Mastering DoD Portfolios from Cradle-to-Grave
The DoD struggles to have visibility across multiple portfolios and budgets and it can be almost impossible to get the information you need in the time frame you need it. CORAS eliminates this challenge. The key to effective cross organizational management is to have the ability to view the full scope of your programs and understand where their commonalities lie, as well as their deadlines, budgets, and performance metrics. Join us for a webin...
Department of Transporation Webinar: Cr...
Are you having trouble keeping your virtual meeting participants engaged or looking for new ways to fight virtual classroom fatigue? Whether you are training your workforce or connecting with external constituents, Adobe Connect can transform the way you engage your audience by creating immersive virtual learning experiences. Join this Department of Transportation webinar to gain a deeper understanding of Adobe Connect features that can effect...
Creating Consumable No-Code Machine Lea...
Join Tableau, DataRobot, and Salesforce to understand data-driven decision-making for the public sector using best-in-class predictive modeling in consumable visual analytics. This webinar will show the end-to-end process of using automated machine learning from DataRobot to build, deploy, and consume real-time models in Tableau with augmented intelligence without writing code.Join this session, where attendees will learn how to:Build an AI mo...
Leveraging Visibility to Plan for Painl...
During this discussion-based webinar, attendees will learn: How to quantify and map the performance of applications pre-migration How to identify high-risk applications before migration How to ensure newly migrated applications perform as expected What do we do when applications in the cloud aren’t performing How maximize performance, while minimizing costs
Dashboarding to Analyze Federal Law Enf...
You have data, you have charts, and now it's time to bring it all together. Join this live webinar to watch how dashboarding and data storytelling best practices can bring your data to life. During this live webinar, attendees will learn: What is data storytelling and why it can empower everyone to understand data, making better decisions, and drive better outcomes Techniques for helping others see key takeaways from visuals The use of Tableau...
Splunk & Blockchain
Blockchain is more than a transactional database of critical data. Once data is committed onto a blockchain, it is permanent and nearly impossible to manipulate or hack. As such, businesses can operate more efficiently and securely. Businesses are turning to blockchain to solve a wide range of problems including:Quality AssuranceAccounting Contract ManagementSupply Chain ManagementData Protection and an indisputable trail of transactionsIn thi...
Tableau CRM-Intelligent Experiences For...
During this webinar, we will dive deeper into Tableau CRM, one of the powerful analytics tools of choice at the VA. We will demonstrate how this solution infuses insights into any business process and provides built-in CRM actions enabling users to take action on insights at the right time and in the right place. The demonstration will also cover how users can connect to and analyze data from any source, without leaving the Salesforce platform...
10 Tips to Perfect Public PDFs
Join our complimentary webinar to learn how to quickly improve the readability and reliability of your PDFs for optimal user experiences with improved security, compression, and searchability features. Specifically, this webinar will explore: Security Tips – remove sensitive metadata, prevent unwanted changes, and learn about sanitization. Readability and Reliability Tips – provide automatic bookmarks, make documents searchable, an...
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.