Predictive Analytics & Data Mining Cour...
LEARN WHAT MANAGERS & PRACTITIONERS REALLY NEEDTO KNOW ABOUT PREDICTIVE ANALYTICS & DATA MINING Get up to speed in data mining faster and more effectively than with any other training program available. Leverage highly valuable and impactful prospective insight from within your existing data through an intensive course series with over 20 years of innovation.If you want to learn what really works in predictive modeling and why you shou...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Your Place or Mine? Incoterms® Explained
Incoterms® 2010, short for the 2010 version of International Commercial Terms, are internationally accepted rules for interpreting the responsibilities of parties to a sale. They are contractual “short hand” for the Terms of Sale that define the obligations, risks, and costs of the seller and buyer for the international sale of goods without requiring the parties to negotiate every detail of common transactions. They are also w...
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer:
FEDINSIDER Location:
Albuquerque, NM
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
Cost Estimating and Contract Pricing
Attend an upcoming National Contract Management Association (NCMA) National Education Seminar! Cost Estimating and Contract Pricing This seminar offers best practices and answers important questions in cost estimating and contract pricing. What should a product, service, or integrated business solution cost? How much is it worth to the buyer? What is the appropriate rate of return or profitability for a product or service? What constitutes a f...
Top 6 Tools to Monitor Contract Performance
The Contracting Officer’s Representative (COR) has the primary responsibility for monitoring contractor performance for the Contracting Officer (CO). The COR’s influence on contract monitoring begins during acquisition planning, but once the contract is awarded the COR becomes the lead agent for contract surveillance. This webcast introduces six tools that will help you monitor contractor performance and provide timely and effectiv...
Big Data Everywhere DC
Big Data Everywhere is one-day conference focused on Hadoop and surrounding technologies that brings together users and developers to share their experience via technical sessions and user success stories. Industry experts will exchange Hadoop knowledge, share best practices, and discuss use cases and business applications. The event is a full day conference with a full breakfast, lunch, and la...
IT Security Crisis
Today’s dynamic IT environments continue to become more complex than ever before. As a result, knowing what hardware and software you have or procured, their lifecycle status, current manufacturer, Windows compatibility and Open Source exposure are key to ensuring what was initially a secure platform, does not suddenly become a major vulnerability. If you can’t describe your IT baseline accurately and immediately, you can’t p...
Government Leadership in the Data Age
The declining cost of data collection, storage, and processing coupled with ever-growing sources of digital data are spurring incremental increases in the amount of information available to government, law enforcement, intelligence, health agencies and other agencies. Big data is transforming the way we govern and live, and the Administration is taking steps to minimize potential risks such as loss of privacy, discrimination, and threats to c...
May 12, 2015
Organizer:
FEDINSIDER Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.