The Department of the Interior published on May 18, 2018, a list of 35 mineral commodities considered critical to the economic and national security of the United States. These minerals have been designated as critical to the US’s national interest in part because of their potential military and industrial applications. …
Read More »TimeLine Layout
August, 2020
-
6 August
Raytheon’s Excalibur is all weather smart artillery that triples the range and can strike moving targets with high precision
The Excalibur smart artillery shell has a ruggedized Global Positioning System (GPS) satellite navigation receiver and uses satellite signals to help guide itself to its intended targets. It first was fielded in Iraq in 2007 for urban or complex-terrain engagements in which collateral damage must be kept to a minimum. …
Read More » -
5 August
Beyond CMOS or More Moore technologies to power Next Generation Computers, communications, industrial and Defense Systems
In 1965 R&D Director at Fairchild (and later Intel co-founder) Gordon Moore predicted continued systemic declines in cost and increase in performance of integrated circuits in his paper “Cramming more components onto integrated circuits.”Moore’s Law which stated that the number of transistors on a chip will double approximately every two …
Read More » -
4 August
DARPA’s PREEMPT to predict next pandemic due to Zoonotic Viruses like COVID-19 and plan proactive interventions
In recent weeks, concern over the emergence of a novel coronavirus in China has grown exponentially as media, experts and government officials around the world have openly worried that this new disease has the potential to develop into a global pandemic. As the ongoing coronavirus outbreak centered in China has spread …
Read More » -
2 August
Rising threat of Social media as weapon to influence Politics, and sentiments and carry psychological warfare
The past several centuries have largely been defined by physical security threats, requiring a nation’s military to physically respond with whatever means they have available. But as explained by Isaiah Wilson III—president of Joint Special Operations University—today we face “compound security threats,” which include physical security threats as well as …
Read More » -
1 August
Next Quantum Cryptology (QKD) revolution is Quantum Communications between Drone and ground and between drones
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if Eve attempts to intercept and measure Alice’s quantum transmissions, her …
Read More » -
1 August
Helicopter technology developments and trends driven by their rising employment in civil and military missions
The helicopter is a type of aircraft which is lifted and propelled by one or more sets of horizontally revolving overhead rotors. It has two rotors that spin several blades. A blade is a tilted airfoil, just like an airplane wing. As it speeds through the air, each blade generates …
Read More »
July, 2020
-
31 July
Modern Bigdata Battlefield requires rugged commercial-off-the-shelf (COTS) Computers and Servers
Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Modern ICT devices can provide “information superiority” to military by providing information with greater timeliness, relevance, accuracy, and comprehensiveness than to an adversary. Intelligence and military applications rely on …
Read More » -
31 July
Joint Multi-Role (JMR) helicopter program demonstrations to mature technology for future vertical lift (FVL) program
The US Army is pursuing plans to develop a family of future vertical lift aircraft that will be able to perform a variety of mission sets. Key to that effort is a technology maturation program which has Bell and a Sikorsky-Boeing team designing new aircraft. The precursor for FVL is …
Read More » -
28 July
New radar imaging chips enable Through the wall imaging or Wall-penetrating radar on Android smartphones
Security forces require effective ground ISR technologies that can overcome these challenges and provide effective situational awareness. One of the technologies useful in such situations is through-wall imaging which apply radio frequency (RF) and other sensing modes to penetrate wall materials and optimally estimate the terrorists hiding in other rooms …
Read More »