Knowledge Management & Information Sharing

Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct, and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes.

Articles

F
Artist's interpretation of new optical processor for an edge device, developed by NIT researchers, that performs machine learning computations at the speed of light, classifying wireless signals in a matter of nanoseconds. (Image credit: Sampson Wilcox, Research Laboratory of Electronics)

Photonic Processor Could Streamline 6G Wireless Signal Processing

As more connected devices demand an increasing amount of bandwidth for tasks like teleworking and cloud computing, it will become extremely challenging to manage the finite amount of wireless spectrum available for all users to…

F
modern circuit board, image created on Canva

New Protocol Demonstrates and Verifies Quantum Speedups in a Jiffy

While breakthrough results over the past few years have garnered headlines proclaiming the dawn of quantum supremacy, they have also masked a nagging problem that researchers have been staring at for decades:  Demonstrating the advantages…

F
closeup of soldier holding a communications device strapped to his chest

Breaking Through the Noise:  WSComm’s Revolution in Spectrum Sharing

In today’s hyperconnected world, wireless communication faces a critical challenge known as the “spectrum crunch.” Spectrum crunch results from more devices vying for limited frequencies, creating an overcrowded radio frequency spectrum — a bottleneck that…

Webinars

avoid risk reduce transfer

Cyber Risk Management: Program Development for Risk-Based Decision-Making

This discussion provides attendees with an understanding of how to construct a comprehensive risk management program. This includes developing a governance structure, a risk appetite statement, and related policies and procedures.  The publication “Advancing Risk…

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring…

Events

graphic of soldier holding digital world

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

AI Generated image of a holographic globe centered in a diagram of structures

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…

human hand pointing finger and touching finger of digital AI hand

Public Sector Summit

Unlocking Data Power and AI Innovation in Government: Join Qlik’s annual, one-day event dedicated to empowering the Public Sector with the latest technology in data analytics, data quality, artificial intelligence (AI) and decision intelligence. Discover…