+ SIGNAL Magazine


 Blog     e-Newsletter       Resource Library      Directories      Webinars     Apps
AFCEA logo
Resource Library

Resource Library:

AFCEA offers a wide range of whitepapers, case studies and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Marsha Carpenter by phone (703) 631-6181 or Email or your SIGNAL account executive.

A Guide to Hybrid Cloud for Government Agencies: An inside-out approach for extending your data center to the cloud
Author: VMware   Send Email to POC   View Content
The majority of government IT organizations operate some combination of onsite and offsite IT environments and are struggling to manage both new and legacy applications and infrastructure. Enterprise-class hybrid cloud empowers government organizations to leverage existing investments in applications and infrastructure, and avoid the complexity of having to rewrite applications to work on a public cloud infrastructure. Download this new guide to learn the questions you need to ask when evaluating enterprise-class hybrid cloud models, as well as the top 5 considerations ...

Recommended Best Practices for the Design of Secure Multi-Domain KVM and Video Routing Systems
Author: Thinklogical   Send Email to POC   View Content
Is the next Edward Snowden working for you? Surveys of IT professionals have consistently pointed to internal users as major security threats. Recent events highlight the need for government and business to take additional steps to control access to data sources by cleared end users and increase overall system security. This white paper reviews the industry's current understanding of the internal security threat, and explores best practices for designing visual computing and data analysis systems for C4ISR that ensure the security of the content and meet demanding In ...

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
Author: Palo Alto Networks, Inc.   Send Email to POC   View Content
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries. With all of the renewed attention, potentially shifting priorities, media and political activity surrounding cybersecurity, it is important for enterprises not to lose sight of the role network securit ...

Securing DoD Facilities for the 21st Century
Author: Quantum Secure Inc.   Send Email to POC   View Content
The security process needs to be transformed to incorporate and rely on lifecycle privilege management for physical access, which is an imperative for DoD facilities. This transformation must be accomplished without reinventing the wheel and wasting critical mission dollars. Controlling access to Department of Defense (DoD) facilities and ensuring the safety of those who work there has never been a higher priority. Ensuring that only the right persons gain access, at the right times, for the right reasons is vital to the security of these facilities in the 21st century.

Big Data, Sensors and Analytics: Discovering New Information through Technology
Author: Mercury Systems   Send Email to POC   View Content
Many of todays advanced sensors and technologies are generating extremely large volumes of digital data. With enough data and the right analytic tools, new information can be discovered that would have otherwise gone unnoticed. This paper investigates some technologies and processes that translate information about the physical world into digital data that can be further handled and analyzed. It also delves into the space of analytics, and investigates some common methods for processing and analyzing large volumes of data.

Deciphering SSD Endurance
Author: HGST   Send Email to POC   View Content
Which SSD will hold up under your workload? Solid-state drive (SSD) endurance is an important factor in system design. Due to characteristics of flash media, repeated write cycles eventually wear out an SSD. Before purchasing an SSD, it is important to understand your application workload and how long an SSD will last in that environment.

Using Advanced Analytics to Facilitate Intelligence Analysis
Author: SAS   Send Email to POC   View Content
Using traditional tools and manual approaches, intelligence analysts are asked to do the impossible  find hidden threats based on only a few data fragments. Now, advanced analytics with built-in alert systems can be set up to proactively identify, prioritize and present information to analysts based on pattern identification and quantification of risk. This paper explores how government agencies can use advanced analytics to link disconnected data and provide answers to complex questions.

A Business Model for an Interoperable World
Author: RTI   Send Email to POC   View Content
You CAN develop interoperable systems affordably. Use the new RTI open source model. RTI helps you sustain your software development culture affordably so you can concentrate on high-quality, reliable, and effective interoperable systems. The RTI Infrastructure Community program includes an option for a completely free version of RTI Connext DDS. Commercial RTI products use a simple, predictable, and easily-scaled pricing model.