Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
Harnessing the Power of America's Small...
America’s small businesses keep the nation’s military combat ready with critical parts, cutting-edge technology and top-notch services. They account for 43% of all high-tech jobs and generate 16 times more patents than large firms. As such, the Defense Department’s acute focus on supporting this vital segment for strong national and economic security reinforces their commitment to strengthen our domestic supply chains, increa...
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
Battlefield Bandwidth and Its Implicati...
The U.S. military has moved to an interconnected battlefield in which data can move seamlessly between air, land, maritime, space and cyber in real time. Modern battlefield networks are increasingly tasked with not only the transport of voice but also large and varied data types, including still images, video, sensor data, maps, situational awareness data and inventory information. In addition to transporting the raw data itself, these network...
WEST Conference and Exhibition
The premier naval conference and exposition on the West Coast, WEST is now in its 33rd year of bringing military and industry leaders together. Co-sponsored by AFCEA International and the U.S. Naval Institute, WEST is the only event in which the makers of platforms and the designers of technologies can network, discuss and demonstrate their solutions in a single locale. One recurring highlight of WEST is a town hall discussion among the Chief...
Containerization Is Driving Technology...
If you're interested in modernizing your software stack to containerize applications and orchestrate them with Kubernetes out to the tactical edge, you are not alone. In this exclusive RGS webinar for the AFCEA community, open source government technology experts will help you understand what you need and how to choose the right Kubernetes management platform for your agency. This webinar will cover: Docker and Kubernetes concepts and architec...
Building an Operational Technology/Cont...
Securing critical infrastructure requires a combination of resources, technology and people that understand the unique nature of control systems and their supporting technology. People are the most critical element of the equation — without the right team that understands how to resource a control system/operational technology program, and without the right people to operate and maintain both cybersecurity capabilities and compliance pro...
The Future of 5G in Sky and Space Non-T...
5G heralds a generational step forward for cellular networks, bringing faster connection speeds and unlocking new use cases like AR/VR and IoT. The emergence of 5G also marks a significant industry disruption in terms of Non-Terrestrial Networks (NTN). No longer will cellular networks be confined to traditional terrestrial deployments on rooftops and towers. With NTN and 5G, network assets can be deployed on satellites as well as unmanned airc...
How to Leverage Defense-in-Depth to Min...
Federal agencies are not immune to security attacks, even if their controls and processes are as tight as Fort Knox. Some of the world’s most technologically advanced enterprises, from Microsoft to SolarWinds to Okta, have faced security incidents and were exposed to risk. Many of these successful cyber attacks did not start with hackers fighting their way through firewalls and intrusion prevention systems or executing zero-day exploits....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.