Back to Search Begin New Search Save Search Auto-Notify
Your Place or Mine? Incoterms® Explained
Incoterms® 2010, short for the 2010 version of International Commercial Terms, are internationally accepted rules for interpreting the responsibilities of parties to a sale. They are contractual “short hand” for the Terms of Sale that define the obligations, risks, and costs of the seller and buyer for the international sale of goods without requiring the parties to negotiate every detail of common transactions. They are also w...
May 14, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Top 6 Tools to Monitor Contract Performance
The Contracting Officer’s Representative (COR) has the primary responsibility for monitoring contractor performance for the Contracting Officer (CO). The COR’s influence on contract monitoring begins during acquisition planning, but once the contract is awarded the COR becomes the lead agent for contract surveillance. This webcast introduces six tools that will help you monitor contractor performance and provide timely and effectiv...
May 13, 2015
Organizer: American Management Association
Location: Webcast
Add Favorite
Big Data Everywhere DC
Big Data Everywhere is one-day ​conference ​focused on Hadoop​ ​and surrounding technologies that brings together users and developers to share their experience via technical sessions and user success stories. Industry experts will exchange Hadoop knowledge, share best practices, and discuss use cases​ and business applications​. ​ The event is a full day conference with a full breakfast, lunch, and la...
May 12, 2015
Organizer: MapR Technologies
Location: Tyson's Corner, VA
Add Favorite
IT Security Crisis
Today’s dynamic IT environments continue to become more complex than ever before. As a result, knowing what hardware and software you have or procured, their lifecycle status, current manufacturer, Windows compatibility and Open Source exposure are key to ensuring what was initially a secure platform, does not suddenly become a major vulnerability. If you can’t describe your IT baseline accurately and immediately, you can’t p...
May 12, 2015
Organizer: FedScoop and BDNA
Location: Washington, DC
Add Favorite
Government Leadership in the Data Age
The declining cost of data collection, storage, and processing coupled with ever-growing sources of digital data are spurring incremental increases in the amount of information available to government, law enforcement, intelligence, health agencies and other agencies. Big data is transforming the way we govern and live, and the Administration is taking steps to minimize potential risks such as loss of privacy, discrimination, and threats to c...
May 12, 2015
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Fundamentals of University Export Compliance
Most export compliance training focuses on issues facing businesses. But businesses are not the only exporters; universities and other institutions of higher learning export too. The "business" of a university is to disseminate knowledge -- an objective that can be directly impacted by U.S. export control regulations. In addition to encountering many of the same ITAR, EAR and OFAC issues as companies, academic institutions face another set of...
May 12, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
May 4-8, 2015
Organizer: American Management Association
Location: Seattle, WA
Add Favorite
Back to Search Begin New Search