59 results found
    1. The advantages of expanded beam

      The advantages of expanded beam

      How it works: Expanded beam connectors utilize optical lenses to expand the fiber’s optical beam, typically at the connector interface. The optical beam is then refocused onto the receiving fiber using a lens system. This technique avoids the direct physical contact found in traditional connectors, significantly reducing the risks associated with contamination and misalignment. Reduced sensitivity to contamination: Since the fiber ends never come into physical contact, contaminants like dust or oils do not degrade the performance of the connection. This is especially beneficial in environments with high levels of dust or where connectors are frequently mated and unmated. Enhanced durability and reliability: Expanded beam connectors can withstand up to 3000 matings without any loss degradation and offer a much larger tolerance for misalignment as the expanded beam allows for easier coupling between fiber optic cables and their receivers, even if the fibers are not perfectly aligned. Physical contact connectors will struggle to reach a third of the mating figure mentioned above and any misalignment, contamination or repetitive matings can lead to significant degradation, higher insertion loss and lower reliability. Easier cleaning and maintenance: Since there is no direct fiber to fiber contact in expanded beam technology, the risk of contamination, scratches or damage to the fiber end face is significantly reduced. This leads to easier maintenance and cleaner connections, enhancing system longevity. Conclusion: Expanded beam connectors are an advanced optical connection solution that offer superior performance in harsh environments where traditional fiber optic connectors may fail. By reducing physical contact, minimizing contamination risks, and offering improved durability against environmental stresses, these connectors are indispensable in industries such as military, aerospace, broadcast, mining and industrial automation.

    2. The sustainable cityscape of the future is multifunctional, smart and safe

      The sustainable cityscape of the future is multifunctional, smart and safe

      C3C Wonderwall® - our concept for safety barriers that blend into the surrounding environment and at the same time provide and release information and create social spaces. Our solutions can be permanent or temporary at events, concerts or larger gatherings. With IoT technology in built-in sensors, it is possible to collect information about temperature, air pollution. Build in functions to promote biodiversity and increase vegetation and green areas in city environments. Add functions for public information or to alert if a vehicle is about to ram the barrier. The design is done according to need. Why not let the safety barrier also be a bench for warm conversations or a parkour park with full activity.

    3. Therefore, Färist VPN is a safer cyber protection for vital societal functions

      Therefore, Färist VPN is a safer cyber protection for vital societal functions

      Tutus has been supporting sensitive operations and critical infrastructure for 30 years, working closely with Sweden's highest requirements setters to develop the product Färist VPN. Färist VPN is a proven encryption solution that seamlessly integrates into the organization's IT systems, protecting sensitive and classified communication against intrusion and external influence. It is scalable from smartphones to high-performance servers with up to 100 Gbps capacity. The development, production, and operational support of Färist VPN are carried out in Sweden by security-classified personnel, with Tutus registered to conduct sensitive operations. Overall, Färist VPN stands as Sweden's most effective cybersecurity protection for sensitive and classified communication. Färist VPN is also available as an approved signal protection (SG R) for safeguarding classified information up to and including limited secret. Tutus is a leading player in defense-approved solutions with over 30 years of experience. The company is Swedish and has assisted both public authorities and civil organizations in safeguarding sensitive and classified information with secure encryption solutions. Tutus is independent and collaborates with authorities and businesses in Sweden and within the EU. If you wish to get in touch with us or learn more, you can visit www.tutus.se.

    4. Tider för presentationer i montern och speeddejting

      Tider för presentationer i montern och speeddejting

      Passa på att lyssna till våra forskares spännande dragningar i pauserna. Du kan också boka tid för speeddejting på tu man hand med en forskare. Den 17 mars pratar vi bland annat om: • 11.00 och 11.30 - Den blå försörjningsberedskapen: Aron Björk • 12.30 och 13.00 - Konstens roll i krig: Anna Mcwilliams • 14.45 - Kriskommunikation i krig: Alicia Fjällhed Den 18 mars pratar vi bland annat om: • 10.50 - Befolkningsskyddets förutsättningar i krigets Ukraina: Peter Bennesved • 12.30 och 13.00 - Samhällets förmåga att omhänderta ett stort antal döda i krig: Elina Elveborg Lindskog • 14.45 - Posthantering under krig: Anna Lioufas I vår monter kan du också träffa Glimt-projektet som genomförs i nära samarbete med ukrainska myndigheter. Utgångspunkten är att med kollektiv intelligens som vapen skapa en säkrare och mer förutsägbar värld. Kom och bidra - anmäl dig till att bli en av Glimts framtidsbedömare!

    5. Total Defence Exercise Gränsland

      Total Defence Exercise Gränsland

      Borderland is an interactive total defence simulation designed to help you identify critical dependencies, strengthen leadership capacity, and build confidence when information is incomplete. Participants make real decisions — without real-world consequences — while developing a shared understanding of responsibilities, roles, and priorities. The game throws you straight into a rapidly escalating security environment in the grey zone between peace, crisis, and heightened preparedness. You are faced with a fictional yet highly realistic scenario: Armed conflict is unfolding near the Republic of Ardonia. National and allied forces are on the move. At the same time, the country is affected by cyberattacks, disinformation, and strain on critical infrastructure. Resources are limited. The situational picture is incomplete. Time is short. But the decisions cannot wait.

    6. Two hours after the call we were there!

      Two hours after the call, we were on site In January and February 2020, water levels in the Lagan River rose sharply. The media reported that more rain was on the way and SMHI warned of high current speeds where vulnerable environments, people and properties could suffer serious damage. At C3C, it was predicted that the relevant authorities in the area around Ljungby would soon need equipment that could stop any flooding. “We started to prepare ourselves, and after about 24 hours, the Rescue Service in Ljungby called and said they needed our help to protect properties along the Lagan River,” says Erik Jansson, project manager at C3C Engineering. 75-meter-long wall C3C's installers were on site two hours after the call with an excavator, two crane trucks and blocks. The blocks were built into a 75-meter-long and 1.2-meter-high wall some distance from the properties that were at risk of being affected. – The rescue services were mainly concerned that a power dam would burst and create a tidal wave in Lagan. If that had happened, there would have been a great risk that water would penetrate properties. The water could also have been contaminated, says Erik Jansson. Gradually, the water levels dropped again and the risk of an accident decreased. The wall remained standing for two weeks before C3C dismantled the blocks and drove them back to one of C3C's storage locations. Some time later, the incident was evaluated. – Both the rescue services and the people from the Armed Forces who were on site were satisfied with the help they received from us, and that help was available so quickly and so close by,

    7. When civilian arms transports are defined as security-sensitive assets, we already have the solution

      When civilian arms transports are defined as security-sensitive assets, we already have the solution

      The Swedish government’s proposal that civilian weapons transports should be able to be classified as security-protected objects is an important and welcome step towards strengthening the protection of critical and theft-prone assets. When transports of weapons and ammunition are given a higher level of protection, this also creates a need for practical, cost-effective and scalable security solutions that meet both operational and legal requirements. Mobile Strongroom M/25 has been developed precisely for this purpose. The M/25 is a security container specifically classified and approved for military transport of weapons and ammunition. By integrating certified physical protection into what outwardly appears to be a standard ISO shipping container mounted on a hooklift frame, dual security is achieved: security through obscurity and security through patented technology that complies with EN 1143-1 Grade 3. This enables: • Discreet transports • Low tare weight, allowing for heavy payloads • Strengthened regulatory compliance in the transport of theft-prone materiel • More efficient use of resources – potential to reduce the number of personnel in the guard force • Mobile security infrastructure with alarm as well as GPS and GSM tracking