Hazardous Waste Management Webcast
In this interactive course with a live instructor, you will gain the knowledge you need to manage hazardous waste in accordance with the latest regulatory requirements. While meeting your 40 CFR 265.16 training requirements, you will learn how to properly classify and accumulate hazardous waste, how to ensure your waste containers meet EPA and DOT requirements, how to avoid hazardous waste manifest errors, and how you must prepare for and resp...
3rd Annual San Diego Regional Security...
The 3rd annual "C4ISR, CyberSecurity, Robot Platforms & Sensors Conference" will be held Sep. 14 & 15, 2010. The San Diego Chapter of ISSA holds its annual Security Conference on Sep. 14 in conjunction with The Security Network. The Mission of The Security Network is to advance security by “Fostering Innovation through Collaboration” worldwide. The non-profit, non-partisan The Security Network promotes rapid commercializati...
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
The Video Revolution
The Video Revolution Class Format: Webinar Instructor: Michael Rosenblum, Rosenblum TV Date Tuesday, September 14, 2010 Time: 1:00 – 2:30 PM ET Fee: $50 federal, state, or local U.S. government $75 non-government Description Small, inexpensive, and easy-to-operate digital camcorders and desktop and laptop editing software have changed the face of video and television production. What used to be expensive, complicated, and difficult is n...
How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
Foundation of Federal Budget Analysis
About This Training: Government agencies are mandated to improve accountability, transparency and budget performance. This introductory course combines lectures, discussions, group exercises, and case studies to familiarize students with formulating, executing and analyzing government budgets. This course is designed for federal employees and contractors who are new to the federal budget process. What separates this course from other governme...
The Magic of Exceptional Customer Service
The Magic of Exceptional Customer Service Class Format: Webinar Instructor: Doug Lipp Date: Wednesday, September 8, 2010 — CHANGED DATE Time: 1:00 – 2:30 PM ET Fee: Free Course Description Doug’s Walt Disney University training experience provides fascinating stories, unique insights, and invaluable lessons. Learn how certain skills, attitudes and behavior contribute to delivering exceptional customer service. Doug’s ac...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
Gov 2.0 Summit 2010
From open data to social media, from web services to mobile applications, from crowdsourcing to cloud computing, government is exploring the power of the latest wave of technology to lower the costs of government while increasing its capabilities. Last year's inaugural Gov 2.0 Summit brought leaders from federal, state, and local government together with individual and corporate entrepreneurs, citizens, not-for-profits, and educators, to artic...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.