Current & Future Military Data Links
ABOUT THE PROGRAM The requirements of modern Command and Control, Situational Awareness, Real-Time Into and Out of Cockpit, and Network-Centric Warfare all demand the secure transmission of tactical data in as near real-time as possible. Especially in Joint or Combined Operations, the continuous and automatic update of secure voice and data between networks of users is fundamental to effective deployment and to the success of the mission. Mili...
Unmanned Aircraft Systems West Conference
The Premier UAS Conference on the West Coast While funding for many defense programs are getting cut amid the Depart of Defense?s (DoD) latest costsaving measures, Unmanned Aircraft System (UAS) spending continues to remain in the billionsof dollars for 2011 with several UAS programs slated to grow. This remains in line with the recentQuadrennial Defense Review (QDR) and DoD?s call for increased UAS platform, payload and supportingtechnology d...
Information Assurance - Latest Requirem...
Covertly and overtly, government and private networks are under attack every hour of every day. This continuous assault on the nation's information networks illustrates the need for effective Information Assurance (IA). An attacker needs only one vulnerability to successfully penetrate a system; a defender requires a 100% comprehensive solution. The DoD has made Information Assurance a major element of the JCIDS process and replaced the vener...
Department Of Defense Architecture Framework
What’s New in DODAF 2.0? Step-by-Step Examples for Constructing DODAF Architecture Products Meeting the Latest JCIDS CJCSI 3170.01G and CJCSI 6212.01E Integrated Architecture Requirements How to get the most ROI from your Architecture Products Tips on Using DoDAF to Guide You Through the DIACAP Process Expert Tips on Getting Your DoDAF-Compliant Architecture Approved ABOUT THE PROGRAM This year, the DOD released version 2.0 of the DOD A...
Cyber Security Conference: Emerging Str...
Last year, DoD networks suffered an onslaught of an estimated 360 million cyber attacks. As cyber attacks on US federal and commercial computer systems increase at alarming rates, the risk for national security to be compromised is also growing. Through cyber espionage and data theft, China acquired Joint Strike Fighter (JSF-35) aircraft plans. On eBay, a hard drive containing US missile defense data was for sale. Both the State of Virginia an...
Current and Future Military Data Links
Evaluation of OSD / Service Data Link Plans, Needs and Initiatives A Look at Future Data Links: MR-TCDL, N-CDL, TTNT, JTRS WNW, SRW A Detailed Technical Description of Links 4, 11, 16, MIDS/JTIDS, EPLRS and more… How they work Today and in the Future Understanding how the Latest JTRS Requirements Impact Data Link Development Guidelines for Integrating Data Links on Inhabited vs. Uninhabited Platforms Meeting Data Link Requirements for...
Unmanned Aircraft Systems East Conference
The recently released Quadrennial Defense Review (QDR) document has expectedly reemphasized the Department of Defense's (DoD) call for increased Unmanned Aircraft System (UAS) platform, payload and supporting technology development and procurement, paving the way for a multitude of opportunities and growth potential. The QDR also reinforced Congress? December 2009 approval for full funding on the DoD’s 2010 UAS budget request, totalling...
Full-Motion Video Conference: The Promi...
Experts from OUSD, Army, USMC, DISA, NGA, General Dynamics, Textron, BAE Systems, SAIC, L-3 Communications, Northrop Grumman, Lockheed Martin, SAIC, Marshall Communications, HaiVision Network Video, Z Microsystems and many more examine: OSD/Services/IC Plans, Needs and Initiatives Status of Key Programs – Gorgon Stare, Valiant Angel, NOVA, etc. FMV and Wide-Area Persistent Surveillance Manned/Unmanned Aircraft Platforms; Space-based Capa...
Intelligence, Surveillance & Reconnaiss...
Dealing with the New Realities, Opportunities and Challenges in Global ISR Continuing gaps in intelligence information sharing capabilities post 9/11, emerging requirements for new “ISR surges” in Afghan and Iraqi operations, ISR challenges associated with new counter-insurgency and counter-terrorism operations, increased roles for ISR assets across a broad range of new and evolving missions (space defense, maritime domain awarenes...
Military Airlift & Mobility 2010
DoD and the Services have sustained a tremendous operational tempo through a period of unprecedented requirements, while being burdened with severe asset constraints. Performance has been improved by up to 50% in velocity and precision throughout the supply chain system, and almost $700 million in savings have been implemented. However, this ongoing stress, in terms of constant change and overwhelming requirements, has led to daunting sustaina...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.