Technology

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Disruptive Technologies for the Militaries and Security

    • Publisher: Springer, Singapore
    This book debates and discusses the present and future of Disruptive Technologies in general and military Disruptive Technologies in particular. Its primary goal is to discuss various critical and advanced elucidations on strategic technologies. The focus is less on extrapolating the future of technology in a strict sense, and more on understanding the Disruptive Technology paradigm. It is widely accepted that technology alone cannot win any military campaign or war. However, technological superiority always offers militaries an advantage. More importantly, technology also has a great deterrent value. Hence, on occasion, technology can help to avoid wars. Accordingly, it is important to effectively manage new technologies by identifying their strategic utility and role in existing military architectures and the possible contributions they could make towards improving overall military capabilities. This can also entail doctrinal changes, so as to translate these new technologies into concrete advantages.
    • ISBN: E-book-978-981-13-3384-2, Hardcopy-978-981-13-3383-5
    • Price: E-book- € 118.99, Hardcover- € 139,99
    2019

    Bharath asked: How is it that India has woefully performed in indigenous defence manufacturing while it has excelled in space and nuclear technology?

    G. Balachandran replies: There were many reasons. But the primary reason was that in the space and the nuclear sector the developers and users were the same. Secondly, they could proceed at their pace. If there were delays or targets not met, there was no question of the users importing since that option was not available.

    The Global Race for Artificial Intelligence: Weighing Benefits and Risks

    India can play an essential role in mitigating the risks and maximizing the benefits on account of rapid growth of AI enabled technologies.

    February 23, 2018

    Artificial Intelligence in Military Operations: Technology, Ethics and the Indian Perspective

    Artificial Intelligence in Military Operations: Technology, Ethics and the Indian Perspective

    After decades of false starts, AI/ Robotics technologies today appear to be at an inflection point, making rapid advancements which are considered significant enough to usher in a new revolution in military affairs

    January 31, 2018

    Compact Fusion: Are the Energy Equations About to Change?

    Advanced technologies and supercomputing have accelerated the pace of research and development in the field of nuclear fusion.

    January 10, 2018

    Comprehensive Integrated Border Management System: Issues and Challenges

    Implementation of high-tech solutions without adequately trained personnel is unlikely to help the Border Security Force achieve the goal of foolproof border surveillance.

    October 04, 2017

    Securing Critical Information Infrastructure: Global Perspectives and Practices

    This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.

    2017

    The race for leadership in supercomputers – does India stand a chance?

    India must move away from the perspective which it has allowed to dominate, namely, that the application of supercomputers is more important than supercomputer technologies themselves.

    September 07, 2016

    God forgives, would Google?

    God forgives, would Google?

    At present, the entire debate on ‘right to be forgotten’ is mainly focused on individual freedom and individual rights. However, it is important to look at this issue from a security angle too.

    June 06, 2016

    Soumyadipta Majumder asked: What are the different modes of encryption?

    Arul R. replies: Encryption is a way of scrambling the data or message thereby securing the data from unintended recipients. Decryption is the way of retrieving the data that is encrypted.

    There are two basic modes of encryption:

    Pages

    Top