Back to Search Begin New Search Save Search Auto-Notify
Rethink Technology for Secure Comms and...
Military and first responder deployments in harsh or hostile environments require enterprise-grade technology to deliver secure comms as well as compute to power applications critical for the demands of highly distributed tactical operations. It is also vital that these rugged IT systems are easy to deploy and can be managed with field operators, and not IT specialists. Agility is key and the days of packing in separate rackmount solutions for...
February 23, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Strengthening The Future of DevOps Thro...
Listen as DevOps Experts explain the importance of DevOps across the Federal Government. In this period of time of building the “new normal,” What emerging technology has led to strengthening DevOps? This panel will set out to explain the emerging technology that has been used to help strengthen federal DevOps, along with the future of DevOps in the Federal Government. What does it mean to strengthen your agency’s DevOps? Whe...
February 17, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
AI in Government - Maximizing the Impac...
The February 2022 AI in Government featured presentation guest speaker is Pamela Isom, Director AI & Technology at the U.S. Department of Energy presenting ‘Maximizing the Impacts of AI through Strategic Coordination, Planning and Customer Service Excellence’ on Thursday, February 17, 2022 from 11:30 AM - 1 PM ET! The pervasiveness of algorithms and our reliance on AI excellence for safety and security as well as for fun requir...
February 17, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
ICIT Virtual Event: Discussion of Criti...
Emerging technologies promise new abilities to make our increasingly fragile global society more resilient. To sustain this progress, nations must invest in research, expand their digital infrastructures, and increase digital literacy so that their people can compete and flourish in this new era. Yet, at the same time, no nation or international organization is able to keep pace with the appropriate governance structures needed to grapple with...
February 16, 2022
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Basic Contracting for GSA Schedules
This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C Level 1 training requirement (equivalent to FA...
February 16, 2022
Organizer: GSA
Location: Webcast
Add Favorite
Accelerating Cloud Modernization throug...
As Federal agencies work to realize their cloud smart strategies, shifting to modernizing in a way that leverages both cloud and hybrid environments to transform the way they manage their data have become more prevalent. This type of modernization allows these Federal agencies to support the increasing and evolving operational needs of their missions in a flexible manner. Join this panel to hear a discussion on the best practices used to make...
February 3, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Enterprise Data & AI - Insights Learned...
The February Enterprise Data & AI featured guest speaker is John Power, Chief Data & Analytics Officer at Equifax (Europe) and his presentation "Insights Learned on Explainable AI in a Global Data Environment" Thursday, February 3, 2022 from 11:30 AM - 1 PM ET! Advances in computing have generated the use of more data and complex algorithms that turn data into decisions and insights. New AI credit scoring technology is able to make cre...
February 3, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
ATARC's Mission Critical Identity Secur...
Hear from topic experts as they explore how the Federal Identity-Centric Security Roadmap fits in with the advancement of Zero Trust Security. What does the concept of never trust, always verify mean? What are some best practices for verifying users in your network? What challenges have these topic experts experienced as they incorporate Zero Trust within their Federal Identity-Centric Security Roadmap? What solutions have these topic experts...
February 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Enterprise Data & AI: Lessons From the...
As machine learning expands and larger organizations begin deploying across bigger teams, the need to efficiently operationalize becomes critical for enterprises. In our discussions with leading organizations utilizing ML like The RealReal and Uber, we have compiled real-world case studies and organizational best practices for MLOps in the enterprise. Join us for a discussion where we'll explore the benefits of MLOps and discuss when and how t...
January 27, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Working Together: Securing Modern Appli...
As agencies begin to pivot from their legacy applications and embrace containerized environments, satisfying security, development and availability requirements is a tough challenge. The DevSecOps software development methodology is a proven solution to this challenge whereby coders, cybersecurity specialists, and system administrators all work together in a more effective way to produce software and maintain compliance. Please join our panel...
January 27, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search