This document is a program for the 10th Annual Airborne Electronic Warfare conference taking place from September 28-29, 2011 in London. The conference will feature briefings from military experts from countries such as the UK, US, Canada, Germany, France and Italy on topics related to electronic warfare capabilities, operations, and technology developments. Presentations will provide insights into ongoing electronic warfare programs and lessons learned from recent operations in areas like Afghanistan and Libya. The event aims to give attendees an overview of the electronic warfare world and help assess needs to stay ahead of evolving threats.
Coordinating Approaches to Coordinated Fires
Close Air Support will give insight into:
Unparalelled Operational Feedback on Equipment And Digital CAS from TACP Units Just Returned From Theatre and how to improve air-land integration.
Download the brochure now for full details
SMi's 13th annual Military Airlift conference Dale Butler
SMi's 13th annual Military Airlift conference takes place in Florence, Italy on December 3rd and 4th 2012. There is also a site visit to Pisa Airforce Base on December 5th.
Military Radar 2011 offers the most comprehensive and influential speaker panel yet in the ninth annual occurrence of this unique series. This year’s conference will go further than ever before to help you to achieve effective radar systems on air, sea and land, by interacting with the world’s foremost military and industry radar experts.
In the past year radar technology has continued to evolve rapidly. The next generation of radar technology such as AESA, multi-static, through-wall and dual band radar systems are now an operational reality driving new platform and retrofit development. In addition the demand for radar technology allowing 360 degree real time battlespace awareness has continued to increase driving research, development and procurement in the military radar sector.
Download the brochure now for further details
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Coordinating Approaches to Coordinated Fires
Close Air Support will give insight into:
Unparalelled Operational Feedback on Equipment And Digital CAS from TACP Units Just Returned From Theatre and how to improve air-land integration.
Download the brochure now for full details
SMi's 13th annual Military Airlift conference Dale Butler
SMi's 13th annual Military Airlift conference takes place in Florence, Italy on December 3rd and 4th 2012. There is also a site visit to Pisa Airforce Base on December 5th.
Military Radar 2011 offers the most comprehensive and influential speaker panel yet in the ninth annual occurrence of this unique series. This year’s conference will go further than ever before to help you to achieve effective radar systems on air, sea and land, by interacting with the world’s foremost military and industry radar experts.
In the past year radar technology has continued to evolve rapidly. The next generation of radar technology such as AESA, multi-static, through-wall and dual band radar systems are now an operational reality driving new platform and retrofit development. In addition the demand for radar technology allowing 360 degree real time battlespace awareness has continued to increase driving research, development and procurement in the military radar sector.
Download the brochure now for further details
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
More Related Content
Similar to 10th Annual Airborne Electronic Warfare 2011
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
1. Bo bef nd 00
pa gust to £
Au up
ok ore sav
y a 2
www.electronic-warfare.co.uk
an 5t e
d h
10th Annual
Airborne Electronic
Warfare
Assessing the ongoing need to stay ahead of the threat
Thistle Westminster, London, 28th - 29th September 2011
Expert Insights From:
Event Highlights: Captain Frank “Spanky” Morley, Prospective Program
Manager PMA265 - F/A-18 & E/A-18G Program, US Navy
> Hear a broad coverage of UK MoD and RAF activity - with Captain Paul Overstreet USN, Program Manager PMA-272,
particular focus on the contrasts of operating EW in Afghanistan Advanced Tactical Aircraft Protection Systems, US Navy
and Libya Wing Commander Paul Lenihan, SO 1 Electronic Warfare,
Joint Capabilities Board, UK MoD
> Further lessons learned from French EW operations in Libya -
discover how NATO nations are managing threat on current and Wing Commander Rick Adams, SO 1 Electronic Warfare, HQ
Air Command, RAF
ongoing operations
Lieutenant Colonel Michael Arlt, Chief EW Officer General
> Full spectrum Canadian briefings - with updates of EW support Staff, German Air Force
to the Canadian fleet and developments with Canadian Forces
Lieutenant Colonel Nicola Donati Guerrieri, OPS Chief, Air
structure and EW doctrine Force EW Centre, Italian Air Force
> Counter-measure and aircraft survivability – platform Lieutenant Colonel M. R. Grischkowsky, USMC Deputy
protection for rotary and fixed-wing, plus examination of the use Director, Joint Electronic Warfare Center, US Strategic
Command
of IRCM in Afghanistan and RF counter-measures in Libya
Lieutenant Colonel Daniel Parpaillon, Fleet and Operational
> Developments in jamming and Electronic Attack technology and EW Officer, Air Force Staff, French Air Force
doctrine, with briefings from the US Navy Growler Programme
and US Navy Electronic Attack School Kent Smith, Systems Engineering Lead Program Executive
Office, Aviation, US Army
Good networking. Excellent overview of the EW world Major Kirk Bennet, Electronic Warfare Cell, Canadian Air
Warfare Centre, Canadian Forces
Stephen Bailey, Royal Air Force Kinloss
Major Tom Pilz, Electronic Warfare Operational Support,
Canadian Forces
Very interesting to get an insight Very good experience to capture
Captain John “Limey” Christianson, Chief, Joint Force
into the EW programmes of other challenging & customer Integration, 57 WG Electronic Warfare Officer, USAF Weapons
countries. expectations. School, USAF
Joshua Lee, DSTL - Good range Giancarlo Chinino, Elettronica Lieutenant Marek Gnida, EW Officer HQ, Slovakian
of expertise S.p.A Air Force
MEDIA PARTNERS
+44(0)20 7368 9300 +44(0)20 7368 9301 defence@iqpc.co.uk
2. 10th Annual Airborne Electronic Warfare 2011
Day One: 28th September 2011
08.30 Coffee and Registration Status of the greater EW program, Analysis of
Alternatives(s) and vision for future EW systems /
09.00 Chairman’s Welcome weapons as part of the Integrated Electronic Warfare
Wing Commander Chris Pitt (Ret’d), formerly System (IEWS) family of systems
S01 EW & TD, RAF and Managing Director, Cycnia Update on EW training and command structure in US
Army
09.10 STRATEGIC LEVEL BRIEFING – FUTURE Clay Ogden, Army Electronic Warfare, DAMO - ODE, US
OF UK ELECTRONIC WARFARE CAPABILITY Army
Wing Commander Paul Lenihan, SO1 EW, UK
MoD 12.20 Networking Lunch
09.50 VIEW FROM RAF HQ AIR COMMAND - 14.00 THE WAY AHEAD FOR FRENCH ELECTRONIC
MANAGING THE DIFFERING ENVIRONMENTS WARFARE
OF LIBYA AND AFGHANISTAN Current fleet EW capability
Adapting to different operating environments Participation within NATO and working with NATO
and managing different threats CONOPS
Infrared vs. RC threats Lessons learned from recent and ongoing operations
Ensuring that the RAF is capable of reacting to Facing the threats of tomorrow
operational requirements in the realm of ECM Lieutenant Colonel Daniel Parpillon, EW Capability
Equipping the fleet for current and future Officer, French Air Force
conflict
Wing Commander Rick Adams, Head of Air 14.40 DEVELOPMENTS IN CANADIAN ELECTRONIC
Platform Protection, Headquarters Air Command, WARFARE DOCTRINE
Royal Air Force Canadian Air Force way ahead in electronic warfare
Emergence of new EW doctrine
10.30 Coffee and Networking Break Implementing doctrine and challenges in moving
theory into practice
11.00 GERMAN AIR FORCE EW UPDATE – Major Kirk Bennet, Canadian Forces Air Warfare Centre
CURRENT PROJECTS AND ONGOING
DEVELOPMENTS 15.20 Coffee and Networking Break
EW Training within the air force - use of live
and simulated environments 15.50 ITALIAN AIRFORCE EW EFFORTS
Current capability of German Air Force electro- Current capability of the Italian Air Force platform
magnetic effects protection programme
On-going efforts to ensure that capability Improving and managing EW integration into air
remains ahead of the threat force operational scheme
Lieutenant Colonel Michael "George" Arlt, Chief Approaching and defending against current and
EW Officer for Airborne Platforms, German Air emerging threats
Force Staff Lieutenant Colonel Nicola Donati Guerrierri, Electronic
Warfare Centre, Italian Air Force
11.40 US ARMY ELECTRONIC ATTACK AND EW
SYSTEMS 16.30 Chairman’s Closing Remarks and End of Day One
Airborne Electronic Attack weapons Wing Commander Chris Pitt (Ret’d), formerly S01 EW &
development, mission sets and future vision / TD, RAF and Managing Director, Cycnia
plans
Sponsorship Opportunities | Three easy ways to get involved
1. Thought Leadership: With an expected audience of senior military customers and decision makers from across the globe, Defence IQ events
enable you to build your reputation as a market leader in your chosen domain through speaking sessions and subject specific conference
streams, workshops and focus days
2. Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for on-site branding and exposure.
Furthermore, our dedicated marketing team can help you achieve your promotional aims in the months leading up to the conference with
dedicated mailings to cover 50,000 contacts through brochure drops, extensive e-mail campaigns and tailored web coverage
3. Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business
relationships and achieve face to face contact that overcrowded tradeshows cannot deliver. Sponsorship opportunities range from exhibition
stands to sponsored lunches, cocktail receptions, gala dinners and a host of informal social networking events.
For further details, or to discuss which option is best for your organisation, please call +44 (0) 207 368 9857 or email sponsor@iqpc.co.uk
3. 10th Annual Airborne Electronic Warfare 2011
Day Two: 29th September 2011
08.30 Coffee and Registration Joint EW exercise with Czech Air Force & NATO JEWCS:
Achieving operational harmony between Quick Reaction
09.00 Chairman’s Welcome Alert Units & Forward Air Controllers
Wing Commander Chris Pitt (Ret’d), formerly S01 Lieutenant Marek Gnida, Electronic Warfare Officer,
EW & TD, RAF and Managing Director, Cycnia Slovakian Air Force
09.10 US STRATEGIC COMMAND – JOINT 12.20 Networking Lunch
ELECTRONIC WARFARE CENTRE
Provision of EW planning - support and advocacy 14.00 USAF WEAPONS SCHOOL – EXPERIENCE FROM
Conducting effects-based assessment of assigned THE TRAINING GROUND AT NELLIS TO OPERATION
operations ODYSSEY DAWN
Maintaining readiness at directed levels EW Training on the Nellis Range/at the USAFWS
Lieutenant Colonel M. R. Grischkowsky, Deputy EW lessons learned from Operation Odyssey
Director, Joint Electronic Warfare Center, US Dawn/Operation Unified Protector
Strategic Command The importance of joint/coalition EW for a modern IADS
takedown
09.50 MEETING THE ELECTRONIC ATTACK Captain John "Limey" Christianson, USAF Chief, Joint
REQUIREMENT FOR THE US NAVY Force Integration, USAF Weapons School
US Navy – F/A 18-G Growler; the lead airborne
EW platform for the US Navy 14.40 OPERATIONAL AND TACTICAL SUPPORT
Latest technology electronic attack suite PROVIDED TO THE CANADIAN FLEET
Wide ranging SEAD capabilities Overview of Canadian EW programmes
The critical need for effective EW Battle Unique support provided by Canadian Air Warfare
Management (EWBM) School
Challenges for the platforms future development Ensuring full EW integration and support– both at home
Captain Frank "Spanky" Morley, PMA265 - F/A-18 and on operations
& E/A-18G Program, Prospective, Program Manager, Major Tom Pilz, EW Tactics Officer, Canadian Forces Air
US Navy Warfare School
10.30 Coffee and Networking Break 15.20 Coffee and Networking Break
11.00 TRAINING THE US NAVY PILOT FOR THE 15.50 HELICOPTER AIRCRAFT SURVIVABILITY
FIGHT EQUIPMENT UPDATE. US ARMY
Training set-up for the USN towards EW and ECM Suite of Infrared Counter Measures (SIIRCM)
Feedback from Operation Odyssey Dawn, Unified Improved lamp / laser jammer
Protector - lessons learned and application to The new missile warner (CWMS)
training systems Advanced flare dispenser
Current efforts to integrate training with the USAF Advanced flare munition
and benefits towards improving pilot capability Ommon Missile Warning System / Improved
Lieutenant Commander Sean Hays, USN Countermeasure Dispenser (CMWS/ICMD)
Electronic Attack Weapons School, US Navy Kent, Smith, Aircraft Survivability and Systems
Engineering Lead, Program Executive Office Aviation, US
11.40 NATO JOINT EW TRAINING WITH THE Army
SLOVAKIAN AIRFORCE
Meeting the EW training needs of the Slovakian 16.30 Chairman’s Closing Remarks and End of Day One
Air Force Wing Commander Chris Pitt (Ret’d), Formerly S01 EW
Air Traffic Control & TD, RAF and Managing Director, Cycnia
Ground Based Air Defence
Tactical Air Control Party
Tel: +44(0)207 368 9300 Email: newsletter@defenceiq.com
Defence IQ is an authoritative news source for high quality and exclusive commentary and analysis on global
defence and military-related topics. Sourcing interviews and insights directly from senior military and industry
professionals on air defence, cyber warfare, armoured vehicles, naval defence, land defence and many
more topics, Defence IQ is a unique multimedia platform to discuss and learn about the latest developments within
the defence sector. So join over 45,000 defence professionals today to claim your exclusive video interviews,
podcasts, articles and whitepapers that are updated on a daily basis at www.defenceiq.com - and all for free. Join
the community: http://www.defenceiq.com/join.cfm
4. 10th Annual 5 WAYS TO REGISTER
Freephone: 0800 652 2363 or
Airborne Electronic Fax:
+44 (0)20 7368 9300
+44 (0)20 7368 9301
Warfare Post: your booking form to
IQPC Ltd. 2nd Floor,
129 Wilton Road,
London SW1V 1JZ
Thistle Westminster, London, 28th - 29th September 2011
Online: www.electronic-warfare.co.uk
To speed registration, please provide the priority code located on the mailing label or in the box below. Email: defence@iqpc.co.uk
My registration code is: PDFW
Team Discounts*
Please contact our database manager on +44(0) 207 368 9300 or at database@iqpc.co.uk quoting the registration
IQPC recognises the value of learning in teams. Groups of 3 or more
code above to inform us of any changes or to remove your details. booking at the same time from the same company receive a 10%
discount. 5 or more receive a 15% discount. 7 receive a 20% discount.
Only one discount available per person.
Venue & Accommodation
Military/Govt/Public Sector**
Book & Pay by Book & Pay by Venue Thistle Westminster Hotel
Standard Price 49 Buckingham Palace Road, London SW1W 0QT
5th August 2011* 26th August 2011* Phone: 0871 376 9039 / +44 845 305 8338
SAVE £200 SAVE £100 Accommodation Travel and accommodation are not included in the
2-Day Conference £699 + VAT
£499 + VAT £599 + VAT conference fee; however we have put together a HotelMap that displays
discounted accommodation for hotels in the area to the Thistle Westminster
Standard Industry Rates Hotel. The map displays live availability and allows you to book directly with
each hotel: http://www.HotelMap.com/M4T8L Alternatively, if you would like to
Book & Pay by Book & Pay by book your accommodation by phone, please call Daniel Spinner, our dedicated
Standard Price
5th August 2011* 26th August 2011* London concierge, on 020 7292 2335 (if outside UK +44 20 7292 2335)
quoting Special Reference Code M4T8L. He will be happy to help you with your
SAVE £200 SAVE £100 hotel booking and provide assistance organising your time in London.
2-Day Conference £1799 + VAT
£1599 + VAT £1699 + VAT
* To qualify for discounts, payment must be received with booking by the early registration deadline. Early booking discounts are not valid in Free Online Resources
conjunction with any other offer. UK VAT charges at 20%. Vat registration No. GB799225967 To claim a variety of articles, podcasts and other free resources please
** Military & Government discounted rates apply to serving military officers, government, police and university personnel only
visit www.electronic-warfare.co.uk
All serving Generals/Flag Officer 1 Star and above may attend the conference free of charge Digital Conference On CD-ROM
Please contact defence@iqpc.co.uk for further details. This offer cannot be combined with any others and is not transferable
Recent digital conferences available - £599 plus VAT each
Delegate Details 6 Military Airlift 2011
Please photocopy for each additional delegate 6 International Fighter 2011
6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other 6 International Military Helicopter 2011
First Name Family Name
Please send me conference materials indicated above.
Rank Job Title
I have filled out credit card details below
Tel No. For further information please call: 0207 368 9300
Email or email: knowledgebank@iqpc.co.uk.
6 Yes I would like to receive information about products and services via email
Organisation
Nature of business Terms and Conditions
Address Please read the information listed below as each booking is subject to IQPC Ltd standard terms
Postcode Country and conditions. Return of this email will indicate that you accept these terms. Payment Terms
Upon completion and return of the registration form full payment is required no later than 5
Telephone Fax business days from the date of invoice. Payment of invoices by means other than by credit card,
Approving Manager or purchase order (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT)
per delegate processing fee. Payment must be received prior to the conference date. We reserve
Name of person completing form if different from delegate: the right to refuse admission to the conference if payment has not been received.
IQPC Cancellation, Postponement and Substitution Policy You may substitute delegates at any
Signature
time by providing reasonable advance notice to IQPC. For any cancellations received in writing
not less than eight (8) days prior to the conference, you will receive a 90% credit to be used at
I agree to IQPC’s cancellation, substitution and payment terms. another IQPC conference which must occur within one year from the date of issuance of such
Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted
cancellations. No credit will be issued for any cancellations occurring within seven (7) days
Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6
(inclusive) of the conference. In the event that IQPC cancels an event for any reason, you will
Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC event
to be mutually agreed with IQPC, which must occur within one year from the date of cancellation.
Payment Method In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling
to attend in on the rescheduled date, you will receive a credit for 100% of the contract fee paid.
Total price for your Organisation: (Add total of all individuals attending): You may use this credit for another IQPC event to be mutually agreed with IQPC, which must
occur within one year from the date of postponement. Except as specified above, no credits
Card Number: VISA 6 M/C 6 AMEX 6 will be issued for cancellations. There are no refunds given under any circumstances. IQPC is
not responsible for any loss or damage as a result of a substitution, alteration or cancellation/
6666666666666666
Conference code: 11398.005
postponement of an event. IQPC shall assume no liability whatsoever in the event this conference
is cancelled, rescheduled or postponed due to a fortuitous event, Act of God, unforeseen
Exp. Date: 6 6 6 6 Sec: 6 6 6 6 occurrence or any other event that renders performance of this conference impracticable, illegal
or impossible. For purposes of this clause, a fortuitous event shall include, but not be limited
to: war, fire, labour strike, extreme weather or other emergency. Please note that while speakers
Name On Card: Signature: and topics were confirmed at the time of publishing, circumstances beyond the control of the
organizers may necessitate substitutions, alterations or cancellations of the speakers and/or
Billing Address (if different from below): topics. As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics
if necessary without any liability to you whatsoever. Any substitutions or alterations will be
City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) updated on our web page as soon as possible. Discounts All ‘Early Bird’ Discounts require
payment at time of registration and before the cut-off date in order to receive any discount. Any
discounts offered whether by IQPC (including team discounts) must also require payment at the
(Please quote 11398.005 with remittance advice) IQPC Bank Details: HSBC Bank Plc, 67 George Street, Richmond, time of registration. All discount offers cannot be combined with any other offer.
Surrey TW9 1HG, United Kingdom Sort Code: 40 38 18 Account No: 51304143 Swift Code: MIDLGB2112V
IBAN Code: GB59 MIDL 4038 1851 3041 43 Account Name: International Quality & Productivity Centre Ltd.