Air Force officers in charge of creating air tasking orders have long developed mission plans …
Read More »Masonry Layout
Cyber risks of Video-conferencing apps like Zoom, popular with professionals working from home globally
Video conferencing apps like Zoom have become popular with professionals working from home globally, who …
Read More »Predicting, eliminating and mitigating the impact of increasing disease outbreaks due to pandemics such as dengue and zika are national security priorities
From Ebola outbreak in West Africa to the most recently, the rapid spread of Zika …
Read More »Memcomputing to accelerate deep learning and Space-based Intelligence, Surveillance, and Reconnaissance
By 2020, there are expected to be more than 200 billion interconnected devices within the …
Read More »Google demonstrates quantum supermacy on their quantum computing chip with 72 quantum bits, or qubits
In March 2018, Google unveiled Bristlecone, a new quantum computing chip with 72 quantum bits, or …
Read More »Researchers use Graphene for miniature inductors enabling Ultra-Miniaturized Electronics Devices
The inductors along with capacitors and resistors, inductors are one of the three passive elements …
Read More »US Army’s Warfighter Network (WIN-T) provides high-speed, high-capacity and secure reliable voice, video and data communications anytime, anywhere without the need for fixed infrastructure
Today’s soldiers expect to have network access anywhere, anytime. With the Warfighter Information Network-Tactical (WIN-T), …
Read More »Neutron Beams can detect Nuclear Warheads and disable them
Despite making reductions in their arsenals, both the USA and Russia have extensive and expensive …
Read More »Militaries developing Vehicle mounted Lasers Directed Energy Weapons to counter swarm of Drones , C-RAM (Counter Rocket, Artillery and Mortar) and subsonic cruise missiles
The drones have emerged as a major new threat to civilian infrastructure and military. The …
Read More »High-assurance Network encryptors secure voice, video, and data moving over public and private IP networks
Protecting network transmitted data against cyber attacks and data breaches is imperative for government agencies. …
Read More »