Risk
5/14/2012
02:39 PM
John Foley
John Foley
Slideshows
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Military Transformers: 20 Innovative Defense Technologies

Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
Previous
14 of 20
Next


The X-56A Multi-Use Technology Testbed (MUTT) is a prototype unmanned aircraft made of lightweight, flexible materials that's being developed by the Air Force Research Laboratory in collaboration with Lockheed Martin. Its long, thin wings (28 feet across) are susceptible to vibrations, or flutter, that results from air flow and turbulence. Engineers plan to use MUTT's flight-control software to find ways to minimize flutter. That knowledge will inform the design of the proposed X-54 aircraft, which is intended to demonstrate technologies that muffle sonic booms, potentially opening the door to supersonic commercial flights over the United States.
Credit: AFRL/Lockheed

RECOMMENDED READING:

Top 10 Open Government Websites

U.S. Military Robots Of The Future: Visual Tour

NASA's Next Mission: Deep Space

NASA's Blue Marble: 40 Years Of Earth Images

DOD Mobile App Eases Transition To Civilian Life

Army Aids Wounded Warriors With Mobile App

Army Eyes Monitoring Tools To Stop Wikileaks Repeat

10 Lessons From Leading Government CIOs

14 Cool Mobile Apps From Uncle Sam

11 Epic Technology Disasters

Previous
14 of 20
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
5/16/2012 | 4:03:30 PM
re: Military Transformers: 20 Innovative Defense Technologies
Where can I get the one-click version of the article, Please?
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers