Training Session Speakers

Achieving Information Dominance at the Edge

Cognitive Services on the Edge

By Evan Mills, Technology Strategist – SOF, Microsoft Federal and Vivek Warrier, Sr. Architect, Microsoft Federal

Session Abstract

Cognitive Services brings AI within reach of every developer and data scientist. With leading models, a variety of use cases can be unlocked. All it takes is an API call to embed the ability to see, hear, speak, search, understand, and accelerate advanced decision-making into your apps. Microsoft is taking the next step in moving these services to the edge by providing several Docker containers that let you use the same APIs that are available in Azure, on-premises. Utilizing these containers allows you the flexibility to bring Cognitive Services closer to your data for compliance, security or other operational reasons.

During the discussion we will talk about the path forward, current containerized services, and future efforts. We will provide a couple of Microsoft use cases demonstrating the deployment of cognitive services on edge devices to support multiple missions.

Tactical Edge Automation for Agile Infrastructure Deployment

By Josh Morgan, SOF Technical Account Manager, NexTech Solutions (NTS) and Will Lester, VP of Engineering, NexTech Solutions (NTS)

Session Abstract

NTS is putting an immediate focus on Edge Automation for Agile Infrastructure Deployment, enhancing the ability to exchange critical information required to accomplish your mission in communications-limited environments. We will explore MANTLE, our automation platform, purpose-built for the edge, demonstrating how customers can automatically build their edge infrastructure, verifying that it meets operational intent by providing automated remediation to eliminate infrastructure problems quickly.

Tactical Data Operations

By Sean MacKirdy, District Manager – Federal DoD, Cohesity and Ron Nixon, Federal CTO, Cohesity

Session Abstract

Information has always been the key to success on and off the battlefield, but that success depends on having that information available at the right place at the right time. The transition to a “digital force” has data production and consumption growing at exponential rates. This provides unparalleled capability for an organization to execute operations faster with greater speed, accuracy, and lethality than at any point in history. Yet for all its advantages, the explosion of data operations poses challenges to ensuring the availability, integrity, and availability of that data. These challenges are amplified further in the resource-constrained tactical environments where the option to buy more gear or add more people is not a realistic course of action.

The Cohesity team training session will be a scenario-driven discussion that focuses on data management and security in tactical operations. The training scenarios will cover:

  • Tactical Data Infrastructure — This scenario focuses on deployable assets that are deployed, maintained, and then returned to the garrison. During deployment, systems will have periods of reach back, but that may not always be consistent. Regardless of connectivity local data must be managed and secure and when possible deconflicted with strategic sources. We talk about the challenge of austere environment data management and how to apply technologies to ensure mission success.
  • Data and Application Mobility — In this scenario, the group will engage in a discussion about the aspects of keeping critical data and applications updated and positioned where needed. This functionality is crucial for a unit to maintain continuity of operations in a constantly evolving operation. We will talk about the implementation of technology that helps ensure data and application interoperability, security risk and mitigation, and data migration. For example, the US Army has the vision of a cross-domain, data and application “fabric” from the cloud to the data center to the tactical edge. The concept is that data and applications move freely across nodes participating in the mesh.
  • Operations Management — Data operations requires a core set of data management networking tools and extending the capabilities of a large, powerful collection of nodes. We talk about the requirement to establish global management mechanisms that are needed to aggregate and execute DoD missions across all echelons. The group will engage in overcoming challenges like inefficient IT operations, lack of data visibility and control, resource demands, and others. Data operations need to ensure healthy day-to-day operations of the data sharing system but also need insights into organic system growth.
  • Tactical Data Protection — The current state of tactical data protection (backup and recovery) is quite interesting. In this scenario, we consider what’s involved with protecting data in harsh and hostile environments. Physical security is a challenge. Certainly, hostile forces need to be denied access to data. Also, the tactical theater is notorious for limited data connectivity between locations. Given these challenges, the notion of data protection is often a secondary or lower priority.

The goal of a scenario-based training session is to facilitate discussion between operators, planners, and industry to cultivate a shared understanding of the tactical data mission to ensure information availability as a combat multiplier.

Tactical Network Operations

By Suman Mallick, VP of Systems Engineering, CodeMettle

Session Abstract

CodeMettle will train on its portfolio of products designed to simplify Network Operations. This will include management of critical components such as transmission (satcom, radio), network (route, switch), applications, and services. The training will also include the coordination and collaboration necessary for integrated NetOps across echelons.

Building a Multi-Cloud, Cyber Resilient Data Protection Strategy

By Brendan Kelly, Data Protection Account Executive, Dell Technologies

Session Abstract

In this session, Dell Technologies will discuss how to leverage an as-a-service-centric, multi-cloud strategy for interoperability between on-prem and off-prem data protection. In addition, the pillars of a sound zero trust architecture will be discussed, and how Dell’s Cyber Recovery Vault can be a key component of a cyber resilient architecture.

90 Minutes Total
Presentation Time Description
0-5
Agenda Review and Introduction of Dell SOF Team Members at Forum
5-10
Dell Technologies Data Protection Capabilities Overview
10-20
Working definition of Cloud with SaaS centric approach
- Consumption model based
- Resource allocation and workload specific scenarios
20-40
Introduction of APEX Backup Service
- Dell SaaS offering for in-cloud protection of M365 suite
- Explanation of underlying consumption model via multi gov cloud approach
- Review of replication zone redundancy
- Look into APEX Backup Service interface via VPN into Dell Federal Lab in McLean VA
40-50
Time for Questions/overflow from material above/transition to next topic
50-60
Review of 4 Pillars of sound Zero Trust Architecture
- Good start but not enough for Cyber Resilient Architecture
60-80
Explanation and Review of Dell’s Cyber Recovery Vault
- Process Flow diagram of cyber attack -> demonstrate risk of architecture without Cyber Vault
- Review of Cyber Sense -> AI Tool that is brains of Cyber Vault
- Look into Cyber Vault GUI
80-90
Time for Questions/overflow from material above
Klas Logo

Blackrock Extreme Edge Automation

By Clayton (“Clay”) Coppernoll, Systems Integration Architect, Klas Government

Session Abstract

Developed by Klas, Blackrock integrates Ansible agentless automation and Nagios SNMPv2/3 monitoring/reporting in a single, easy-to-use web portal. Blackrock can configure and manage Klas and numerous 3rd party network devices, including Cisco IOS and Juniper. Our solution eliminates the complexity of remote infrastructure deployment and management, enabling IT and network professionals to focus on core business objectives. With integrated management and monitoring, Blackrock can control multiple device types, with the flexibility to manage configurations on a per-device basis, which includes firmware updating. Group devices by geographic location, firmware, or hardware characteristics and quickly determine the running configuration and date of last modification on devices. With an integrated map Blackrock allows you to identify assets with issues quickly with georeferenced location information. Leverage Klas, 3rd party, or bring your own custom playbooks, which can execute simultaneously against one or many hosts from the centralized portal. Lastly, with Blackrock, IT professionals can quickly determine if a device configuration has deviated from the centralized configuration.

Blackrock is a management and automation utility based on open-source technologies to help you deploy and manage SNMP devices.

Klas Logo

Keel OS and Auto-PACE Made Simple

By Clayton (“Clay”) Coppernoll, Systems Integration Architect, Klas Government

Session Abstract

Bringing our lessons learned in high-speed rail communications, Klas developed Keel OS. Keel is an x86-focused secure, lightweight operating system with an integrated hypervisor and a range of Software-Defined Networking (SDN) features. The Auto-PACE function in Keel OS allows for optimal path selection that can reduce operational costs and, more importantly, reduce the frequency of network outages and failover times. Keel OS provides link aggregation, link prioritization, high availability, traffic segmentation, and traffic encapsulation in a simple, easy-to-use interface. Under the code, Keel OS uses Smoothed Round Trip Time (SRTT) to create routing metrics based on best path or weighted path selection. Failover time is customizable with user input in a “missed count” value. These values and be adjusted for path types. SRTT allows for a true path determination for applications based on TCP values.

The TRX family is the perfect hardware to run the Auto-PACE feature with its robust transport paths.