Back to Search Begin New Search Save Search Auto-Notify
Announcing InTTENSITY: The Next Level i...
Announcing InTTENSITY: The Next Level in Extraction Combining world-renowned IN-Q-TEL endorsed best-of-class extractors from Inxight and Attensity into the world's best state-of-the-art extraction solution for the Intelligence and DoD Communities The Christmas Day Bomber, Umar Farouk Abdulmutallab, successfully boarded a US-bound flight because certain pieces of information were not connected. While InTTENSITY does not solve the challenge of i...
February 17, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
'Meaningful Use' of the Nationwide Heal...
The Social Security Administration (SSA) was the first federal agency to use the NHIN as a tool to gain rapid access to electronic health information. In its partnership with MedVirgina, the Richmond-based regional Health Information Exchange (HIE), the partners used NHIN technologies to speed the delivery of clinical health records of patients awaiting medical disability decisions. In accelerating the process from weeks to days, the project...
February 11, 2010
Organizer: Government Health IT
Location: Webcast
Add Favorite
Eliminate the Enterprise Encryption Mess
Challenges Today and Tomorrow: Slippage in your quality service levels just because you need to protect your data? Re-creating your government processes just to accommodate enterprise encryption? Sharing data between departments or agencies without the proper data security? Paying stiff fines for non-compliance with data security regulations? These problems all exist today, but what about tomorrow? Point products proliferating in your enterpri...
February 9, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Are Your Web Applications Safe? Identif...
Are Your Web Applications Safe?Identify and Remediate Security Vulnerabilities with HP Web applications have become a key method for government agencies to deliver information and services to their users, including services being driven by the Open Government Initiative. However, a simple defect can provide attackers with complete access to all the information stored within secure databases and servers. This is your last chance to join HP, Ca...
February 9, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Introduction to Executive Order 13514
First Thursday Seminar #1 Introduction to Executive Order 13514 provides an overview of definitions, baseline measurements, and other requirements outlined by the new executive order. FEMP First Thursday Seminars provide training for Federal energy and environmental professionals. Leading experts address timely topics in 90-minute sessions offered live via satellite or through streaming video at your desktop.   Contact FEMP Central at femphelp...
February 4, 2010
Organizer: Federal Energy Management Program (U.S. DOE)
Location: Webcast
Add Favorite
Health IT Summit for Government Leaders
HEALTH IT SUMMIT FOR GOVERNMENT LEADERS OVERVIEW With the passage of the American Recovery and Reinvestment Program and the very real possibility of national health reform this year, federal and state government leaders face a myriad of challenges associated with the use of information technology to tackle a range of complex healthcare issues. The Health IT Summit for Government Leaders is designed for federal and state government leaders who...
February 3-4, 2010
Location: Washington, DC
Add Favorite
NAAAC TargetGov Federal Procurement 101...
The first of a year-long series of national teleconferences to win federal contracts starts January 27, 2010. These teleconferences are hosted by the National Alliance of African American Chambers (NAAAC) & TargetGov and are open to all entrepreneurs nationwide. “Given the economy and the reality of today's business environment, it is essential that Black enterprises increase their revenues and customers. Being successful in Federal...
January 27, 2010
Organizer: TargetGov and NAAAC
Location: Washington, DC
Add Favorite
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
January 26, 2010
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Pentaho Webcast: Government Adoption of...
Government Adoption of Open Source on the Rise Attendees of this webcast learned about the advantages of open source for business intelligence, such as: Reliability and security Reduced dependence on expensive proprietary software Non-restrictive licensing that enables rapid provisioning Lower licensing costs and lower total cost of ownership The ability to customize software for new missions and changing situations
January 26, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
INPUT Webinar: New Technologies: How Wi...
With a new administration, tightening budgets and growing technology needs, federal agencies are looking for new ways to help reduce costs and increase efficiency. INPUT's examination, delivered in the report Emerging Technology Markets in the U.S. Federal Government, 2009-2014, details five areas that are poised to emerge as game-changers across the federal government over the next five years: Cloud Computing Service-Oriented Architecture (SO...
January 20, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Back to Search Begin New Search