Geospatial Summit 2011
Geospatial Management Strategies will address the growing desire by non-technical managers to tap the power of location-enabled and place-based information streams to improve decision making processes.
LIVE DEMO: 70% Labor Savings for Micros...
If you are running your DNS or DHCP services on Microsoft, this live demo is for you. See why Infoblox’s IPAM for Microsoft DNS/DHCP makes your life easier! You will also see Tolly Certified ROI data so you can look smart with your boss! You’ll see and learn: • How centralized management of DNS, DHCP and IP Address Management can lead to increase in network up-time and efficiency • How you can gain labor savings of up to...
WAVE Matchmaking Mixer
The attendees will have the opportunity to sit down for ten minute one-on-ones with representatives from government agencies, prime contractors and exhibitors of their choice. Our confirmed exhibitors/one-on-one participants as of June 9, 2011 are: Booz Allen Hamilton Lockheed Martin Northrop Grumman SAIC SBA HHS VA Department of Treasury V-WISE The attendees will also have the opportunity for more networking with each other.
Getting ready for IPv6 - the first five steps
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babble Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: Setting up your DNS fast and securely with easy to use workflow wizards Running name servers over IPv6 Registering and delegating to IPv6 Setting up forward- and...
Prepare Your Network for IPv6 with Expe...
Two Ways to Participate: Watch the Live Broadcast Online Watch the event online as Cricket presents from Washington D.C. A lucky online viewer from each broadcast will be selected to win an iPad 2®! Join us online or in-person on June 7 as world IPv6 expert Cricket Liu, author of several books on DNS and IPv6, presents a variety of IPv6 topics, including: IPv6 basics Setting up forward- and reverse-mapping with AAAA and PTR records Running...
Unleash The Power of Microsoft DNS/DHCP...
We would like to extend a personal invitation for you to join one of two 30 minute live demonstration sessions of Infoblox IPAM for Microsoft DNS/DHCP on Thursday May 12th at either 10 AM ET or 4 PM ET. We’ll show you how centralized management of DNS, DHCP and IP Address Management can lead to increase in network uptime, efficiency and cost reduction. We’ll also cover: • Enterprise requirements for IP address management ...
FREE Seminar: "Doing More with Less: Ac...
With budgets up in the air, continuing resolutions continuing, and a call to trim staff but maintain productivity, you need to keep the work moving with less time, less money, and less personnel. That's why Feith Systems is coming to DC to share the secrets of how to do more with less and still deliver results. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Join us on April 27th for a FREE...
FREE Seminar: "Achieve Your Workflow Go...
Join Feith Systems April 27th in DC for free for an exclusive Washington Workflow Workshop! One day only, see the latest applications in maximizing your Business Processes, best practices in streamlining your Workflow, creating lasting efficiency in Operational Control, and so much more. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Feith Workflow Workshop Presents a FREE Event Achieve Yo...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.