Coordination among allied militaries is one of the world’s oldest problems. In the future, U.S. forces will likely operate in increasingly complex environments alongside diverse multinational forces to address emerging threats. Coalition command structures will require warfighting capabilities built on interoperability and a secure environment for communication and collaboration among trusted coalition forces at operational and tactical levels.
Residential real estate isn’t the only hot market these days. While the pandemic has negatively affected hundreds of industry sectors, it has had little to no effect on mergers and acquisitions in the government contractor arena.
Experts in the fields of business strategy, transaction due diligence, finances and investments discussed the mergers and acquisitions (M&A) topic during a member-only AFCEA webinar presented in an “ask the expert” format. Lisa Shea Mundt, co-founder of The Pulse of GovCon, moderated the discussion about topics based on questions collected from registrants prior to the event.
The U.S. Army is focusing on how to change its processes to be faster and more agile. One fundamental shift is in its approach to leveraging commercial solutions as well as those the other services and other organizations such as government laboratories have developed. These nearer-to-prime-time technologies would be available faster than PowerPoint capabilities.
The Defense Information Systems Agency is searching for talented personnel in a broad array of career fields, including information technology, science and engineering, program and project management, contracting and acquisition and human resources—and the effort to recruit those personnel virtually is gaining steam.
Although the world is still in the midst of the coronavirus disease 2019 pandemic, technology experts agree lessons the infection teaches about cybersecurity and resilience are emerging. As people don masks to decrease the likelihood of germs entering their bodies, they also must put barriers in place to protect their networks. And, just as they prepare for how they will rebound from the illness or economic downturns, they must examine their options for life after the pandemic.
Although computers are full of data, unless it’s structured, it can’t really be considered information—or knowledge. Unfortunately, a great deal of the documents most organizations rely on were created without structure in mind, making it difficult to find, hard to collate or compare and therefore less valuable.
Chad Dybdahl, solutions consultant, Adobe Technical Communications, shared his expertise about the value of establishing a structured data system during a recent SIGNAL Media webinar. Dybdahl didn’t sugarcoat the challenges: Going from business as usual to a structured content environment poses some trials and tribulations. But Dybdahl believes making the transition is worth overcoming those ordeals.
The Young AFCEANs from AFCEA's NOVA Chapter recently sponsored a webinar, "Capture strategies in constrained timeframes." Jeffrey Shen, vice president and general manager at Red Team Consulting, provided a one-hour briefing on the basic sales principles in determining whether to pursue a business opportunity. Here are some lead-off questions businesses need to ask themselves:
Today, military communications deploy diverse technologies that comprise the tactical and strategic converged networks needed to support warfighters' missions. Challenges exist in deploying and operating these networks that include a broad range of technologies including: VoIP, TDM, SatCom, cellular, tactical radios, SCIP, WiFi and GSM. Additionally, military communications must support the wide range of diverse and not necessarily interconnected networks which are comprised of legacy and emerging technologies.
On August 11, 2011 at 12 noon ET, join us for a webinar discussion on how the U.S. Defense Department and coalition partners can safely move mission-critical data without compromising security or compliance through assured air gap transfer. Today's missions-whether they include sharing vital information in forward locations, moving data between coalition partners, or delivering command instructions and situation briefs-depend on the secure movement of data. However, in recent years, USB devices have been identified as potential attack vectors for viruses and malware that could impact critical systems and so have been banned or restricted in many environments.
Join us on June 23 at 1 p.m. for a webinar sponsored by SafeNet on how Ethernet encryption over other technologies can help you improve your bottom line while simplifying your network.
Widespread access to sensitive or confidential documents poses serious risks of information disclosure, as was witnessed this year with confidential information ending up in the hands of WikiLeaks. Join us on May 26, 2011, at 1 pm ET for a discussion on how an effective data classification strategy can help government organizations comply with marking standards, reduce data loss and optimize information sharing whether internally or externally.
Everyone who registers before May 26 is eligible to win a free iPad. You do not need to attend the webinar to win.
Join us on April 21, 2011 at noon ET as SIGNAL Editor-in-Chief Robert K. Ackerman talks with Mercury Computer Systems' Marc Couture and Tom Roberts in "Detect, Deceive and Defeat: Increasing the HPOI of your EW System":
Join us March 10, 2011 at 12 noon as SIGNAL Editor-in-Chief Robert K. Ackerman talks with Alan Henderson, Vice President of Engineering, Globecomm Network Services Corp.:
Data center networking presents many challenges in terms of supporting cost-effective, reliable and high-performance services for business-critical applications. A coherent overall networking strategy leading to the deployment of a powerful and flexible network creates more long-term value than a series of tactical, project-oriented steps.
In this virtual seminar, Ciena's Jim Morin and Jeff Verrant discuss bandwidth options and other ideas for taking a more strategic approach to data center networking that addresses the heart of the problem: The need for a high-performance, deterministic, manageable and cost-efficient network.
The next SIGNAL webinar will be held on Thursday, February 25, at 12:00 PM Eastern Time. The topic will focus on service portfolio management, which is new to the world of service management in ITIL V3. It provides the critical guidance to ensure that "the complete set of services that are being managed by a service provider" in terms of the value to the mission and the organizational value that they provide.
For more information and to register, visit the Web site.
As defense entities continue to virtualize their IT environments, they must revisit not only their security architectures but their policy and governance models, the subject of the next SIGNAL webinar on November 12 at 11 a.m. Eastern Time.
Join Dr. James Ransome of Cisco Systems as he explores how the three commonly accepted models for cloud-service delivery can be implemented to drive efficiencies while maintaining desired security levels.
For more information and to register, click here.
In today's telephony environment, the U.S. Department of Defense needs to not only meet the legacy demands of its current TDM technology but also lead its organization to the future of end-to-end IP-centric communications on the GIG, the subject of the next SIGNAL webinar on October 29 at 1 p.m. Eastern Time.
Join Steve Anderson of Cisco Federal and Jeff Sinclair of PacStar as they discuss key innovations of the newest Small End Office (SMEO) solution, certified August 2009.
Carrier Ethernet takes the dominant LAN technology-namely, Ethernet-and extends it onto Metro and Wide Area networks (MANs/WANs). This potent force greatly simplifies access to, and use of, IP traffic for mission-critical applications and services.
Please join co-presenter Chris Janson, coauthor of the book Carrier Ethernet for Dummies, and Lt. Col Jeff Verrant, USMCR, Ciena's director of DOD business development, for "Carrier Ethernet 101 - A Primer on Carrier Ethernet for the DOD" on Thurs., Oct. 15, 2009, at 1:00 PM ET.
The next SIGNAL Webinar will be held on September 24, 2009, at 12:00 PM Eastern.
Government agencies and departments around the globe are rapidly moving forward with their efforts of converging voice, data and video services onto a common IP infrastructure. The main force behind this accelerated transition to IP networks is a realization of the efficiency and cost savings from running multiple applications and services across a single infrastructure.
Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought. A well thought-out defense-in-depth strategy includes multiple layers of security and different overlapping technologies.
Attendees will learn how a secure data center architecture can:
Managing virtual environments is becoming more complex, Federal initiatives are piling on, and your organization's infrastructure is what it is. Is the promise of virtualization a pipe dream? How do you manage it all and keep your sanity?
This webinar, to be held March 19, 2009, at 12 noon ET, will explore:
SIGNAL's next webinar will be on February 26 at 11 a.m. and features Kurt Dickey, Unified Communications Specialist at Cisco Federal. From the description:
Organizations that maintain separate voice and data networks are confronted with the challenge of increasing productivity while reducing costs.
The next SIGNAL Webinar, "Data at Rest Protection: An Integral Part of an Enterprise Data Protection Strategy," will be on Tuesday, December 9 at 12 Eastern. Here's the description:
Government agencies and enterprises require an Enterprise Data Protection (EDP) solution to effectively secure their data from the "core" where key data repositories exist, across networks, and all the way to the "edge" where the data is used - a perimeter defense will no longer suffice in today's world. A truly comprehensive EDP solution includes database / server encryption, network encryption, key management systems, disk & file encryption, and authentication tokens.
Details have been announced for the next AFCEA Solutions Series webinar, which will be on May 21, 2008, 1-2 p.m. SIGNAL Editor-in-Chief Robert K. Ackerman will moderate the panel, which includes:
Robert Lentz, Director for Information Assurance, OASD NII