Speaking at Remote Monitoring and Control Conference 2016

I’m a speaker at the Remote Monitoring & Control conference, Nov 4th, 1:30pm.  My talk is titled “Applying Military Tactical Networking Lessons-Learned to Enable Industrial Remote Monitoring.”  I’m diving into best practices on ruggedization of COTS networking equipment and on integrated equipment management.  I’ll also show some new and interesting use cases in networking solutions[…]

Share

Traction: Army Deploys PacStar Software Across WIN-T Program

We’re very excited about this article, which is generating a lot of visibility for PacStar.  C4ISR added a wealth of appealing imagery, the slide show, and the video interview at the end with program managers of the WIN-T program.  A great example of a very effective article, and PacStar is receiving positive feedback from customers[…]

Share

PacStar Announcing Two DOD Projects at AUSA Meeting

I’m thrilled to announce (and proud of my contribution towards) PacStar’s successful deployment of IQ-Core Software in two major U.S. Army programs – WIN-T Inc 1b, and on U.S. Army Wireless Command Posts.  Many years in the making by a dedicated and high functioning team.  I’m particularly pleased with the use of IQ-Core Software to manage NSA[…]

Share

Galois Awarded DARPA Blockchain Research Project

Research and Development company Galois and Guardtime Federal have announced they have jointly been awarded a $1.8 million contract by the Defense Advanced Research Projects Agency to verify the correctness of Guardtime’s Keyless Signature Infrastructure. The contract will fund an attempt to advance the state of formal verification tools and all blockchain-based integrity monitoring systems.[…]

Share

CyberChaff at Reed College – Galois, Inc.

Thrilled to have been a part of this early success! Formaltech, a Galois subsidiary, and Reed are excited to celebrate CyberChaff’s first month of service at Reed. Formaltech’s CyberChaff allows you to deploy low-cost, secure decoy hosts on a network. The hosts alert administrators when an attacker is detected while also slowing down key steps[…]

Share