NFMV Enterprise Architecture. Navy Full Motion Video
|
|
- Alisha Oliver
- 8 years ago
- Views:
Transcription
1 NFMV Enterprise Architecture Navy Full Motion Video
2 Setting the stage for an enterprise solution DOMAIN PROBLEM
3 July 16, 2012
4 What Happened? Small vessel turns towards USNS USNS USNS security forces fire on small vessel Outcome: 1 fatality 3 wounded International Incident Small vessel 5000 yards
5 Official Report Released From U.S. Central Command
6 What if the ship was equipped with a dash cam capability? the ships cameras were networked into the dash cam array? the security teams cameras were networked too? IF we did have a ship dash cam
7 New Headlines
8 I remember that day Full Motion Video (FMV) Integrated Product Team (IPT) Working Group FMV IPT Conducted gap analysis of afloat systems related to FMV dissemination Urgent Operational Need (UON) from US Central Command for Visual Information to support first look reporting
9 NFMV Stakeholders and Team Stakeholders Mo Kane ICOP APM Mike O Sullivan FMV IPT Chair NFMV Team Mike Stewart IT Standards Juan Bautista Sydney Metzmaker Tara Rhodes
10 Current Architecture Issues Manual process to collect and disseminate video Bandwidth constraints impact ability to transmit quality video Video transmission limited single point of delivery
11 NFMV Architecture Goals
12 Solution to the domain problem NFMV ARCHITECTURE
13 Proposed Automated Video Distribution High level Operational View (OV 1) Multiple Organic SIP/FMV Sources SHF/UHF SIPRNET compressed SIP/FMV Dual UDP Stream (via SHF/EHF SATCOM) CGR Infrastructure Services QoS Higher HQ Even t Security Fleet MOC UVDS LEGEND Strike Group CDR 13 SIPR L/C/Ku SHF
14 NFMV Architecture NFMV Enterprise Architecture is designed using a Rich-Services SOA pattern and has been documented using DoDAF v2.02.
15 Governance Planning, Programming, Budgeting, and Execution (PPBE) Defense Acquisition System (DAS) Operations (OPs) DoDAF 2.02 Supports 6 DoD processes Portfolio Managment (PM) Systems Engineering (SE) Joint Capabilities Integration and Development System (JCIDS) Joint Warfighting Capability DoD Procedure Capability based requirement generation Combatant Commanders (COCOMs) Acquisition requirements and evaluation criteria Joint Capability Areas (JCAs) Future defense programs 2.0 Battlespace Awareness
16 Joint Capability Area (JCA): Battlespace Awareness JCA 2.0 Battlespace Awareness JCA 2.1 Planning and Direction JCA 2.2 Collection JCA 2.3 Processing/ Exploitation JCA 2.4 Analysis, Prediction and Production JCA 2.5 BA Data Dissemination and Relay JCA Define & Prioritize Requirements JCA Signals Collection JCA Data Transformation JCA Integration JCA BA Data Transmission JCA Develop Strategies JCA Imagery Collection JCA Information Categorization JCA Evaluation JCA BA Data Access JCA Task and Monitor Resources JCA Measurements and Signatures Collection JCA Predict JCA Interpretation JCA Evaluation JCA Human Based Collection JCA Exploit JCA Prediction JCA Product Generation
17 NFMV Capability Taxonomy (CV 2) Video Distribution Collection Processing/ Exploitation Data Dissemination and Relay Imagery Collection Information Categorization Data Transformation Data Access Data Transmission Multi Source Video Collection Metadata Indexing Data Compression Data Management Data Conversion Storage Management Distribution Management Quality of Service
18 NFMV Services Policy Security Event Audit Logging CONVERSION TRANSFORMATION QOS SECURITY ENCRYPTION AUTHENTICATION CRITICAL VIDEO REQUEST LV VIDEO REQUEST DISSEMINATION CRITICAL VIDEO REQUEST LOCAL VIEWER REQUEST EVENT TRACE LOGGING LOG LEVELS Common Ground Receiver (CGR) Data Collection Data Conversion Video Relay Process Data Transformation Metadata Index Data Manager Movement Broadcast Disseminate Data Monitor
19 Proposed Architecture
20 Services Implementation Plan 10/1/2013-9/30/2014 Phase One 10/1/2014-9/30/2015 Phase Two 1/1/2014 4/1/2014 7/1/ /1/2014 1/1/2015 4/1/2015 7/1/ /1/2013 9/30/ /1/2013 9/30/2014 Infrastructure Services Implementation (Policy, Security, Audit, Logging, PK/CA) 11/1/2014 5/2/2015 Infrastructure Services Enhancement (Advanced Encryption, Compression, and Advanced; Automated Workflow) 10/1/2013-3/31/2014 Common Ground Receiver Service 10/1/2014-3/31/2015 Enhanced Video Collection Service 1/1/2014-6/30/2014 1/1/2015-6/30/2015 Process Service Enhanced Data Transformation 4/1/2014-9/30/2014 Data Manager Service 4/1/2015-9/30/2015 Data Monitor & Management Service
21 Lets get down to it BUSINESS
22 Focus
23 How we will REDUCE COST Automated Workflow Minimal Footprint Scalable Solution
24 5 year Project Outlook Year 1 R&D Phase 1 Year 2 R&D Phase 2 Ship deployment Phase 1 Year 3 Ship deployment Phase 2 Operations of phase 1 deployment Year 4 Ship deployment Phase 3 Operations of phase 1 & 2 deployment Year 5 Cumulative Operations of deployment phases 1,2, & 3
25 Financial Analysis Operations Savings Cash Flows Operations Operating Costs Deployment Capacity Costs Deployment Labor Costs R&D Capital Costs R&D Labor Costs ($50,000,000) $0 $50,000,000 $100,000,000 $150,000,000 $200,000,000 $250,000,000 $300,000,000 $350,000,000 Year 1 (R&D Phase 1) Year 2 (R&D Phase 2 & 25 ship deployment) Year 3 (100 ship deployment) Year 4 (75 ship deployment) Year 5 ( Operations)
26 Value Proposition 2018 $ $ $ $ $ $ $ $ $ $18.0 $95.00 $ $ $23.0 $47.20 $ $4.90 $13.1 $6.8 $1.4 $ $1.4 NPV $2.6 $42.9 $ $355.3 ($50.0) $0.0 $50.0 $100.0 $150.0 $200.0 $250.0 $300.0 $350.0 $400.0 Net Option Value Asset Value Option Exercise Option Purchase
27
28 We appreciate your time CLOSING
29 Closing Faculty Hal Sorenson Ingolf Kruger Alexander Zack Thomas Roemer Stakeholders Mike O Sullivan Mo Kane Mike Stewart
CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics
CORPORATE CAPABILITIES DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics Droidan is a Certified 8(a), Minority, Veteran-Owned Small Business providing professional
More informationSPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7045.20 September 25, 2008 USD(P) SUBJECT: Capability Portfolio Management References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes policy and assigns
More informationBattlespace Awareness and Information Operations Program Office (PMW 120)
Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Battlespace Awareness and Information Operations Program Office (PMW 120) Statement A: Approved for public
More informationArchitecture. Governance
Capabilities Integration Enterprise Forum Architecture Standards d and Governance UTILIZING DATA STEWARDSHIP TO MANAGE ARCHITECTURE DATA FOUO TRADOC: Victory Starts Here! Army s Net centric Goals Army
More informationDepartment of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
More informationUsing the SELEX Elsag Intelligent Information Dissemination (I2D) System over Fleet Broadband and BGAN
Using the SELEX Elsag Intelligent Information Dissemination (I2D) System over Fleet Broadband and BGAN Bearer-agnostic data bandwidth reduction and management solution Version 1.0 31.08.11 Contents 1 Overview...
More informationDoD Application Store: Enabling C2 Agility?
DoD Application Store: Enabling C2 Agility? 19 th International Command and Control Research Symposium C2 Agility: Lessons Learned from Research and Operations Track: 3 resenters: Mr. Michael Morris and
More informationCoordinated Operation Capability Using Scalable C2
Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY hkutluca@milsoft.com.tr iaksu@milsoft.com.tr
More informationHow To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationArchitecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
More informationK2 System Ready for Nonlinear Media Production: QOS, Bandwidth and File Compatibility in File-based Workflows
K2 System Ready for Nonlinear Media Production: QOS, Bandwidth and File Compatibility in File-based Workflows Karel Rasovsky, Marketing Operations Grass Valley, a Belden Brand August 2013 What makes an
More informationBig Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
More informationSecurity in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
More informationConsolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5000.69 July 30, 2014 USD(AT&L) SUBJECT: Joint Services Weapon Safety Review (JSWSR) Process References: See Enclosure 1 1. PURPOSE. In accordance with the authority
More informationProviding On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018
More informationArmy Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
More informationUNIVERSITY OF CALIFORNIA, SAN DIEGO. Multi-Intelligence Distribution Architecture
UNIVERSITY OF CALIFORNIA, SAN DIEGO Multi-Intelligence Distribution Architecture A Capstone Team Project submitted in partial satisfaction of the requirements of the Architecture-based Enterprise Systems
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key
More informationAcquisition Domain Data Governance
United States Air Force Acquisition Domain Data Governance AV SOA Conference 22 Oct 09 Why Do We Care? We get dazzled by tools and there s always a new one We create and fund programs to spiral out systems
More informationApplying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
More informationAF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
More information1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode.
ECM Questions USPACOM 1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode. a. If Yes, please answer the questions below: 1)
More informationMOC 20462 Administering Microsoft SQL Server 2014 Databases
To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com MOC 20462 Administering Microsoft SQL Server 2014 Databases Class Duration 5 Days Class Overview
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationDeploying VSaaS and Hosted Solutions Using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
More informationStriking the Right Balance for
Striking the Right Balance for Laptop Data Protection ti Matthew Seeley EVault Systems Engineer 2012 ISACA Webinar Program. 2012 ISACA. All rights reserved. Welcome Type in questions using the Ask A Question
More informationImages move the world We move images
Images move the world We move images Images move the world. We move heaven and earth to make sure your content is delivered to your viewers and customers. In Europe and throughout the world. Efficiently
More informationFM 6-02 SIGNAL SUPPORT TO OPERATIONS
FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at
More informationDevelopment of a Ground System Architecture Test Bed Array
Development of a Ground System Architecture Test Bed Array Howard D. Gans, Ph D, PE Lennis Bearden Eric Hertzog Royce Hall Allan Dianic Erik Cotton Brad Kizzort assuredcommunications #1 Background and
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489
Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key aspects of the apps
More informationImpact of Connected Automated Vehicles on Traffic Management Centers (TMCs)
Impact of Connected Automated Vehicles on Traffic Management Centers (TMCs) Automated Vehicles Symposium 2015 Breakout Session Impact of Connected and Automated Vehicles on Traffic Management Systems and
More informationAFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationApplying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events
Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented
More informationITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition
Take your ITIL skills to the next level ITIL Lifecycle ITIL Intermediate: Part of the complete ITIL Education Program Advance your career Add value to your organisation Gain credits towards ITIL Expert
More informationNEXIUM SAT. Satcom systems solutions
w w w. t h a l e s g r o u p. c o m NEXIUM SAT Satcom systems solutions DEFENCE SECURITY SATELLITES B ased on its long experience and worldwide leadership in military communications and battlespace digitization,
More informationWhat s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal
What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data
More informationD83167 Oracle Data Integrator 12c: Integration and Administration
D83167 Oracle Data Integrator 12c: Integration and Administration Learn To: Use Oracle Data Integrator to perform transformation of data among various platforms. Design ODI Mappings, Procedures, and Packages
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
More informationINFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
More informationcontinue to have difficulty with communications in the Arctic region.
How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role
More informationDepartment of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
More informationInformation Professional. The evidence tells the truth.
Information Professional Rebecca Jones MLS 1981 Director, Professional Learning, Faculty of Information Studies, University of Toronto Partner, Dysart & Jones Associates Farm Girl, Wife, Mom, Librarian,
More informationSystems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
More informationWhat is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
More informationWEAPON SYSTEM ACQUISITIONS. Opportunities Exist to Improve the Department of Defense s Portfolio Management
United States Government Accountability Office Report to Congressional Committees August 2015 WEAPON SYSTEM ACQUISITIONS Opportunities Exist to Improve the Department of Defense s Portfolio Management
More informationHitachi Visualization. Twin Cities Public Safety Presentation
Hitachi Visualization Twin Cities Public Safety Presentation Safer, Smarter, More Efficient Communities INTEGRATED REPORTING AND ANALYTICS: ACTIONABLE INSIGHT ENERGY UTILITY VEHICLE TRANSIT PUBLIC SAFETY
More informationBridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: crane_scott@bah.com 1. Abstract The DoD
More informationPEO C4I & PEO Space Systems Overview
PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) PEO C4I & PEO Space Systems Overview 29 Jan 2013 RDML Jerry Burroughs PEO C4I PEO Space Systems
More informationAF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert aflcmc.en-ez.weapon.systems.ia.team@us.af.mil
More informationInformation Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov
More informationGAO BEST PRACTICES. An Integrated Portfolio Management Approach to Weapon System Investments Could Improve DOD s Acquisition Outcomes
GAO United States Government Accountability Office Report to the Committee on Armed Services, U.S. Senate March 2007 BEST PRACTICES An Integrated Portfolio Management Approach to Weapon System Investments
More informationA Concentris Systems Paper
A Systems Paper Wireless Mesh Networked Sensors in Security Applications Advances in sensor technologies and wireless mesh networking offer great promise for military and homeland security applications,
More informationJoint Operational Medicine Information Systems Program
COL John R. Bailey, Deputy Program Manager 2015 Defense Health Information Technology Symposium Joint Operational Medicine Information Systems Program 1 DHA Vision A joint, integrated, premier system of
More informationSecurity Center Unified Security Platform
Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly
More informationCommon Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationOperationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
More informationVideo Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance
S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless
More informationNW Systems, Inc. Corporate Overview. 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com
NW Systems, Inc. Corporate Overview 8300 Greensboro Drive, Suite 800 McLean, VA 22102 www.nw-systems.com SUMMARY Founded in 1996 ; Professional Services Firm Supporting US Government and Commercial Clients
More informationCourse 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions
More informationEDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA
EDUCAUSE Security Presentation Chad Rabideau Senior Consultant Identity Management AegisUSA Agenda Overview of Security & Identity and Access Management (IAM) Essential Functions of IAM Identity in Higher
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationDISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
More informationOpportunities to Overcome Key Challenges
The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia
More informationMEDIA & CABLE. April 2012. Taras Bugir. Broadcast Reference Architecture. WW Managing Director, Media and Cable
MEDIA & CABLE Taras Bugir WW Managing Director, Media and Cable Broadcast Reference Architecture April 2012 Changing Business Models (1) Media Business Systems Broadcasting was a simpler business The broadcaster
More informationDoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
More informationConceptual Model for Enterprise Governance. Walter L Wilson
Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2
More informationCapitalizing on Emerging Technology: Enhancing the Health Artifact and Image Management Solution
Mr. Alvaro E. Rodriguez, PM Care & Benefits Integrated Systems Solution Delivery Division 2015 Defense Health Information Technology Symposium Capitalizing on Emerging Technology: Enhancing the Health
More informationBlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now
BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now EXTENDING EXCHANGE WITH SECURE WIRELESS SOLUTIONS BlackBerry Enterprise Server software integrates with Microsoft Exchange and your
More informationSolving Agencies Big Data Challenges: PED for On-the-Fly Decisions
White Paper Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions Carina Veksler, NetApp March 2012 WP-7158 ABSTRACT With the growing volumes of rich sensor data and imagery used today to
More informationEliminating the Communication Black Spots in Future Disaster Recovery Networks
Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen
More informationDeduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON
Thomas Rivera, SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationThe Webcast will begin at 1:00pm EST. www.gig-werks.com
SharePoint 2013 & SharePoint Online Security, Compliance & ediscovery The Webcast will begin at 1:00pm EST Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with SharePoint Office
More informationMHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
More informationContent Management Playout Encryption Broadcast Internet. Content Management Services
Content Management Playout Encryption Broadcast Internet Content Management Services We offer a range of services covering the digitisation and archiving of your content as well as processing and conversion
More informationCreating unique customer experiences
Creating unique customer experiences Company Introduction N NETinfo is a company specializing in the development and supply of e Banking and Mobile Financial Services (MFS) Solutions to the Banking and
More informationOracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
More informationAutonomy Consolidated Archive
Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain
More informationGeneric RFID Software Platform for Any Application
FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition
More informationOracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
More informationDODIG-2013-105 July 18, 2013. Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets
DODIG-2013-105 July 18, 2013 Navy Did Not Develop Processes in the Navy Enterprise Resource Planning System to Account for Military Equipment Assets Additional Copies To obtain additional copies of this
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
More informationBusiness Analysis Standardization & Maturity
Business Analysis Standardization & Maturity Contact Us: 210.399.4240 info@enfocussolutions.com Copyright 2014 Enfocus Solutions Inc. Enfocus Requirements Suite is a trademark of Enfocus Solutions Inc.
More informationMs. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
More informationENERGISTICS E&P BUSINESS PROCESS REFERENCE MODEL
ENERGISTICS E&P BUSINESS PROCESS REFERENCE MODEL Access, receipt, or use of the E&P Business Process Reference Model is subject to the Energistics Product License Agreement found on the Energistics website.
More informationThe only navigation information management system you need now and for the future
The only navigation information management system you need now and for the future Intuitive and easy to use Unique 100% BA Chart update service Enables you to view the important Admiralty Information Overlay
More informationready. aiim. learn. 4 day ECM Master Training Class Outline - Learn the Why, What, and How to implement Enterprise Content Management
4 day ECM Master Training Class Outline - Learn the Why, What, and How to implement Enterprise Content Management Introduction The AIIM Enterprise Content Management (ECM) Certificate Program is designed
More informationPROCUREMENT, DEFENSE-WIDE. ($ in Millions) FY 2005 Estimate $6.994 FY 2004 Estimate $6.824 FY 2003 Estimate $7.612 FY 2002 Actual $5.
American Forces Information Service PROCUREMENT, DEFENSE-WIDE Purpose and Scope ($ in Millions) FY 2005 Estimate $6.994 FY 2004 Estimate $6.824 FY 2003 Estimate $7.612 FY 2002 Actual $5.332 These funds
More informationThe Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation
The Role of Business Capabilities in Strategic Planning Sneaking up on Quality Using Business Architecture in a learning corporation 2 Credits The Open Management Group, Business Architecture Special Interest
More informationWireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
More information