AFCEA CeVA Data Centric Summit
This conference brings together government visionaries, industry leaders, academicians, and data enthusiasts whose work transforms the landscape of data innovation. Dive deep into the data-centric world of big data, AI-driven insights, risk/compliance, mesh/fabric, and cutting-edge data technologies. This event, inspired by AFCEA TechNet, aims to foster collaboration, showcase solutions, and empower participants to harness the full potential o...
February Monthly Luncheon Series: The C...
The U.S. Department of Defense and the U.S. Intelligence Community must preserve our nation’s competitive advantages in highly contested environments; real-time flow of information, reliable communications, and accurate data are absolutely essential to our country’s strategic efforts. Our warfighters must succeed where stable communication links are sparse, bandwidth constraints impede data flow, cyber threats loom large, and the d...
From Edge to Insight: Real-Time Data at...
In the fast-paced world of modern data-driven operations, the ability to harness real-time insights at the tactical edge is critical. Whether in the fields of defense, emergency response or critical operations, minimizing latency to ensure immediate access to data is not just important; it is essential for effective and efficient decision-making The Tactical Edge Unleashed Edge to Insight Journey Real-Time Data Optimization In this webinar, yo...
The Missing V of Data: Veracity
The missing V of large data—volume, velocity and variety—has always been veracity. In this webinar, we'll hear from two long-time leaders who have worked on this problem. They will present how to find the 'truth' in the deluge of data, how to validate data, how to check pedigree and lineage, and how to weed out duplicates that can create false positives. Attendees will come away with the guidance and approaches that can help serve...
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
Battlefield Bandwidth and Its Implicati...
The U.S. military has moved to an interconnected battlefield in which data can move seamlessly between air, land, maritime, space and cyber in real time. Modern battlefield networks are increasingly tasked with not only the transport of voice but also large and varied data types, including still images, video, sensor data, maps, situational awareness data and inventory information. In addition to transporting the raw data itself, these network...
Improving End User Experience for Missi...
When the "Fix My Computer" social post went viral in early 2022, instead of dismissing or ignoring, the reaction from U.S. Air Force leadership was to embrace the idea that improving end user experiences and IT performance was critical for mission success. Join the Air Force's Chief Experience Officer (CXO) Col. Lloyd "Colt" Whittall for an engaging and informative discussion about how the Air Force has embraced the call to improve end user ex...
Defending Sensitive Government Data Aga...
Government contractors are increasingly a prime target for cyber-attacks, ranging from phishing and social engineering to malware and ransomware. Cloud computing, remote working and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges? Network detection and response solutions can help detect potential breaches and prevent attackers from disrup...
Securing Communications at the Tactical...
Today’s warfighters and the network architects that design the communications networks they rely on are faced with adversaries that are increasingly sophisticated. It’s critical that sensitive and classified information is secured while in transit and at rest. Public key cryptography plays an essential role in securing this data, whether it is CUI data used throughout the federal government, or Secret and Top Secret data secured th...
Mitigating the Risk of Wildfires with A...
Climate change has already had a major impact across the United States. The Biden administration recently unveiled a 10-year plan to spend billions of dollars to combat destructive wildfires on roughly 50 million acres of land. Both operationally and to inform public policy, we need physical spread models and the assessment models built on them. Why? Because size matters. Conventional models treat all people as identical and fail to map areas...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.