Metasurface-Driven EW Drone Swarms to T...
The Electronic Warfare (EW) community is witnessing the introduction of increasingly capable, phased-array-based, multifunctional, and cognitive radars in the modern scenario. This conceptual webinar approaches the perspectives and challenges related to the use of metasurfaces to enable multi-agent reinforcement-learning-capable EW drone swarms which, in turn, will be key to tackle the challenges associated with these new technologies.
Transform Reporting Experience for Tabl...
Tired of spending hours formatting Tableau reports? Join us for a live webinar and discover how Pixel Perfect can help you generate print-ready, contextualized and sharable reports in seconds. Experts from USEReady will share key insights into the tool's features, its enterprise value and real-world success stories. During this webinar, attendees will learn: Contextualized Report Formatting: How Pixel Perfect simplifies formatting to create pr...
OT Cybersecurity Outlook 2025: Top 5 Pr...
Gain insights into the future of Cyber-Physical Systems (CPS) security. Join our webinar featuring Fortinet experts and their top 2025 OT predictions. We'll discuss:Key market trends, tech advancements, and industry changes impacting CPS security Strategies for achieving a competitive edge with the Fortinet OT Security Platform Proactive approaches to safeguarding your critical infrastructure in a dynamic threat landscape
December 5, 2024
Organizer:
Fortinet Location:
Webcast
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
Unlock the Power of Your CMDB with Ivan...
You're invited to join Ivanti, Network Consulting Services, inc. (NCSi), and Carahsoft for a webinar on December 5th, 2024! Discover how Ivanti Neurons for IT Asset Management (ITAM) can add more functionality to your Configuration Management Database (CMDB). In this webinar, you will learn:The full lifecycle of your devices from acquisition to disposalHow to monitor software licenses and usageHow to prevent over-licensing and ensuring complia...
Build an Elastic Supply Chain for Busin...
Business growth is a CEO’s top priority, but increasing geopolitical instability presents a significant challenge to companies’ growth prospects. To support their company’s growth targets, chief supply chain officers (CSCOs) are tasked with designing a geopolitically elastic supply chain that can effectively adapt and drive growth amid geopolitical tension. An elastic supply chain is the strategic practice of building a chang...
December 5, 2024
Organizer:
Gartner Location:
Webcast
FAS and Buy.GSA.Gov Overview
GSA Events offers a wide variety of training opportunities for your agency. The training is free, and you can earn Continuous Learning Points (CLPs) for attending all classes. With these recurring training opportunities, GSA provides overviews of acquisition support that is available to our federal customers and Military! All developed to make your acquisition work easier and more efficient while achieving cost savings! Mark your calendar righ...
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR). Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to inci...
Reimagining Digital Efficiency: A Bluep...
Balancing increasing workloads with limited resources and tight deadlines is a constant challenge for state and local agencies. Learn how Atlassian's System of Work and agency implementation can streamline agency operations, improve efficiency and enhance services. In Part 1 on Thursday, December 5th, learn about the core principles of the System of Work, real-world examples and how to apply Atlassian solutions to your specific agency chal...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.