1 / 14

Global InfoTek, Inc. Corporate Overview

Corporate Summary. Research, Design, Develop, Integrate, Test, and Deploy Intelligent Systems for the WarfighterWomen Owned Small Business Serving DoD and IC since 1996Exceptionally Skilled and Educated Cleared ProfessionalsSCIF Facility Large Scale Distributed SOA TestbedsC4I Integration

faunus
Download Presentation

Global InfoTek, Inc. Corporate Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. Corporate Summary Research, Design, Develop, Integrate, Test, and Deploy Intelligent Systems for the Warfighter Women Owned Small Business – Serving DoD and IC since 1996 Exceptionally Skilled and Educated Cleared Professionals SCIF Facility Large Scale Distributed SOA Testbeds C4I Integration Laboratory Command Post of the Future (CPOF) Lab Partners with Leading Technology Vendors, Integrators & Academia

    4. What We Do for Our Clients Supporting DoD and IC Since 1996

    5. What We Do for Our Clients: Integration

    6. Intelligent Systems Integration and Interoperability Provide world class SOA Thought leaders, Architect, and Developers (IC, Navy, Commercial…) Semantic Enterprise Data Integration Extend SOA for the last tactical miles Make SOA more resilient and dynamic Develop Intelligent Systems using semantics web and software agents in SOA framework Agent framework agnostic

    7. Intelligent Systems COP – Managing Information by Exceptions Maritime Intelligence Analysis and Threat Awareness (MIATA): A standards-based Agent and SOA framework to persistently monitor sensors, reports, and data sources; analyze the data; and notify when anomalous condition is detected End users composability of agents and services DCGS – CPOF Interoperability Very large scale data integration – spanning data sources in the theater to national level

    8. What We Do for Our Clients Knowledge Management

    9. Knowledge Management Solutions Universal Connector: Supports the rapid integration of analytical applications. It allows the intelligence analyst to create an analytical work flow by drawing desired connections between data sources, analytical services, and tools. Verona: Software agents rapidly create, package, present, share, and distribute information based on established policies Audio, imagery, and archived video Microsoft products (embed Excel, PowerPoint Word….) Rapidly deploy advanced pattern recognition and social network analysis solutions tailored to customer’s data, business processes, and knowledge processes.

    10. Knowledge Management Semantic Data Integration and Mediation

    11. What We Do for Our Clients Cyber Security

    12. Cutting Edge Cyber Security R&D Cyber Security Experts supporting national centers of excellence in cyber security Vulnerability analysis Binary analysis; Confinements; Diversify Cyber command and control Lightweight, flexible monitoring, analysis & alerting tools Situation understanding, monitoring and visualization Agent-based exploitation Proactive host defenses Memory-based attack protection Cyber testing and evaluation Range and test management, visualization

    13. What We Do for Our Clients Test & Evaluation

    14. Knowledge Intensive Tests and Evaluation Automated Large Scale Distributed Testing Full support for knowledge intensive computing test and evaluations: pre test planning to post test analysis Testbed range that provides end-to-end automated test & evaluation capability General: supports wide range of T&E scenarios / requirements Automated: no user management required Scalable: supports thousands of nodes Reliable: executes hundreds of thousands of runs without failure Fault tolerant: gracefully manages software and hardware failures Repeatable: ensures T&E integrity / accuracy

More Related