SlideShare a Scribd company logo
Your security is our priority Introduction   SMS – Smart Simulator For the use of Military and Security forces
Your security is our priority System Parts Camera + basis Laser + batteries Barrel connector Trigger micro switch Computer software and speakers Projector with camera
Your security is our priority Laptop Projector screen / wall Cables  Speakers Projector + IR camera  Training range 1-20 m.  System Configuration
Your security is our priority System calibration and weapon zeroing System calculate average hit point and software process the calibration
Your security is our priority Friendly control on operation and data
Your security is our priority 1-4 trainees
Your security is our priority On motion drills
Your security is our priority Technical drills
Your security is our priority Tactical drills
Your security is our priority Graphic firing range drills
Your security is our priority Video realistic drills
Your security is our priority SMS – allow firing training to every end user

More Related Content

What's hot

Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
3.3 housing and mounts
3.3 housing and mounts3.3 housing and mounts
3.3 housing and mounts
Nader Elmansi
 
Rohan College seminar
Rohan College seminarRohan College seminar
Rohan College seminar
Rohan Tandel
 
Iinformation security
Iinformation securityIinformation security
Iinformation security
amitmujumdar
 
Vutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal AbeyrathneVutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal AbeyrathneShamal Abeyrathne
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
Canon Business CEE
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
ICT Security with Automation
ICT Security with AutomationICT Security with Automation
ICT Security with Automation
Mark Joseph Veloso-Salvado, CSP
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Tonex
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityPLN9 Security Services Pvt. Ltd.
 

What's hot (12)

Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
 
3.3 housing and mounts
3.3 housing and mounts3.3 housing and mounts
3.3 housing and mounts
 
Rohan College seminar
Rohan College seminarRohan College seminar
Rohan College seminar
 
Iinformation security
Iinformation securityIinformation security
Iinformation security
 
Vutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal AbeyrathneVutlan presentation 09.2015 EN - Shamal Abeyrathne
Vutlan presentation 09.2015 EN - Shamal Abeyrathne
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
ICT Security with Automation
ICT Security with AutomationICT Security with Automation
ICT Security with Automation
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
Week10
Week10Week10
Week10
 

Viewers also liked

A14610002 Nurul ANggraeni Hidayati
A14610002 Nurul ANggraeni HidayatiA14610002 Nurul ANggraeni Hidayati
A14610002 Nurul ANggraeni Hidayati
Nurulanggraeni Hidayati
 
Social network game
Social network gameSocial network game
Social network gamePark SooJin
 
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...nacionalaidentitate
 
你知道你的父母昨天晚餐吃了什麼嗎
你知道你的父母昨天晚餐吃了什麼嗎你知道你的父母昨天晚餐吃了什麼嗎
你知道你的父母昨天晚餐吃了什麼嗎
kayoweb
 
Equipment list
Equipment listEquipment list
Equipment listsahir999
 
Internettrendsv1 150526193103-lva1-app6892
Internettrendsv1 150526193103-lva1-app6892Internettrendsv1 150526193103-lva1-app6892
Internettrendsv1 150526193103-lva1-app6892
Benjamin Crucq
 
Chinese Trademark Violations
Chinese Trademark ViolationsChinese Trademark Violations
Chinese Trademark Violations
Mihex
 
AOL Headquarters
AOL HeadquartersAOL Headquarters
AOL Headquarters
Mihex
 
Technology and education power point
Technology and education power pointTechnology and education power point
Technology and education power pointkgillen11
 
Sandwich Art
Sandwich ArtSandwich Art
Sandwich Art
Mihex
 
Television presentation for class (3)
Television presentation for class (3)Television presentation for class (3)
Television presentation for class (3)
Setzerma
 
Wheel
WheelWheel
4 10-2011 أخر نسخة معدلة من الكتيب
4 10-2011 أخر نسخة معدلة من الكتيب 4 10-2011 أخر نسخة معدلة من الكتيب
4 10-2011 أخر نسخة معدلة من الكتيب Mahmoud Muhammed
 
Развертывание и управление CMS Drupal в Microsoft Azure
Развертывание и управление CMS Drupal в Microsoft AzureРазвертывание и управление CMS Drupal в Microsoft Azure
Развертывание и управление CMS Drupal в Microsoft Azure
Artur Baranok
 
Isaiah 28:14-18 precious cornerstone
Isaiah 28:14-18 precious cornerstoneIsaiah 28:14-18 precious cornerstone
Isaiah 28:14-18 precious cornerstone
Hans Rudolf Tremp
 
Space Efficient Kitchens
Space Efficient Kitchens Space Efficient Kitchens
Space Efficient Kitchens
Mihex
 
DGP Woodworks
DGP WoodworksDGP Woodworks
DGP Woodworks
Subhan Khan
 
The Stockholm Metro
The Stockholm MetroThe Stockholm Metro
The Stockholm Metro
Mihex
 
애니팡 In gamification
애니팡 In gamification애니팡 In gamification
애니팡 In gamificationPark SooJin
 

Viewers also liked (20)

A14610002 Nurul ANggraeni Hidayati
A14610002 Nurul ANggraeni HidayatiA14610002 Nurul ANggraeni Hidayati
A14610002 Nurul ANggraeni Hidayati
 
Social network game
Social network gameSocial network game
Social network game
 
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...
Karavīru dienasgrāmatas Otrajā pasaules karā: faktoloģisks fiksējums un 'dvēs...
 
你知道你的父母昨天晚餐吃了什麼嗎
你知道你的父母昨天晚餐吃了什麼嗎你知道你的父母昨天晚餐吃了什麼嗎
你知道你的父母昨天晚餐吃了什麼嗎
 
Equipment list
Equipment listEquipment list
Equipment list
 
Internettrendsv1 150526193103-lva1-app6892
Internettrendsv1 150526193103-lva1-app6892Internettrendsv1 150526193103-lva1-app6892
Internettrendsv1 150526193103-lva1-app6892
 
Chinese Trademark Violations
Chinese Trademark ViolationsChinese Trademark Violations
Chinese Trademark Violations
 
AOL Headquarters
AOL HeadquartersAOL Headquarters
AOL Headquarters
 
Technology and education power point
Technology and education power pointTechnology and education power point
Technology and education power point
 
Sandwich Art
Sandwich ArtSandwich Art
Sandwich Art
 
Television presentation for class (3)
Television presentation for class (3)Television presentation for class (3)
Television presentation for class (3)
 
Coding standard
Coding standardCoding standard
Coding standard
 
Wheel
WheelWheel
Wheel
 
4 10-2011 أخر نسخة معدلة من الكتيب
4 10-2011 أخر نسخة معدلة من الكتيب 4 10-2011 أخر نسخة معدلة من الكتيب
4 10-2011 أخر نسخة معدلة من الكتيب
 
Развертывание и управление CMS Drupal в Microsoft Azure
Развертывание и управление CMS Drupal в Microsoft AzureРазвертывание и управление CMS Drupal в Microsoft Azure
Развертывание и управление CMS Drupal в Microsoft Azure
 
Isaiah 28:14-18 precious cornerstone
Isaiah 28:14-18 precious cornerstoneIsaiah 28:14-18 precious cornerstone
Isaiah 28:14-18 precious cornerstone
 
Space Efficient Kitchens
Space Efficient Kitchens Space Efficient Kitchens
Space Efficient Kitchens
 
DGP Woodworks
DGP WoodworksDGP Woodworks
DGP Woodworks
 
The Stockholm Metro
The Stockholm MetroThe Stockholm Metro
The Stockholm Metro
 
애니팡 In gamification
애니팡 In gamification애니팡 In gamification
애니팡 In gamification
 

Similar to Presant

Doc sms1
Doc sms1Doc sms1
Doc sms1
riskis
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
dma1965
 
Fast Tech profile
Fast Tech profileFast Tech profile
Fast Tech profileEast Cairo
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
Dignesh Bhatt
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
Glen Yi
 
CCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure ProtectionCCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure Protection
Neometrix_Engineering_Pvt_Ltd
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
Trishla Thakur
 
Keeping up with the security features
Keeping up with the security featuresKeeping up with the security features
Keeping up with the security features
Technomine
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
pmurphy123
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011andrewpugh
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
Vahid RG-zadeh
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
Davide De Bella
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security EngineerMark Long
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
Larry Vandenaweele
 

Similar to Presant (20)

Doc sms1
Doc sms1Doc sms1
Doc sms1
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
FSIPL1
FSIPL1FSIPL1
FSIPL1
 
Fast Tech profile
Fast Tech profileFast Tech profile
Fast Tech profile
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
CCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure ProtectionCCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure Protection
 
CCTV Surveillance
CCTV SurveillanceCCTV Surveillance
CCTV Surveillance
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 
Keeping up with the security features
Keeping up with the security featuresKeeping up with the security features
Keeping up with the security features
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 

More from riskis

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheetriskis
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC descriptionriskis
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheetriskis
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochureriskis
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochureriskis
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competitionriskis
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx xriskis
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentationriskis
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
riskis
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
riskis
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjatriskis
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system modriskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
riskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming systemriskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
riskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming systemriskis
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammer
riskis
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammer
riskis
 
Presant identica
Presant identicaPresant identica
Presant identica
riskis
 

More from riskis (20)

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheet
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC description
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheet
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochure
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochure
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competition
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx x
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentation
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjat
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammer
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammer
 
Presant identica
Presant identicaPresant identica
Presant identica
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Presant

  • 1. Your security is our priority Introduction SMS – Smart Simulator For the use of Military and Security forces
  • 2. Your security is our priority System Parts Camera + basis Laser + batteries Barrel connector Trigger micro switch Computer software and speakers Projector with camera
  • 3. Your security is our priority Laptop Projector screen / wall Cables Speakers Projector + IR camera Training range 1-20 m. System Configuration
  • 4. Your security is our priority System calibration and weapon zeroing System calculate average hit point and software process the calibration
  • 5. Your security is our priority Friendly control on operation and data
  • 6. Your security is our priority 1-4 trainees
  • 7. Your security is our priority On motion drills
  • 8. Your security is our priority Technical drills
  • 9. Your security is our priority Tactical drills
  • 10. Your security is our priority Graphic firing range drills
  • 11. Your security is our priority Video realistic drills
  • 12. Your security is our priority SMS – allow firing training to every end user