What Russia's Vostok-18 Exercise with China Means
Moscow knows what it is doing and Washington should take note.The West got a fresh jolt from Moscow last week. That’s when Russian defense minister Sergey Shoygu announced that Russian armed forces...
View ArticleChairman Michael McCaul: Empower our Allies to Fight Terrorism in Africa
Terrorism anywhere is a threat to civilization everywhere.Before September 11, 2001, very few people were concerned with what was happening inside Afghanistan. How could the internal dynamics of a poor...
View ArticleAirbus Beluga XL Transport Aircraft
French aircraft manufacturer Airbus is developing the Beluga XL heavy-lift transport aircraft, which is an advanced version of A300-600ST (Beluga) Super Transporter (ST), to meet its future air...
View ArticleDoes a Smart City Need to Be 5G? 3 Cities Implementing 5G Today
The terms are often used interchangeably, but you can implement a smart city with or without 5G and 5G doesn’t need to live in a smart city. But if you don’t want to be left in the digital dust, it...
View ArticleScaling Power Racks for Data Centers: A Look at a Modular Power Shelf from...
Cloud-based computing and processing-intensive applications require a lot of scalable power solutions. Here's a look at a recent power shelf option from Bel Fuse.Power is a pain point for designers...
View ArticlePLC Design Board Aims at Industry 4.0 Applications
Industry 4.0 is here now, and Maxim's Pocket IO PLC development platform shows how it can reinvigorate manufacturing operations with tiny sensors and distributed control units.The Industry 4.0 movement...
View ArticleFuture Rifle Cartridge Development Predictions
Cartridge development continues to progress, and the game is changing.The last couple of decades have seen many new cartridges come onto the scene, some revolutionary, and some nothing more than a...
View ArticleWhat You Need to Know About the TLS 1.3 Protocol and WolfSSL’s TSL/SSL Libraries
Security protocols, like communication protocols, are currently in competition to set industry-wide standards. What is the TLS 1.3 protocol? How does this security protocol differ from SSL?WolfSSL, a...
View ArticleThe New Data Management Risks (Part 2)
In Part 1, we explored the differences between a local server and a cloud server as options for data management. Now, we will explore the security risks of each.Cloud computing requires a careful...
View ArticleThe New Data Management Risks (Part 1)
Cloud servers are the newest hype, but debate rages over their security.Since 2009, cloud computing has become the major trend in data management with good reason, and who doesn't want to be trendy?...
View ArticleIndia: The Next Big Aircraft Carrier Power (or Paper Tiger)?
India’s aircraft carrier ambitions just passed a milestone.On August 2, India’s domestically built Tejas Light Combat Aircraft (LCA) conducted an arrested landing for the very first time. The naval...
View ArticleThis Is China's Way of Warmaking
Beijing's military wants to sow paralysis in an enemy system-of-systems for long enough to accomplish its goals—that way it will not need to bother trying to annihilate its adversary. So “systems of...
View ArticleDBP87 5.8x42mm: China’s High Velocity Caliber
For the last few decades, the American 5.56x45mm and the Russian 5.45x39mm have dominated the world’s small-caliber, high-velocity (SCHV) ammunition. Surprisingly, in the mid-1990s the Chinese military...
View ArticleLarge Synoptic Survey Telescope (LSST)
Large Synoptic Survey Telescope (LSST) is a next-generation wide-field astronomical survey telescope being built by LSST Corporation (LSSTC) in collaboration with Association of Universities for...
View ArticleTop 20 Politicians for Gun Owners 2016
It’s no secret to anyone who is paying attention that gun rights are in the crosshairs of the political debate.We no longer live in a time where gun control advocates hide their views behind “gun...
View ArticleHow to Design a Super Simple Sensor System for Industrial Monitoring...
This article describes an Ethernet-connected subsystem of a larger modular sensor system designed for industrial or smart home sensing and monitoring. We will discuss a custom sensor subsystem...
View ArticleHow to Use Scilab to Analyze Frequency-Modulated RF Signals.
Computing a discrete Fourier transform can help you to analyze the ways in which RF modulation affects the spectrum of a carrier signal.The frequency-domain effects of amplitude modulation are fairly...
View ArticleBrainChip to Release Biologically Inspired Neurmorphic System-on-a-Chip for...
BrainChip has announced the Akida Neuromorphic System-on-Chip (NSoC), the first production-volume artificial intelligence accelerator utilizing Spiking Neural Networks (SNN).BrainChip has announced the...
View Article