©2021 Sightline Media Group. All rights reserved.
Learn more about the Pentagon’s demand for faster software development, containerization and container management, kubernetes getting containers under control and enabling DevSecOps, how DoD is implementing DevSecOps and using kubernetes, putting kubernetes on F-16s, and more.
Market Intelligence
Learn more about establishing the information advantage, the infrastructure necessary to support ISR, and the future of ISR Networks.
Navigating the New Normal for Public Sector Organizations
SPONSOR PROVIDED
Learn more about how the Army has decided that to keep up with threats from near-peer competitors, a more effective investment would be to begin fielding a new vehicle and limit any future Bradley upgrades.
SPONSOR PROVIDED
Learn more about how ISR is on the rise, how to work the data , computational challenges, emerging solutions, and what's ahead.
A Cybersecurity Professional’s Guide to Today’s Hyper-connected World
SPONSOR PROVIDED
Learn more about systemic adaptations, network connectivity and crowdsourcing, ground based signal sources, inertial navigation, low-earth orbit satellites and more
Learn more about how the U.S. military forces are facing a proliferation of GPS signal jamming and spoofing. GPS powers everything from precision guided weapons to navigation to timing. As such, the Pentagon wants to maintain this information advantage. Defense Department leaders need to take new steps to ensure position, navigation and timing capabilities are always available.
Learn more about how Special Operations Command wants to put all mission data in a single pane of glass, how Special Operations Command is reorganizing to focus on software and AI, making the Hyper Enabled Operator a reality, and more.
|
Includes a letter from the director of DISA, 5 questions with the deputy director of DISA's contracting arm, as well as insights on how DISA is helping the DoD in various ways.
Learn more about the challenges, advantage and future of the Hyper Enabled Operator.
Learn more about how to recognize the artifacts of a new technological environment, read our 5 questions on the future of the Pentagon's top AI office, learn how the Army plans to revolutionize tanks, and more.
Lack of interoperability of distributed components, makes data sharing and communication difficult, if not impossible. Learn more about how to deliver end-to-end C4ISR solutions.
SPONSOR PROVIDED
Download the Outlook 2021 eBook to get perspective and analysis from defense leaders across the globe on the future state of global security.
A look at how low-bandwidth mesh networks can transform operator safety and performance.
SPONSOR PROVIDED
Lack of interoperability of distributed components, can make data sharing and communication difficult, if not impossible. Learn more about system requirements, software reuse, the need to integrate legacy systems without redeveloping capabilities, and more.
SPONSOR PROVIDED
Learn more about the national security implications of the coronavirus, the gaps in the DoD's current COVID-19 strategy and how it should change, and what the DoD would need in order to put troops at less risk for contracting COVID-19.
Learn more about the Navy’s need for passive sensor capabilities, how the Navy has addressed the need for passive sensors, and more.
Learn more about emerging technologies driving military innovation, embracing new concepts, overcoming technological hurdles, and more.
A deep dive into using drones to find drones, counter-drone innovations, short-range air defense systems, and much more.
Learn more about risk management framework, how emerging trends spotlight the demand for better monitoring, plus a look at a reinvigorated risk management framework, and more.
Learn more about recent policy on PNT protection, countermeasures against navigation warfare, the future of PNT protection, and more.
Learn more about what the Army Futures Command chief says his team got right – and wrong – since its founding, how Army scientists are developing the next tank that’s not a tank, the coming budget crunch and its implications on modernization, and more.
Learn more about EITaaS in the Army and Air Force, security and ease of use are allies, embracing the main advantages of EITaaS, key considerations and factors for EITaaS success, and more.
This whitepaper discusses how to adapt and adopt to compete with world adversaries, adoption obstacles, simulated training advantages, improved personnel safety, virtual reality advances, and more.
This whitepaper discusses the rethinking recruiting, training and retaining personnel through skill development, the focus on education and workforce development in the military, benefits for both the military and its personnel through training, education and career development, and more.
This whitepaper contains an overview of the virtual landscape, how the U.S. military wants extended reality, technology + pedagogy, how AI meets VR, and what the future holds.
This whitepaper explores the resurgence of armored vehicles, how the Army uses lessons learned to develop the next-gen vehicle, prioritizing mobility for heavy vehicles, the three stages of mobility upgrades, and more.
Learn more about the Army tool that empowers soldiers to virtually collaborate across regions, how they train forces across military on tools to fight drones, how they are making headway on Synthetic Training Environment, and more.
Learn more about the next-generation engine that will take performance to new heights, how Honeywell's T55-714C engine compares to the current T55-714A engine, and power and fuel-consumption improvements.
SPONSOR PROVIDED
Learn more about how you can protect your applications and data at rest, securing boot technologies that check for malicious code, hardware resource partitioning to help protect your software, tips to make sure your software is well contained, and more.
SPONSOR PROVIDED
Exploring this report will help you assess your mobile security environment and calibrate your defenses. Now in its fourth year, the Mobile Security Index (MSI) offers a view into the threats facing mobile and IoT devices, as well as organizations’ defenses and how often those fail.
SPONSOR PROVIDED
Public safety agencies have choices when it comes to selecting communications and networking vendors. This whitepaper includes five key criteria that can guide agency communications' decision making when choosing a network.
SPONSOR PROVIDED
Learn more about Advanced Persistent Threats (APTs), how they work, how to protect against them, and the future of APT defense.
This whitepaper provides an overview of the military supply chain issues, and explores how to find the necessary parts, avoid counterfeit parts, and dig deep to meet a request.
This eBook features many world leaders who describe the state of global security now. Get different perspectives from across the globe in our annual outlook.
This whitepaper explores the DoD's five strategic goals for its digital engineering efforts, a better process for weapons development, model-based systems engineering (MBSE), and more.
This whitepaper explores the challenges around the Pentagon's logistical footprint, military supply chain and domestic manufacturing issues, the role technology plays in the supply chain, and more.
This whitepaper explores how new military technologies and capabilities are accelerating operational challenges and stressing conventional defensive systems, the breakthroughs in semiconductor-based High Power Microwaves (HPMs), and more.
SPONSOR PROVIDED
This whitepaper explores the communications breakdown and the need for speed and connective networking, creating useful AI-integrated systems that can operate in places without a robust network infrastructure, and more.
This whitepaper explores lessons learned from the Army's Project Convergence, networking and scaling up communications for larger formations, drone relay stations, sharing common standards, and more.
This whitepaper explores how different guards have different needs, the importance of assessing gaps and having assessments to help determine the best mix of communication devices, infrastructure, and more.
As the demand for modern weapon systems like missiles increase, finding a partner who can supply certified sub-assemblies across your supply chain is critical. Download this helpful guide.
SPONSOR PROVIDED
This whitepaper explores how digital technology is shaping training, information gathering, collaboration between forces across the U.S. military, and more.
This whitepaper explores the supply chain challenges facing the U.S. military, how military leaders can mitigate supply chain challenges, the steps government leaders are taking to protect the supply chain, and more.
This whitepaper explores key objectives of Future Vertical Lift, developing rotorcraft for harsh operating environments, adopting a modular open systems approach, and more.
This whitepaper explores the role of Ground-based Missile Defense in protecting the United States from missile attacks, technological advancements in missile defense, preparing for future missile threats, and more.
A look into how electric vehicles offer tactical advantages, including silent operation and powering auxiliary devices, how battery technology continues to improve, and how hybrid technology is bridging the gap between internal combustion engines and electric vehicles.
World leaders describe the state of global security now. This eBook includes essays from defense leaders, Q&As, infographics, thought leadership, and more.
This whitepaper explores moving to autonomous processes in the air to reduce risk, shrinking the logistics footprint and flexible deployment, how wide ranging deployment requires wide-ranging software, and more.
SPONSOR PROVIDED
This whitepaper explores the climate-change related events impacting military installations, the cross-border tensions exacerbated by climate change, The need to share climate change assessment data with National Guard units, and more.
SPONSOR PROVIDED
This whitepaper covers operating in contested environments is creating new challenges for the U.S. Navy, the autonomous, unmanned equipment can be used for scouting, sensing, offensive and defensive purposes, Littoral combat is a priority for the U.S. Navy, and it creates new capability requirements for the fleet, and more.
SPONSOR PROVIDED
SPONSOR PROVIDED
This whitepaper covers the state of U.S. military cyber and key elements of today’s U.S. cyber capabilities, strategies, like Zero Trust, to develop the cyber infrastructure to meet the needs of modern cyber warfare and improve resilience of tactical elements, and more.