Back to Search Begin New Search Save Search Auto-Notify
Leverage Data Processing at the Edge fo...
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly mission critical as the volume, variety, and velocity of data exceeds the cognitive capabilities of human operators. Join AI/ML experts from Red Hat and HPE as they discuss how to enable AI/ML as an effective real-time mission partner with their collaborative solution that makes AI-driven edge processing a reality. Data-driven applications like AI/ML must not be c...
Add Favorite
What You Need to Know About the Uniform...
The Office of Management and Budget just made a host of important updates to Uniform Grant Guidance (Title 2 CFR), which go into effect on November 12, 2020. Failure to comply with the latest requirements could mean audit findings and more headaches for governments who cannot afford additional delays during such a critical time. Join this complimentary webinar to learn: The latest updates to Uniform Grant Guidance Federal expectations and req...
Add Favorite
Captivating Video Editing with Adobe Pr...
Communicating with citizens and employees is a critical function of government agencies, from emergency response to educating the public on agency processes. The National Aeronautics and Space Administration (NASA) was able to produce a successful video series using the industry-leading video editing software, Adobe Premiere Pro. Video communication makes NASA's scientific content more approachable even when the subject matter is highly techni...
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Add Favorite
Orchestration & Automation for Lockheed...
Security and IT Ops teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk gives you the full power of orchestration, automation, and response to executing actions in seconds, not hours. Join us to learn how Splunk Phantom can help your team achieve optimum security and IT operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage t...
Add Favorite
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
Add Favorite
How Tribes Can Make the Most of Availab...
With nearly all COVID-19 relief funds distributed, many tribes may be left wondering where else they can go if they are in need of additional support.In this complimentary webinar, eCivis will cover the latest federal grant guidelines that tribes should be aware of, along with best practices to manage the influx of funding.Join to learn:The latest updates to Uniform Grant Guidance and how it affects tribesThe most recent grant programs and ava...
Add Favorite
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Add Favorite
Business Architecture: Strategy Executi...
Failure to execute strategy is the most significant management challenge facing public and private organizations in the 21st century. In fact, according to economist Michael Porter, more than 80% of organizations do not successfully execute their business strategies and in 70% of these cases, the reason is not the strategy itself, but bad execution. Most organizations have a strategy, but few are able to align strategic objectives and tactical...
Add Favorite
Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Add Favorite
Back to Search Begin New Search