MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / Robotics & AI in defence sector

Robotics & AI in defence sector

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

In this episode we cover XTEK’s growing partner applications in robotics & AI.

Milrem Robotics will collaborate with XTEK in order to develop a composite material ballistic armour solution. Milrem Robotics (based in Tallinn, Estonia) is Europe’s leading robotics and autonomous systems developer whose defence sector products include the THeMIS UGV and Type X RCV.

XTEK is also working with Queensland based Athena Artificial Intelligence (Athena AI) which develops and manufactures AI enabled target recognition, geospatial analysis and machine learning decision support. More specifically, the company produces multi sensor computer vision data fusion with machine learning for battle tracking, grouping information, supporting targeting such as weapons effects and linking detections to suitable effectors. It also has experience in middleware services for providing a server based solution as part of a C4I battle network.

#milremrobotics #xtek #defence #AI #artificalintelligence #mysecuritytv

OTHER VIDEOS IN THIS SERIES

Astronomers
April 18, 2024
An international team of astronomers has discovered 49 new gas-rich galaxies using the MeerKAT radio telescope in South Africa. Watch Now
apsm_03
April 8, 2024
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Watch Now
apsm_01
April 8, 2024
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. Watch Now
apsm
April 2, 2024
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over your true security posture. Be proactive in fixing vulnerabilities, misconfigurations, leaked credentials, and privileges before they are exploited. Watch Now