Japan has replaced North Korea with China as the top security threat to the country, citing Beijing’s growing defense expenditure and strength as well as its expansion of military activities in the region. “The reality is that China is rapidly increasing military spending, and so people can grasp that we need …
Read More »TimeLine Layout
January, 2023
-
11 January
US Army Medical Modernization Strategy(AMMS) to counter future medical threats through disruptive technologies
As the Army charts a course to modernize its force by 2035 with a focus on multi-domain operations, the service is also looking to fundamentally transform its medical capabilities to take advantage of and move at the pace of technological advancements. The Army must modernize its medical formations and capabilities …
Read More » -
10 January
Quantum secure direct communication (QSDC)
Quantum communication refers to a quantum information exchange that uses photons as quantum information carriers over optical fibre or free-space channels. Today, quantum data transfer rates remain quite low, and so communicating entire messages is not yet practical. Instead, Quantum Cryptography or Quantum key distribution (QKD) is being used …
Read More » -
8 January
Laser 3D scanning for fast prototyping of Military systems, reverse engineering, virtual reality, maintenance support and quality control
3D laser scanning is a way to capture a physical object’s exact size and shape into the computer world as a digital 3-dimensional representation. 3D Laser Scanning is a non-contact, non-destructive technology that digitally captures the shape and structure of physical objects in a faster and more accurate way using …
Read More » -
7 January
Remote Security Assessment System (RSAS)
Network vulnerabilities are an increasingly common issue in today’s highly complex computing environments. With exploit attacks appearing faster than ever before, it has become significantly more challenging for organizations to protect against attacks. Only if users could discover these vulnerabilities in their network and proactively get ready before attackers take action, can the losses …
Read More » -
6 January
Lasers shape the world of quantum technologies
The quest for quantum computing supremacy is a geopolitical priority for Europe, China, Canada, Australia and the United States. The quantum computing market was valued at $472m earlier in 2021 and is expected to reach $1.7bn by 2026, according to a Markets and Markets projection. Boston Consulting Group’s 2018 report that estimates …
Read More » -
5 January
DARPA Report Finds Vulnerabilities in Blockchain Crypto Transactions
Distributed ledger technologies commonly known as the blockchain, refer to software that stores information on a secure, decentralized network where users need specific cryptographic keys to decrypt and access data. Cryptocurrencies, such as the popular Bitcoin, are networks built on the blockchain, a financial ledger formatted in a sequence of …
Read More » -
5 January
Modeling and Simulation are critical enablers for military training, analysis, decision-making and capability development
Conflicts unfold at an unprecedented rate and things can change in days if not hours, the amount of data available is overwhelming in both volume and complexity. We need new tools to make sense of it all. This is against a backdrop of rising costs and financial pressures, and so …
Read More » -
4 January
Threat of Quantum computer to Blockchain , Researchers propose Quantum Resistant Ledger (QRL) and Quantum blockchain
Blockchain, is a growing list of records, called blocks, which are linked using cryptography. Blockchains which are readable by the public are widely used by cryptocurrencies. Private blockchains have been proposed for business use. Blockchain a transformative decentralized digital currency, a secure payment platform free from government interference, is being considered …
Read More » -
3 January
Rise of Narco-Terrorism require new Contraband detector technologies
Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC, ELN, AUC in Colombia, PCP-SL in Peru, Hamas, Hezbollah, and …
Read More »