Back to Search Begin New Search Save Search Auto-Notify
True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
Add Favorite
FAR Part 37- Service Contracting
This part prescribes policy and procedures that are specific to the acquisition and management of services by contract. This part applies to all contracts and orders for services regardless of the contract type or kind of service being acquired, including performance-based acquisitions.
Add Favorite
GSA Schedule - Completing The Proposal
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Standoff Facial Recognition from UAVs,...
Security forces personnel are required to accomplish hundreds of hours of training each year to accomplish the mission of providing integrated defense and military law enforcement for the base, while developing highly-trained security forces Airmen to support deployed contingency operations. Whether this training entails guarding assets, controlling entry to the installation, increasing security for a distinguished visitor, or a construction p...
Add Favorite
Enhance Collaboration Experiences for P...
Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review and approval processes – providing users with more control and visibility over all document workflows. As Microsoft’s preferred e-signature solution, Adobe Sign works right from the Microsoft tab interface, so you can quickly and securely sign and send documents, contracts, an...
Add Favorite
Boost and Monitor Remote Worker Product...
Join Carahsoft & ISEC7 to learn how to monitor and increase remote worker productivity through digital transformation with VMware End User Computing (EUC) and ISEC7 solutions. Organizations around the world are in the process of digital transformation - integrating digital technology into all areas of business and fundamentally changing operations. While shifting towards a totally digital workplace may seem like a daunting task, it ultimat...
Add Favorite
Modernizing DoD's Approach to Security...
The Department of Defense (DoD) is considering how to best leverage zero trust architecture (ZTA) to move away from the traditional network-centric security model. By shifting to a modern, resource-centric framework, agencies are better able to focus on protecting data and critical resources. During this webcast, we’ll explore how a cloud service provider, such as Zscaler, can help transform the DoD's existing cybersecurity platform with...
Add Favorite
FAR Part 38- Federal Supply Schedule Co...
This part prescribes policies and procedures for contracting for supplies and services under the Federal Supply Schedule program, which is directed and managed by the General Services Administration.
Add Favorite
How the Lonestar State is Leveraging Di...
More than 1,300 local, state and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, prepopulated agreements, and automated approval processes. Join your peers and other leaders in Texas to see how you can transform your agreement process by eliminating paper, automating workflows, and connecting the systems within your organization. T...
Add Favorite
Leverage Data Processing at the Edge fo...
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly mission critical as the volume, variety, and velocity of data exceeds the cognitive capabilities of human operators. Join AI/ML experts from Red Hat and HPE as they discuss how to enable AI/ML as an effective real-time mission partner with their collaborative solution that makes AI-driven edge processing a reality. Data-driven applications like AI/ML must not be c...
Add Favorite
Back to Search Begin New Search