ReportWire

Tag: Cyberspace

  • State to use AI to improve government

    [ad_1]

    BOSTON — Artificial intelligence is being used for everything from guiding self-powered cars and developing life-saving medicines to powering online search engines that help you find a plumber or pick holiday gifts for your family.

    And the machine learning platform could soon be employed by the state government to speed up the processes of getting a state permit, renewing a vehicle registration or detecting fraud in public benefits programs.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm%96 w62=6J 25>:?:DEC2E:@? 2??@F?465 uC:52J E92E :E A=2?D E@ 56A=@J r92Ev!%’D 2CE:7:4:2= :?E6==:86?46 2DD:DE2?E A=2E7@C> 😕 6I64FE:G6 3C2?49 286?4:6D H:E9 E96 8@2= @7 >2<:?8 DE2E6 8@G6C?>6?E H@C< “36EE6C 2?5 72DE6C” 7@C C6D:56?ED]k^Am

    kAm“%9:D 😀 23@FE >2<:?8 8@G6C?>6?E 72DE6C[ >@C6 677:4:6?E[ 2?5 >@C6 67764E:G6 7@C E96 A6@A=6 H6 D6CG6[” v@G] |2FC2 w62=6J D2:5 😕 2 AC6A2C65 DE2E6>6?E]k^Am

    kAmw6C 25>:?:DEC2E:@? D2:5 E96 px C@==@FE H:== 36 :>A=6>6?E65 2D 2 A92D65 2AAC@249 24C@DD E96 6I64FE:G6 3C2?49 “2?5 H:== AC@G:56 2 D276 2?5 D64FC6 6?G:C@?>6?E E92E AC@E64ED DE2E6 52E2]” %96 4@?EC24E H:E9 r92Ev!% H2D ?68@E:2E65 E9C@F89 2 4@>A6E:E:G6 AC@4FC6>6?E AC@46DD[ @77:4:2=D D2:5]k^Am

    kAm~?46 56A=@J65[ |2DD249FD6EED H:== 36 E96 7:CDE DE2E6 E@ 25@AE E96 E649?@=@8J 7@C E96 6?E:C6 c_[___6>A=@J66 6I64FE:G6 3C2?49[ 244@C5:?8 E@ E96 w62=6J 25>:?:DEC2E:@?]k^Am

    kAm%96 C@==@FE @7 E96 ?6H A@=:4J 4@>6D 2D DE2E6 =2H>2<6CD 2C6 4@?D:56C:?8 2 >JC:25 @7 AC@A@D2=D 2:>65 2E 255:?8 8F2C5C2:=D 2C@F?5 FD6 @7 E96 ?6H E649?@=@8J]k^Am

    kAm~?6 AC@A@D2= H@F=5 C6BF:C6 =2C86 2CE:7:4:2= :?E6==:86?46 E649?@=@8J 4@>A2?:6D DF49 2D E96 @?=:?6 492E3@E r92Ev!% E@ C68:DE6C H:E9 E96 DE2E6 pEE@C?6J v6?6C2=’D ~77:46 2?5 5:D4=@D6 :?7@C>2E:@? 23@FE E96:C 2=8@C:E9>D]k^Am

    kAmp?@E96C 3:== 42==D 7@C 32??:?8 “566A72<6D” @C 4@>AFE6C86?6C2E65 >2?:AF=2E:@?D @7 2 A6CD@?’D G@:46 @C =:<6?6DD FD:?8 >249:?6 =62C?:?8 E@ 4C62E6 G:DF2= 2?5 2F5:@ 4@?E6?E E92E 2AA62CD E@ 36 C62=] %96 E649?@=@8J 😀 36:?8 FD65 E@ 86?6C2E6 72<6 :>286CJ 7@C 2?JE9:?8 7C@> “C6G6?86 A@C?” E@ A@=:E:42= >F5D=:?8:?8]k^Am

    kAmx? a_ac[ pEE@C?6J v6?6C2= p?5C62 r2>A36== D@F89E E@ E:89E6? E96 C6:?D @? 2CE:7:4:2= :?E6==:86?46 56G6=@A6CD[ DFAA=:6CD 2?5 FD6CD[ :DDF:?8 ?6H 8F:52?46 E92E H2C?65 E96> ?@E E@ CF? 27@F= @7 E96 DE2E6’D =2HD @? 4@?DF>6C AC@E64E:@?[ 2?E:5:D4C:>:?2E:@? 2?5 52E2 D64FC:EJ]k^Am

    kAm{2DE H66<[ E96 DE2E6 w@FD6 @7 #6AC6D6?E2E:G6D 2AAC@G65 2 A2:C @7 3:A2CE:D2? 3:==D D6EE:?8 ?6H C6DEC:4E:@?D @? E96 FD6 @7 2CE:7:4:2= :?E6==:86?46 😕 A@=:E:42= 42>A2:8?:?8] %96 AC@A@D2=D H@F=5 C6BF:C6 42>A2:8?D E@ 5:D4=@D6 E96 FD6 @7 px 😕 A@=:E:42= 25D 2?5 32? “5646AE:G6” 4@>>F?:42E:@?D 😕 42>A2:8? 25D h_ 52JD 367@C6 2? 6=64E:@?]k^Am

    kAmr92Ev!%[ H9:49 H2D 4C62E65 3J $2? uC2?4:D4@32D65 ~A6?px[ 2? 2CE:7:4:2= :?E6==:86?46 C6D62C49 7:C> 4@7@F?565 3J t=@? |FD<[ 2==@HD FD6CD E@ 6?E6C E96>6D[ AC@>AED 2?5 8F:56=:?6D :?E@ E96 px DJDE6> E92E 4@>6D FA H:E9 2 C6DA@?D6 2D :7 2 9F>2? HC@E6 :E]k^Am

    kAm~? :ED H63D:E6[ E96 4@>A2?J D2JD E96 r92Ev!% 3@E 😀 2 “D276 2?5 FD67F=” px DJDE6> E92E :?E6C24ED 😕 2 “4@?G6CD2E:@?2= H2J” H:E9 FD6CD[ >2<:?8 :E A@DD:3=6 E@ “2?DH6C 7@==@HFA BF6DE:@?D[ 25>:E :ED >:DE2<6D[ 492==6?86 :?4@CC64E AC6>:D6D[ 2?5 C6;64E :?2AAC@AC:2E6 C6BF6DED]”k^Am

    kAmqFE E96 6>6C86?46 @7 px E649?@=@8J 92D 366? DE66A65 😕 4@?EC@G6CDJ[ H:E9 4C:E:4D H2C?:?8 E92E r@?8C6DD 2?5 DE2E6 8@G6C?>6?ED ?665 E@ >@G6 BF:4<=J E@ D6E C68F=2E:@?D 8@G6C?:?8 :ED FD6]k^Am

    kAmw62=6J 25>:?:DEC2E:@? @77:4:2=D D2J E96 C@==@FE @7 r92Ev!% H:== 36 5@?6 H:E9:? 2 “H2==65@77[ D64FC6 6?G:C@?>6?E E92E AC@E64ED DE2E6 52E2 2?5 6?DFC6D E92E 6>A=@J66 492E :?AFED 5@ ?@E EC2:? AF3=:4 px >@56=D]” %96J D2:5 FD6 @7 E96 E649?@=@8J H:== 36 8@G6C?65 3J 4FCC6?E DE2E6 C68F=2E:@?D 2?5 A@=:4:6D[ H9:49 H:== 36 “C68F=2C=J” FA52E65[ @77:4:2=D D2J]k^Am

    kAm“qJ >2<:?8 r92Ev!% 2G2:=23=6 E@ E96 DE2E6 H@C<7@C46[ H6 2C6 6>A@H6C:?8 @FC 6>A=@J66D H:E9 2 D64FC6[ 8@G6C?65 E@@= E92E 42? 6?92?46 D6CG:46 56=:G6CJ H9:=6 >2:?E2:?:?8 E96 9:896DE DE2?52C5D 7@C 52E2 AC:G24J[ D64FC:EJ[ 2?5 E9@F89E7F=[ EC2?DA2C6?E FD286 @7 px[” y2D@? $?J56C[ D64C6E2CJ @7 E96 tI64FE:G6 ~77:46 @7 %649?@=@8J $6CG:46D 2?5 $64FC:EJ[ D2:5 😕 2 DE2E6>6?E]k^Am

    kAm“~FC 7@4FD 😀 ?@E ;FDE 25@AE:?8 px[ 3FE 5@:?8 D@ 😕 2 H2J E92E C67=64ED @FC G2=F6D[ 2?5 DEC6?8E96?D ECFDE H:E9 E96 C6D:56?ED H6 D6CG6]”k^Am

    kAmr9C:DE:2? |] (256 4@G6CD E96 |2DD249FD6EED $E2E69@FD6 7@C }@CE9 @7 q@DE@? |65:2 vC@FAUCDBF@jD ?6HDA2A6CD 2?5 H63D:E6D] t>2:= 9:> 2E k2 9C67lQ>2:=E@i4H256o4?9:?6HD]4@>Qm4H256o4?9:?6HD]4@>k^2m]k^Am

    [ad_2]

    By Christian M. Wade | Statehouse Reporter

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • Parenting 101: 5 Lessons to keep kids safe online for the new school year

    [ad_1]

    The back-to-school season is exciting – new knowledge, new digital tools, and new discoveries. But it also brings higher cybersecurity risks for both schools and children. Cybersecurity experts are urging children, parents, and school communities to stay extra alert during this period.

    “The back-to-school period requires additional efforts to keep children and school communities safe online. A new beginning means new digital tools, online searches, and registrations for learning platforms. All of that increases cyber risks that must be taken seriously,” said Karolis Arbačiauskas, head of product at NordPass, in a media release

    A new study by NordPass, in collaboration with NordStellar, reveals a worrying truth: many educational institutions are still using shockingly weak passwords to protect sensitive data. Entries like “123456”, “Edifygroup@1”, and “principal@2021” appeared frequently, showing a widespread reliance on predictable or outdated credentials that are easy for hackers to guess.

    This is why the back-to-school season is the perfect moment to talk to children about cyber hygiene – the dos and don’ts in digital environments – and to help them build strong habits for digital security and privacy. “Learning about cybersecurity can be fun. Many families of cybersecurity professionals make it a game – they host a small party with snacks and guide their children through five simple but essential exercises,” said Arbačiauskas.

    Cybersecurity experts advise to take these steps to preserve your own cybersecurity and that of your family members (it can also be used as inspiration for your family’s Cyber Party):

    • Create strong and unique passwords. Make sure every account in your family – whether it’s yours, your parents’, your significant other’s, or your children’s – uses a strong and unique password. The easiest way to do it? Use a trusted password manager to generate, store, and share them securely.
    • Turn on multi-factor authentication (MFA). Add an extra layer of security wherever you can, especially to access school portals, email accounts, and social apps. MFA helps keep hackers out even if a password gets breached – and they get breached more often than you think. A recent study by NordPass revealed that many educational institutions still use shockingly weak passwords.
    • Update devices and apps. Keep phones, tablets, and laptops up to date with the latest software. Outdated apps can contain vulnerabilities that hackers take advantage of to get backdoor access into your device. Updates patch these security holes so that cybercriminals can no longer exploit them.
    • Talk about phishing. Discuss cybersecurity with your family and why it matters. Teach them to never click suspicious links or open unknown attachments – especially in emails or messages claiming to be from the school. When in doubt, verify with the sender by using a website checker.
    • Adjust privacy settings. Review and tighten privacy settings on social media, online games, and school platforms. Limit what personal info is publicly visible and who can contact your kids online.

    – JC

    [ad_2]

    Source link

  • Salem State gets $624K grant for cybersecurity training center

    Salem State gets $624K grant for cybersecurity training center

    [ad_1]

    SALEM — Salem State University announced this week that it received a $624,437 grant to establish and operate a cybersecurity training facility on campus.

    The grant is part of the state’s Security Operations Center (SOC) Cyber Range Initiative, a program managed by Mass Tech’s MassCyberCenter that aims to help build a diverse generation of cybersecurity professionals through education, training and workforce development, according to a news release.

    “Massachusetts is committed to leading in cybersecurity and ensuring that all communities have the skills, resources and capacity to protect their businesses and residents,” Gov. Maura Healey said. “Congratulations to Salem State on this award and their efforts to grow the cyber workforce.”

    Lt. Gov. Kim Driscoll said how proud she is, “as Salem’s former mayor and a Salem State graduate … of the work the university is doing to teach students critical cybersecurity skills.

    “Cybersecurity affects every part of our community whether you are a small business, elementary school or local government office. The more cybersecurity professionals we have, the more we can ensure our communities are protected online,” Driscoll said.

    “Salem State is grateful to the Healey-Driscoll Administration and the MassCyberCenter for selecting us for this important partnership,” Salem State President John Keenan said. “This type of investment and professional relationships are a win-win for everyone involved.

    “Like our nursing and occupational therapy simulation labs, the CyberRange will imitate real-world problems for students to solve in real time,” he said.

    The funding is expected “to promote cybersecurity while also ensuring Massachusetts stays competitive in modern economic development,” said Yvonne Hao, state secretary of economic development and board chair of the Massachusetts Technology Collaborative.

    Salem State will join Bridgewater State University, Springfield Technical Community College and MassBay Community College as a critical part of a statewide network of cybersecurity educators, MassCyberCenter Director John Petrozzelli said.

    The award will support capital expenditures to construct the CyberRange and expenditures for the first year of operations.

    The center is expected to promote the Massachusetts cybersecurity ecosystem by working to build a strong cyber talent pipeline and to strengthen the defense of local communities.

    More information is available online at https://masscybercenter.org.

    [ad_2]

    By Buck Anderson | Staff Writer

    Source link

  • Cyber Monday Retailers Worried Americans Not Ready To Buy Goods Over World Wide Web

    Cyber Monday Retailers Worried Americans Not Ready To Buy Goods Over World Wide Web

    [ad_1]

    Image for article titled Cyber Monday Retailers Worried Americans Not Ready To Buy Goods Over World Wide Web

    NEW YORK—Expressing skepticism about the unproven technology’s potential in the lead-up to the holiday season, Cyber Monday retailers reportedly worried this week that Americans were simply not ready to buy goods over the World Wide Web. “While there may be a few fringe dedicated Netizens interested in online holiday shopping, we’re not sure the average joe has the understanding or, frankly, interest needed to purchase goods in cyberspace,” said Best Buy vice president Scott Evans, echoing thousands of web retailers who noted that Americans have always enjoyed the atmosphere and experience of brick-and-mortar stores, and the rise of the information superhighway did not seem poised to change that. “I’ll admit I’m a bit in the dark on how it even works. People type ‘http://www.bestbuy.com’ into their web browser, sure, but what happens after that? Do they just send us a check in the mail? Plus, after they buy their item, who drives it to their house? Me? Our IT guy showed the whole thing to me, and it just went way over my head. So I can’t imagine how the average consumer feels. Computers are great for playing solitaire, but I think using them to buy goods is just more of a headache than it’s worth for most Americans.” Evans added that all of this was obviously purely hypothetical, given that the company only expected to get a few dozen online shoppers during the holidays.

    [ad_2]

    Source link

  • Kronos Fusion Energy Plans to Make the U.S. a World Leader in Fusion Energy Generation

    Kronos Fusion Energy Plans to Make the U.S. a World Leader in Fusion Energy Generation

    [ad_1]

    Press Release


    Mar 15, 2022

    The United States is falling behind in the race for fusion energy. Kronos Fusion Energy has the ambitious goal of creating commercial and defense applications that will make the United States a world leader in fusion energy generation. Decades of research and development and recent technological breakthroughs have brought us to an inflection point in fusion power. Using advances in machine learning, artificial intelligence, and quantum computing, Kronos Fusion Energy will use proprietary algorithms in simulations that will greatly accelerate the design of an optimized fusion energy generator. Find out how Kronos Fusion Energy is contributing to the future of fusion energy here.

    There is great potential for many military applications for fusion energy across all domains: land, air, sea, space, and cyberspace. On land, clean power with a spectacular reduction in logistics requirements will greatly enhance both the readiness and force protection of U.S. military service members. At sea, there is potential to create fusion power generators for submarines and ships that will be faster, safer, and more powerful with reduced operational costs. In air and space, direct fusion drive technology is emerging that will extend ranges and performance of U.S. military aircraft while also dramatically reducing payload and travel time in the exploration of the universe. In cyberspace, compact and reliable power generation greatly enhances the performance of critical cyber warfare systems. 

    From algorithms to simulation to commercialization, Kronos Fusion Energy plans to build viable fusion energy generators for use at military installations and deployed locations by 2036 and seeks opportunities to incorporate fusion energy across all domains of possible warfare. 

    Kronos Fusion Energy Defense Systems plans to get fusion energy out of the laboratory and on any potential battlefields by aggressively synchronizing a unity of efforts. Brig. Gen. (ret.) Paul E. Owen, Founding Partner and CEO of Kronos Fusion Energy Defense Systems, advised in congruence, “KFEDS recognizes the criticality of the commercialization of emerging technologies and are already grabbing the bull by the horns, building a team that incorporates leadership from across the three pillars of academia, government and industry. This unified effort will allow us to deliver clean, limitless fusion energy to the American people.”

    For further information:

    Kronos Fusion Energy

    1122 Colorado St

    Austin, TX 78701

    https://www.kronosfusionenergy.com/

    PR Contact – Erin Pendleton – e.pendleton@kronosfusionenergy.com

    Source: Kronos Fusion Energy

    [ad_2]

    Source link