3,162 past events found
Back to Search Begin New Search Save Search Auto-Notify
Enabling Secure Data Recovery Within Yo...
View this on-demand webinar to learn about: How to manage the entire data recovery incident: job submission; prepaid device enrollment; shipping; and reporting Supporting work from home with a workflow designed around the widespread adoption of Bring Your Own Device (BYOD) and the increasingly mobile (and home-based) workforce Learning how enrolling devices in a protection plan streamlines admin processes, lowers costs, and meets SLA's How to...
Add Favorite
How CIOs Can Accelerate Software and Te...
This on-demand webinar showcases case studies on how CIOs and CPOs use a challenge-based approach to drive rapid digital transformation. During this on-demand webinar, you will learn about: How new technology can help make quick work of even the most complex technical acquisition process Ways of getting everyone at your agency on board with your digital transformation efforts Key challenges in digital transformation and what to do about them
Add Favorite
Gain Deeper Insights from Your Data
Organizations are accelerating their journey to the Cloud for increased agility, reduced costs, and faster time-to-market. Many of them are increasingly moving towards a multi-cloud approach to drive performance optimization, cost savings, and flexibility. The rise of multi-cloud brings about many challenges to organizations in gaining visibility for monitoring and securing their infrastructure, data, and applications, and in driving business...
Add Favorite
Modernizing Major Incident Response for...
With the proliferation of mobile and consumer-facing applications in everyday life, state and local governments are under immense pressure to adopt new technologies and processes that will enable them to provide essential digital services to constituents and do more with fewer resources. View this on-demand from PagerDuty and Carahsoft to hear PagerDuty's Julie Gunderson and Haroon Chohan explore why modernizing major incident response in stat...
Add Favorite
Deliver Modern Training Experiences wit...
In today’s remote world, the learner experience is more important than ever. Our current learning culture is evolving with the potential to adapt and create a custom virtual learning environment tailored to each user. Adobe Captivate Prime is a next-generation learning management system (LMS) that can assist in training your workforce effectively with simple reports at-a-glance, a vibrant and easy-to-use learner ecosystem, and an all-new...
Add Favorite
Deltek Open Plan & Project Scheduling f...
Project Scheduling is a key best practice in project based organizations and government agencies. Many state and federal agencies leverage project scheduling to manage their work as well as that of their contractors. In this live webinar, Deltek will highlight their project scheduling tool, Open Plan, and many of its key features and advantages over other scheduling tools in the market. View this on-demand webinar as we explain why some of th...
Add Favorite
Building ScientificML Communities and A...
The value of Google Cloud & NVIDIA to Scientific Computing extends far beyond the core cloud tenets of elasticity, cost savings, and improved agility. Researchers and scientists see a faster path to discovery with NVIDIA GPU Accelerators & Google Cloud services for data, networks, compute, and AI/ML. View this on-demand roundtable to learn how Google's effectively limitless compute, AI/ML, and Quantum Computing, combines with NVIDIA GP...
Add Favorite
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Add Favorite
Protect and Defend Your Most Sensitive Data
When protecting your most critical personal assets, you take a defense-in-depth approach. Beyond the lock on your door, you have a video doorbell, perimeter security sensors, active security monitoring, locks on your windows, a fire-proof safe for your most valuable assets, and more. This same approach is often overlooked when protecting sensitive data in your databases. View this on-demand webinar to learn: How to implement a proven database...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
Back to Search Begin New Search