Recent Posts

Wearable Photonic devices making personalized medicine and health tracking a reality.

Currently, old-style personal Medicare techniques rely mostly on traditional methods, such as cumbersome tools and complicated processes, which can be time-consuming and inconvenient in some circumstances. Furthermore, such old methods need the use of heavy equipment, blood draws, and traditional bench-top testing procedures. Invasive ways of acquiring test samples can …

Read More »

Optical Networks Vulnerabilities and Security threats

Optical networks are vulnerable to several types of security breaches or attacks, typically aimed at disrupting the service or gaining unauthorized access to carried data, i.e., eavesdropping. Depending on the aim of the attack, security breaches can induce financial losses to the clients or cause network-wide service disruption, possibly leading to huge …

Read More »

Militaries thrust on Autonomous convoys or Vehicle swarm technology for building Autonomy-Enabled Future Force

Recent combat operations have continually demonstrated the vulnerability of convoys due to their fundamental requirement for delivering sustainment supplies over long distances of unsecured routes. This operational reality of convoy missions makes them particularly vulnerable to attack and ambush. According to US DOD  52 percent of all battlefield casualties are …

Read More »
error: Content is protected !!