AMSUS - Association of Military Surgeon...
The 115th Annual Meeting will focus on protecting the nation. Session topics include public health issues and initiatives among the federal health agencies, as well as chemical, biological, and radiation surveillance. As in past years, educational value and maximum awarding of continuing education credits have received primary emphasis in the planning of the 115th Annual Meeting. The agenda has been developed to emphasize federal medicine and...
November 14-19, 2009
Organizer:
AMSUS Location:
St. Louis, MO
Reporting and Analytics - Learn to Avoi...
It's easy to buy reporting and analysis tools: business intelligence (BI) is a multi-billion-dollar market, with vendors ranging from the biggest names to boutiques. Unfortunately, most users don't have the time or resources to learn how to use BI tools. Yet organizations frequently deploy them to non-technical users, causing low user satisfaction, poor adoption rates, and minimal value per tax dollar spent. To be successful, you have to learn...
Spotlight on NASA
The National Association of Small Business Contractors has once again joined forces with the U.S. Women's Chamber of Commerce to present "Spotlight on NASA". This one day event provides an in-depth look at the National Aeronautics and Space Administration as it relates to small businesses; including agency overview, Center opportunities and Subcontracting opportunities with prime contractors.
Avoid Negligent Hiring - Best Practices...
"All employers have an obligation to exercise a reasonable duty of care in hiring. In addition, many organizations have a legal duty to not employ individuals with certain enumerated criminal records. There are a number of steps that employers can take in the hiring process to reduce their risk when hiring. First, organizations must carefully review and audit their hiring program, including their application, interview and past employment chec...
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
HCMF - Human Capital Management: Federal
HCMF delivers exceptional value for learning about key human capital strategies and initiatives across the Federal agencies and for meeting your peers looking for solutions to day-to-day challenges in managing and developing your workforce. It is an exciting time to be a human capital officer, with all the many opportunities to assess, change, and improve existing human resource policies and processes. Join government leaders and peers at this...
November 16-18, 2009
Organizer:
WB Research Location:
Arlington, VA
E3 2009
E3 2009 will focus on the intersection among innovative technologies, visionary policies, environmental benefits and emerging market opportunities related to renewable energy. How do we provide sustainable fuel, food, fiber and freshwater to a global population of 9 billion people in our lifetime? That’s one of more than 15 urgent questions we’ll explore during E3 2009.
Enhance Your BI Knowledge: Free Introdu...
Experience the latest breakthrough in BI, MicroStrategy 9, firsthand through demonstrations and hands-on activities. Don't miss this chance to be the first in your organization to learn how to: Create an entire BI application in less than a dayDesign dynamic and interactive dashboards in just a few minutesAccess reports in Microsoft® Office and on your mobile deviceInteract with reports and dashboards using our easy-to-use Web interface to piv...
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.