DefenseNews

The British Army’s new Ajax vehicles ride too rough, too loud: report

LONDON — British Army attempts to modernize its armored fighting capabilities have taken a new hit with reports that the General Dynamics UK-built Ajax reconnaissance vehicle has encountered significant design problems. British newspaper Daily Telegraph cited a leaked document outlining issues such as excessive vibration, which had required the Army to impose speed restrictions on the vehicle…
Read more
DefenseNews

US Air Force awards $465M contract for new E-11A planes

WASHINGTON — The U.S. Air Force on Tuesday awarded Learjet a contract worth up to $465 million for Bombardier Global 6000 business jets, which will be modified into the E-11A aircraft used to relay data between platforms that cannot normally share information. The contract immediately obligated $70 million to pay for the first Global 6000 out of a potential total of six planes. That aircraft…
Read more
NewsPhotography

Fujifilm Shuts Down Servers Due to Possible Cyberattack

Fujifilm Corporation may have been the victim of a ransomware attack. The company says that it is looking into possible unauthorized access to its server from outside the company and has partially shut down its servers while it investigates. Fujifilm says that the…
AI & RoboticsNews

Deepgram beefs up conversational AI engagement with new APIs

Elevate your enterprise data technology and strategy at Transform 2021. Deepgram today added three additional capabilities to an automated speech recognition (ASR) platform that is invoked via a set of application programming interfaces (APIs). The company is adding a conversational AI option that reduces response lag to less than 300 milliseconds. That level of interaction will make it…
Read more
NewsPhotography

Facebook to Provide Additional Insight into How Photos Are Used

Facebook Rights Manager, which helps creators protect unauthorized image use, has been gradually rolling out since it was announced last year. As part of that process, the system can now provide detailed insights to photographers into how photos are used, including unauthorized use. Image theft as well as unauthorized use — such as users sharing or repurposing content without approval — is…
Read more