The 2010 Social Services Performance Co...
Implement Performance Measurement Practices to Empower Change in Social Services Organizations Develop and utilize performance measures to evaluate progress and increase program outcomes Strengthen Grants Management and Performance-Based Contracting Techniques Create, implement and maintain performance-based contracts and learn proven methods for winning grants that are designed for social and human services improvements Navigate Through Trans...
The 2010 Nonprofit Performance Conference
Implement Performance Measurement Practices to Empower Change Develop and utilize performance measures to evaluate progress and develop a plan to increase outcomes in your nonprofit Utilize Data Collection and Analysis to Sustain Your Organization Understand how data collection and other performance benchmarks are integral to standardization practices Cultivate Employee, Volunteer and Community Support for Your Nonprofit Identify the challenge...
Delivering Command Information to the T...
Achieve Information Dominance Using RIAs Join us September 21-22 for a 3-Part discussion, demonstration, and education! Attend the FREE hands-on training seminar “Delivering Command Information to the Tactical Edge,” on Tuesday and Wednesday, September 21-22, 2010 at the Ritz-Carlton, Pentagon City in Arlington, VA. We will bring together military program managers, application developers, and technology and information-sharing expe...
MAS IT 70 Business Partner Pre and Post...
Attendees will gain insight on the MAS IT 70 offer process, marketing a MAS IT 70 contract, and keeping schedule contracts in compliance. GSA's Center for the IT Schedule 70 Program offers business partner training. The sessions are held at 2200 Crystal Drive, Crystal Plaza 4, Room L1301, Arlington, VA 22202. There is no fee for the training and it will include: a) Pre-award - provides an overview of the offer process and break-out discussions...
Advanced Improvised Explosive Devices (IED's)
About This Training: The Advanced Improvised Explosive Devices workshop is designed to address the growing threat of terrorists’ tactics, techniques and procedures utilizing improvised explosive devices. With the ever present ability to easily acquire materials necessary to construct improvised explosive devices; there is a need to educate and familiarize first responders to the fundamentals of common explosive ordnance, explosive detect...
DoD Network Solutions Forum: Delivering...
A View from the Frontline of the DoD’s Network Defense No organization controls more resources—personnel, computing power, weaponry, and communications networks—than the U.S. Department of Defense (DoD). Deployed worldwide in force, the department’s demands for 24x7, redundant, and secure networks is parallel to none. Given these requirements, the DoD needs superior technology, strategies, and support to meet its dynami...
Full-Motion Video Conference: The Promi...
Experts from OUSD, Army, USMC, DISA, NGA, General Dynamics, Textron, BAE Systems, SAIC, L-3 Communications, Northrop Grumman, Lockheed Martin, SAIC, Marshall Communications, HaiVision Network Video, Z Microsystems and many more examine: OSD/Services/IC Plans, Needs and Initiatives Status of Key Programs – Gorgon Stare, Valiant Angel, NOVA, etc. FMV and Wide-Area Persistent Surveillance Manned/Unmanned Aircraft Platforms; Space-based Capa...
Foundation of Federal Budget Analysis
About This Training: Government agencies are mandated to improve accountability, transparency and budget performance. This introductory course combines lectures, discussions, group exercises, and case studies to familiarize students with formulating, executing and analyzing government budgets. This course is designed for federal employees and contractors who are new to the federal budget process. What separates this course from other governme...
Computer Forensics for the Security Pra...
About This Training: Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Dis...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.