Category Strategy, Policy & Governance

Countering Foreign Interference and Knowledge security

State actors use a variety of methods to acquire knowledge and technology that they can use for military purposes or for objectives that are not consistent with our fundamental values. Examples include centrally controlled talent programmes, applying pressure to compatriots…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Active Protection Systems (APS) on Military tanks Detect, Track and Destroy Enemy RPGs and Anti-Tank Guided Missiles

trophyprotect2

The war in Ukraine has highlighted the importance of well protected armoured vehicles. The increased use of artillery weapons and precision rocket systems along with strikes against targets of opportunity using drones,  caused widespread casualties among infantry soldiers caught out…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

“Future of Work” demands transformation of learning and development (L&D)

Today’s disruptive working landscape requires organizations to largely restructure the way they are doing work, which has a significant impact on the capabilities business leaders expect from their people.   As technology races ahead, skill gaps have appeared, widened and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Voilent Extremist attacks on Critical Infrastructure and protection

Infrastructure protection

Critical infrastructure comprises facilities and assets that are essential for the normal functioning of day-to-day life within a country and range from energy and transportation to agriculture and public health.   Extremists tend to view critical infrastructure as an attractive…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Clinical Trial Management System (CTMS) automates and manages clinical research studies

Clinical research is medical research involving people. Clinical research is a branch of healthcare science that determines the safety and effectiveness (efficacy) of medications, devices, diagnostic products and treatment regimens intended for human use. These may be used for prevention, treatment,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

European Union (EU) cyber security and EDA cyber defence strategy calls for proactive and reactive cyber defence technology and Cyber Situation Awareness (CySA) operational capability.

european priorities in information security 5 638

The pandemic, which moved citizens’ lives into the digital sphere, saw a rise in security breaches within European businesses and institutions. Cyber attacks against key European sectors doubled in 2020. Significant malicious attacks against key sectors doubled in Europe –…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Aircrafts employing Directed InfraRed CounterMeasure (DIRCM) to counter threat of Manpads, the shoulder-fired anti-aircraft missiles

countemanpads

The West in its continuous support to Ukraine has been supplying the besieged country with military aid in the form of arms as well as anti-aircraft and anti-tank defence systems. Joe Biden said the US will be sending an additional…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

After 5G, now 6G research race to satisfy Military’s growing requirements to gather, analyze, and share information rapidly

6g

With every generation of communications technology, the focus of the network changes. The 2G and 3G eras centered on human-to-human communication through voice and text. 4G heralded a fundamental shift to the massive consumption of data, while the 5G era…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Navy “Distributed Maritime Operations (DMO),” strategy integrating diverse autonomous unmanned vehicles UUV, USVs, UAVs

DistributedLethalityConcept

The US Navy published a navigation plan to boost the war vessels to 500 by 2045 in the region citing “both a current and long-term challenge.” Reiterating that China is the central threat to the US Navy’s maritime dominance, the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Aligning Marketing Strategy with Sales Strategy

Your Sales and Marketing strategy is your plan for reaching, engaging, and converting target prospects into profitable customers. A marketing strategy is how you will reach your target audience, while a sales strategy is how you will convert them to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here