Skip to main content

The mighty fly drone is the next-generation logistics.




The Mighty fly drone can deliver 45 kg cargo about 965 kilometers. There is no mentioned one-way operational distance. Or is it two ways operational distance of that drone? 

And the drone can lift off and land vertically. The GPS and advanced avionics allow this small drone craft can deliver pizza from Helsinki to Rovaniemi with very high accuracy. The Mighty fly will transform logistics for many purposes. And one thing is clear. These drones are effective tools in surveillance missions in private and governmental sectors. 

The long-distance operational capacity allows this type of drone to guard areas from remote stations. And they can carry LLC(Low-Level Light Camera) systems that can uncover prohibited things. Infrared cameras are making it possible to search the pollution and missing persons. 

Small-size radars can install under the drone. By using that system. The drone can detect underwater caves or tunnels. 

The official and illegal private surveillance teams can use drones to shadow people from their workplace to home. The drones that are equipped with laser microphones can record discussions. 

And the compact electronic surveillance systems can also dismantle information that hidden eavesdropping tools record. The same systems can dismantle information that trail cameras store in nature. So the thing is that the recorders that are recording birds' songs can easily transform to eavesdrop tools that are hard to detect. 




Regular eavesdropping tools send electromagnetic radiation all the time. And that makes them easy to detect. The protective systems notice those eavesdropping tools called "bugs" because of radio transmission. 

Modern systems are recording information in their mass memories. And then the drone, satellite, or some manned system will send an order that the bug must dismantle its data. The microchip-controlled eavesdropping tool sends a so-called burst. The burst lasts less than a second. And that makes modern eavesdropping tools hard to detect. 

But this kind of drone can also target smart weapons to manned- and unmanned attack aircraft. Or they can drop SDBs:s (Small Diameter Bombs) on precise targets. The same system that leads pizzas down can use to release those SDBs that are effective against at least APCs (Armored Personnel Carriers) or helicopters and aircraft. 

As you see, drones are multipurpose tools. And the world is a race between defenders and attackers. The private military contractors are interested in this kind of system the same way as they are interested in surveillance systems. The criminals can use drones to take images of their next target. Or they can deliver weapons and other prohibited tools to prisons by using drones. 


https://shorttextsofoldscholars.blogspot.com/

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that