By 2025, it is predicted that there can be as many as 100 billion connected …
Read More »Masonry Layout
US Navy found Faulty Welding in Submarine Missile Tubes, developing non-destructive weld inspection methods
In 2000, a Russian cruise-missile submarine — Kursk — sank, killing all 118 sailors on …
Read More »Navies exploring Biomimetics, Bio-inspired mechanisms to improve military underwater sensing, control and communications systems
“It was in the oceans that life first evolved and where complex animals have thrived …
Read More »Technology breakthroughs in GaN enabling large growth in Semiconductor devices market in Defence and Aerospace
GaN is a semiconductor material that can amplify high power radio frequency signals efficiently at microwave frequencies to enhance a system’s range. Therefore it has become the technology of choice for high-RF power applications …
Read More »Vulnerabilities in 3D printing could be exploited for Cyber-Physical attacks and Cyber Warfare
3D printing or additive manufacturing is ongoing revolution in manufacturing with its potential to fabricate …
Read More »DARPA’s SMISC program to identify misinformation or deception campaigns on Social Media and conduct its own propaganda campaigns
The conditions under which our Armed Forces conduct operations are rapidly changing with the spread …
Read More »Neuro- or Biohybrid systems to synthesize fuels, and chemicals and act as sensors for military
Neuro- or Biohybrid systems are systems formed by at least one biological component – i.e. …
Read More »Future Blended Physical-Cyber Attack shall use multiple attack vectors to cause the mayhem, report anticipates 2M Fatalities
Governments, military forces and critical national infrastructure organisations typically deal with some of the most …
Read More »New technology to fight human and drug smuggling across maritime borders
One of the threat of maritime security is human and drug smuggling across maritime borders. …
Read More »Cyber Red teaming or penetration testing uncovers the vulnerabilities of an organisation, NEC develops automated tool
Cyberattacks are being conducted daily on any type of target, and any notion that a …
Read More »