military

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness but most who run these programs dont know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, youre going to learn where your peers standand some practical tips on how to get startedeven if you think your data is dirty or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
US ground forces handle massive amounts of information and data while working under unpredictable conditions. These conditions dont always allow military intelligence analysts access to a technologically reliable way to share information. AI can help develop a comprehensive intelligence picture and a true sense of cognitive situational understanding (CSU). These technologies can help analyze the massive amounts of data the military receives. And because AI programs are constantly adding new capabilities and tools, they can help the military prepare for the battlefield of the future. Read how.
Tags : 
    
Group M_IBM Q2'19
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Published By: Cherwell Software     Published Date: Apr 07, 2016
B/E Aerospace is the worldwide leading manufacturer of aircraft passenger cabin interior products and the leading global distributor of aerospace fasteners for commercial, business jet, and military markets. The company has leading worldwide market shares in all major product lines and serves virtually all of the worlds airlines, aircraft manufacturers, and leasing companies through its direct global sales and customer support organizations. Headquartered in Wellington, Florida, B/E Aerospace has grown to nearly 12,000 employees and 220 sites around the world and a true follow-the-sun model for global customer support.
Tags : 
best practices, customer support, business intelligence, business optimization, business management
    
Cherwell Software
Published By: TE Connectivity     Published Date: Feb 07, 2018
TE Connectivity (TE) high-performance relays, contactors and switches are designed specifically to operate in extremely rigorous environments in military and aerospace applications. Our relay products include COTS (commercial off-the-shelf), Mil-Spec, plus highly specialized, and custom-designed products. These high-performance products are designed to withstand extreme shock, vibration, temperature and altitude.
Tags : 
    
TE Connectivity
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a Zero Trust network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower until now, that is. Download this use case from VMware and Carahsoft now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red HatEnterprise Linux frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 23, 2016
Cisco is a leading provider of networking solutions that transform how people connect, communicate, and collaborate. A US $47 billion global company, Cisco develops intelligent networks and technology architectures for customers in industries ranging from government and military to healthcare and transportation. To help keep pace with rapidly changing customer demand, Cisco built its internal Lightweight Application Environment on OpenShift Enterprise by Red Hat. With this solution, Cisco IT delivers application middleware quickly and easily to internal developers through a self-service portal. Cisco has decreased time to market for new applications, streamlined the infrastructure using containers, increased operational efficiencies, and improved the developer experience.
Tags : 
cisco, best practices, networking, software development, productivity, business analytics, database development, web development
    
Red Hat
Published By: Dell     Published Date: Sep 14, 2017
Total cost of ownership of rugged vs. non-rugged computing devices. Whether training, on patrol or in the field, our police officers, firefighters and other first responders and our military men and women operate in some of the harshest of environments where computing is critical for communication and situational analysis. This is why choosing the right device to support these situations is often paramount to their success.
Tags : 
    
Dell
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business removing any air-gaps that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, auditing, hacker detection, security management
    
HP - Enterprise
Published By: Dassault Systmes     Published Date: Aug 08, 2017
Intellectual Property (IP) is the life-blood of your Aerospace & Defense business. Its the product designs that required thousands of man-hours and millions of dollars to create, or the 10-year strategy overviews that can give a competitor a huge advantage. The stakes for safeguarding IP within the Aerospace & Defense industry are at an all-time high, given the costs, complexity and potential military applications of their products. Read this White Paper to learn how you can secure and manage your IP by implementing the right strategy.
Tags : 
intellectual property, aerospace, defense business, product design, security
    
Dassault Systmes
Published By: Sparton Corporation     Published Date: Jan 12, 2018
Todays biotechnology and military companies have high expectations for software performance of electromechanical devices. However, attempting to satisfy all customer demands and features at the outset can lead to costly challenges and inefficiencies down the road. This white paper explains five benefits of taking a phased approach to the development, as well as what to look for when vetting potential contract manufacturing partners.
Tags : 
software, software development, contract manufacturing, contract manufacturing partner, phased development, medical, military
    
Sparton Corporation
Published By: Sparton Corporation     Published Date: Jan 16, 2018
Todays biotechnology and military companies have high expectations for software performance of electromechanical devices. However, attempting to satisfy all customer demands and features at the outset can lead to costly challenges and inefficiencies down the road. This white paper explains five benefits of taking a phased approach to the development, as well as what to look for when vetting potential contract manufacturing partners.
Tags : 
software, software development, contract manufacturing, contract manufacturing partner, phased development, medical, military
    
Sparton Corporation
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Todays data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
    
Canon Solutions America
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms, business analytics, business intelligence
    
IBM
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
    
Quocirca
Published By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : 
pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com, infrastructure, internetworking hardware, server hardware, spend management, green computing
    
UsedCisco.com
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military, compliance, hacker detection
    
HP - Enterprise
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book youll find out all about AETs, and get useful pointers and advice to help you secure your organization. If youre working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what youre up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Todays data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: TE Connectivity     Published Date: Feb 09, 2018
TE Connectivity (TE) high-performance relays, contactors and switches are designed specifically to operate in extremely rigorous environments in military and aerospace applications. Our relay products include COTS (commercial off-the-shelf), Mil-Spec, plus highly specialized, and custom-designed products. These high-performance products are designed to withstand extreme shock, vibration, temperature and altitude.
Tags : 
    
TE Connectivity
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.