Back to Search Begin New Search Save Search Auto-Notify
Top IT Management Practices for Governm...
Combining the unique and evolving IT infrastructure requirements of government entities, IT engineers and administrators are challenged on a daily basis. Being tasked with with ensuring networks, servers and applications are running at peak performance while maintaining security and reducing operating costs is no easy feat. In this webinar, we will provide some top tips for satisfying these needs, such as: Monitoring network performance and tr...
February 7, 2012
Organizer: SolarWinds
Location: Webcast
Add Favorite
Free Webinar: Heeding The Call for Reco...
Heeding The Call for Records Management Reform:How The President's Initiative Will Change How We Manage Records Today at2pm ET|11am PT Records Management in Agencies across the board will see a major paradigm shift in 2012 in the wake of President Obama's Memorandum on Managing Government Records. Join Feith Systems this TODAY at 2pm ET as we present a round table with the Feith Government Records Management Team in this critical new webinar w...
February 7, 2012
Organizer: Feith Systems & Software Inc.
Location: Washington, DC
Add Favorite
New Lighting Technologies
New Lighting Technologies is the first of seven trainings scheduled on the first Thursday of each month from February through August 2012.* Understand the uses and benefits of spectrally enhanced lighting (SEL) and solid-state lighting (SSL). Learn the best deployment opportunities, correct applications, project examples, and measurement and verification protocals. Learn how to: Select optimal lighting solutions based on quality baseline data...
February 2, 2012
Organizer: Federal Energy Mangement Program (FEMP)
Location: Webcast
Add Favorite
Secure Remote Support for the Mobile Agency
This complimentary online webinar is provided on behalf of Bomgar. Agencies have used remote access to support their employees for decades. However, the point-to-point solutions first used to support the LAN have failed to address key security requirements of an Internet-centric world. In fact, for several years, remote access has been found to be the leading attack pathway for hackers – in some studies, implicated in more data breaches...
February 2, 2012
Organizer: immixGroup, Inc.
Location: McLean, VA
Add Favorite
i2 Web-Based Training: Analyst’s Notebo...
i2 training is pleased to offer a complimentary short web-based training session focusing on: Importing large data sets Link multiplicity Filter, histogram, and HeatMatrix Conditional formatting Join Jennifer Davis, i2 Training Instructor, to learn how to create charts by importing large data sets held in Excel. The focus will be on using the predefined designs and fully understanding multiplicity to get the right chart for your analytical wor...
February 1, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Improving Citizen Services by Integrati...
You are invited to join us for a 60-minutes discussion about how to improve citizen services while reducing costs with innovative technologies. We’ll explore best practices government organizations are using today, clearly defined metrics and key performance indicators agencies can quickly deploy solutions that can have a significant positive impact on the citizen engagement process. We will look at some of the low cost effective and inn...
February 1, 2012
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
Database Breaches - Are Your Customers...
This complimentary online webinar is provided on behalf of McAfee. Recent studies conducted by both Verizon Business and Forrester Research indicate that 15% of enterprises and government agencies do not employ any security measures to protect the data residing in their databases. Additionally, more than 70% of enterprises and government agencies do not, or cannot, patch their databases, leaving them vulnerable to attacks. Learn how to help yo...
January 31, 2012
Organizer: immixGroup, Inc.
Location: McLean, VA
Add Favorite
Harnessing Temporal Signals for Cyber Defense
Government and defense organizations are faced with fast evolving cyber threats and Recorded Future provides groundbreaking temporal analysis to help analysts find intelligence buried in big data. Recorded Future, an In-Q-Tel and Google Ventures backed startup, has been featured by Wired Magazine, The New York Times, NPR Marketplace, and MIT Technology Review, and was named in the Top 5 Disruptive Search Engines by Big Think.Register now to he...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Information Assurance and Successful So...
Facebook and social networks are being used extensively for both public engagement and interagency communications. Agencies need to be aware of the risks associated with the explosive growth of social media use and how to protect themselves for successful data exchanges. There are new technologies that protect social media networks for information assurance, user behavior, data leakage, eDiscovery, and human and technology threats. Join us now...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Big Data Case Study: Obtaining Smart, M...
Big data is a new term being used to describe the explosive growth of datasets as well as the new architectures that are evolving to address the storage, management and analytic functions. As defense and intelligence agencies seek to use the increasing amount of available data to make mission-critical decisions on the battlefield, there is heavy emphasis on smart data and imagery collection, capture, storage and analysis to drive real-time int...
January 31, 2012
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
Back to Search Begin New Search