Page 50 - FCW, November, December 2018
P. 50

 Industry Innovators
centralizes the process
for securing funding and onboarding new customers. It has transformed the way the centers access and provision cloud services.
IBM
LITES and VERA
IBM was responsible for
two innovations: the Army’s Logistics Support Activity IT Services (LITES) and the Video Exploration and Recognition Assistant (VERA).
Through LITES, IBM decommissioned a legacy
data center and upgraded the Army to a state-of-the-art, on- premises, hybrid cloud model. The system processes 40 million data transactions daily and supports 65,000 users and 150 Army suppliers worldwide. It is so efficient that it is saving the Army more than $2 million a month over the cost of the previous logistics system.
VERA is a new method for classifying images using a
deep learning model called a 3D augmented convolutional neural network. IBM clients were looking for ways to automate manual processes
for detecting, changing and summarizing full-motion video. VERA combines machine learning models and computer vision techniques to reduce the time analysts spend evaluating the data.
Intelligent Waves
Hypori
Hypori manages security on network-connected devices that
could easily be lost, stolen or otherwise compromised. The solution essentially creates two separate phones on a user’s mobile device with no data
or apps saved locally. Should the device be compromised, hackers will not have access to government applications, data or the broader network.
ISSAC
VOR Advanced Analytics Technology
ISSAC has leveraged government funding and internal investments to
create an advanced artificial intelligence and complex data analytics platform known as VOR. It is currently being used in the intelligence community and for commercial logistics optimization and health data analytics.
The company also developed a proprietary machine reasoning technology. And it
is worth nothing that ISSAC made these investments as a service-disabled veteran-owned small business.
Leidos
Leidos Enterprise Application Framework
The Leidos Enterprise Application Framework was developed to decrease the time and money involved in developing new solutions and modernizing legacy applications. The disruptive and reusable capability
uses extensible framework technologies to develop high- quality applications faster
than previously possible. One example is the Army Advanced Field Artillery Tactical Data System, which collects target data from frontline sensors, assigns fire missions and updates forces on the effect of the missions.
LEAF has helped Leidos unseat incumbents in the command and control segment of the defense market.
ManTech
Advanced Cyber Range Environment
The Advanced Cyber
Range Environment is an infrastructure-as-a-service model used to train employees, evaluate cybersecurity tools, conduct security architecture testing and manage live-fire exercises. It replicates users’ networks and makes attack simulations as real as possible so that users can improve the effectiveness of their people, processes and tools.
The solution is in use by Defense Department agencies and the Department of Homeland Security.
Merlin International
MerlinGlass
MerlinGlass is an internet- of-things solution that enhances the security of connected medical devices and helps providers access information from multiple locations and platforms.
It automatically identifies different types of unmanaged devices — including smart
TVs, IP-enabled thermostats, unauthorized mobile device hotspots, and mobile and stationary medical equipment.
Using a combination of agentless query, telemetry and applied cognition of geography and topology, MerlinGlass addresses the gap in visibility in these environments, and its sophisticated policy manager automatically executes a range of responses depending on the severity of the issue.
NCI
Scaling Humans with Artificial Intelligence
NCI’s Scaling Humans with Artificial Intelligence uses AI
to augment employees, not replace them, by relieving them of repetitive, high-volume back- office operations.
Pilot projects are underway with the Army and Navy in areas such as Active Directory maintenance, auditing capabilities and system access. NCI is also using the tool internally in areas such as service desk support, back- office support, and data entry and migration.
Ntrepid
Nfusion
Nfusion allows analysts
and researchers to perform stealthy cyber operations and engage online without being identified by their targets. The cyberthreat hunting tool has been used by law enforcement and national security customers.
The solution manages
50 November/December 2018 FCW.COM
















































   48   49   50   51   52