Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Join the discussion to learn how Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by: Addressing today's challenges: Need for more modernized, data-driven, and AI-em...
FY24 Computers For Learning (CFL) In PPMS.gov
Come learn about the Computers For Learning module in PPMS.gov including CFL Allocations, CFL Requisitions, CFL Completed Transfers, CFL eligibility best practices and more. Federal Agencies can learn about how they can donate computer equipment to schools through the CFL program, and what to expect throughout the process. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual...
Managing Personal Property In PPMS
Come learn about managing excess personal property and the Property Custodian roles in the new PPMS.gov. This class focuses on managing excess personal property and roles of the Property Custodian in PPMS.gov for disposal. Emphasizing Auction Review/Approval and documenting Removal and Purchaser’s Receipt (PR) upload. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtua...
Reporting Excess Property in PPMS
Come learn about excess personal property management and the new PPMS.gov. This class focuses on reporting excess personal property into PPMS.gov for disposal (manage the disposition). There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual training session. Open to Federal Employees, Military Personnel, DoD Civilian Employees, Federal Agency Contractors, and Federally-sponsore...
Tech 101: GPS
As the navigation landscape continues to evolve, understanding Global Positioning System (GPS) technology and its role in defense operations becomes paramount. For several decades, GPS technology has played a fundamental role in guiding military strategies and operations. After its introduction in the First Gulf War, it became eminently clear to policymakers and military leaders that GPS technology enabled substantial battlefield advantages, e...
Webinar: Distributed, Collaborative, Au...
As will be shown in this webinar, modern threat systems are difficult to deny and degrade within peer mission environments. There are many reasons for this difficulty and many methods to “attack” this problem set: one of which is using distributed, collaborative, autonomous EW systems of systems. Using existing, government-open tools, Mr. Hellwig will discuss methods and approaches for evaluating and effecting modern, complex spect...
Addressing Technical Debt in Software-I...
During this presentation, Dr. Ipek Ozkaya and Brigid O'Hearn from Carnegie Mellon University’s Software Engineering Institute (SEI), will give insight into the challenges that DOD and defense industry face in addressing technical debt in software. Technical debt is defined as “an element of design or implementation that is expedient in the short term, but that would result in a technical context that can make a future change costli...
Federal Executive Forum Data Center ...
Data centers and cloud optimization continue to be an important stepping stone to innovation within agencies. But what lessons have agencies learned to create more impactful optimization for the future?
Electromagnetic Protection for Defense...
Modern wireless and electromagnetic technologies continue to advance at a rapid and sustained pace. While the pace of technology advancement has been rapid, security against threats that exploit wireless devices and networks has not kept up. Data, operational information, intelligence, and intellectual property are under constant attack. Threats are increasing in both magnitude and consequence, and in parallel with a rising reliance on wireles...
Army Threat Intelligence in the Crosshairs
As worldwide cyber threats intensify, every soldier, sailor, marine, airman, guardian, reservist, DoD civilian, and contractor has a special responsibility to actively manage the risk of the Department. However, in this dynamic environment where cyber threats are becoming increasingly sophisticated, this is especially difficult. As a result, the importance of adapting to change cannot be overstated. Attend this four-part Army webinar series t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.