Back to Search Begin New Search Save Search Auto-Notify
The Missing V of Data: Veracity
The missing V of large data—volume, velocity and variety—has always been veracity. In this webinar, we'll hear from two long-time leaders who have worked on this problem. They will present how to find the 'truth' in the deluge of data, how to validate data, how to check pedigree and lineage, and how to weed out duplicates that can create false positives. Attendees will come away with the guidance and approaches that can help serve...
October 10, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Large Language Models: An AI Paradigm Shift
Large Language Models (LLMs) are still in their infancy, but they are an absolute paradigm shift from traditional AI in the Enterprise. This session will explore why and how LLMs are unlocking new opportunities for government agencies and discuss the unique challenges that must be planned for and avoided.
September 20, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
The Tactical Edge: Mission-Ready Kubern...
Across DoD, intelligence and most civilian federal agencies, the ‘tactical edge’ is top of mind. The ability to put application workloads out in the field, literally on the front lines, has the potential to transform the outcomes of all kinds of missions, whether it’s AI-based computer vision on reconnaissance drones, communications infrastructure or supply chain and logistics. Kubernetes has emerged as the software platform...
August 29, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
August 23, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Digital Chatter - The Growing Challenge...
Cyber threats related to mis/disinformation are rapidly evolving. Artificial intelligence (AI), deep fake technology and machine learning have the potential to greatly expand the capabilities—and the reach—of mis/disinformation. New language model technologies have the potential to generate extensive amounts of mis/disinformation—much of which may be distributed without fact-checking resolution. Enemy states and terrorist gro...
August 1, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
July 27, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
July 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Accelerating the Kill Chain: Optimizing...
In the 21st century battlespace, it's critical that the U.S. Department of Defense ensure fast, secure and reliable networks, IT systems and communications for global warfighters across terrestrial, SATCOM, host-nation and other transport systems. For 20 years, Riverbed Technology has been at the forefront of optimizing and accelerating defense networks. As the need for greater bandwidth, reduced latency and operational fidelity has grown, so...
July 19, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
June 22, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
June 21, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Back to Search Begin New Search