Compute at the Edge: Selecting CPUs, GP...
In this insightful webinar, experts Dominic Perez, CTO at Curtiss-Wright Defense Solutions and Aaron Frank, Senior Product Manager delve into the critical considerations for selecting CPUs, GPUs and FPGAs for rugged field applications and vehicle platforms with Size, Weight, and Power (SWaP) constraints. With a focus on optimizing power efficiency without compromising performance, they will guide attendees through the latest advancements in pr...
Digital Twins and Monitoring at the EDG...
Join us for an exclusive demonstration of BMC Helix Edge, an artificial intelligence-powered edge management and orchestration solution that unlocks actionable insights and predictive capabilities to optimize asset performance. The edge management solution discovers, collects, aggregates and analyzes operational technology (OT) data at the point of inception to enable anomaly detection, predictive maintenance and digital twin simulation in a u...
Adding Value to Chapter Events with Con...
Adding Value to Chapter Events with Continuing Education will explain exactly how to offer continuing education at your chapter events, and what the benefits are to both chapters and members. Any chapter officer interested in maximizing offerings and providing value at their chapter's events should attend this session.
The Missing V of Data: Veracity
The missing V of large data—volume, velocity and variety—has always been veracity. In this webinar, we'll hear from two long-time leaders who have worked on this problem. They will present how to find the 'truth' in the deluge of data, how to validate data, how to check pedigree and lineage, and how to weed out duplicates that can create false positives. Attendees will come away with the guidance and approaches that can help serve...
Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
AFCEA Chapter Officers Boot Camp
Our annual virtual Boot Camp is an excellent opportunity to learn more about what AFCEA International offers its chapters in the way of resources and information, and to discover some best practices initiated by chapters. It is invaluable for both new and existing chapter officers, as in addition to explaining available resources, we focus in-depth on a different topic each year, followed by a question and answer session. Our virtual Boot Camp...
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.