In my last article I spoke to the challenges large organizations have with innovation, in the same breathe you could argue that there is such a thing as too much innovation! It’s with that, that I’m happy to announce that Daniel and I are r…
This infantry squad vehicle is getting a laser to destroy drones
The U.S. Army’s pursuit to counter small drones is heating up through directed-energy solutions.
As Ukraine highlights value of killer drones, Marine Corps wants more
These drones can remain airborne until a target is identified ― at which point they set a course for that target and go out in a blaze of glory.
Army Space, Cyber and Special Operations commands form ‘triad’ to strike anywhere, anytime
US Army Cyber, Space and Special Operations Forces are coming together in a new “triad” that aims to increase effectiveness in operations and provide combatant commanders with more unique options to act.
Philippines tries to claw back money after canceling Russian helicopter deal
Transport helicopters are a vital component of the Philippine military; the country is an archipelagic nation made up of more than 7,000 islands and is beset with natural disasters and ongoing insurgencies.
New Hacker Forum Takes Pro-Ukraine Stance
A uniquely politically motivated site called DUMPS focuses solely on threat activity directed against Russia and Belarus
US Air Force moves to shield Wedgetail acquisition from continuing resolution
The Air Force says a continuing resolution could slow down its plans to award a contract for the E-7 Wedgetail in February.
Boeing, Nammo test Ramjet 155 artillery weapon
Boeing and Nammo have jointly test-fired a Ramjet 155 weapon as the U.S. Army seeks to modernize its long-range precision fire capability.
Meet Tim Vereecke: Technical Solutions Architect
Tim Vereecke, technical solutions architect at Akamai, discusses how he uses a developer-first mindset to find internet performance solutions.
Cisco Confirms Network Breach Via Hacked Employee Google Account
Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.