How Tribes Can Make the Most of Availab...
With nearly all COVID-19 relief funds distributed, many tribes may be left wondering where else they can go if they are in need of additional support.In this complimentary webinar, eCivis will cover the latest federal grant guidelines that tribes should be aware of, along with best practices to manage the influx of funding.Join to learn:The latest updates to Uniform Grant Guidance and how it affects tribesThe most recent grant programs and ava...
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Business Architecture: Strategy Executi...
Failure to execute strategy is the most significant management challenge facing public and private organizations in the 21st century. In fact, according to economist Michael Porter, more than 80% of organizations do not successfully execute their business strategies and in 70% of these cases, the reason is not the strategy itself, but bad execution. Most organizations have a strategy, but few are able to align strategic objectives and tactical...
Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Adobe Captivate Prime Workshop
Adobe and Carahsoft invite you to join these on-demand Technology Workshops! These virtual workshops feature sessions on how Adobe is accelerating digital transformation across federal, state, and local agencies for modern, efficient, and engaging digital experiences. Leave with exclusive how-tos, tips, and best practices that you can implement in your day-to-day at your organization for improved citizen and employee service delivery. Adobe Ca...
Content Discovery in a COVID-19 World
piXserve is an enterprise-class software product that can enhance the productivity of law enforcement professionals. The software automatically indexes the contents of images/videos (archived or live sources) and helps users discover content of specific interest: objects, scenes, text strings, and people. The general use of face-masks due to the pandemic has made it more difficult for law enforcement professionals to generate and investigate l...
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
How to Scale and Modernize Agency Infra...
When migrating legacy, on-premise infrastructure to AWS Cloud, it is imperative for government agencies to implement new monitoring and alerting frameworks to reflect the nature of the new Cloud environment. This informative webinar will showcase how to seamlessly modernize, migrate and scale cloud infrastructure to deliver reliable, secure and user-friendly FedRAMP compliant citizen services. The presentation will include a government case st...
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.