445 past events found
Back to Search Begin New Search Save Search Auto-Notify
Xsigo Delivers the Next Virtualization...
Boost Data Center Agility and Drive Down Data Center Costs "An order of magnitude improvement in price/performance and a sustainable business advantage.” - GartnerXsigo does for I/O what VMware does for servers. By converging network and storage connections to a single cable, Xsigo enables a simpler, lower cost infrastructure that eliminates the limitations of cards, cables, and switch ports. Join us for a complimentary webcast to learn...
February 21, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
USDA's SAP Solutions Webcast Series Ses...
Session 1: Overview of Enterprise Information Management & Business IntelligenceThursday, February 16, 2012 at 1pm ESTThis session will focus on SAP Netweaver Master Data Management, SAP BusinessObjects Data Integrator, SAP BusinessObjects BI, SAP NetWeaver Business Warehouse Accelerator, and the SAP BusinessObjects ESRI Integration. The session will: Describe how the solution is used in current USDA programs Provide examples of how other...
February 16, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Intelligent Image and Video Search
Image and full motion video content are among the fastest growing digital assets for government and commercial enterprises, yet over 95% of this content, particularly full motion video, goes unviewed and unexploited for important information. While a range of advanced tools exists to support text and web-based data search and analysis, government and commercial enterprises currently have no viable solutions for indexing and searching image and...
February 14, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Theoretical Underpinnings of Common Cri...
Red Hat is committed to providing secure and stable software that can be easily used in security-sensitive environments. Red Hat works closely with US Government customers and security specialists to ensure that Red Hat products are certified for government use, and are easily accredited by the appropriate authorities. To date, Red Hat Enterprise Linux is one of the most certified operating systems available. Join this webinar and you will: Ga...
February 9, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Best Practices for Logistics in Supply...
It is a daunting task to stay informed and in control of every stage of the supply chain as globalization has increased the complexity of the suppliers and consumers of goods and services. Having online visibility into any supply chain issues or disruptions, as well as the ability to perform real-time collaboration with suppliers and partners, is crucial to the success of your agency’s mission. Being able to manipulate the organizational...
February 9, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
i2 Web-Based Training: Analyst’s Notebo...
i2 training is pleased to offer a complimentary short web-based training session focusing on: Importing large data sets Link multiplicity Filter, histogram, and HeatMatrix Conditional formatting Join Jennifer Davis, i2 Training Instructor, to learn how to create charts by importing large data sets held in Excel. The focus will be on using the predefined designs and fully understanding multiplicity to get the right chart for your analytical wor...
February 1, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Harnessing Temporal Signals for Cyber Defense
Government and defense organizations are faced with fast evolving cyber threats and Recorded Future provides groundbreaking temporal analysis to help analysts find intelligence buried in big data. Recorded Future, an In-Q-Tel and Google Ventures backed startup, has been featured by Wired Magazine, The New York Times, NPR Marketplace, and MIT Technology Review, and was named in the Top 5 Disruptive Search Engines by Big Think.Register now to he...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Information Assurance and Successful So...
Facebook and social networks are being used extensively for both public engagement and interagency communications. Agencies need to be aware of the risks associated with the explosive growth of social media use and how to protect themselves for successful data exchanges. There are new technologies that protect social media networks for information assurance, user behavior, data leakage, eDiscovery, and human and technology threats. Join us now...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Ten Tips for Moving to a Least Privileg...
Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks. Thus, moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks. Join Viewfinity and Carahsoft as they discuss the top ten tips for remo...
January 26, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Strategies for Compliance with Executiv...
An October 2011 Executive Order makes individual Federal agencies responsible for striking the right balance between protecting sensitive data on their networks and ensuring fast access to valid users. This directive, carrying the force of law, puts added pressure on agencies to reduce the network vulnerabilities that are putting Federal applications and data at risk. Join us for an informative discussion that will highlight steps you can take...
January 26, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search