varying twist angle of 2-D materials

twistedelectronics

When two atomically thin two-dimensional layers are stacked on top of each other and one layer is made to rotate against the second layer, they begin to produce patterns — the familiar moiré patterns — that neither layer can generate…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here