How Post 9/11 Antiterror Laws are Being...
A moderated panel discussion will examine how in the years since 9/11, often at the behest of the United States, foreign nations have passed broad counterterrorism laws that have been used in a number of instances to prosecute and jail journalists and citizen bloggers for writing things deemed critical of the government. According to the Committee to Protect Journalists, a record-high of 231 journalists were in prison in 2012. Of that number,...
MongoDC 2013
MongoDB Washington DC 2013 is our annual user conference in Washington, DC, dedicated to the open source, non-relational database MongoDB. At MongoDB Washington DC Conference, you will be able to connect with fellow MongoDB developers and 10gen engineers. In this multi-track conference, there will be a wide variety of sessions to meet the needs of developers and administrators at all levels of expertise. 10gen is excited to announce the additi...
SEQRA
Protect your organization - know the ins and outs of SEQRA. Join us for this seminar and get practical information about a complex area of the law presented by an extremely knowledgeable faculty in an interactive format. Get a handle on complicated issues surrounding SEQRA strategies. Avoid problems down the road by protecting yourself and your company - find out exactly what the critical issues are and how to best handle them. You will gain t...
What You Need to Know About Public Reco...
Uncertain how public records and open meetings laws apply to you? Find out what New Mexico law has to say about balancing the public's right to information with the individual's right to privacy. If you're involved with a public entity or if you represent the media, you need to know the ins and outs of federal and state public records and open meetings laws. Join us for this seminar and you'll get updates on recent developments in the interpre...
IT Service Management and DOD: A 2013 F...
As the nation faces the reduction of expenses across the Department of Defense (DoD) coupled with the need to maintain and enhance our national security, IT Service Management (ITSM) plays an essential role. Many organizations within the DoD have adopted ITSM best practices to improve existing services and for the deployment of new services which are depended on by millions of war fighters, civilians, and other stakeholders. This ITSM and DoD...
2013 Data Center Brainstorm
Data center consolidation continues to be a high priority as we move closer to OMB's rigorous 2015 deadlines. How is the intersection of consolidation, cloud, mobility, and even big data going to affect the path forward? Which mandates are realistic and which should change? Join MeriTalk's Data Center Exchange for the second annual 2013 Data Center Brainstorm on Thursday, March 7, 2013 at the Newseum in Washington, D.C. The event will bring to...
March 7, 2013
Organizer:
MeriTalk Location:
Washington, DC
HIMSS 2013 Annual Conference & Exhibition
Today's dynamic healthcare IT industry demands timely knowledge and education to navigate priority issues. With knowledge as power, HIMSS Annual Conference & Exhibition is in lockstep with today's industry and is the most comprehensive and authoritative knowledge event in healthcare IT today. HIMSS13 educational content will feature top leaders who will share their insights and lessons learned on the most critical topics today. With more t...
March 3-7, 2013
Organizer:
HIMSS Location:
New Orleans, LA
Surety Bonds in Government Contracting...
Jennifer Schaus & Associates will present a webinar on surety bonds in government contracting. The guest speaker is Josh Etemadi of Construction Bonds, Inc. Please join us to learn about surety bonds and what they mean for your government contracting business. RECORDED Presentation: http://youtu.be/G8eYJNWurfI Full List of Webinars: http://JenniferSchaus5.eventbrite.com
Big Data for the Federal Government Symposium
Big Data and Government R&D – Turning Overload into Exploitable Information Assets Earlier this year the White House announced funding for a large new research and development initiative aimed at extracting and exploiting the “knowledge and insights from large and complex collections of digital data… to help solve some the Nation’s most pressing challenges.” This is in addition to numerous ongoing “Big...
Protective Measures Training for Securi...
Workshop Purpose This course is designed to provide executive and employee level personnel in the public/private sector with the knowledge to identify the appropriate protective measures for their unique sector. The course focuses on providing information pertaining to available protective measures and strategies for selecting which protective measures are most appropriate. The course focuses on teaching the student the threat analysis proces...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.