How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
DoD Network Solutions Forum: Delivering...
A View from the Frontline of the DoD’s Network Defense No organization controls more resources—personnel, computing power, weaponry, and communications networks—than the U.S. Department of Defense (DoD). Deployed worldwide in force, the department’s demands for 24x7, redundant, and secure networks is parallel to none. Given these requirements, the DoD needs superior technology, strategies, and support to meet its dynami...
Full-Motion Video Conference: The Promi...
Experts from OUSD, Army, USMC, DISA, NGA, General Dynamics, Textron, BAE Systems, SAIC, L-3 Communications, Northrop Grumman, Lockheed Martin, SAIC, Marshall Communications, HaiVision Network Video, Z Microsystems and many more examine: OSD/Services/IC Plans, Needs and Initiatives Status of Key Programs – Gorgon Stare, Valiant Angel, NOVA, etc. FMV and Wide-Area Persistent Surveillance Manned/Unmanned Aircraft Platforms; Space-based Capa...
Foundation of Federal Budget Analysis
About This Training: Government agencies are mandated to improve accountability, transparency and budget performance. This introductory course combines lectures, discussions, group exercises, and case studies to familiarize students with formulating, executing and analyzing government budgets. This course is designed for federal employees and contractors who are new to the federal budget process. What separates this course from other governme...
The Magic of Exceptional Customer Service
The Magic of Exceptional Customer Service Class Format: Webinar Instructor: Doug Lipp Date: Wednesday, September 8, 2010 — CHANGED DATE Time: 1:00 – 2:30 PM ET Fee: Free Course Description Doug’s Walt Disney University training experience provides fascinating stories, unique insights, and invaluable lessons. Learn how certain skills, attitudes and behavior contribute to delivering exceptional customer service. Doug’s ac...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
UDT Asia
UDT ASIA 2010 is the only conference and exhibition within Asia dedicatedto Undersea Defence Technology. New submarine programmes planned in the next 5–10 years for Singapore, Malaysia, Australia, Taiwan, South Korea, India and Pakistan An expanding market for undersea port and harbour security solutions UDT ASIA will bring together the key buying regions with global solution providers to address the ever changing nature of global milita...
Gov 2.0 Summit 2010
From open data to social media, from web services to mobile applications, from crowdsourcing to cloud computing, government is exploring the power of the latest wave of technology to lower the costs of government while increasing its capabilities. Last year's inaugural Gov 2.0 Summit brought leaders from federal, state, and local government together with individual and corporate entrepreneurs, citizens, not-for-profits, and educators, to artic...
Computer Forensics for the Security Pra...
About This Training: Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Dis...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.