Category Critical & Emerging Technologies

Emerging technology convergence of Nanotechnology, Biotechnology, Information technology and Cognitive science

technology convergance

Technological convergence is a tendency for technologies that were originally quite unrelated to become more closely integrated and even unified as they develop and advance. Technological convergence, in general, refers to the trend or phenomenon where two or more independent…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nanoparticles or Nanocapsules can deliver the CRISPR genome-editing system to most cells and tissues safely and efficiently

CRISPR delivery mechanism

Within only a few years, research labs worldwide have adopted a new technology referred to as “CRISPR,”that facilitates making specific changes in the DNA of humans, other animals, and plants. Compared to previous techniques for modifying DNA, this new approach…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry transforming network design and network management through Automation, Artificial Intelligence, and Machine Learning

AIMLNetworking

In 2018, operators began to deploy 5G networks globally, which is now in full swing. Compared with 2G/3G/4G, 5G has a significant leap in key performance such as network speed, network latency and connections scale, which would allow it to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New radars can detect Drones carrying IEDs, biological or chemical agents, a critical technology for Counter UAS systems

dronedetectionradar

The increased commercialization of drones is increasing the risks that these drones can be used by terrorists and criminals. The small drones such as a quadcopter or model airplane are readily available and it is highly probable that existing technology…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA ICARUS develops self destructing drones that make precise deliveries of critical supplies and then vaporize into thin air

ghost

A Chinese navy submarine rescue vessel launched a small boat and seized the US drone which the Pentagon also called an “ocean glider.”  The Pentagon said the Chinese ship ignored repeated demands to return the vehicle from the USNS Bowditch.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Border Agents can fight the Threat of Drug trafficking networks by portable Drug Detection Devices that can identify drugs within seconds

Drug Detection Devices

Criminal networks traffic a range of drugs including cannabis, cocaine, heroin and methamphetamine.  As international borders become increasingly porous, global abuse and accessibility to drugs have become increasingly widespread.   This international trade involves growers, producers, couriers, suppliers and dealers.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US and China tested X-ray pulsar-based navigation and timing (XNAV) on spacecrafts for autonomous and secure space missions

china pulsar satellite 759

Pulsars are highly magnetized, rotating neutron stars that emit electromagnetic radiation at regular intervals. They radiate energy across a broad range of frequencies, but they are most visible in their X-ray beams. Pulsars emit powerful beams in opposite directions as they…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Chaos Engineering tests large complex Cloud based systems by injecting extreme, and turbulent conditions with goal to build more resilient systems

ROI example 1

Advances in large-scale, distributed software systems are changing the game for software engineering.  Now organizations of all sizes are leveraging the power of the cloud by hosting their data, applications, and services in shared data centers.   Despite their extraordinary…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rapid global expansion of Life Sciences, Biotech and health care industry is creating new risks

Biotech

In general, biotechnology is the utilization of biological procedures for industrial and other purposes, specifically, the genetic management and the manipulation of microorganisms for the production of antibiotic drugs, hormones, and medical devices.   The life sciences and healthcare industry…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA Media forensics to detect fake photos and videos on social media to support National Security

MediFoe

In recent years consumer imaging technology (digital cameras, mobile phones, etc.) has become ubiquitous, allowing people the world over to take and share images and video instantaneously. Mirroring this rise in digital imagery is the associated ability for even relatively…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here