Back to Search Begin New Search Save Search Auto-Notify
Unmanned Aerial Vehicles (UAVs) Mission...
Course Description: This course provides a practical introduction to Unmanned Aerial Vehicles (UAVs) and Unmanned Aerial Systems (UASs), their missions, payloads, and data links. The main thrust of the course is to understand the traceability of mission-related performance requirements from the target, through the payloads and data links, to the operational user. The course begins a brief overview of the history of UAV development and current...
July 24-27, 2012
Organizer: Association of Old Crows
Location: San Diego, CA
Add Favorite
US Export Controls / Defense Trade Cont...
US Export Controls / Defense Trade Controls SAN FRANCISCO, CA June 25-28, 2012 (SCROLL DOWN FOR REGISTRATION OPTIONS) Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) Explained: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on regulations administered by the US Departments of State, Commerce & Treasury. Our instructors are wide...
June 25-28, 2012
Organizer: Export Compliance Training Institute
Location: San Francisco, CA
Add Favorite
Beyond Engagement: Key Strategies for G...
Beyond Engagement: Key Strategies for Government LeadersWednesday June 6, 2012 9:00–10:00 a.m. Pacific Time, 12:00–1:00 p.m. Eastern Time 4:00–5:00 p.m. GMT, 5:00–6:00 p.m. UK In agencies where employee work passion is high, people willingly exert discretionary effort. They talk positively about the organization to friends and family. They support their colleagues without it being a required part of their job. They are...
June 6, 2012
Organizer: The Ken Blanchard Companies
Location: Webcast
Add Favorite
Survey of EW and Cyber Applications Course
The increasing prevalence of wireless internet and telecommunication networks in the operational environment has created a wide range of opportunities and vulnerabilities when EW and Cyber tactics, techniques, and procedures are used synergistically. While EW and Cyber remain distinct mission areas, the convergence of wired and wireless apertures in global information systems necessitates a better understanding of both domains for effects deli...
June 4, 2012
Organizer: Association of Old Crows
Location: Charleston, SC
Add Favorite
Interpreting Iranian Sanctions Provisio...
“Interpreting Iranian Sanctions Provisions: Connecting the new with the old” Webinar Webinar Instructor: Amanda DeBusk Wednesday, May 30 1:00 PM EDT U.S. concerns about Iran’s nuclear program have driven recent efforts to increase the sanctions placed on Iran. The comprehensive Iranian sanctions of 2010 were followed by new sanctions at the end of 2011. The February 5, 2012 Executive Order and February 27th implementing regul...
May 30, 2012
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Montréal: US Export Controls on Non-US...
MontréalMAY 14-17, 2012 SEMINAR VENUE:Le Centre Sheraton Montréal1201 Boulevard Rene-Levesque West Montreal,Quebec H3B 2L7 Canada (Scroll down for online registration options) US Export Controls Explained. EAR & ITAR Training for Non-US Companies: United States trade control laws and regulations impact companies who use or resell US-origin products, components or technology. The US Government can impose serious penalties for...
May 14-17, 2012
Organizer: Export Compliance Training Institute
Location: Montréal, CA
Add Favorite
Defense Daily's Cyber Security Summit
The growing number of attacks on our cyber networks has become one of the most serious economic and national security threats the United States faces today. Cyberspace touches nearly every part of our daily lives through broadband networks, wireless signals, local networks, and the massive grids that power our nation. Defending against and defeating cyber attacks will require the combined efforts of both the public and private sectors, working...
May 3, 2012
Organizer: Access Intelligence
Location: Washington, DC
Add Favorite
Law Enforcement IT Day
Law enforcement and national security depends on adaptation—adaptation to the economy, adaptation to technology and adaptation to criminal methodologies. As budgetary cutbacks become commonplace in the Federal government, creativity in new technology initiatives must take precedence as agencies are increasingly expected to do more with less. Law enforcement agencies and officers will need to use new tools, including, data analytics, secu...
April 18, 2012
Organizer: AFCEA Bethesda
Location: North Bethesda, MD
Add Favorite
2012 DoDIIS Worldwide Conference
The Defense Intelligence Agency (DIA) announces the 2012 Department of Defense Intelligence Information Systems (DoDIIS) Worldwide Conference! Hosted annually by the DIA Directorate for Information Management (DS) and Chief Information Officer (CIO), the conference’s 2012 theme, “Advancing Mission Integration,” will highlight the DIA CIO’s commitment and intent to unify defense intelligence infrastructure and informatio...
April 1-4, 2012
Organizer: National Conference Services, Inc. (NCSI)
Location: Denver, CO
Add Favorite
Veterans in Business Conference
The Veterans In Business Conference provides education, networking and business opportunities for Veteran and Service Disabled Veteran Small Business Owners. The conference was created by civic and business leaders in Northern Virginia to provide training and exposure to veterans who wish to grow their businesses through contracting and subcontracting opportunities with the Federal Government. Due to our close proximity to Washington D.C. and...
March 30, 2012
Organizer: Community Business Partnership
Location: Fairfax, VA
Add Favorite
Back to Search Begin New Search