Home enemy
 

Keywords :   


Tag: enemy

Crossing Enemy Lines The Growing Demand For Submersible Technology

2015-07-31 17:44:09| rfglobalnet Downloads

This paper examines USSOCOM's emerging requirements for new and updated submersible equipment, with a focus on the factors that qualify such equipment for operation in combat environments. Specifically, it addresses the components most often considered the weakest link – namely, electrical cable connectors. Typically, significant changes in military equipment requirements such as this spawn innovation in the private sector. So the paper concludes by reviewing the types of equipment for which the 20-meter submersible capability may soon become standard.

Tags: technology lines growing demand

 

Security Experts to Feds: Encryption Is Not the Enemy

2015-07-08 18:01:15| PC Magazine Software Product Guide

The FBI wants Google and Apple to back down on encryption, but security experts think that's a bad idea.

Tags: the security experts enemy

 
 

Security Experts to Feds: Encryption Is Not the Enemy

2015-07-08 16:03:40| PC Magazine Security Product Guide

The FBI wants Google and Apple to back down on encryption, but security experts think that's a bad idea.

Tags: the security experts enemy

 

Enemy on the inside: Terrorists plan attack for American Independence Day

2015-06-28 02:41:01| Telecom - Topix.net

Suspects have been been collecting bomb-making materials similar to those used in the Boston marathon bombing two years ago. US law enforcement agencies are on high alert.

Tags: day plan american inside

 

Enemy on the inside: Terrorists plan attack for American Independence Day

2015-06-28 01:37:52| IT Services - Topix.net

Suspects have been been collecting bomb-making materials similar to those used in the Boston marathon bombing two years ago. US law enforcement agencies are on high alert.

Tags: day plan american inside

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] [9] next »