Combatting Advanced Persistent Threats:...
Years ago, the U.S. Air Force coined the term "Advanced Persistent Threats" (APTs). Today, it is becoming one of the most talked about, inconsistently defined, and abused terms in security. Yet APTs are real threats that federal government and enterprise IT teams must combat because their sophisticated attacks have serious consequences. Please join Daniel Teal, founder and CTO of CoreTrace, and a former information warfare officer at the Air F...
Revenue Recognition for Nonprofit Organ...
Benefits We will review and discuss a wide variety of revenue recognition issues affecting nonprofit organizations. Practical case examples will be used to illustrate and reinforce the accounting principles to be considered in more complicated revenue transactions. This live audio conference will cover the revenue transaction descriptions described above in a practical approach format. You will take away concrete examples of the issues and con...
Mobile and Text Message Strategies for...
Benefits By now we've all heard the story of the Red Cross text-message fundraising campaign after the tsunami. Many nonprofits dove feet first into mobile after that, yet very few nonprofits achieved that level of success with any single mobile tactic. The truth is that mobile can be very effective for your organization, especially if you consider more than just text messaging. In this live audio conference, we will review the mobile strategi...
Current Issues in Cell Tower Leases and...
Benefits The wireless industry has built more than 250,000 cell sites in the United States in the past 20 years. But many more cell sites are needed as iPhones™, iPads™ and the like strain existing network capacity with data, email, computer and video applications. New cell sites and significant modifications to existing cell sites will also be needed due to the government's goal of using wireless to increase broadband speeds and c...
Securely Connecting Health Communities...
What to know and how to start... A soldier will receive medical attention from many military hospitals and clinics throughout his or her career. Meanwhile, family members back home may be treated for injuries or illnesses by their local physicians. With treatment received by many different healthcare providers over the course of several years, how will each family member’s health records be accurately maintained and protected? Will they...
Protect Access to Cloud-Based Applicati...
Multi-factor authentication – whether through the use of one-time password (OTP) tokens, certificates, USB tokens, or smart cards – has grown increasingly critical as organizations look to secure remote users’ access to sensitive data. As enterprises move increasingly strategic services to the cloud, security teams will need to leverage centralized mechanisms that accommodate both traditional remote access scenarios and cloud...
Backup and Recovery Solutions Optimized...
EMC Webcast:Backup and Recovery Solutions Optimized for VMware Virtualization gives IT the flexibility to address the unique challenges presented by mission-critical applications and data growth. To harness the benefits of this dynamic computing environment while providing reliable data protection, you need a backup-and-recovery solution that is optimized for VMware. Traditional backup and recovery can't keep up with the increased demands of v...
Boeing Twister Data Framework: A Data I...
Whether your organization is moving towards data consolidation or maintaining all data in a federated environment, a data management framework must be put in place to enable information sharing and collaboration. Please join us to learn more about the Boeing Twister Data Framework, a leading data integration platform for rapid ETL processing and multi domain, federated queries on almost any type of data.Customer uses for Twister Data Framework...
Beyond .GOV - Building a Winning Web St...
The web is changing. In fact, what most organizations traditionally viewed as their "web site" has been re-defined to include all the different ways and places audiences find and consume content. From the proliferation of fragmented mobile devices to the massive growth of social media destinations, government agencies now are challenged with reaching a much larger footprint with fewer resources and less time. Join us for an informative webcast...
Search and Discovery Over DCGS Applications
Rapid Integration Solutions from Bob Gourley and Kapow Software Within DCGS, developers rely on programmatic access to published APIs in order to translate business processes into automated IT solutions. When faced without APIs, developers are saddled with rewriting legacy applications – costing time, tax payer money, and risking mission objectives. Join Kapow Software, along with former DIA CTO Bob Gourley, to learn how a unique approac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.