Big Data Case Study: Obtaining Smart, M...
Big data is a new term being used to describe the explosive growth of datasets as well as the new architectures that are evolving to address the storage, management and analytic functions. As defense and intelligence agencies seek to use the increasing amount of available data to make mission-critical decisions on the battlefield, there is heavy emphasis on smart data and imagery collection, capture, storage and analysis to drive real-time int...
Converting Waste Into Usable Energy
Benefits Many city and county governments who manage solid wastes have heard of or been approached by vendors of newly introduced waste conversion technologies promising to convert waste into useful energy. However, implementing such facilities can be a complex undertaking on a variety of issues including technically, environmentally, economically and perhaps most importantly, politically. This live audio conference is an introductory overview...
A Closer Look at Applying Commercial Lo...
This complimentary online webinar is provided on behalf of Progress Software. It is a daunting task to stay informed and in control of every stage of the supply chain. Supply chains are becoming more complex due to the globalization of suppliers and consumers. It is important to have online visibility into any supply chain issues/disruptions and the ability to perform real-time collaboration with suppliers and partners. You must also be able t...
Degauss It or Risk It Webinar on Data D...
Join us for a Webinar on January 26! Attend our FREE webinar to learn more about the technology used by the FBI, NSA and CIA to quickly and safely destroy sensitive data. Hard drives and data tapes store your secrets: sensitive data you would not want to fall into the wrong hands. Our state-of-the-art degausser can kill up to 1,800 hard drives or tapes an hour. It is so powerful, it meets tough National Security Agency and Department of Defen...
Ten Tips for Moving to a Least Privileg...
Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks. Thus, moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks. Join Viewfinity and Carahsoft as they discuss the top ten tips for remo...
Strategies for Compliance with Executiv...
An October 2011 Executive Order makes individual Federal agencies responsible for striking the right balance between protecting sensitive data on their networks and ensuring fast access to valid users. This directive, carrying the force of law, puts added pressure on agencies to reduce the network vulnerabilities that are putting Federal applications and data at risk. Join us for an informative discussion that will highlight steps you can take...
Public Health Adaptations in a Changing...
Learn from moderator Dr. Jonathan Patz, Director of Global Environmental Health at the University of Wisconsin in Madison and President of the International Association for Ecology and Health, and a panel of experts how climate impacts public health planning and administration on a global scale. SSF’s Free Adaptation Webinar Series is designed to assist managers, decision makers, and professionals from government, industry, and academia...
New Analysis Solution Capabilities for...
Thetus Corporation would like you to join us for an informative webcast where we will demonstrate the new capabilities being released in the latest version of the Savanna application. Savanna is a multi-source, model-enabled analysis solution that builds on existing investments and programs bringing together various analysis techniques to enable faster, more informed decision-making. With its intuitive user interface, backed by the powerful se...
Building a Successful Self-Defense agai...
This complimentary online webinar is provided on behalf of HB Gary. The APT (Advanced Persistent Threat) has become an umbrella term that conjures up fear and is often positioned as an unwinnable battle of wills for access to a network. Yet upon closer inspection, the telltale artifacts of a highly adaptable adversary would appear not to be advanced at all. In fact, this is a fight that organizations can win on their own without having elite h...
Federal Data Center Consolidation Initi...
Federal Data Center Consolidation Initiative (FDCCI): Ensuring Successful Consolidation & Private Cloud Migrations by Utilizing Your Real-Time Server-SAN Monitoring DataOne of the biggest challenges when planning a server/storage consolidation is ensuring the applications and the Server-SAN infrastructure can meet the required performance and availability service level agreements (SLAs). The challenge is that most agencies don’t real...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.