Army energy-efficient tents
Wherever Soldiers go, shelters must go, too. These shelter systems must not only protect and provide comfort; they must also be as energy efficient as possible. Every time a base camp needs fuel delivered,...
"Knowledge is wealth that multiplies only if given away."
Wherever Soldiers go, shelters must go, too. These shelter systems must not only protect and provide comfort; they must also be as energy efficient as possible. Every time a base camp needs fuel delivered,...
Click to watch video The PhoneSats employ an off-the-shelf commercial smartphone as the control system for the satellite and used a UHF radio beacon to transmit data and images to the ground. The...
The results obtained by research and technology concerning the technical solutions for Defense needs have gradually allowed to replace direct human intervention with mechanical systems, computerized, cybernetic . In this context, the remote control...
In a recently released report, the UK Government Office for Science, analyses the future of manufacturing, noting the rising share of services. Manufacturing in 2050 will look very different from today, and will be...
For the first time the four major J-ISR (Joint Intelligence, Surveillance and Reconnaissance) Alliance Working Groups met in joint session, for what NATO itself has called “The Rome Model,” a solution that allowed a...
State-of-the-art RAF Typhoons and French Air Force Mirages were involved in the air component of Exercise Joint Warrior, a twice-yearly, multinational, tri-service military exercise, one of the biggest of its kind in Europe. see...
Northrop Grumman Corp. Electronic Systems segment is joining the Honeywell Inc. Aerospace sector on a project to upgrade precision landing systems aboard U.S. Navy aircraft carriers and amphibious assault ships. Officials of the Naval Air Systems Command...
The CESMA (Center for Aeronautical Military Studies “Giulio Douhet”) of the ITAF Association hold a workshop “ Future J-ISR ” at the Center for High Defence Studies (CASD). ISR activities are taking an increasing role...
Northrop Grumman Corporation has received the Capability Maturity Model Integration (CMMI®) for Development Level 5, the highest rating possible, for two U.S. Defense Information Systems Agency joint modernization programs. Northrop Grumman is the prime...
Fighter aircraft from Turkish, Polish and Russian air forces together with air traffic controllers successfully completed a live three-day joint NATO-Russia counter-terrorism exercise “Vigilant Skies 2013,” on 26 September. The exercise was the second...
General Dynamics Fidelis Cybersecurity Solutions today announced its flagship network security solution, Fidelis XPS, now includes a new application of YARA technology, a rule-based malware identification and classification tool, that will increase the real-time...
Thirteen British companies and the U.K. Minister of Defence Equipment, Support and Technology participated in a Lockheed Martin Industry Recognition Event during the DSEI tradeshow today. Over the next 40 years, British industry will...
The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. continue article here: https://www.aofs.org/best-practices/ book here: http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 Article written by: Pierluigi Paganini: Chief Information...
“Innovation in Radar Systems for Defense, Security and Electronic Warfare,” is the title of a workshop organized by the AFCEA Rome Chapter, aiming “to continue – according to Lt. Gen. (r) Pietro Finocchio, chapter...
Canada’s aerospace industry could lose about $10.5 billion worth of contracts over several decades if the federal government ultimately decides not to purchase the controversial F-35 Stealth Fighter, says a senior executive at Lockheed...
The United States’ National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA...
Counterterrorism efforts in the past decade have been responsible for surveillance in the skies to extreme security measures on the ground. Now, one research institute is bringing a whole new surveillance technique to the...
The embattled Littoral Combat Ship (LCS) programme is heading for another set-back with reports suggesting that the Office of the Secretary of Defense (OSD) is planning to purchase less than half the amount the...
Today’s cyber threat is arguably at its highest level of severity and shows no signs of diminishing. Among the issues arising in recent months have been the increased frequency of targeted malware tools to...
Follow: