Knowledge Management & Information Sharing

Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct, and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes.

Recent Inquiries

Long-term goals for the Communications-Electronics Command (CECOM) Software Engineering Center (SEC) include incorporating Zero Trust further into Army and DOD systems and developing workforce training programs around the organization’s methodology.

Open Standards That Support Zero Trust Implementation

What open standards apply to zero trust implementation?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

What information can external sources (hackers) obtain from a user on public Wi-Fi, and how does that information change from a nonsecure (http:) site to a secure (https:) site?

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Articles

F
Artist's interpretation of new optical processor for an edge device, developed by NIT researchers, that performs machine learning computations at the speed of light, classifying wireless signals in a matter of nanoseconds. (Image credit: Sampson Wilcox, Research Laboratory of Electronics)

Photonic Processor Could Streamline 6G Wireless Signal Processing

As more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to…

F
modern circuit board, image created on Canva

New Protocol Demonstrates and Verifies Quantum Speedups in a Jiffy

While breakthrough results over the past few years have garnered headlines proclaiming the dawn of quantum supremacy, they have also masked a nagging problem that researchers have been staring at for decades:  Demonstrating the advantages…

F
closeup of soldier holding a communications device strapped to his chest

Breaking Through the Noise:  WSComm’s Revolution in Spectrum Sharing

In today’s hyperconnected world, wireless communication faces a critical challenge known as the “spectrum crunch.” Spectrum crunch results from more devices vying for limited frequencies, creating an overcrowded radio frequency spectrum — a bottleneck that…

Webinars

avoid risk reduce transfer

Connecting With Cyber: Developing an Enterprise Risk Program

COMING SOON – EXACT DATE AND TIME TBD. This discussion provides the attendees with a sense of how to construct a holistic risk management program. This includes the development of a governance structure, risk appetite statement,…

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring…

Events

graphic of soldier holding digital world

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

AI Generated image of a holographic globe centered in a diagram of structures

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

human hand pointing finger and touching finger of digital AI hand

Public Sector Summit

Unlocking Data Power and AI Innovation in Government: Join Qlik’s annual, one-day event dedicated to empowering the Public Sector with the latest technology in data analytics, data quality, artificial intelligence (AI) and decision intelligence. Discover…