Digital Transformation: A Bit More Than...
Public and private sector organizations use high-tech tools such as artificial intelligence, machine learning and cloud computing to remain competitive in the digital race for enhanced connectivity and capability, and enterprises are widely adopting and incorporating these tools to transform their organizations. Businesses and operations are changing at rapid speeds. However—are they just changing or actually digitally transforming? The...
Delivering Cloud Capabilities to the Ta...
Today cloud computing is far more than just someone else’s computer, and taking advantage of modern containerized and virtualized application infrastructure brings challenges when moving out of the data center and into the dirt. Join experts Dominic Perez, CTO for Curtiss-Wright Defense Solutions and Brandon Gulla, CTO for Rancher Government Solutions, for this educational webinar on deploying cloud environments and integrating with priv...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
AFCEA DC Luncheon: Computing at the Edg...
Join AFCEA DC for an in depth dialogue with our panel of experts as they illuminate and demystify Computing at the Edge. Edge computing has a wide range of applications in the internet of things (IOT) from unmanned driving, traffic flow congestion, and real time urban traffic data processing but how can we narrow this concept to ensure we have the upper hand in the battle field. The panel will define and dig into the complexities, issues, and...
Defending Sensitive Government Data Aga...
Government contractors are increasingly a prime target for cyber-attacks, ranging from phishing and social engineering to malware and ransomware. Cloud computing, remote working and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges? Network detection and response solutions can help detect potential breaches and prevent attackers from disrup...
Leveraging Cloud and Edge-Based Video D...
Lt. Gen. Dennis Crall, USMC, the Director for Command, Control, Communications, and Computers/Cyber and Chief Information Office Joint Staff J6, has said the JADC2 vision for a connected force across all domains—land, sea, air, space and cyber—is not possible without enterprise cloud computing. The Defense Department’s future battlefield network needs the cloud to increase command and control capabilities, to provide global a...
Leveraging Hybrid, Open Cloud Technolog...
IBM invites you to join a discussion led by experts from Forrester Research on how hybrid and open cloud technologies can drive success for public and private sector organizations. Bobby Cameron, a Vice President and Principal Analyst at Forrester Research, will discuss the goals and headwinds facing today and how they can modernize using hybrid and open cloud technologies to drive mission success. Benjamin Brown, a Principal Consultant in For...
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
How 5G is Enabling the Next Revolution...
The winner in the future tactical battlespace will be those who can first collect and process information that drives rapid, accurate and actionable decision-making. Battlespace intelligence, surveillance and reconnaissance (ISR) and Internet of Things (IoT) technology exploding presents both an opportunity to quickly deliver battlespace clarity while challenging the capabilities of existing edge wireless systems and networks. Success requires...
April 14, 2022
Organizer:
AFCEA Location:
Webcast
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.