Rome Labs/Griffiss Park Technology Expo
A very important air force location, the Air Force Research Lab in Rome NY is a central location for IT research that can influence purchases at several air force bases across the US. Specific areas of interest to AFRL personnel are: software applications, Information Technology research ie, --Cyber apps; Comm tech apps; high performance computer apps; UAV & RPA comm and data links; Command & Control apps, etc. If you are selling to th...
2nd Annual Threats in the Global Marketplace
The U.S. Commercial Service and Global Chamber® Dallas hosts the 2nd Annual Threats in the Global Marketplace event to educate and inform you on a multitude of international challenges and global threats to your businesses as well as how to obtain and implement the appropriate tools to protect your company. What You Will Gain Basic indicators that an employee may become a security risk Common business technologies that can be used in econo...
Critical Infrastructure Protection and...
Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Europe. The conference will look at developing existing national or international legal and technical frameworks, integrating good risk management, strategic planning and implementation. Critical Infrastructure ProtectionWith much focus on convergence, the CIP track of the p...
Fuze Conference
The 60th Annual NDIA Fuze Conference welcomes the participation of both domestic and allied fuze designers, manufacturers and component suppliers, and research organizations along with government representatives. This year’s theme is "Celebrating 60 Years of Fuzing Excellence". This conference provides the opportunity to discuss and share ideas to help advance the state-of-the-art for the next generation of fuzing that meets the users...
NASTD Eastern Region Seminar
NASTD represents information technology professionals from the 50 states, divided into four regions, and the private sector. State members provide and manage state government IT services and facilities for state agencies and other public entities. These members also play a strategic role in planning and shaping state government technology infrastructures and policies. Corporate members provide IT services and equipment to state government. Est...
Dell EMC World
Experience the digital transformation Dell EMC World is the premier enterprise technology forum for IT practitioners and business decision makers. We invite you to come see how the Dell Technologies family of businesses will help you reinvent your business, maintain your competitive advantage, and enrich the lives of those you serve. You’ll experience a compelling lineup of jointly designed products and services focused on three essentia...
May 8-11, 2017
Organizer:
Dell EMC Location:
Las Vegas, NV
O'Reilly Open Source Convention
The open source community's annual gathering Since 1999, the O’Reilly Open Source Convention has brought together talented people from diverse backgrounds who are doing amazing things with open source technologies. We share new techniques and approaches, proven best practices, and practical skills. No matter what your technical experience level, you’ll learn from the useful stories and hard-won experience delivered by our talented...
May 8-11, 2017
Organizer:
O'Reilly Location:
Austin, TX
Ft. Drum Technology Expo
Held each year since 2000, this event makes the most of your time at an important, remotely located site. The Expo has become a major IT activity for Fort Drum and is their one opportunity each year to interact with vendors who can help them with their IT needs and applications. This expo continues to reflect the growth of the installation and features 35 leading vendors who participate annually. Make your plans to be part of the 2017 Event fo...
Time Sensitive Targeting
Time Sensitive Targets (TST), as defined in Allied Joint Publication 3.9, are those targets requiring immediate response because they pose (or will soon pose) a danger to friendly operations or are highly lucrative, fleeting targets of opportunity. TST have always been prevalent in operations, evolving from: artillery spotting during the First World War; hunting for V1 and V2 sites in the Second World War; Scud-hunting in the Gulf War; and int...
JBER - AFCEA Alaska Tech & Cyber Security Day
The Armed Forces Communications & Electronics Association (AFCEA)- Alaska Chapter will, once again host the 10th Annual Information Technology & Cyber Security Day for Joint Base Elmendorf-Richardson (JBER). To learn more about the AFCEA – Alaska Chapter please visit http://alaska.afceachapter.org/ The Information Technology & Cyber Day will also have strong support from AFCEA leadership on base and four of the major communic...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.