Back to Search Begin New Search Save Search Auto-Notify
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at hello@jenniferschaus.com
Add Favorite
Federal Tech Talk Series: Digital Trans...
Many Navy stakeholders and business units have unique issues or gaps that are not sufficiently supported by current or existing functionality, including the need for timely and relevant insights and data. Situations like these call for rapid development of focused, data-driven metrics and visualizations. The Navy would benefit from a more clearly defined process by which business units can incubate and execute digital solutions. Discussion top...
Add Favorite
Accelerate Your Mission: Unlocking the...
National security in the 21st Century requires timely and informed decision making. Harnessing hidden insights found in data from disparate systems and applications can help develop strategies to address unseen aspects of defense relation challenges. No matter the location or source, how do agencies effectively ingest and route all data into a platform where it can be used to its full potential? What role do emerging technologies play in ensur...
Add Favorite
The Responsible AI Conversations: How t...
The Responsible AI Conversations are discussions on topics relevant to the U.S. government’s journey toward Responsible AI. Watch this conversation on the state of the global AI race. David Spirk, former Chief Data Officer of the U.S. Department of Defense, and Neil Serebryany, CalypsoAI’s CEO, will discuss the state of AI around the world and what the U.S. government must do to become a global AI leader.
Add Favorite
In the Flat Field: Did Russian Army Ele...
In the Flat Field: Did Russian Army Electronic Warfare underperform in Ukraine? Since the Russian government began to overhaul its military early last decade, fears in NATO and allied nations have deepened over the efficacy of its army's electronic warfare systems. New capabilities have been deployed and supported previous Russian military adventures in Georgia, Ukraine and Syria with seemingly great effect. The world's media has shared photog...
Add Favorite
Navigating the Horizons of Aerospace an...
This webinar will explore the benefits and challenges of manual software testing versus automated software testing in the defense and aerospace industries. Participants will gain a comprehensive understanding of the differences between these two testing approaches, including their respective advantages and limitations. We will discuss the role of manual testing in ensuring the safety and reliability of critical defense and aerospace systems, a...
Add Favorite
Driving Efficiency & Reliability for Mi...
In the fast-paced aerospace and defense software development landscape, continuous integration and continuous delivery (CI/CD) have become critical for ensuring high-quality, error-free software releases for military systems such as avionics, radar, communications, etc. However, achieving CI/CD can be a daunting task, especially when it comes to software testing. Manual testing can be time-consuming, prone to errors, and cannot keep pace with...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Back to Search Begin New Search