Risk
5/14/2012
02:39 PM
John Foley
John Foley
Slideshows
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Military Transformers: 20 Innovative Defense Technologies

Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
Previous
13 of 20
Next


Think of Shrike as a personal drone for the commander in the field. DARPA describes Shrike as a "perch-and-stare micro air vehicle" that provides real-time intelligence, surveillance, and reconnaissance. It's also "man-packable," a reference to the gear that soldiers carry with them. The device's four-rotor design enables vertical take-off and landing and forward flight. Shrike is capable of high-res observation for several hours, during which it transmits data and information to a ground station. Once done, Shrike re-launches from its perch and returns home.
Credit: DARPA

RECOMMENDED READING:

Top 10 Open Government Websites

U.S. Military Robots Of The Future: Visual Tour

NASA's Next Mission: Deep Space

NASA's Blue Marble: 40 Years Of Earth Images

DOD Mobile App Eases Transition To Civilian Life

Army Aids Wounded Warriors With Mobile App

Army Eyes Monitoring Tools To Stop Wikileaks Repeat

10 Lessons From Leading Government CIOs

14 Cool Mobile Apps From Uncle Sam

11 Epic Technology Disasters

Previous
13 of 20
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
5/16/2012 | 4:03:30 PM
re: Military Transformers: 20 Innovative Defense Technologies
Where can I get the one-click version of the article, Please?
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3308
Published: 2015-09-02
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.

CVE-2015-4330
Published: 2015-09-02
A local file script in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges for OS command execution via invalid parameters, aka Bug ID CSCuv10556.

CVE-2015-6274
Published: 2015-09-02
The IPv4 implementation on Cisco ASR 1000 devices with software 15.5(3)S allows remote attackers to cause a denial of service (ESP QFP CPU consumption) by triggering packet fragmentation and reassembly, aka Bug ID CSCuv71273.

CVE-2015-6277
Published: 2015-09-02
The ARP implementation in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 5.2(1)SV3(1.4), Nexus 3000 devices 7.3(0)ZD(0.47), Nexus 4000 devices 4.1(2)E1, Nexus 9000 devices 7.3(0)ZD(0.61), and MDS 9000 devices 7.0(0)HSK(0.353) and SAN-OS NX-OS on MDS 9000 devices 7.0(0)HSK(0.353) allows remote...

CVE-2015-6587
Published: 2015-09-02
The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.