Onsite Training: Defense, Security, Public Safety

Presented here are courses of interest to players in the Defense, Home Land Security, Public Safety, Law Enforcement, and Intelligence space. The content and tech level of any course can be tailored to audiences ranging from telecom or IT professionals to policy makers.

Related curriculum Telecom, Wireless, RF/SATCOM
Onsite Training: Defense, Security, Public Safety
all can be taught at your offices, some also on the Web
Courses: Cyber Security and Warfare
Courses: Geo-location and Location Based Services / Applications
Courses for 911 Professionals
Sampling of Related Knowledge Center Content

Blockchain and Other Cutting Edge Tech

Bockchain, the Distributed Ledger Technology behind Bitcoin, has attracted interest across many industries including financial services, legal, real estate, digital rights, identity management, healthcare, asset tracking, supply chain management, and the Internet of Things (IoT). A disruptive technology, it has the potential to transform the way many transactions are conducted. Eogogics now offers a fast-paced, one-day tutorial on Blockchain for managers and professionals.

Read More

Distributed Computing for IoT: Data Management in a Fog Computing Environment

Whereas the evolution of ICT has taken us from mainframes to PCs and back to the Cloud (e.g. from centralized to distributed to centralized computing), clearly distributed computing will have an increasingly important role in the digital economy. Edge Computing includes a number of technologies including Mobile Edge Computing, Fog Computing, and Cloudlets — to mention a few. In this article, we take a quick look at some of the Fog Computing and Data Management issues and challenges.

Read More

SDN/NFV: Enhancing Network Capacity and Functionality

SDN was originally developed to address the problems of large data centers, where virtualization of hardware and operating system is important (think cloud computing). It will likely spread to other areas, including the WAN, where virtualization and the ability to dial up bandwidth and related characteristics would be extremely valuable as well. NFV is an outgrowth of SDN in many respects, concentrating on backbone networks, where the need to rapidly reconfigure resources is key.

Read More

Cyber Security: Next Pearl Harbor?

The purpose of a cyber-attack may be to embarrass or incapacitate an organization and/or to steal its intellectual property or customer identification and financial data. Companies on the receiving end of cyber-attacks have suffered monetary losses in the billions, damage to their brand, and loss of customer confidence.

Read More

Evolution of Mobile Positioning and Location-based Services (LBS)

Mobile positioning and location-based services (LBS) have come a long way since the FCC order for phase II of 9-1-1 dictated that cellular operators provide location of emergency callers within a certain degree of location accuracy.  This caused carriers in the USA to support two technical solutions.

Read More