Accelerate Application Deployment with...
This insightful webinar was designed to empower developers and DevOps teams with cutting-edge strategies and tools for enhancing the entire application development lifecycle. It explored the seamless integration of GitLab Operator and Red Hat OpenShift for faster and simpler containerized workload deployments, minimizing errors and boosting efficiency. This recording will help you discover how to: Optimize resource allocation for accelerated...
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). In this User group webinar hosted by Carahsoft wher...
Migrate, Optimize, and Modernize with V...
Attendees explored the potential of VMC on AWS to streamline and enhance the efficiency of migrating their agency's cloud workloads, making the process faster and more cost-effective. They experienced the transformation of applications and infrastructure services using familiar tools and increased scalability. Participants in our in-person workshop listened to experts dive into the following topics: Accelerating datacenter evacuations with VMC...
Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
VMware's Data Portfolio Overview for SOF Week
During this briefing attendees learned about how VMware Tanzu can support with: Speed and Scale: Faster time to insight due to in-database analytics and AI. Query and data ingestion for petabyte-size data sets. Productivity: Diverse data types on a single platform (structured, semi-structured, unstructured, vector, or geospatialor graph) wherever the data is located. Flexibility: Deployment on any infrastructure type with optimizations for bar...
Navigating the Data Maze: Unleashing th...
Palantir and Carahsoft hosted an exclusive webinar, Navigating the Data Maze: Unleashing the Power of Palantir AIP. Participants discovered how government tech leaders could make informed decisions across diverse data sources, from clouds to classified networks and tactical edge systems.
Unlocking Intel's AI Ecosystem: From PC...
This webinar, hosted by Intel and Carahsoft, will cover Intel's Data Center GPU Flex Series. It offered a versatile GPU solution for the visual clouds and supports various workloads This included media streaming, AI Inference, and virtual desktop infrastructure, with a focus on reliability and scalability.
How AI Will Transform Higher Education...
In this webinar, attendees learned about how the AI-driven smart campuses of the future will look. We examined how universities are leveraging AI to transform operations and the student experience. Viewers also gained insights about how forward-thinking institutions are accelerating digital transformation to better prepare for the future of higher education supported by AI.
Google Cloud & BlueVector AI Webinar
Google Cloud, BlueVector AI, and Carahsoft hosted a one-hour webinar on the power of Document AI. In this session, BlueVector AI demonstrated an end-to-end scanning-to-data extraction process and discuss how the Michigan Department of Vital Records achieved more than 70% reduction in data entry time. This webinar covered:Document AI FundamentalsAn end-to-end scanning to data export workflowAdvanced human in the loop and data validationLessons...
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics included:How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.