Resource Library

Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Marsha Carpenter by phone (703) 631-6181 or Email or your SIGNAL account executive.

NetApp Private Storage for Cloud
Author: NetApp   Send Email to POC   View Content
Your cloud, your terms: use multiple industry leading clouds and maintain complete control over your data. With NetApp Private Storage (NPS) for Cloud solutions, you keep your data on NetApp storage next to rather than into multiple clouds. You get the freedom to connect to the clouds you want while maintaining complete control of your data on your own dedicated, private NetApp storage systems.

Nondisruptive Operations and Clustered Data ONTAP
Author: NetApp   Send Email to POC   View Content
As IT operations become more and more critical to business, no downtime can be tolerated. Downtime causes lost business, poor customer satisfaction, and competitive weakness. Todays always-on data centers are all about how the underlying infrastructure provides continuous data availability to the applications despite changing business needs. From a storage perspective, this means a flexible storage infrastructure, which allows businesses to start small and grow nondisruptively as the business grows. This flexibility reduces up-front costs and enables businesses to bu ...

How Public Sector Organizations Benefit from Flash Storage - Strategies That Boost Performance and Lower Costs
Author: NetApp   Send Email to POC   View Content
Why is flash storage compelling? Simpler than conventional storage using a spinning disk, flash uses electricity to store data in locations on a fixed, thin layer of oxide. Data is retained even when the power is off. Public sector organizations are combining flash and conventional storage to produce notable gains in performance and cost reductions. This paper examines leading strategies as demonstrated by several organizations and reviews the range of flash solutions for public sector organizations, including all-flash storage systems.

Networks That Know Automation
Author: Juniper   Send Email to POC   View Content
Todays federal networks may be more flexible, available and dynamic than ever before, but network administrators find themselves limited by inefficient architecture and error-prone manual configuration. Network automation and orchestration tools can simplify network management, reduce the risk of human error, and improve overall operational efficiency. To learn more about how to realize the full potential of your network, download this new white paper from Juniper Networks: Networks that Know Automation.

Defensive Cyber Operation Symposium
Author: AFCEA Event Video Pesentations   Send Email to POC   View Content
Conference Dates: June 16-18, 2015 *Leaders in the cyber domain outline goals and offer predictions. *DISA Director Lt. Gen. Ronnie Hawkins Jr., USAF, releases and discusses the agencys updated strategic plan for 2015-2020. * Terry Halvorsen, CIO, U.S. Defense Department, suggests the department needs to get a little smarter regarding the policy for storing passwords. *DISA panelists woo industry, stressing the need for cooperation. Click here to see and listen to more information shared at the conference.

Network Interoperability
Author: AFCEA   Send Email to POC   View Content
Network interoperability has been a long-sought goal ever since the appearance of the second military network. The issue has grown, of course, concurrent with the development of varied networks serving multiple and single customers. Now, militaries are embracing network of networks architectures as they seek an enterprise network solution.

Web Security and the OWASP Top 10: The Big Picture
Author: Plural Sight   Send Email to POC   View Content
Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritization of risks and most importantly, how organizations building software for the web can protect against them.

Easing the Burden of Records Management: Automating Records Capture
Author: Kofax, Inc.   Send Email to POC   View Content
Deadlines are looming for all U.S. Federal Agencies to implement and demonstrate their compliance with the 2012 Directive (M-12-18) from OMB/NARA, mandating electronic record keeping by 2019. Capture and categorization in relation to electronic records management is the greatest burden for the user community. Download this AIIM white paper to learn strategies to comply with these mandates while maximizing operational efficiency.

The Security Implications of the Internet of Things
Author: AFCEA   Send Email to POC   View Content
The Internet of Things (IoT) comprises creative products that connect healthcare, home energy consumption, mass transit, insurance, and almost every economic sector. With these new devices, we have infinitely more opportunities, yet little consideration is being paid to the cyber security of this phenomenon. Once consumers introduce the IoT into their lives, machine-to-machine interactions begin on their behalf. Assumptions about privacy and protections need to be considered now, before the massive rollout. The implications of the IoT are significant, and nothing short ...

Using Wider, Deeper Views of Elusive Signals to Characterize Complex Systems and Environments
Author: Keysight   Send Email to POC   View Content
For decades, spectrum analyzers were used in the development and characterization of radar and electronic warfare (EW) systems. However, traditional swept measurements have become insufficient, as most modern radar systems are adaptive, requiring significantly more speed, flexibility, and performance. Today's best alternative is a signal analyzer equipped with real-time spectrum analysis (RTSA) coupled with vector signal analysis (VSA) software. Learn techniques for monitoring EW scenarios, identifying unwanted spectral events, or issues in transmitted signals.

Author: AFCEA, Sponsored by FireEye and Owl Computing Technologies, Inc.   Send Email to POC   View Content
Cybersecurity is becoming the defining element of information system success. Where capabilities and services once ruled, safety now is looming as the most important aspect of a network or information storage system. Since its origins as an afterthought, cybersecurity has moved up the ladder to hold veto power over the use of a new capability.

Big Data
Author: AFCEA   Send Email to POC   View Content
Big data is on every network managers lips as systems and operations are re-shaped to take advantage of this information wellspring. This EBook contains valuable insight on some of the big data initiatives underway and the technology involved as covered by SIGNAL Media.