0% found this document useful (0 votes)
22 views9 pages

IT Uses by The Military

Uploaded by

Derpy Comics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views9 pages

IT Uses by The Military

Uploaded by

Derpy Comics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

IT uses by

the Military
Virtual Reality
Virtual Reality Pt. 2
Virtual Reality Pt. 3
Predictive
Technology
Unmanned Combat
• IoMT (the internet of military things) is a subcategory of the
Internet of things related to warfare, combat, and other
militarized use cases
• It allows all entities in a given network to communicate with
each other as seamlessly as possible.
• Maintained under the idea that machine-based warfare will
become the new standard.
• IoMT falls under four categories

Internet of • Data-carrying device: Devices such as hard drives

Military Things that are connected and used to maintain servers.


• Data-capturing device: Use of drones for
intelligence-gathering/data gathering.
• Sensing and actuating device: Thermal-imaging
devices (scopes, cameras, etc)
• General device: Vehicles, smart equipment, etc.
• Joshinav. “VR Is the Future of Military
Training.” Application Development, 18 Oct.
2019, www.allerin.com/blog/vr-is-the-future-of-
military-training.

• (www.dw.com), Deutsche Welle. “A Guide to


Military Drones: DW: 30.06.2017.” DW.COM,

Bibliography www.dw.com/en/a-guide-to-military-drones/a-
39441185.

• Abadicio, Millicent. “Predictive Analytics in the


Military - Current Applications.” Emerj, Emerj, 25
Mar. 2019, emerj.com/ai-sector-
overviews/predictive-analytics-in-the-military-
current-applications/.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy