Back to Search Begin New Search Save Search Auto-Notify
Harnessing the Full Potential of Contin...
CloudBees CI is a powerful enterprise solution for Continuous Integration (CI) that leverages the flexible and robust Jenkins engine. With its added features, this solution significantly boosts scalability, manageability and performance for organizations utilizing Jenkins. Attendees joined CloudBees experts for a webinar and learned how Jenkins and CloudBees CI compare against each other and delve deeper into the best practices for: Software d...
Add Favorite
The Anatomy and Drivers of Peak Perform...
Watch a complimentary webinar to build an understanding of the latest research demonstrating the foundational importance of resilience to innovation. Discussion will include a review of key mindsets and behaviors that build the skills that help people navigate ambiguity, as well as strategies for planning amid uncertainty, and various types of creativity that surface novelty. Viewers will leave with practical tips to foster innovation and resi...
Add Favorite
FortiGate and SD-WAN
Discover the power of FortiOS and how it is leveraged to create secure and efficient network architecture. Firewalls, the backbone of any network’s cybersecurity architecture, need to level-up in order to support the demands of the modern world. Especially as SD-WAN (Software-Defined Wide Area Networks) becomes more prevalent across the nation as networks expand to cover more edges, the need for tools that are both powerful and easy to u...
Add Favorite
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Ammar Jaghlit, and John Vernetti provided live demonstrations as well as answered any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications...
Add Favorite
Empowering Virtual Training in Governme...
In today's digital landscape, government agencies are increasingly turning to virtual platforms for training, education, and seminars. This transition requires sophisticated tools and strategies to ensure seamless and effective experiences. As technology reshapes how government agencies like the Department of Commerce (DOC) and its sub-agencies approach these initiatives, it's crucial to stay updated with best practices and emerging trends. Wa...
Add Favorite
Modernizing Government ERP Systems to I...
Enterprise resource planning (ERP) systems are integral to streamlining operations and centralizing data. But rigid architecture can make it difficult to adapt to modern technologies or tailor to evolving mission requirements. And upgrading ERP systems can be lengthy, disruptive, and costly. Attend this webinar to explore a proven approach to ERP modernization: a low-code agility layer to unlock adaptability and empower business users to drive...
Add Favorite
Splunk Attack Analyzer Webinar
Participants joined us for a webinar with Splunk to learn how Splunk Attack Analyzer can help them. Splunk Attack Analyzer automates the analysis of suspected malware and credential phishing threats. Unlike other analysis tools that require cumbersome manual workflows, the solution automatically follows and analyzes each step in complex attack chains to get to the final payload. Splunk Attack Analyzer renders a verdict and extracts forensics t...
Add Favorite
Babel Street GEOINT Webinar
Learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizing. Attendees of this webinar...
Add Favorite
Rethink Your Contact Center with CloudHesive
On Thursday, June 6, CloudHesive, Amazon Web Services (AWS) and Carahsoft hosted an engaging webinar on the dynamic world of contact centers. Navigating attendees through the latest transformations in contact center operations and learning strategies to thrive in this ever-evolving industry. Attendees of the webinar left with a deeper understanding of:The contact center spaceThe ConnectPath CX solution and its benefitsCurrent trends in contact...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Back to Search Begin New Search