ASTI Webinar: How to Manage Field Workf...
Need to access project information from wherever you are? This webinar will show you a few ideal field workflows using a mobile device with PlanGrid. Go beyond basic and see how easy and intuitive it is to innovate with PlanGrid. Learn how to: Execute a daily progress report. Successfully complete a pre-pour checklist. Generate and close out tasks directly from the field. Generate an RFI directly from the field. Place a video taken in the fiel...
A New Data Management Approach
Leadership and decision-makers are losing visibility of their budgets across mission-critical projects to ensure compliance. As agencies today face and experiencing extreme scrutiny on their spending budgets, with the added challenges of understanding and integrating data from many portfolios, strategic plans and enterprise architecture are failing. Register today, to learn how InQuisient’s Data Management approach to enterprise planning...
Department of the Navy Oracle II ESLA a...
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. Please join DLT Solutions and Oracle Navy Team for a technology briefing that will highlight the DON Oracle II Enterprise Software License Agreement (ESLA) held by DLT Solutions. This briefing will include a training on how to utilize DLT’s Marketplace, an overview of Oracle’s Core Technology & ESLA product offering...
April 15, 2020
Organizer:
DLT Location:
Virtual
Why is Next-Generation Endpoint Protect...
Today, organizations across all industries are facing an onslaught of cyberattacks. Public sector organizations are among the top three most exploited sectors in the United States. It is clear that U.S. federal agencies, schools, health systems, as well as state and local entities, need an effective solution that can protect against both simple and sophisticated cyber threats. It may seem like a daunting task, but by educating cybersecurity te...
What Components Make Up Next-Generation...
Today, organizations across all industries are facing an onslaught of cyberattacks. Public sector organizations are among the top three most exploited sectors in the United States. It is clear that U.S. federal agencies, schools, health systems, as well as state and local entities, need an effective solution that can protect against both simple and sophisticated cyber threats. It may seem like a daunting task, but by educating cybersecurity te...
Department of the Navy Oracle ESLA and...
Please join DLT Solutions and Oracle Navy Team for a technology briefing that will highlight the DON Oracle II Enterprise Software License Agreement (ESLA) held by DLT Solutions. This briefing will include a training on how to utilize DLT’s Marketplace, an overview of Oracle’s Core Technology & ESLA product offerings, and a deep dive into Oracle’s FedRamp Authorized Oracle Cloud Infrastructure (OCI) and Oracle platform as...
March 4, 2020
Organizer:
DLT Location:
San Diego, CA
Department of the Navy Oracle ESLA and...
Please join DLT Solutions and Oracle Navy Team for a technology briefing that will highlight the DON Oracle II Enterprise Software License Agreement (ESLA) held by DLT Solutions. This briefing will include a training on how to utilize DLT’s Marketplace, an overview of Oracle’s Core Technology & ESLA product offerings, and a deep dive into Oracle’s FedRamp Authorized Oracle Cloud Infrastructure (OCI) and Oracle platform as...
February 19, 2020
Organizer:
DLT Location:
Norfolk, VA
The New Standard in Endpoint Security f...
Please join CDWG and CrowdStrike as we discuss endpoint security for New York K-12 schools. We will discuss legacy vs next-Gen A/V and how time to value is an important measure when evaluating security solutions.Time-to-value measures the time it takes for a solution to be fully operational, including the ease with which it can be implemented and used. Time-to-value is critical because a solution that can’t be deployed or fully used, lea...
What do agencies need to do to protect...
Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC). How can agencies continuously monitor security performance within their contractor and subcontractor ecosystem? How should they work w...
KETIV - Introduction to Advanced Manufa...
What will be covered? Generative Design: A design exploration technology that enables multiple solutions based on real-world constraints and requirements. Additive Manufacturing: The set of manufacturing processes that progressively adds layers of material to manufacture your products. Hybrid Manufacturing: The process of using both additive and subtractive manufacturing. Injection Molding: Thermoplastic injection molding, which is a method fo...
January 21, 2020
Organizer:
KETIV Location:
Brea, CA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.