Welcome!

Machine Learning Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Zakia Bouachraoui

Blog Feed Post

Defense Intelligence Worldwide Conference: Bring your disruptive technology to DIA leaders

By

diabadgeThe new Defense Intelligence Worldwide Conference evolved from an old event with roots in intelligence systems.  With a new, more mission-focused event, I expect the technology on the expo floor will have a wider scope, and will very likely include technologies that more strongly support the new mission-focused themes.

The conference, which will be held 8-10 April 2013 in Baltimore MD, has already attracted many tech firms to the expo floor, and I imagine booth space will soon sell out. If you are a firm with mission-focused technologies relevant to DoD intelligence missions you will want to check out your opportunities to participate right away (do that here).  If you are a government technology user or manager you will want to dedicate some time on your conference to walk the expo floor. This is a great way to meet with many firms all at once.

Which firms will be there? I imagine we will not see a final list for quite a while, but the following have already been listed on the conference website:

  • Academy of Computer Education
  • Accenture
  • AccessData
  • ACME Portable Machines, Inc.
  • Actiance
  • Actifio
  • Adobe Citizen Engagement
  • Adobe Government Solutions
  • Adobe Systems, Inc.
  • Advanced Programs, Inc.
  • AFRL
  • AirWatch
  • Allied Telesis
  • Alfresco Software
  • Akamai Technologies
  • AMX
  • Anritsu
  • Application Security, Inc.
  • Arista Networks
  • Aruba Networks logo
  • Aspera, Inc.
  • AtHoc
  • ATEN Technology, Inc.
  • AvePoint Public Sector Inc.
  • AVI-SPL
  • Axway
  • Aydin CyberSecurity
  • BAE Systems logo
  • Basis Technology
  • Battelle logo
  • Belkin International, Inc.
  • Berico Technologies, LLC
  • Bit9 logo
  • Bivio Networks
  • Bloomberg LP
  • Blue Canopy Group, LLC
  • BlueCat Networks
  • Blue Coat Federal logo
  • BlueSpace Software
  • BMC Software
  • Boeing
  • Bottom Line Technologies, Inc.
  • Braxton-Grant Technologies, Inc. (BGTech)
  • Brocade
  • CA Technologies
  • Carahsoft Intelligence Solutions logo
  • Carahsoft Open Source Solutions
  • Carahsoft Storage and Security
  • Catapult Consultants, LLC
  • C4ISR Journal
  • CACI International, Inc.
  • CDW-G logo
  • CGI Federal
  • Chiliad, Inc.
  • Ciena
  • CIS Secure Computing, Inc.
  • Cisco logo
  • ClearCube
  • ClearTerra
  • Cloudera
  • CommVault
  • Copper River IT
  • Coraid
  • Corning Cable Systems
  • Corporate Office Properties Trust
  • Crestron Electronics, Inc.
  • Crossroads StrongBox logo
  • CRU Dataport logo
  • CSC
  • CTG, Inc. logo
  • Cubic Cyber Solutions
  • Cybertap, LLC
  • Cyviz
  • Data Direct Networks logo
  • Datalogics, Inc.
  • Datameer
  • Data Security, Inc.
  • Decisive Analytics Corporation
  • Defense Systems logo
  • Dell logo
  • Delphix logo
  • DigitalGlobe, Inc.
  • Digital Reasoning logo
  • DLT Solutions logo
  • Eagle Ray logo
  • DMI
  • DRC logo
  • eIQnetworks, Inc.
  • EMC at Carahsoft
  • EMC logo
  • EMCON
  • Emerson Network Power logo
  • Emtec Federal
  • EnterpriseDB
  • Enterprise Information Services, Inc. (EIS)
  • Epoch Concepts, LLC
  • Esri logo
  • Exelis logo
  • Extron Electronics
  • F5 Networks
  • Fast Lane
  • FEDITC, LLC
  • Feith Systems logo
  • Fiberplex Technologies, LLC
  • FireEye
  • Firemon
  • ForeScout Technologies
  • Freedom Consulting Group
  • Fusion-io, Inc.
  • Futron Incorporated
  • GammaTech Computer Corporation
  • General Dynamics logo
  • General Dynamics Fidelis Cybersecurity Solutions
  • GFI Software
  • Gigamon logo
  • Good Technology
  • GovDeliver
  • GTRI
  • Hortonworks logo
  • HP
  • HP Software
  • Hytrust logo
  • IBM logo
  • IEEE Xplore Digital Library
  • immixGroup
  • Infoblox
  • Informatica logo
  • IMC logo
  • Intelligent Software Solutions
  • Intelink
  • Intensity Analytics Corporation
  • Intergraph logo
  • inTTENSITY
  • Invertix logo
  • Invincea, Inc.
  • IO logo
  • Iron Bow Technologies, LLC
  • JANUS Research Group
  • Juniper Networks
  • Kapow Software logo
  • KGS
  • Kinney Group, Inc.
  • Klas Telecom
  • L-3
  • Layer7 Technologies
  • LexisNexis
  • Liebert Maryland
  • Lockheed Martin
  • Lockmasters, Inc.
  • LogRhythm logo
  • Lynux Works logo
  • ManTech International
  • MapR Technologies
  • MarkLogic logo
  • McAfee
  • Mega logo
  • Mellanox Federal Systems
  • MicroPact logo
  • Microsoft logo
  • MicroStrategy
  • Modus Operandi, Inc.
  • MotionDSP, Inc.
  • Napatech, Inc.
  • NASA SEWP logo
  • NCS Technologies, Inc.
  • Near Infinity logo
  • NetApp logo
  • NETIQ
  • Net Optics logo
  • NetScout Systems
  • Network Instruments
  • Nicira
  • NIH-NITAAC
  • NIKSUN
  • Nimble Storage
  • Nimbus Data Systems
  • NJVC
  • Northrop Grumman logo
  • nPulse Technologies, Inc.
  • NTC Mazzuca Contracting, Inc.
  • Nutanix
  • Objective Interface Systems, Inc.
  • Objectivity, Inc.
  • Obsidian Strategics, Ltd.
  • Occam Solutions
  • Octo Consulting Group
  • Oculus Federal Corp.
  • Operations Support Technologies, Inc.
  • Oracle logo
  • Orbis Technologies logo
  • Overwatch
  • Owl Computing Technologies, Inc.
  • Palantir Technologies
  • Palmer’s Contracting Group
  • Palo Alto Networks logo
  • PCMG
  • Pentaho
  • Perceptive Software
  • Phoenix TS
  • Plug-In Storage Systems
  • Praescient Analytics
  • PTFS logo
  • QBase
  • Quantum Corporation
  • Quark Software, Inc.
  • Radware
  • Rapid7
  • Raytheon
  • Raytheon Trusted Computer Solutions
  • Recommind logo
  • Recorded Future
  • Red Hat
  • Riverbed
  • Riverside Research
  • Rose Electronics
  • SafeNet
  • SAIC
  • SAP NS2 logo
  • SAS Institute, Inc.
  • SCIF Global Technologies
  • SecureNinja
  • Security Engineered Machinery
  • Semantic Research, Inc.
  • Serena Software
  • Serious Energy – Quiet Rock
  • ServiceNow
  • SES Government Solutions
  • Simulyze logo
  • Skybox Security
  • Social Intelligence Corp
  • Solera Networks logo
  • Sotera Defense Solutions
  • Sourcefire, Inc.
  • Splunk
  • SRA International
  • StorageHawk
  • Strategy Bridge
  • Symantec logo
  • SYSTRAN Software, Inc.
  • Tableau Software
  • Talend
  • Technical Innovation
  • Technology Management Associates (TMA)
  • TekPanel, Inc.
  • Telos
  • Teradata logo
  • Texas Memory Systems, an IBM Company
  • Thales e-Security
  • Thermopylae Sciences + Technology
  • The Software Revolution, Inc. (TSRI)
  • Thetus
  • ThunderCat Technology, LLC
  • Tintri
  • TITUS logo
  • T-Mobile USA
  • Topsy Labs
  • Transition Network
  • Tresys
  • Tripwire
  • Trusted Solutions
  • TVAR Solutions
  • Tyco Integrated Security
  • Unisys
  • Veracode
  • Verdasys
  • Verizon
  • Vidyo
  • Violin Memory
  • ViON
  • Vormetric
  • VMware Desktop
  • VMware
  • Wave Systems Corp. logo
  • Whitaker Brothers
  • XBIS Laboratory, The MITRE Corporation
  • YARC Data logo
  • Zolon Tech, Inc.

Stay tuned for more info!

And to register for the event see: http://www.ncsi.com/dia/2013/

 

 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

CloudEXPO Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by sharing information within the building and with outside city infrastructure via real time shared cloud capabilities.
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.