140 likes | 241 Views
Corporate Summary. Research, Design, Develop, Integrate, Test, and Deploy Intelligent Systems for the WarfighterWomen Owned Small Business Serving DoD and IC since 1996Exceptionally Skilled and Educated Cleared ProfessionalsSCIF Facility Large Scale Distributed SOA TestbedsC4I Integration
E N D
2. Corporate Summary Research, Design, Develop, Integrate, Test, and Deploy Intelligent Systems for the Warfighter
Women Owned Small Business – Serving DoD and IC since 1996
Exceptionally Skilled and Educated Cleared Professionals
SCIF Facility
Large Scale Distributed SOA Testbeds
C4I Integration Laboratory
Command Post of the Future (CPOF) Lab
Partners with Leading Technology Vendors, Integrators & Academia
4. What We Do for Our ClientsSupporting DoD and IC Since 1996
5. What We Do for Our Clients: Integration
6. Intelligent Systems Integration and Interoperability Provide world class SOA Thought leaders, Architect, and Developers (IC, Navy, Commercial…)
Semantic Enterprise Data Integration
Extend SOA for the last tactical miles
Make SOA more resilient and dynamic
Develop Intelligent Systems using semantics web and software agents in SOA framework
Agent framework agnostic
7. Intelligent Systems COP – Managing Information by Exceptions Maritime Intelligence Analysis and Threat Awareness (MIATA): A standards-based Agent and SOA framework to persistently monitor sensors, reports, and data sources; analyze the data; and notify when anomalous condition is detected
End users composability of agents and services
DCGS – CPOF Interoperability
Very large scale data integration – spanning data sources in the theater to national level
8. What We Do for Our ClientsKnowledge Management
9. Knowledge Management Solutions Universal Connector: Supports the rapid integration of analytical applications. It allows the intelligence analyst to create an analytical work flow by drawing desired connections between data sources, analytical services, and tools.
Verona: Software agents rapidly create, package, present, share, and distribute information based on established policies
Audio, imagery, and archived video
Microsoft products (embed Excel, PowerPoint Word….)
Rapidly deploy advanced pattern recognition and social network analysis solutions tailored to customer’s data, business processes, and knowledge processes.
10. Knowledge ManagementSemantic Data Integration and Mediation
11. What We Do for Our ClientsCyber Security
12. Cutting Edge Cyber Security R&D Cyber Security Experts supporting national centers of excellence in cyber security
Vulnerability analysis
Binary analysis; Confinements; Diversify
Cyber command and control
Lightweight, flexible monitoring, analysis & alerting tools
Situation understanding, monitoring and visualization
Agent-based exploitation
Proactive host defenses
Memory-based attack protection
Cyber testing and evaluation
Range and test management, visualization
13. What We Do for Our ClientsTest & Evaluation
14. Knowledge Intensive Tests and EvaluationAutomated Large Scale Distributed Testing Full support for knowledge intensive computing test and evaluations: pre test planning to post test analysis
Testbed range that provides end-to-end automated test & evaluation capability
General: supports wide range of T&E scenarios / requirements
Automated: no user management required
Scalable: supports thousands of nodes
Reliable: executes hundreds of thousands of runs without failure
Fault tolerant: gracefully manages software and hardware failures
Repeatable: ensures T&E integrity / accuracy