Back to Search Begin New Search Save Search Auto-Notify
FAR Part 46- Quality Assurance
Part 46 prescribes policies and procedures to ensure that contractors conform to the requirements for quality and quantity in accordance with the awarded contract.
Add Favorite
State of Colorado Virtual Training
Google Cloud and Carahsoft invite you to join this on-demand webinar on Google Cloud Platform (GCP). This course shows you the fundamentals of modernizing workloads on GCP. During this training, we will covered the following topics: Google Cloud Platform overview Application Modernization with no code tools and by deploying containerized apps into Cloud Run, Google Kubernetes Engine (GKE), and Google Anthos Utilizing Artificial Intelligence to...
Add Favorite
The Perils Of Getting Pricing Wrong
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Add Favorite
VMware Virtual Power Block Sessions
VMware and Carahsoft would like to offer you the opportunity to attend a variety of on-demand sessions on all of the topics you and your agency care about. SaltStack VMware recently announced the acquisition of SaltStack. In this session learn about SaltStacks award-winning software used by IT and security operations teams to help modern business more efficiently secure and maintain all aspects of their digital infrastructure. SaltStack...
Add Favorite
FAR Part 47- Transportation
This part deals with the application of transportation and traffic management considerations in the acquisition of supplies, as well as acquiring transportation or related servies by methods other than bills of lading, transportation requests, transportation warrants, and similar transportation forms.
Add Favorite
GAO 2020 Protests - Pricing Highlights...
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
FAR Part 48- Value Engineering
This part prescribes policies and procedures for using and administering value engineering techniques in contracts.
Add Favorite
Adobe Captivate Prime Workshop
Adobe and Carahsoft invite you to join these on-demand Technology Workshops! These virtual workshops feature sessions on how Adobe is accelerating digital transformation across federal, state, and local agencies for modern, efficient, and engaging digital experiences. Leave with exclusive how-tos, tips, and best practices that you can implement in your day-to-day at your organization for improved citizen and employee service delivery. Adobe Ca...
Add Favorite
What Is Cybersecurity Engineering and W...
When systems were predominately hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability. Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability—and its cyber risk! Software components are specified loosely, if at...
Add Favorite
Back to Search Begin New Search