• The day of military smart phones nears

    It is only a matter of time before we see military-related iPhone apps; the iPhone can use thousands of programs, and some of these are very useful for military personnel; officers see how useful the iPhone could be with software designed for military purposes; a military version of the iPhone, able to operate on a closed military network, would be a big help in the combat zone

  • ASE shows cargo and vehicle inspection system

    American Science and Engineering, Inc. combines its patented Z Backscatter technology with High Energy Transmission to offer enhanced scanning system for vehicles, cargo; system may be used in drive-by mode to scan stationary objects, or in portal mode to scan vehicles as they drive past the system

  • Raytheon uses millimeter-wave radiation to keep food safe

    Missile and defense contractor Raytheon offers a solution which uses millimeter-wave radiation to pasteurize food; new method is both healthier and more energy efficient than current pasteurization technologies

  • Study: Why the best soccer teams do not always win

    New study shows that there is a high statistical probability that the best team might not win; the analysis found that in the 2006 World Cup, for example, the best team had only a 28 percent chance of winning

  • Boeing releases video of air-born tactical laser in action

    In the (near) future, a laser weapon-carrying aircraft might be hidden by distance or darkness, and selected targets — cars, buildings, cell towers, etc. — would appear suddenly and inexplicably to burst into flames

  • Pain weapon in a potable version may end up in police hands

    The Pentagon’s efforts to develop a beam weapon that can deter an adversary by causing a burning sensation on their skin has taken a step forward with the development of a small, potentially hand-held, version

  • Denying denial-of-service attacks

    Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks

  • Oracle updates Agile PLM for food and beverage compliance

    Oracle offers a solution for the food and beverage industry, helping companies cope with ever-more-demanding regulatory requirements and product complexity

  • High-tech nuke detectors check Puget Sound small vessels for WMD

    Pacific Northwest National Laboratory coordinated activities with the Coast Guard and Customs and Border Protection, and many other state, local, and tribal agencies for the two-day nuclear detection exercise

  • Camera manufacturers going HD

    High definition technology gives users the capability to make out faces and license plates more easily, which in the future will also have implications for video analytics, making them more effective

  • Magnetically levitating "Sky Pods" to solve traffic congestion, pollution

    It would more economical — and cleaner — if people were using public transportation rather than drive their own cars; most people, though, are reluctant to give up the privacy of individual travel; the solution: individual “sky pods”

  • Surveillance airship for Afghanistan

    A hybrid airship — it is heavier than air, 80 percent of its lift coming from buoyancy and 20 percent from aerodynamics — will be deployed to Afghanistan; it is 250ft long, and designed to loiter at 20,000ft for up to 21 days carrying a 2,500lb ISR payload

  • Earthquake-resistant building structure developed

    The system dissipates energy through the movement of steel frames that are situated around the building’s core or along exterior walls; the frames rock off their foundation under large earthquakes

  • Army heli-UAV hops to avoid obstacle trouble

    The U.S. Army funds development of a hopping rotochute — a UAV designed to travel deep into obstacle-ridden spaces such as caves and rubble-laden buildings to video what it finds

  • Improving home computer security

    Researchers have developed a specification for security policy on home networks that can guarantee reliability and availability; the specification also takes into account authentication, authorization, security policy deployment so that all users in the home are not only protected from malware but also can help ensure everyone can use the network when they need to