Category Critical & Emerging Technologies

Tungsten, the wonder military material used in armor-piercers, armored tanks, to Hypervelocity projectiles is controlled by China

1200px Raufoss NM140 MP en.svg

Tungsten is one of the hardest metals on the earth, and many scientists compare it to diamond. Tungsten is a dull silver-colored metal with the highest melting point of any pure metal. Pure tungsten melts at a whopping 6,192 degrees…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Fiber Optics transmission system and component technologies for Rising Internet traffic

fiberopticcommunications

Optical communications make use of light waves, very high frequency (100 terahertz) electromagnetic waves, for information transmission. Modern optical communications were begun in the 1960s, when lasers were invented as a coherent light source. Since then, the rapid development of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

3-D holograms will be employed for battlefield intelligence, military planning and explosives disposal

large hologram projector

We see things because our eyes are sophisticated light detectors: they constantly capture the light rays bouncing off nearby objects so our brain can construct an ever-changing impression of the world around us. When our eyes see a three-dimensional image such…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum cryptography links integration on commercial wide-area optical networks using Wavelength division multiplexing (WDM) is essential to develop global scale Quantum Key Distribution Networks (QKD)

WDMQKD

Quantum key distribution (QKD), establishes highly secure keys between distant parties by using single photons to transmit each bit of the key. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that any attempts to intercept and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military Sensor Fusion technology enhances situational awareness of Air, Sea and Space-based platforms and Remote Intelligence

combat systems fusion engine for the f35 5 728

The military typically operates in demanding, dynamic, semi-structured and large-scale environments. This reality makes it difficult to detect, track, recognize/classify, and response to all entities within the volume of interest, thus increasing the risk of late (or non-) response to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum Entanglement advances enables Quantum Computers, high-speed ultra secure communications, high precision Quantum Sensors and Imaging

quantum entanglement

The extraordinary promise of quantum technology—depend on quantum “entanglement,” in which the physical states of two or more objects such as atoms, photons or ions become so inextricably connected that the state of one particle can instantly influence the state…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Electro-optical Circuit Board (EOCB) enable photonic integrated circuits, autonomous cars and even quantum computers based on light

EOPCB

As copper reaches its speed limit, engineers look at optics to replace copper for very high speed signals. The electronic transmission of information requires energy – the faster the interface, the more electrical power is required. At very high data…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

symmetric asymmetric crypto diagramv2

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

tablets

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries racing to develop Digital apps for giving military the warfighting edge

militarymobileapp

Recent growth and advances in mobile computing and communication have revolutionized the way we live and access information. Today we are able to receive and process a vast amount of real-time data and situational information on mobile devices in a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here