©2021 Sightline Media Group. All rights reserved.
Learn more about the Pentagon’s demand for faster software development, containerization and container management, kubernetes getting containers under control and enabling DevSecOps, how DoD is implementing DevSecOps and using kubernetes, putting kubernetes on F-16s, and more.
Market Intelligence
Learn more about establishing the information advantage, the infrastructure necessary to support ISR, and the future of ISR Networks.
Navigating the New Normal for Public Sector Organizations
SPONSOR PROVIDED
Learn more about how the Army has decided that to keep up with threats from near-peer competitors, a more effective investment would be to begin fielding a new vehicle and limit any future Bradley upgrades.
SPONSOR PROVIDED
Learn more about how ISR is on the rise, how to work the data , computational challenges, emerging solutions, and what's ahead.
A Cybersecurity Professional’s Guide to Today’s Hyper-connected World
SPONSOR PROVIDED
Learn more about systemic adaptations, network connectivity and crowdsourcing, ground based signal sources, inertial navigation, low-earth orbit satellites and more
Learn more about how the U.S. military forces are facing a proliferation of GPS signal jamming and spoofing. GPS powers everything from precision guided weapons to navigation to timing. As such, the Pentagon wants to maintain this information advantage. Defense Department leaders need to take new steps to ensure position, navigation and timing capabilities are always available.
Learn more about how Special Operations Command wants to put all mission data in a single pane of glass, how Special Operations Command is reorganizing to focus on software and AI, making the Hyper Enabled Operator a reality, and more.
|
Includes a letter from the director of DISA, 5 questions with the deputy director of DISA's contracting arm, as well as insights on how DISA is helping the DoD in various ways.
Learn more about the challenges, advantage and future of the Hyper Enabled Operator.
Learn more about how to recognize the artifacts of a new technological environment, read our 5 questions on the future of the Pentagon's top AI office, learn how the Army plans to revolutionize tanks, and more.
Lack of interoperability of distributed components, makes data sharing and communication difficult, if not impossible. Learn more about how to deliver end-to-end C4ISR solutions.
SPONSOR PROVIDED
Download the Outlook 2021 eBook to get perspective and analysis from defense leaders across the globe on the future state of global security.
A look at how low-bandwidth mesh networks can transform operator safety and performance.
SPONSOR PROVIDED
Lack of interoperability of distributed components, can make data sharing and communication difficult, if not impossible. Learn more about system requirements, software reuse, the need to integrate legacy systems without redeveloping capabilities, and more.
SPONSOR PROVIDED
Learn more about the national security implications of the coronavirus, the gaps in the DoD's current COVID-19 strategy and how it should change, and what the DoD would need in order to put troops at less risk for contracting COVID-19.
Learn more about the Navy’s need for passive sensor capabilities, how the Navy has addressed the need for passive sensors, and more.
Learn more about emerging technologies driving military innovation, embracing new concepts, overcoming technological hurdles, and more.
A deep dive into using drones to find drones, counter-drone innovations, short-range air defense systems, and much more.
Learn more about risk management framework, how emerging trends spotlight the demand for better monitoring, plus a look at a reinvigorated risk management framework, and more.
Learn more about recent policy on PNT protection, countermeasures against navigation warfare, the future of PNT protection, and more.
Learn more about what the Army Futures Command chief says his team got right – and wrong – since its founding, how Army scientists are developing the next tank that’s not a tank, the coming budget crunch and its implications on modernization, and more.
Learn more about EITaaS in the Army and Air Force, security and ease of use are allies, embracing the main advantages of EITaaS, key considerations and factors for EITaaS success, and more.
This whitepaper discusses how to adapt and adopt to compete with world adversaries, adoption obstacles, simulated training advantages, improved personnel safety, virtual reality advances, and more.
This whitepaper discusses the rethinking recruiting, training and retaining personnel through skill development, the focus on education and workforce development in the military, benefits for both the military and its personnel through training, education and career development, and more.
This whitepaper contains an overview of the virtual landscape, how the U.S. military wants extended reality, technology + pedagogy, how AI meets VR, and what the future holds.
This whitepaper explores the resurgence of armored vehicles, how the Army uses lessons learned to develop the next-gen vehicle, prioritizing mobility for heavy vehicles, the three stages of mobility upgrades, and more.
Learn more about the Army tool that empowers soldiers to virtually collaborate across regions, how they train forces across military on tools to fight drones, how they are making headway on Synthetic Training Environment, and more.
Learn more about the next-generation engine that will take performance to new heights, how Honeywell's T55-714C engine compares to the current T55-714A engine, and power and fuel-consumption improvements.
SPONSOR PROVIDED
Learn more about how you can protect your applications and data at rest, securing boot technologies that check for malicious code, hardware resource partitioning to help protect your software, tips to make sure your software is well contained, and more.
SPONSOR PROVIDED
Exploring this report will help you assess your mobile security environment and calibrate your defenses. Now in its fourth year, the Mobile Security Index (MSI) offers a view into the threats facing mobile and IoT devices, as well as organizations’ defenses and how often those fail.
SPONSOR PROVIDED
Public safety agencies have choices when it comes to selecting communications and networking vendors. This whitepaper includes five key criteria that can guide agency communications' decision making when choosing a network.
SPONSOR PROVIDED
Learn more about Advanced Persistent Threats (APTs), how they work, how to protect against them, and the future of APT defense.
This whitepaper provides an overview of the military supply chain issues, and explores how to find the necessary parts, avoid counterfeit parts, and dig deep to meet a request.
This eBook features many world leaders who describe the state of global security now. Get different perspectives from across the globe in our annual outlook.
This whitepaper explores the DoD's five strategic goals for its digital engineering efforts, a better process for weapons development, model-based systems engineering (MBSE), and more.
This whitepaper explores the challenges around the Pentagon's logistical footprint, military supply chain and domestic manufacturing issues, the role technology plays in the supply chain, and more.
This whitepaper explores how new military technologies and capabilities are accelerating operational challenges and stressing conventional defensive systems, the breakthroughs in semiconductor-based High Power Microwaves (HPMs), and more.
This whitepaper explores the communications breakdown and the need for speed and connective networking, creating useful AI-integrated systems that can operate in places without a robust network infrastructure, and more.
SPONSOR PROVIDED
This whitepaper explores lessons learned from the Army's Project Convergence, networking and scaling up communications for larger formations, drone relay stations, sharing common standards, and more.
This whitepaper explores how different guards have different needs, the importance of assessing gaps and having assessments to help determine the best mix of communication devices, infrastructure, and more.
As the demand for modern weapon systems like missiles increase, finding a partner who can supply certified sub-assemblies across your supply chain is critical. Download this helpful guide.
SPONSOR PROVIDED
This whitepaper explores how digital technology is shaping training, information gathering, collaboration between forces across the U.S. military, and more.
This whitepaper explores the supply chain challenges facing the U.S. military, how military leaders can mitigate supply chain challenges, the steps government leaders are taking to protect the supply chain, and more.
This whitepaper explores key objectives of Future Vertical Lift, developing rotorcraft for harsh operating environments, adopting a modular open systems approach, and more.
This whitepaper explores the role of Ground-based Missile Defense in protecting the United States from missile attacks, technological advancements in missile defense, preparing for future missile threats, and more.
A look into how electric vehicles offer tactical advantages, including silent operation and powering auxiliary devices, how battery technology continues to improve, and how hybrid technology is bridging the gap between internal combustion engines and electric vehicles.
World leaders describe the state of global security now. This eBook includes essays from defense leaders, Q&As, infographics, thought leadership, and more.
This whitepaper explores moving to autonomous processes in the air to reduce risk, shrinking the logistics footprint and flexible deployment, how wide ranging deployment requires wide-ranging software, and more.
SPONSOR PROVIDED
This whitepaper explores the climate-change related events impacting military installations, the cross-border tensions exacerbated by climate change, The need to share climate change assessment data with National Guard units, and more.
SPONSOR PROVIDED
This whitepaper covers operating in contested environments is creating new challenges for the U.S. Navy, the autonomous, unmanned equipment can be used for scouting, sensing, offensive and defensive purposes, Littoral combat is a priority for the U.S. Navy, and it creates new capability requirements for the fleet, and more.
This whitepaper covers the state of U.S. military cyber and key elements of today’s U.S. cyber capabilities, strategies, like Zero Trust, to develop the cyber infrastructure to meet the needs of modern cyber warfare and improve resilience of tactical elements, and more.
This whitepaper covers modernizing ground vehicles is a top priority for the united states military, commercial technology can be adapted for military use to speed innovation, ground vehicles need to be ready for the next war, not the last one, and more.
This whitepaper covers the characteristics and challenges of multiple satellite orbits, interoperability is critical to effective use of satellites for data collection, analysis and interpretation, how the U.S. Military can successfully conduct multi-orbital operations, and more
This whitepaper covers the Common Access Card is no longer the best solution, Zero Trust solutions provide more comprehensive security, organizations must strike a balance between security and access, and more.
This whitepaper covers hypersonic weapons create new challenges for missile defense, modeling and simulation can help with the design and implementation of missile defense strategies, a layered defense is necessary to meet both current and future challenges, sensing and tracking are critical components of missile defense, and more.
This whitepaper covers connecting assets on the battlefield allows for better information gathering and analysis, commanders can make better decisions with better data, data must be kept secure to be trustworthy, and more.
This Point of View explores where mission priorities meet the cloud - across domains and to the edge, engaging an effective digital backbone, choosing the right classified cloud environment, and more.
SPONSOR PROVIDED
This whitepaper covers, managing massive amounts of data with accuracy is critical for outpacing enemy forces, and achievable through AI, the U.S. government is prioritizing the development of AI technology, and military AI uses are rapidly increasing, and more.
This whitepaper topics covers, the U.S. military needs tools to manage and explore complex data sets to support mission readiness and success, the DoD has significantly ramped up its acquisition and use of AI tools, which hold a critical role in responsible analytics, and more.
World leaders describe the state of global security now
This whitepaper covers advantages of deployment of more electric and full electric aircraft, progress in electric aircraft has been made towards achieving net zero carbon emissions by 2050, and more.
This whitepaper covers the Army 2030 initiative, Zero Trust security procedures, ensuring networks and data can be secure and trustworthy, network security, dependability, portability and more.
This whitepaper covers how the DoD can keep personnel on the cutting edge of technology, the Cyber Workforce Strategy Implementation Plan, and more.
This whitepaper covers how cross-cloud management empowers security and interoperability, modernization equals workflow alignment, empowering interoperability, security beyond compliance, managing across platforms, and more.
SPONSOR PROVIDED
SPONSOR PROVIDED
This whitepaper covers the case for multicloud to support workloads, multicloud management takes more than technology, securing multicloud environments, a trusted technology partner: the essential element, and more.
This whitepaper explores owning mission control in a public cloud environment, GenAI (generative artificial intelligence) as a key test case, impact levels ‘impact’ data availability and functionality, operationalizing a zero trust cybersecurity vision, and more.
This whitepaper explores DOD's sustainability plan which focused on a zero-emissions nontactical vehicle fleet, the army's climate strategy, the advantages and challenges of a zero-emission military vehicle changeover, and more.
This whitepaper discusses satellite and terrestrial communications are both critical pieces of making CJADC2 a reality, communications infrastructure must be able to support delivering real-time data to those who need it, and more.
SPONSOR PROVIDED
This whitepaper discusses how the DoD can quickly infuse Generative AI (GenAI) into mission workflows, how to write a prompt that provides actionable, trustworthy output from GenAI, and more.
This whitepaper discovers real-time threats require adaptive and realistic strategies, continuous authentication and validation ensure protection for Zero Trust framework, rapid data analysis supports timely decisions for critical Mission Intelligence, and more.
This whitepaper discusses how data collection and management is critical to U.S. Navy operations, how the Information Security Vision is a roadmap to effective data management and security, and more.
This whitepaper discusses how data collection and sharing help the U.S. military establish information dominance, how communications infrastructure must support sharing information between multiple forces, and more.