Click here to close now.

Welcome!

AJAX & REA Authors: Automic Blog, Elizabeth White, Hovhannes Avoyan, XebiaLabs Blog, Cloud Best Practices Network

Blog Feed Post

Defense Intelligence Worldwide Conference: Bring your disruptive technology to DIA leaders

By

diabadgeThe new Defense Intelligence Worldwide Conference evolved from an old event with roots in intelligence systems.  With a new, more mission-focused event, I expect the technology on the expo floor will have a wider scope, and will very likely include technologies that more strongly support the new mission-focused themes.

The conference, which will be held 8-10 April 2013 in Baltimore MD, has already attracted many tech firms to the expo floor, and I imagine booth space will soon sell out. If you are a firm with mission-focused technologies relevant to DoD intelligence missions you will want to check out your opportunities to participate right away (do that here).  If you are a government technology user or manager you will want to dedicate some time on your conference to walk the expo floor. This is a great way to meet with many firms all at once.

Which firms will be there? I imagine we will not see a final list for quite a while, but the following have already been listed on the conference website:

  • Academy of Computer Education
  • Accenture
  • AccessData
  • ACME Portable Machines, Inc.
  • Actiance
  • Actifio
  • Adobe Citizen Engagement
  • Adobe Government Solutions
  • Adobe Systems, Inc.
  • Advanced Programs, Inc.
  • AFRL
  • AirWatch
  • Allied Telesis
  • Alfresco Software
  • Akamai Technologies
  • AMX
  • Anritsu
  • Application Security, Inc.
  • Arista Networks
  • Aruba Networks logo
  • Aspera, Inc.
  • AtHoc
  • ATEN Technology, Inc.
  • AvePoint Public Sector Inc.
  • AVI-SPL
  • Axway
  • Aydin CyberSecurity
  • BAE Systems logo
  • Basis Technology
  • Battelle logo
  • Belkin International, Inc.
  • Berico Technologies, LLC
  • Bit9 logo
  • Bivio Networks
  • Bloomberg LP
  • Blue Canopy Group, LLC
  • BlueCat Networks
  • Blue Coat Federal logo
  • BlueSpace Software
  • BMC Software
  • Boeing
  • Bottom Line Technologies, Inc.
  • Braxton-Grant Technologies, Inc. (BGTech)
  • Brocade
  • CA Technologies
  • Carahsoft Intelligence Solutions logo
  • Carahsoft Open Source Solutions
  • Carahsoft Storage and Security
  • Catapult Consultants, LLC
  • C4ISR Journal
  • CACI International, Inc.
  • CDW-G logo
  • CGI Federal
  • Chiliad, Inc.
  • Ciena
  • CIS Secure Computing, Inc.
  • Cisco logo
  • ClearCube
  • ClearTerra
  • Cloudera
  • CommVault
  • Copper River IT
  • Coraid
  • Corning Cable Systems
  • Corporate Office Properties Trust
  • Crestron Electronics, Inc.
  • Crossroads StrongBox logo
  • CRU Dataport logo
  • CSC
  • CTG, Inc. logo
  • Cubic Cyber Solutions
  • Cybertap, LLC
  • Cyviz
  • Data Direct Networks logo
  • Datalogics, Inc.
  • Datameer
  • Data Security, Inc.
  • Decisive Analytics Corporation
  • Defense Systems logo
  • Dell logo
  • Delphix logo
  • DigitalGlobe, Inc.
  • Digital Reasoning logo
  • DLT Solutions logo
  • Eagle Ray logo
  • DMI
  • DRC logo
  • eIQnetworks, Inc.
  • EMC at Carahsoft
  • EMC logo
  • EMCON
  • Emerson Network Power logo
  • Emtec Federal
  • EnterpriseDB
  • Enterprise Information Services, Inc. (EIS)
  • Epoch Concepts, LLC
  • Esri logo
  • Exelis logo
  • Extron Electronics
  • F5 Networks
  • Fast Lane
  • FEDITC, LLC
  • Feith Systems logo
  • Fiberplex Technologies, LLC
  • FireEye
  • Firemon
  • ForeScout Technologies
  • Freedom Consulting Group
  • Fusion-io, Inc.
  • Futron Incorporated
  • GammaTech Computer Corporation
  • General Dynamics logo
  • General Dynamics Fidelis Cybersecurity Solutions
  • GFI Software
  • Gigamon logo
  • Good Technology
  • GovDeliver
  • GTRI
  • Hortonworks logo
  • HP
  • HP Software
  • Hytrust logo
  • IBM logo
  • IEEE Xplore Digital Library
  • immixGroup
  • Infoblox
  • Informatica logo
  • IMC logo
  • Intelligent Software Solutions
  • Intelink
  • Intensity Analytics Corporation
  • Intergraph logo
  • inTTENSITY
  • Invertix logo
  • Invincea, Inc.
  • IO logo
  • Iron Bow Technologies, LLC
  • JANUS Research Group
  • Juniper Networks
  • Kapow Software logo
  • KGS
  • Kinney Group, Inc.
  • Klas Telecom
  • L-3
  • Layer7 Technologies
  • LexisNexis
  • Liebert Maryland
  • Lockheed Martin
  • Lockmasters, Inc.
  • LogRhythm logo
  • Lynux Works logo
  • ManTech International
  • MapR Technologies
  • MarkLogic logo
  • McAfee
  • Mega logo
  • Mellanox Federal Systems
  • MicroPact logo
  • Microsoft logo
  • MicroStrategy
  • Modus Operandi, Inc.
  • MotionDSP, Inc.
  • Napatech, Inc.
  • NASA SEWP logo
  • NCS Technologies, Inc.
  • Near Infinity logo
  • NetApp logo
  • NETIQ
  • Net Optics logo
  • NetScout Systems
  • Network Instruments
  • Nicira
  • NIH-NITAAC
  • NIKSUN
  • Nimble Storage
  • Nimbus Data Systems
  • NJVC
  • Northrop Grumman logo
  • nPulse Technologies, Inc.
  • NTC Mazzuca Contracting, Inc.
  • Nutanix
  • Objective Interface Systems, Inc.
  • Objectivity, Inc.
  • Obsidian Strategics, Ltd.
  • Occam Solutions
  • Octo Consulting Group
  • Oculus Federal Corp.
  • Operations Support Technologies, Inc.
  • Oracle logo
  • Orbis Technologies logo
  • Overwatch
  • Owl Computing Technologies, Inc.
  • Palantir Technologies
  • Palmer’s Contracting Group
  • Palo Alto Networks logo
  • PCMG
  • Pentaho
  • Perceptive Software
  • Phoenix TS
  • Plug-In Storage Systems
  • Praescient Analytics
  • PTFS logo
  • QBase
  • Quantum Corporation
  • Quark Software, Inc.
  • Radware
  • Rapid7
  • Raytheon
  • Raytheon Trusted Computer Solutions
  • Recommind logo
  • Recorded Future
  • Red Hat
  • Riverbed
  • Riverside Research
  • Rose Electronics
  • SafeNet
  • SAIC
  • SAP NS2 logo
  • SAS Institute, Inc.
  • SCIF Global Technologies
  • SecureNinja
  • Security Engineered Machinery
  • Semantic Research, Inc.
  • Serena Software
  • Serious Energy – Quiet Rock
  • ServiceNow
  • SES Government Solutions
  • Simulyze logo
  • Skybox Security
  • Social Intelligence Corp
  • Solera Networks logo
  • Sotera Defense Solutions
  • Sourcefire, Inc.
  • Splunk
  • SRA International
  • StorageHawk
  • Strategy Bridge
  • Symantec logo
  • SYSTRAN Software, Inc.
  • Tableau Software
  • Talend
  • Technical Innovation
  • Technology Management Associates (TMA)
  • TekPanel, Inc.
  • Telos
  • Teradata logo
  • Texas Memory Systems, an IBM Company
  • Thales e-Security
  • Thermopylae Sciences + Technology
  • The Software Revolution, Inc. (TSRI)
  • Thetus
  • ThunderCat Technology, LLC
  • Tintri
  • TITUS logo
  • T-Mobile USA
  • Topsy Labs
  • Transition Network
  • Tresys
  • Tripwire
  • Trusted Solutions
  • TVAR Solutions
  • Tyco Integrated Security
  • Unisys
  • Veracode
  • Verdasys
  • Verizon
  • Vidyo
  • Violin Memory
  • ViON
  • Vormetric
  • VMware Desktop
  • VMware
  • Wave Systems Corp. logo
  • Whitaker Brothers
  • XBIS Laboratory, The MITRE Corporation
  • YARC Data logo
  • Zolon Tech, Inc.

Stay tuned for more info!

And to register for the event see: http://www.ncsi.com/dia/2013/

 

 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.

@CloudExpo Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
A new definition of Big Data & the practical applications of the defined components & associated technical architecture models This presentation introduces a new definition of Big Data, along with the practical applications of the defined components and associated technical architecture models. In his session at Big Data Expo, Tony Shan will start with looking into the concept of Big Data and tracing back the first definition by Doug Laney, and then he will dive deep into the description of 3V...
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Secure Infrastructure & Services (SIAS) is a managed services provider of cloud computing solutions for the IBM Power Systems market. The company...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Avnet, Inc. has announced that it ranked No. 4 on the InformationWeek Elite 100 – a list of the top business technology innovators in the U.S. Avnet was recognized for the development of an innovative cloud-based training system that serves as the foundation for Avnet Academy – the company’s education and training organization focused on technical training around top IT vendor technologies. The development of this system allowed Avnet to quickly expand its IT-related training capabilities around...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
The WebRTC Summit 2015 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
This talk focuses on the application of DevOps fundamentals to include network infrastructure. It draws from real deployment case studies on the extension of today's paradigms to address the challenges of the network infrastructures' ability to seamlessly and cohesively integrate into agile workflows. In this session at DevOps Summit, Arista Networks will focus on configuration management using automation with a nod to future work necessary to include telemetry and ephemeral state information....
In this session we look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. We will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in Computer Science. After graduation Peter worked on a PSTN switch dev...