Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
Managing Procurement in the Age of Open...
Few topics generate more discussion among Federal professionals than procurement. What are considered the best strategies to acquire products and services that meet current and future agency requirements? How can you and your team make the most of available funding this year and what steps can you take to ensure that new systems and services are aligned with organizational business and mission objectives? Login to view this interactive discuss...
Making Your Website More Effective: Int...
Making Your Website More Effective: Intro to Proven Usability Techniques Class Format: Two–Day Course Instructor: Hal Miller–Jacobs, UsabilityCoach.com Date: Wednesday – Thursday, February 10 – 11, 2010 Time: 9:00 am – 4:00 pm Place: Department of Labor (DOL) Directions to DOL Fee: $400 federal, state, or local U.S. government; $600 for non–government Course Description Almost anyone can put up a website or...
OMB Changes the Rules of Federal Cybers...
Government Executive and the SANS Institute are partnering to co-produce the Government Executive Cybersecurity Insider Series, monthly expert briefings on pressing cybersecurity issues. These hyper-current events will feature discussions with high-profile federal officials involved in crafting cybersecurity policy and implementation strategies. Government Executive Media Group and the SANS Institute invite you to attend the first of the new s...
Data Center Consolidation Planning and...
Workshop Description This Potomac Forum Training Workshop provides an overview of data center consolidation in compliance with the Federal Data Center Consolidation Initiative. The Workshop provides a detailed breakdown of major components, reporting requirements and intended goals of the Federal Initiative and how to implement the initiative in the government environment to achieve an effective, cost effective and compliant data center consol...
Oracle Open Storage Discovery Day
Sun Storage: Discover Speed, Simplicity, and Savings Too often in today’s datacenter, rapid data growth results in inefficient, hard-to-manage storage with sluggish throughput, declining quality of service, and escalating costs. As part of your introduction to the new Sun family of offerings from Oracle, we invite you to join us at a FREE half-day seminar on how to overcome this challenge. You’ll discover how Sun Storage 7000 Unifi...
June 15, 2010
Organizer:
Oracle Location:
McLean, VA
Acrobat Webcast: Adobe Solutions for La...
Acrobat Webcast: Adobe Solutions for Law Enforcement Agencies Join Adobe and Carahsoft for an informative webcast to discover how law enforcement agencies across the country are relying on Adobe Acrobat to help with interoperable communications, while cutting down their paper footprint. Through PDF Portfolios, you can utilize Adobe Acrobat Professional as a container of information, giving you the ability to share, comment, and secure multiple...
Gov 2.0 Camp Rocky Mountains
Government 2.0 Camp Rocky Mountains is the first Government 2.0 camp for the Rocky Mountian Region. This camp will bring together government leaders, policy makers, scholars, students, contractors, and government employees to discuss and work collaboratively on improving government through technology. This event is open to anyone interested in improving government. Our focus will be the use of technologies, like Web 2.0 and social media tools...
June 12, 2010 Location:
Boulder, CO
Cyber Security Summit 2010
This conference will provide you with broad insight and analysis into the complex world of cyber security. Defending against and defeating cyber attacks will require the combined efforts of both the public and private sectors, working to develop new technologies and new approaches for maintaining real-time protection of their individual networks. Hear how executives expect the industry and policies to develop, plus: Find out about the technolo...
Bicoastal Counter Terrorism Summit
The 2010 Bicoastal Counter Terrorism Summit features several global subject matter experts from US and British Intelligence Agencies. The Summit is designed to facilitate a collaborative data exchange through a workshop environment. Monday: Warrior Mindset The Warrior Mindset is a critical aspect for successfully dealing with high-fear/high-stress situations. This course focuses on what the Warrior Mindset is and how to develop it. Participant...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.