Cyber
Controlling the Waters Biometric Security at Port Everglades
December 09 by IDGA EditorGlenn Wilshire Deputy Port Director discusses with us the Federal Transportation Workers Identification Credential (TWIC) at Port Everglades, and what technologies would have an enormous impact on U.S...
Unmanned Solutions for Ground Combat Systems: with Johns Hopkins University
November 30 by IDGA EditorIn this interview, Dr. Reed Young, Program Manager – Robotics and Autonomy, Johns Hopkins University Applied Physics Laboratory discusses current requirements in unmanned solutions for ground combat s...
CERDEC On Energy Storage Solutions
November 30 by IDGA EditorMr. Jose Collazo is a Chemical Engineer at the Communications-Electronics Research, Development and Engineering Center (CERDEC). He discusses with us some of the solutions that CERDEC is pioneering un...
Breakthroughs in Energy-Storage Technology
November 10 by IDGA EditorAt ARPA-E there have been several breakthroughs in energy-storage technology that could transform the electrical grid. We spoke with the Senior Commercialization Advisor, Ryan Umstattd, PhD, about thi...
Cyber Security for Defense Military Snapshot
April 23 by IDGA StaffTake a look at the cyber experts who have already signed up to attend the upcoming Cyber Security for Defense event to discuss the ever-growing need to combat the intense rise of cyber attacks on th...
Cyber Security For Defense
April 23 by Brian WhartonNew York, NY, April 23, 2015 - IDGA has just announced the stellar speaker faculty of its new Cyber Security for Defense event. This new program will bring together some of the Military’s ke...
DHS, FBI stepping up digitization of records
April 20 by Chuck BrooksThe digitization of government records has wide support both from consumers seeking better customer service and from the Obama administration, including recent efforts to move toward digitized recor...
Are You Ready for Army Network Modernization?
April 07 by James LinneyThe implementation of CS13/14 is upon us. The technology will serve as the backbone of the BCT communication package as it’s rolled out during the next four to five years. These future variati...
Cyber Security for Defense Anticipated Attendee Snapshot
April 03 by IDGA StaffTake a look at the cyber experts who we expect will join us at the upcoming event to discuss the ever-growing need to combat the intense rise of cyber attacks on the government and military
Big Data: Better Intel. How IBM Analysis Solutions empower the Analysts to Deliver a Strategic Advantage
May 28 by IDGA EditorEvery day, around the world, a massive amount of data—2.5 quintillion bytes—is created. Buried inside this avalanche data is vital intelligence that can be used to protect countries, org...
IBM i2 National Security & Defense Intelligence
May 23 by IDGA EditorThe defense and national security environment has changed dramatically in recent years. While the government agencies involved in defense and in national security remain the key national lines of de...
Resolving for Cyber Security Threats to the Cloud
February 07 by Hannah HagerDaniel Chapple is the Supervisory Cyber Counterintelligence Specialist at the Department of Health and Human Services. In this interview he discusses the biggest cybersecurity threat to the governme...