Hologram Technology Is Finding Military Users

Microsoft’s HoloLens hologram headset systems are already being used in the Australian, Ukrainian and Israeli military forces, and now the US military is also finding a use for Microsoft’s most advanced technology.

In recent exercises, forces from the US Marines held a weeklong exercise called Spartan Emerging Technology and Innovation Week. The event featured various training technologies, from quadcopters to augmented reality developed with support from the US Office of Naval Research (ONR) to accelerate the development of decision-making skills.

During the exercise, the soldiers used several ONR-sponsored technologies. These included the Interactive Tactical Decision Game (I-TDG) with an associated augmented-reality headset, the Augmented Immersive Team Trainer (AITT) and a quadcopter-based system for surveying and modeling terrain quickly.

According to mspoweruser.com, I-TDG is a web technology-based application that allows Marines to plan missions and conduct tactical-decision games or simulation-based exercises. It supports maps and multimedia tools and links to ONR’s HoloLens augmented-reality headset.

“Small-unit leaders are tasked with making big mission decisions in an extremely short time window,” said Natalie Steinhauser, a senior research psychologist at Naval Air Warfare Center Training Systems Division in Orlando, Florida, who took part in Spartan Week.

“These decisions not only impact the success or failure of a mission, they affect life and death. With these new technologies, Marines can perform simulated missions in a safe classroom environment, carry out multiple missions and even use I-TDG as an after-action review tool.”

I_HLS:      Virtual Reality Is Getting Real In 2017:      

 

« Suspect Monitoring & Surveillance Technology
GCHQ Is Investing In Cybersecurity Start-Ups »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.