Systems Center

Pacific Grove, CA, United States

Systems Center

Pacific Grove, CA, United States
SEARCH FILTERS
Time filter
Source Type

News Article | April 17, 2017
Site: www.prweb.com

VT MÄK, (MAK), a company of Vision Technologies Systems, Inc. (VT Systems), today announced that the University of Alabama in Huntsville (UAH) is using MAK’s VR-Forces simulation software to recreate the Battle of 73 Easting, a major United States victory during the 1991 Persian Gulf War, enhancing its students’ learning experience. With VR-Forces, graduate students at UAH have achieved increasingly accurate replication of the historical results. The simulations are directed by Mikel D. Petty, Ph.D, Associate Professor of Computer Science and Senior Scientist for M&S, Information Technology and Systems Center at UAH. “The Battle of 73 Easting is arguably the best-documented battle in U.S. history, which makes it a perfect application for both simulation analysis and historical study,” said Dr. Petty. “Then-Capt. H.R. McMaster’s Eagle Troop of the Second Armored Cavalry Regiment aggressively engaged a much larger Iraqi armored force, destroying a large part of it in only twenty-three minutes. Simulation improves our ability to study the tactics of Eagle Troop and the rest of the regiment from a historical perspective, and recreating historical events in simulation provides insight into the accuracy and capabilities of the simulation.” VR-Forces is MAK’s complete simulation solution software. It is a powerful and flexible Computer Generated Forces platform that populates simulated synthetic environments with battlefield entities. Users can create scenarios full of custom, lifelike entities with specific behaviors, making it an ideal platform for training and education. The VR-Forces software also allows students to alter the parameters of the battle and compare simulation results with historical events. This year, under Dr. Petty’s guidance, his students will be investigating the change in outcome given a national scenario in which the Iraqi forces were able to use modern T-14 Russian Armata battle tanks in 1991. “This is a great application of VR-Forces,” said Dan Schimmel, President and CEO of VT MÄK. “We’re thrilled to see a famous battle simulated and analyzed by Dr. Petty and his students at the University of Alabama in Huntsville.“ “MAK has been very accommodating in allowing my students to use VR-Forces for their academic projects,” said Dr. Petty. “The intuitive nature of their graphical user interface and the accuracy of their simulation results make VR-Forces an excellent technology to enhance learning for modeling and simulation students.”


Collaboration specialists available to better serve German speaking customers in growing German and Austrian IT Markets BOSTON, MA and GENEVA, SWITZERLAND--(Marketwired - May 18, 2017) -  GSX Solutions [http://de.gsx.com], the leading provider of monitoring and management solutions for messaging, collaboration, and mobility applications, today announced its new localized website to better address the needs of German speaking markets. Already trusted by long term German customers and partners, GSX is happy to expand its reach with a tailored suite of products and sales team. German speaking staff is available for demos and inquiries at sales@gsx.com. About GSX Solutions GSX Solutions is the leading provider of monitoring and management solutions for messaging, collaboration, and mobility applications. At the core of GSX's mission is the end-user experience, ensuring smooth and uninterrupted service delivery. GSX Monitoring provides exceptional user satisfaction within complex on-premises, hybrid, and cloud scenarios by providing IT teams with deep insights into the user experience. GSX Management for Office 365 includes powerful usage reporting, security auditing, and enterprise-class administration. GSX is an IBM Business Partner as well as a Microsoft Systems Center Alliance Partner and a Microsoft Gold Partner. For more product information and partner opportunities, please visit  http://de.gsx.com. All product and company names herein may be trademarks of their registered owners.


ARLINGTON, Va.--(BUSINESS WIRE)--CACI International Inc (NYSE:CACI) announced today that it has been awarded a $21 million task order by the Space and Naval Warfare Systems Center (SSC) Atlantic to provide cyber security systems support to the Naval Facilities Engineering Command (NAVFAC) to enhance the security of industrial control systems important to America’s critical infrastructure. The two-year task order, awarded under the SPAWAR Integrated Cyber Operations contract vehicle, represents continuing business for CACI. SSC Atlantic provides a wide range of information warfare capabilities to the Navy, including communication and networking systems; intelligence, surveillance, and reconnaissance support; business systems; and information security. Under this contract, CACI will continue to provide personnel and expertise to support NAVFAC’s capability to meet Department of Defense information assurance standards for providing cyber security to the Navy’s industrial control systems. This work builds upon CACI’s experience designing, developing, configuring, certifying, and accrediting the initial hardware and software that secure these industrial control systems, which control utilities and manage facility energy systems. John Mengucci, CACI’s Chief Operating Officer and President of U.S. Operations, said, “Navy industrial control systems are vital to the infrastructure and business operations of Naval facilities. CACI will leverage its experience and expertise delivering cutting-edge information assurance tools and processes that enhance the cyber security of the Naval Facilities Engineering Command’s critical industrial control systems.” According to CACI President and Chief Executive Officer Ken Asbury, “This win solidifies the strong relationship CACI has with its U.S. Navy customers, and positions us for continued growth supporting high-value business systems for the Navy. We remain on the forefront of providing innovative solutions and services to help secure our nation’s critical infrastructure and keep Americans safe.” CACI provides information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is a member of the Fortune 1000 Largest Companies, the Russell 2000 Index, and the S&P SmallCap600 Index. CACI’s sustained commitment to ethics and integrity defines its corporate culture and drives its success. With approximately 19,000 employees worldwide, CACI provides dynamic career opportunities for military veterans and industry professionals to support the nation’s most critical missions. Join us! www.caci.com. There are statements made herein which do not address historical facts, and therefore could be interpreted to be forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such statements are subject to factors that could cause actual results to differ materially from anticipated results. The factors that could cause actual results to differ materially from those anticipated include, but are not limited to, the risk factors set forth in CACI’s Annual Report on Form 10-K for the fiscal year ended June 30, 2016, and other such filings that CACI makes with the Securities and Exchange Commission from time to time. Any forward-looking statements should not be unduly relied upon and only speak as of the date hereof.


News Article | May 22, 2017
Site: www.marketwired.com

Microsoft MVP, Gary Steere, will discuss how to manage the migration limbo phase when users and applications exist on both platforms BOSTON, MA--(Marketwired - May 22, 2017) -  GSX Solutions [www.gsx.com], the leading provider of monitoring solutions for messaging, collaboration, and mobility applications, today announced a new webinar on Coexistence Package Monitoring. Coexistence packages ensure seamless collaboration when a company has users and applications running on Lotus Notes/Domino and Microsoft Exchange at the same time. Lengthy coexistence outages are a preventable problem. Organizations need to get insights into the health of the single most visible system during the migration period. Microsoft MVP and Certified Master, Gary Steere, will be the featured speaker of the webinar. Gary has nearly 20 years of experience in technology and has spent half of his career helping companies migrate to or integrate IBM's products with Microsoft Exchange Server and Office 365. Registration is now available at http://www.gsx.com/webinar-coexistence-monitoring. Where: Please sign up today at http://www.gsx.com/webinar-coexistence-monitoring. About GSX Solutions GSX Solutions is the leading provider of monitoring and management solutions for messaging, collaboration, and mobility applications. At the core of GSX's mission is the end-user experience, ensuring smooth and uninterrupted service delivery. GSX Monitoring provides exceptional user satisfaction within complex on-premises, hybrid, and cloud scenarios by providing IT teams with deep insights into the user experience. GSX Management for Office 365 includes powerful usage reporting, security auditing, and enterprise-class administration. GSX is an IBM Business Partner as well as a Microsoft Systems Center Alliance Partner and a Microsoft Gold Partner. For more product information and partner opportunities, please visit www.gsx.com.


News Article | May 24, 2017
Site: www.techrepublic.com

Malware has been around for decades now. And as our reliance on computing systems has grown, so too has malware proliferation. While antivirus applications were once the key element in preventing infections from occurring (and subsequently spreading), malware has evolved over time in various ways, similar to how our computer usage has changed. With the changes to malware and its behaviors, the methods of detection and protection have had to be modified to prevent infections from assorted malware types, like spyware, ransomware, and adware—and in the case of zero-days, to mitigate the impact while limiting the exposure as much as possible. With the recent WannaCry ransomware infection affecting users on an international scale, the stakes are extremely high for those who rely on technology to protect their data at all costs. This is especially true of critical systems, such as those that provide life-saving care in hospitals, infrastructure used to manage utilities, and information systems used in government services. The approach to data security is not a one-size-fits-all solution, as it varies based on the organization's needs and the resources available to it. Consideration must also be given to complying with any regulations that may exist specific to your industry. With that said, safeguards are merely that. The risk associated with malware infections is always present, as risk can't be eliminated. But applying multiple security applications as a layered solution provides comprehensive protection on several fronts to minimize the threat of a potential outbreak in accordance with best practices. Keeping current with Windows Updates ensures that your clients and servers will be patched against any known threats. Vulnerabilities that exist in the form of zero-days will not be covered since that is not possible—and yet the WannaCry infection managed to infect more than 150 countries at such an alarming rate, despite a patch having been readily available almost two months prior to the attack. With patch management playing such a crucial role in on-going system protection, there is no end to the tools available to organizations —small, medium, or large—to help ensure that their systems are current. First-party tools available from Microsoft, such as Windows Server Update Services, which is included as a service of Windows Server or Systems Center Configuration Manager (SCCM), can manage patches, from deployment to remediation with included reporting on the status of all managed devices for first- and third-party applications. As stated previously, each organization will have differing needs and resources available to best manage the network and its data. While some commonalities exist, such as firewalls and intrusion prevention systems (IPSes), these devices provide filtering of traffic at the ingress/egress of the network. Alongside firmware updates and signatures, these devices also offer manual configuration to better suit your network's protection requirements. Active monitoring of the health of these devices, along with updating configurations as necessary to match the network's needs, will result in enhancing the network's security posture and help enable the security appliance to stave off attacks. While these devices may not necessarily be Windows-based devices, I included them here because of the real-world benefit they provide in helping to mitigate unauthorized network intrusions and to fend off attacks. Hardening clients and servers is imperative to limit the attack surface from internal or external attacks. The process of hardening a Windows client will differ from a Windows server, in that the aim for their use can vary drastically. By assessing what the devices will be used for, you can determine how the device should be locked down from a security standpoint. Keep in mind that any applications, services, and connected devices that are not needed or that are deprecated (such as the SMBv1 protocol that allowed the WannaCry exploit to proliferate) should be considered a potential attack vector that may be exploited and should be disabled immediately. Microsoft offers the Microsoft Baseline Security Analyzer (MBSA) for clients and servers alike to perform vulnerability assessments for devices and the services that run atop them. It also makes recommendations on how to harden them for the utmost security without compromising services. For newer OSes, such as Windows 10 and Windows Server 2012/2016, MBSA will still work, though it may be used in conjunction with the Windows Server Manager app to identify compliance with best practices, troubleshoot configuration errors, and identify operating baselines used to detect variations in performance, which may be an indicator of a compromised system. Let's face it, a computer is only as reliable as the data it works with. If said data has become compromised, corrupt, or otherwise lost its integrity—say through encryption by ransomware—it will cease to be useful or reliable. One of the best protections against ransomware in general is a good backup system. As a matter of fact, several backup systems are better still. Since data can be backed up to several different media at once, an incremental backup to a local drive that you can transport with you, alongside a constant backup to cloud storage with versioning support, and a third backup to a network server with encryption provides ample redundancy so that if your local drive becomes compromised, you still have three possible data sets to recover from. The Backup And Restore Utility native to Windows clients and servers provides a lightweight solution for backing up local data across multiple storage types. Meanwhile, OneDrive offers excellent cloud backup capability. Third-party software to centrally manage data backups across an organization or to/from the cloud is available from several providers as well. Encrypting data on the whole will not prevent your computer from ransomware infections, nor will it prevent a virus from encrypting the already encrypted data should the device become infected. Be that as it may, some apps use a form of containerization to sandbox data that is encrypted, rendering it completely unreadable by any process outside the container application's API. This is extremely useful for data at rest since it prevents outside access unless it's through the designated application. But it does nothing for data in motion or data that is being transferred over the network. In cases where transmission is required, the de facto standard is virtual private networking (VPN), since it creates an encrypted tunnel by which to send/receive data to/from, ensuring data is protected at all times. Unfortunately, the network is often set up and configured during the installation period of new hardware and then it's left to operate unchecked until something fails. Networking equipment, including routers, switches, and wireless access points, require updated firmware and proper configuration, along with proactive monitoring to address trouble points before they become full-blown issues. As part of the configuration process, an optimized network will be set up for Virtual LANs (VLANs) or segment traffic and should be managed to ensure that data gets where it needs to go in the most efficient manner possible. Another security benefit of VLANs is the ability to logically quarantine malicious traffic or infected hosts so that they can't spread the infection to other devices or parts of the network. This enables administrators to deal with compromised hosts without risk of spreading the infection or to simply shut down the specific VLAN altogether to effectively cut off the device(s) from the internet until remediation has occurred. Policies are often used by larger organizations to enforce compliance with rules and regulations by their employees. However, besides being a document that dictates the rules of the workplace, policies can also serve as guidelines for end users to follow before an attack takes place and as a survival guide during and after an attack occurs. While policies do not inherently stop malware at a technical level, if written properly they can address known issues or concerns with respect to data security and arm employees with useful information that could prevent an infection from spreading. Policies may also direct them to provide feedback to IT support to remedy a reported issue before it becomes a larger problem. Policies should always be considered "drafts" in a sense. Technology is dynamic and ever changing, so the policies that are in effect must change too. Also, be mindful of any restrictions or regulations that may apply to your field. Depending on the industry, writing policies can get tricky and should be addressed with management (and perhaps legal) teams for accuracy and compliance. As with instituting policies, there is no direct correlation between documenting change management process (or recording all changes to clients/servers, including patch deployment, software upgrades and baseline analyses) and preventing ransomware outright. However, detailing changes made to systems configurations, along with the other measures previously listed, can have a profound effect on IT's ability to respond to threats proactively or reactively. Furthermore, it allows for adequate testing and measurement of results that any changes made to systems has on services provided and uptime availability. Lastly, it offers a record of the changes made (alongside their results), which administrators, contractors, and other support personnel can review to determine the cause of some issues or possibly address their recurrence in the future. For a comprehensive set of documentation to be useful, you need input from various support teams—including systems and network administrators, help desk staff, and management—to create a documentation process that is effective yet simple to follow and easy to manage. Never underestimate the value of proper training for all staff, not just IT. Protecting against malware is not solely IT's job. It's everyone's responsibility since it affects everyone and can be essentially brought on by anyone at the organization. Considered a preventative measure, training that focuses on identifying possible malware attacks, such as phishing, can be an effective tool in preventing malware campaigns against your organization from compromising sensitive data. End-user training should center not just on identifying malware attack attempts, but should also target mitigation techniques that users can take to prevent or slow down infections should they suspect their computers have been compromised. Finally, no training is complete without informing users about the organization's expectations with respect to their responsibilities on reporting issues the instant they spot something out of the norm. The aim of a risk assessment (RA) and risk management (RM) process is to identify internal and external threats (also called hazards) and the equipment and services that are affected by them, as well as to analyze their potential impact. The management portion of RA involves evaluating this data to prioritize the list of risks and identify the best plan of action in mitigating them. RA and RM can help you pinpoint the trouble spots and implement an ongoing plan to prevent these issues from negatively affecting your organization. At the very least, RA/RM allows IT to focus its efforts on aligning the company's resources with the devices that pose the greatest threat if compromised, such as mission-critical systems. This process enables IT, management, and compliance/regulation entities to best determine the path forward in identifying equipment, mitigating hazards, determining the order in which to resolve threats, and evaluating the assessment itself so that procedures can be updated and corrective actions modified as risks change over time. Does your organization rely on multi-layered security measures such as those we've looked at here? Share your advice and opinions with fellow TechRepublic members.


News Article | May 11, 2017
Site: www.businesswire.com

MCLEAN, Va.--(BUSINESS WIRE)--The Space and Naval Warfare Systems Center (SSC) Atlantic awarded Science Applications International Corp. (NYSE: SAIC) a task order to perform command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) engineering upgrades and integration for tactical vehicles. The task order has a one-year base period of performance, a six-month option, and a total award value of approximately $61 million if the option is exercised. Work will be performed at Fort Bragg, North Carolina; Charleston, South Carolina; Wahiawa, Hawaii; and Vicenza, Italy. Under the task order, SAIC will upgrade and integrate the C4ISR application and hardware kits, known as capability sets (CS), for the High-Mobility Multipurpose Wheeled Vehicles (Humvees) and the Mine Resistant Ambush Protected All-Terrain Vehicles (M-ATVs). The work will support the Army Program Office for Mine Resistant Ambush Protected Vehicles and the Army Product Manager Light Tactical Vehicles, as part of the Army Network Modernization Plan. “SAIC is excited to continue providing tactical vehicle integration and engineering support services to SSC Atlantic and the Army,” said Tom Watson, SAIC senior vice president and general manager of the Navy and Marine Corps Customer Group. “Under this contract, we will provide critical C4ISR integration to help improve mission capabilities on a number of Army platforms.” The task order also covers CS-specific C4ISR tactical vehicle integration, engineering, and technical support services that SAIC provides to SSC Atlantic, including procurement, logistics, material kitting, and quality assurance. SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC’s more than 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in McLean, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom. Certain statements in this announcement constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. These statements involve risks and uncertainties and a number of factors could cause our actual results, performance, achievements, or industry results to be very different from the results, performance, or achievements expressed or implied by such forward-looking statements. Some of these factors include, but are not limited to, the risk factors set forth in SAIC's Annual Report on Form 10-K and other such filings that SAIC makes with the SEC from time to time, which may be viewed or obtained through the Investor Relations section of our web site at www.saic.com. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements, which speak only as of the date hereof.


News Article | May 9, 2017
Site: www.prweb.com

Fpweb.net, a managed services and cloud provider with a global infrastructure and headquarters in St. Louis, Missouri, now offers network engineer service among its managed services. Fpweb has disrupted the IT industry with its expert, all-USA-based, 24/7 Absolute Support® on-premises, or in any cloud. Expanding on its menu of managed services, Fpweb now provides this managed operating system network engineer service in a monthly subscription model. Fpweb’s Network Engineer as a Service provides network monitoring and troubleshooting, Hyper-V and VMware management, and Active Directory management. It also handles Systems Center and WSUS, Group Policy, domain, and virtual infrastructure management. Authentication, hardware health and maintenance, infrastructure end-of-life management, and network capacity planning are also included. DNS/DHCP/IP, as well as desktop support and OS patching for Windows, Mac, Linux are also covered, in addition to ISP management. VoIP management is also available as an add-on. Register for a complimentary, 30-minute webinar about network engineer service on May 16. Visit Fpweb.net to find out more and sign up for a 30-day trial. Email sales at fpweb dot net, or call 866-780-4678, to get started.


News Article | February 22, 2017
Site: www.marketwired.com

BOSTON, MA--(Marketwired - Feb 22, 2017) - GSX Solutions [www.gsx.com], the leading provider of monitoring and reporting solutions for on-premises and cloud unified communications -- today announced GSX 365 Insights to provide organizations a deeper understanding of their impact on Yammer to improve ROI. GSX 365 Insights is designed for community managers using Yammer for both internal and external communications, and also works with SharePoint online and on-premise. The product collects information needed to empower your business line and your company visibility on the Microsoft networks. Yammer and SharePoint have their own native dashboard analytics tools, but the data they provide is limited. GSX realizes that when it comes to communications, information is power, so GSX 365 Insights collects and presents data on a single interface that allows you to: GSX 365 Insights also allows organizations to benchmark their Yammer and SharePoint engagement, by comparing it to same-sized organizations within your industry. Community Managers can also view top documents, track the most-discussed topics on each network, and monitor the most active topics over time. The product is available for both SaaS and on-premise deployment. "With GSX 365 Insights, organizations are better able to demonstrate their Yammer and SharePoint usage and ROI," said JF Piot, VP of Product Development. "By ensuring that your communications are adequate and effective, you can start to improve the ways you share information both internally and externally from the Microsoft network." To learn more about GSX Solutions and the GSX 365 Insights tool, please visit: www.gsx.com About GSX Solutions GSX Solutions is the leading provider of monitoring and reporting solutions for unified communications, whether on-premises or in the cloud, including Microsoft Office 365, SharePoint, Exchange, Skype for Business, Blackberry servers and IBM applications. A single dashboard monitors the applications themselves, as well as all components that might impact their performance, including network, identity management, security, database, load balancer, and operating system. Powerful Office 365 management tools include advanced usage reporting, security audit, enterprise class administration, and end-to-end performance monitoring. GSX is a Microsoft Systems Center Alliance Partner, and a Microsoft Gold Partner on Messaging competency. For more product information and partner opportunities, please visit www.gsx.com All product and company names herein may be trademarks of their registered owners.


News Article | February 22, 2017
Site: marketersmedia.com

Upcoming AWS Coverage on Accenture LONDON, UK / ACCESSWIRE / February 22, 2017 / Active Wall St. blog coverage looks at the headline from Science Applications International Corp. (NYSE: SAIC) as the Company unveiled its first Amphibious Combat Vehicle (ACV) 1.1 prototype to the US Marine Corps at a ceremony held at the Company's integration facility located in Charleston, South Carolina on February 21, 2017. The vehicle is the first of the batch of 16 to be delivered for testing by the Marine Corps, where the delivery is scheduled to begin in March, under the initial contract of $121.5 million awarded on November 14, 2015. Register with us now for your free membership and blog access at: http://www.activewallst.com/register/ One of Science Applications International's competitors within the Information Technology Services space, Accenture PLC (NYSE: ACN), is estimated to report earnings on March 23, 2017. AWS will be initiating a research report on Accenture following the release of its next earnings results. Today, AWS is promoting its blog coverage on SAIC; touching on ACN. Get all of our free blog coverage and more by clicking on the link below: http://www.activewallst.com/register/ The ACV contract US Marine Corps awarded contracts to both McLean-based SAIC and Bae Systems Inc., to design prototypes for its next-gen amphibious combat vehicles. The award was made for the so-called Amphibious Combat Vehicle Phase 1, Increment 1-ACV 1.1, where the Marines will test and procure each vehicle before moving on to ACV1.2 phase. The aging fleets of Amphibious Assault Vehicles (AAVs) have been in operation since the 70's and the Marines expect to address some of the issues faced by the vehicles. Initially, the Expeditionary Fighting Vehicle (EFV) program was commissioned but cancelled later in January 2011. The existing AAVs were fielded in 80's and were fine vehicles for certain applications, but acted as a deadlock against road mines, and were not impressive in particular for mine protection. The two Companies beat a crowded field of competitors including Bethesda-based Lockheed Martin Corp. (NYSE: LMT), Michigan-based Advanced Defense Vehicle Systems Corp. And Falls Church-based General Dynamics Corp. (NYSE: GD). The Prototypes BAE Systems was awarded a contract worth $103.8 million, where it delivered the first four of the 16 amphibious combat vehicle 1.1 on February 16, 2017, for testing. BAE partnered with Italian Company IVECO Defence Vehicles to build the ACV batch, which features a 700 horsepower engine offering it an edge over the predecessor, i.e., AAV. SAIC delivered the first of its lot on February 21, 2017, which features a remotely operated .50-caliber machine gun turret, mounted cameras on the vehicle to offer 360-degree visibility, and a ‘V-over-V' hull design to ensure blast protection for the Marines inside the vehicles. SAIC partnered with the Singaporean Company ST Kinetics to develop the ACV 1.1, where it based the design on the eight-wheeled Terrex vehicle, used by the Singapore Armed Forces and developed by ST Kinetics. In addition to IED-proof design, the SAIC prototype can swim through four-foot waves and six-foot plunging surf, according to Bernie Ellis, program manager for the vehicle. SAIC's ACV is an eight-wheeled, armored amphibious vehicle, designed to offer improved survivability, mobility, lethality, and C4ISR capability tailored to transport Marine Corps fighting units from ship to shore. The design from SAIC comes with 600 horsepower engine to deliver outstanding mobility while offering excellent fuel economy. SAIC Growth Prospects SAIC is among the major players in the segment with a proven track record for more than 10 years where it has been modifying and upgrading armored vehicles for the Department of Defense, ensuring advanced protection during combat and also securing command and control and repair capabilities. On December 20, 2016, SAIC and root9B partnered to offer advanced cybersecurity simulation and training to government clients. Prior to this agreement, on December 15, 2016, SAIC was awarded a potential $84 million contract by Space and Naval Warfare Systems Center (SSC) Pacific to deliver network service solutions and engineering support to the US Navy and joint Department of Defense shore units across the world. Stock Performance On Tuesday, February 21, 2017, the stock closed the trading session at $88.39, slightly rising 0.87% from its previous closing price of $87.63. A total volume of 218.83 thousand shares have exchanged hands. Science Applications' stock price surged 12.22% in the last three months, 43.94% in the past six months, and 103.34% in the previous twelve months. Furthermore, since the start of the year, shares of the Company have gained 4.61%. The stock is trading at a PE ratio of 29.17 and has a dividend yield of 1.40%. The net market capital for the Company was $3.90 billion as per Tuesday's closing price. Active Wall Street: Active Wall Street (AWS) produces regular sponsored and non-sponsored reports, articles, stock market blogs, and popular investment newsletters covering equities listed on NYSE and NASDAQ and micro-cap stocks. AWS has two distinct and independent departments. One department produces non-sponsored analyst certified content generally in the form of press releases, articles and reports covering equities listed on NYSE and NASDAQ and the other produces sponsored content (in most cases not reviewed by a registered analyst), which typically consists of compensated investment newsletters, articles and reports covering listed stocks and micro-caps. Such sponsored content is outside the scope of procedures detailed below. AWS has not been compensated; directly or indirectly; for producing or publishing this document. PRESS RELEASE PROCEDURES: The non-sponsored content contained herein has been prepared by a writer (the "Author") and is fact checked and reviewed by a third party research service company (the "Reviewer") represented by a credentialed financial analyst, for further information on analyst credentials, please email info@activewallst.com. Rohit Tuli, a CFA® charterholder (the "Sponsor"), provides necessary guidance in preparing the document templates. The Reviewer has reviewed and revised the content, as necessary, based on publicly available information which is believed to be reliable. Content is researched, written and reviewed on a reasonable-effort basis. The Reviewer has not performed any independent investigations or forensic audits to validate the information herein. The Reviewer has only independently reviewed the information provided by the Author according to the procedures outlined by AWS. AWS is not entitled to veto or interfere in the application of such procedures by the third-party research service company to the articles, documents or reports, as the case may be. Unless otherwise noted, any content outside of this document has no association with the Author or the Reviewer in any way. NO WARRANTY AWS, the Author, and the Reviewer are not responsible for any error which may be occasioned at the time of printing of this document or any error, mistake or shortcoming. No liability is accepted whatsoever for any direct, indirect or consequential loss arising from the use of this document. AWS, the Author, and the Reviewer expressly disclaim any fiduciary responsibility or liability for any consequences, financial or otherwise arising from any reliance placed on the information in this document. Additionally, AWS, the Author, and the Reviewer do not (1) guarantee the accuracy, timeliness, completeness or correct sequencing of the information, or (2) warrant any results from use of the information. The included information is subject to change without notice. NOT AN OFFERING This document is not intended as an offering, recommendation, or a solicitation of an offer to buy or sell the securities mentioned or discussed, and is to be used for informational purposes only. Please read all associated disclosures and disclaimers in full before investing. Neither AWS nor any party affiliated with us is a registered investment adviser or broker-dealer with any agency or in any jurisdiction whatsoever. To download our report(s), read our disclosures, or for more information, visit http://www.activewallst.com/disclaimer/. CONTACT For any questions, inquiries, or comments reach out to us directly. If you're a company we are covering and wish to no longer feature on our coverage list contact us via email and/or phone between 09:30 EDT to 16:00 EDT from Monday to Friday at: Email: info@activewallst.com Phone number: 1-858-257-3144 Office Address: 3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute. SOURCE: Active Wall Street ReleaseID: 455703February 22, 2017 /AccessWire/ — Upcoming AWS Coverage on Accenture LONDON, UK / ACCESSWIRE / February 22, 2017 / Active Wall St. blog coverage looks at the headline from Science Applications International Corp. (NYSE: SAIC) as the Company unveiled its first Amphibious Combat Vehicle (ACV) 1.1 prototype to the US Marine Corps at a ceremony held at the Company's integration facility located in Charleston, South Carolina on February 21, 2017. The vehicle is the first of the batch of 16 to be delivered for testing by the Marine Corps, where the delivery is scheduled to begin in March, under the initial contract of $121.5 million awarded on November 14, 2015. Register with us now for your free membership and blog access at: http://www.activewallst.com/register/ One of Science Applications International's competitors within the Information Technology Services space, Accenture PLC (NYSE: ACN), is estimated to report earnings on March 23, 2017. AWS will be initiating a research report on Accenture following the release of its next earnings results. Today, AWS is promoting its blog coverage on SAIC; touching on ACN. Get all of our free blog coverage and more by clicking on the link below: http://www.activewallst.com/register/ The ACV contract US Marine Corps awarded contracts to both McLean-based SAIC and Bae Systems Inc., to design prototypes for its next-gen amphibious combat vehicles. The award was made for the so-called Amphibious Combat Vehicle Phase 1, Increment 1-ACV 1.1, where the Marines will test and procure each vehicle before moving on to ACV1.2 phase. The aging fleets of Amphibious Assault Vehicles (AAVs) have been in operation since the 70's and the Marines expect to address some of the issues faced by the vehicles. Initially, the Expeditionary Fighting Vehicle (EFV) program was commissioned but cancelled later in January 2011. The existing AAVs were fielded in 80's and were fine vehicles for certain applications, but acted as a deadlock against road mines, and were not impressive in particular for mine protection. The two Companies beat a crowded field of competitors including Bethesda-based Lockheed Martin Corp. (NYSE: LMT), Michigan-based Advanced Defense Vehicle Systems Corp. And Falls Church-based General Dynamics Corp. (NYSE: GD). The Prototypes BAE Systems was awarded a contract worth $103.8 million, where it delivered the first four of the 16 amphibious combat vehicle 1.1 on February 16, 2017, for testing. BAE partnered with Italian Company IVECO Defence Vehicles to build the ACV batch, which features a 700 horsepower engine offering it an edge over the predecessor, i.e., AAV. SAIC delivered the first of its lot on February 21, 2017, which features a remotely operated .50-caliber machine gun turret, mounted cameras on the vehicle to offer 360-degree visibility, and a ‘V-over-V' hull design to ensure blast protection for the Marines inside the vehicles. SAIC partnered with the Singaporean Company ST Kinetics to develop the ACV 1.1, where it based the design on the eight-wheeled Terrex vehicle, used by the Singapore Armed Forces and developed by ST Kinetics. In addition to IED-proof design, the SAIC prototype can swim through four-foot waves and six-foot plunging surf, according to Bernie Ellis, program manager for the vehicle. SAIC's ACV is an eight-wheeled, armored amphibious vehicle, designed to offer improved survivability, mobility, lethality, and C4ISR capability tailored to transport Marine Corps fighting units from ship to shore. The design from SAIC comes with 600 horsepower engine to deliver outstanding mobility while offering excellent fuel economy. SAIC Growth Prospects SAIC is among the major players in the segment with a proven track record for more than 10 years where it has been modifying and upgrading armored vehicles for the Department of Defense, ensuring advanced protection during combat and also securing command and control and repair capabilities. On December 20, 2016, SAIC and root9B partnered to offer advanced cybersecurity simulation and training to government clients. Prior to this agreement, on December 15, 2016, SAIC was awarded a potential $84 million contract by Space and Naval Warfare Systems Center (SSC) Pacific to deliver network service solutions and engineering support to the US Navy and joint Department of Defense shore units across the world. Stock Performance On Tuesday, February 21, 2017, the stock closed the trading session at $88.39, slightly rising 0.87% from its previous closing price of $87.63. A total volume of 218.83 thousand shares have exchanged hands. Science Applications' stock price surged 12.22% in the last three months, 43.94% in the past six months, and 103.34% in the previous twelve months. Furthermore, since the start of the year, shares of the Company have gained 4.61%. The stock is trading at a PE ratio of 29.17 and has a dividend yield of 1.40%. The net market capital for the Company was $3.90 billion as per Tuesday's closing price. Active Wall Street: Active Wall Street (AWS) produces regular sponsored and non-sponsored reports, articles, stock market blogs, and popular investment newsletters covering equities listed on NYSE and NASDAQ and micro-cap stocks. AWS has two distinct and independent departments. One department produces non-sponsored analyst certified content generally in the form of press releases, articles and reports covering equities listed on NYSE and NASDAQ and the other produces sponsored content (in most cases not reviewed by a registered analyst), which typically consists of compensated investment newsletters, articles and reports covering listed stocks and micro-caps. Such sponsored content is outside the scope of procedures detailed below. AWS has not been compensated; directly or indirectly; for producing or publishing this document. PRESS RELEASE PROCEDURES: The non-sponsored content contained herein has been prepared by a writer (the "Author") and is fact checked and reviewed by a third party research service company (the "Reviewer") represented by a credentialed financial analyst, for further information on analyst credentials, please email info@activewallst.com. Rohit Tuli, a CFA® charterholder (the "Sponsor"), provides necessary guidance in preparing the document templates. The Reviewer has reviewed and revised the content, as necessary, based on publicly available information which is believed to be reliable. Content is researched, written and reviewed on a reasonable-effort basis. The Reviewer has not performed any independent investigations or forensic audits to validate the information herein. The Reviewer has only independently reviewed the information provided by the Author according to the procedures outlined by AWS. AWS is not entitled to veto or interfere in the application of such procedures by the third-party research service company to the articles, documents or reports, as the case may be. Unless otherwise noted, any content outside of this document has no association with the Author or the Reviewer in any way. NO WARRANTY AWS, the Author, and the Reviewer are not responsible for any error which may be occasioned at the time of printing of this document or any error, mistake or shortcoming. No liability is accepted whatsoever for any direct, indirect or consequential loss arising from the use of this document. AWS, the Author, and the Reviewer expressly disclaim any fiduciary responsibility or liability for any consequences, financial or otherwise arising from any reliance placed on the information in this document. Additionally, AWS, the Author, and the Reviewer do not (1) guarantee the accuracy, timeliness, completeness or correct sequencing of the information, or (2) warrant any results from use of the information. The included information is subject to change without notice. NOT AN OFFERING This document is not intended as an offering, recommendation, or a solicitation of an offer to buy or sell the securities mentioned or discussed, and is to be used for informational purposes only. Please read all associated disclosures and disclaimers in full before investing. Neither AWS nor any party affiliated with us is a registered investment adviser or broker-dealer with any agency or in any jurisdiction whatsoever. To download our report(s), read our disclosures, or for more information, visit http://www.activewallst.com/disclaimer/. CONTACT For any questions, inquiries, or comments reach out to us directly. If you're a company we are covering and wish to no longer feature on our coverage list contact us via email and/or phone between 09:30 EDT to 16:00 EDT from Monday to Friday at: Email: info@activewallst.com Phone number: 1-858-257-3144 Office Address: 3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute. SOURCE: Active Wall Street ReleaseID: 455703 Source URL: http://marketersmedia.com/blog-coverage-saic-delivered-first-acv-to-us-marine-corps-2/172298Source: AccessWireRelease ID: 172298


News Article | February 15, 2017
Site: www.cemag.us

When people find out there are invisible particles in their food or water, they become alarmed. Arizona State University professor Paul Westerhoff has dedicated his career to producing research that answers people’s questions and moves them past fear. “The things I do are not from a scare-mongering point of view, but trying to answer objective engineering questions,” says Westerhoff, a professor of in the School of Sustainable Engineering and the Built Environment at ASU. Westerhoff, an environmental engineer, has been named one of three Regents' Professors for the 2016-2017 academic year. Regents’ Professor is the highest faculty honor and is conferred on full professors who have made remarkable achievements that have brought them national attention and international distinction. An expert in nanoparticles, Westerhoff started working on the tiny specks even before they had a name. As a graduate student, he worked on water filtration. “At that time we talked about these things called ‘sub-micron particles,’ which we couldn’t measure very well but we did a bunch of experiments with them anyway,” he says. A few years later, when the term “nano” was becoming popular, he realized he had already done it. “So I put in my first proposal, and it got funded because I was one of the first people who had data!” Now, he focuses on using nanoparticles to treat and purify water, an interest that was piqued by a hydrology class he took as an undergraduate. “I understand water,” he says. “I like fishing and swimming and kayaking, and I can go to a river and not only understand the hydrology. But I know why the water is a certain color. And I know where it came from. And I know all the fish that live in it.” From his first studies, he saw the trajectory of public perception about invisible and unknown substances in the environment, and how that could influence his research. “In the environmental world, initially it’s like the world’s going to end. But what I’ve learned is that these things move through predictable trends,” he says, using as an example “Silent Spring,” a 1962 book by conservationist Rachel Carson that documented the effects of the use of pesticides, including DDT. “It’s in this early stage that people are scared, while the agriculture industry and pesticide industry responded by saying that they save millions of lives. In the first few years there’s a lot of uncertainty,” he says. “Then researchers come along and help reduce that uncertainty. “Then there’s another phase where politics come in, and there are cost decisions and people think about regulations and finding alternatives,” he says. “We still find DDT in the environment, but it’s regulated and people really aren’t scared of it. It’s like a 20-year cycle.” Westerhoff says the key is to know which phase is coming next. “As a researcher you want to be focusing on what will be the important question to answer in three to five years, before people even know it’s a question,” he says. “In nano, we were ahead of the game in thinking, ‘Maybe this isn’t so bad, maybe we can use it.’” Now he’s deputy director of the Nanotechnology Enabled Water Treatment Systems Center, which is focused on developing compact, mobile, off-grid systems that can provide clean water to millions of people who lack it. Many of Westerhoff’s research projects have been funded by agencies such as the National Science Foundation and the Environmental Protection Agency, but he also works with water utilities, non-governmental organizations, and industry partners. “Industry wants to know the answers to things. It’s moved out of the scientific ‘what if’ toward reality,” he says. “They all have agendas and as long as you understand their agendas, they ask interesting questions.” Westerhoff was commissioned by the environmental activist group Friends of the Earth to see whether there were nanoparticles in powdered infant formula after the manufacturer declined to reveal whether there were. His lab found needle-shaped nanoparticles in the formula. “In Europe, there’s a warning on their use in cosmetics but yet they’re in infant formula,” he says. They discovered the nanoparticles did not dissolve in either water or saliva, but when they put them in stomach fluid, they dissolved instantly. “They did it to deliver calcium to the gut very efficiently, so they didn’t have to use as much,” he says of the manufacturer. Friends of Earth was concerned that the formula labels didn’t disclose the presences of nanoparticles. “That’s an example of where one group sees something as a risk to society but a company sees it as a benefit.” He’s also seen the evolution of how scientific research is portrayed in the media. In 2008, he supervised a doctoral student on a research project that studied the use of nanosilver in socks to eliminate stinky feet. They wanted to know: Did the particles wash out of the socks and into the water supply? The answer was yes. Journalists jumped all over the story. One headline read, “Toxic socks?” “We kept telling them the amount of silver is very small and won’t affect anything. None of them got it, and everything they wrote was over the top,” Westerhoff says. “They don’t want to hear that ‘everything is safe, there’s no problem.’ They want to hear ‘there’s nanoparticles in donuts.’” In 2015, Westerhoff was named an Outstanding Doctoral Mentor by ASU’s Graduate College. His former students said he is able to deftly balance the guidance that students crave with the independence they need to cultivate. Troy Benn, who worked with Westerhoff on the nanosilver paper and is now an engineer in Montana, says: “For a young kid it was a little bit shocking because you do all your research in a lab and you don’t talk to anyone outside, and all of a sudden people are asking you what you did. “Paul’s good at knowing how much guidance each student needs because they’re all unique.” Kyle Doudrick, who was a graduate student at ASU from 2008 to 2013, says that even with the enormous workload of a full professor, including travel, plus the administrative duties of a vice provost, Westerhoff found time to meet weekly with the students he advised. “It was a good balance of managing but also letting you find yourself in your independence but not so hands off that you had no idea what’s going on,” says Doudrick, who is now an assistant professor in the Department of Civil and Environmental Engineering and Earth Sciences at the University of Notre Dame. “The research I did was on nitrate as a contaminant in water,” he says. “He wasn’t the expert but what he was good at was making the student the expert, and that’s the whole purpose of the PhD, is to become an expert at something.” Even now, Westerhoff teaches ASU 101, the required, one-credit course that all first-time freshmen take. “I ask them why they want to be engineers, and about half have a life story of something they want to solve. They have a deep passion. “And if you don’t hear that until you see them in grad school, you’ve lost touch with what motivates people.”

Loading Systems Center collaborators
Loading Systems Center collaborators