M-21-07: the Pathway to IPv6
In November 2020, OMB issued memorandum M-21-07 "Completing the Transition to Internet Protocol Version 6 (IPv6)." The memo creates urgency for the Federal Government to adopt IPv6 protocol and the strategic intent to commit to operating its information services, networks and related services using only IPv6. This move is widely recognized as the only viable option to ensure future growth, modernization, and innovation in internet technology....
Okta Demo Desk
Interested in learning more about Okta? Our team here at Carahsoft will help you understand how Okta helps secure connections between people and technology through their identity cloud. Join this quick, 30-minute demo to get all of your questions answered.
Zoom Trainings - February
Are you wondering what capabilities your agency can unlock with your Zoom for Government account? Don't miss out on Carahsoft's weekly trainings and discover all the tips and tricks to successfully implement your Zoom for Government account. Dive in and learn about: Account and profile settings Scheduling and starting a meeting Exciting features including virtual backgrounds and filters Zoom for Government is a FedRAMP authorized Software as a...
Drive Workforce Collaboration, Creativi...
The pandemic has demonstrated the need for government services to be accessible, inclusive, and user-centric. The delivery of equitable, integrated customer and employee experiences requires a stack of flexible and secure technology that connects the government with people and allows the exchange of information and expertise across agencies. Get a head-start on 2022 and join these virtual seminars to learn more about the integrated technologie...
CloudBees Connect - Austin
Learn about the future of software development and delivery with DevOps leaders in this informative and interactive in-person event. Questions? Email events@cloudbees.com
February 9, 2022
Organizer:
CloudBees Location:
Austin, TX
Turbocharging Quantum Hardware Platform...
A major challenge towards realizing practical quantum computation is predicting the reliability and capacity of quantum computer hardware and suppressing the effects of quantum errors during computations. This talk begins with a high-level overview of the quantum computing industry from applications to the hardware leaders, followed by a discussion on how Quantum Engineering Solutions at Keysight is helping both the hardware leaders and users...
Accelerate Your Journey to Zero Trust w...
Registration is now closed Zero Trust is not a technology or product to be bought and deployed – rather, it is a transformation of operational framework to incorporate the highest security measures in modern network environments. At its core, Zero Trust is a commitment to a risk-based approach across end-users, networks, data, devices, and much more. VMware offers the strongest Zero Trust security capabilities on the market and has exper...
Embracing the Elephant in the Room: Eve...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up your day. Whi...
Drive Collaboration and Improve Specs w...
Accurate specifications are critical to the success of projects by communicating the intended level of quality. As projects have grown more complex, it's important to consider specification tools such as AIA MasterSpec® that provides design professionals unbiased, objective technical information written by professional architects and engineers. Join us in this webinar where Melody Fontenot an AIA MasterSpec® writer, shares how working...
February 9, 2022
Organizer:
Deltek Location:
Webcast
Solving Financial Crimes
Fraud and economic crimes are now common occurrences in corporations, nonprofits, universities, and government agencies. Corporate and private investigators face the daunting task of responding to fraud and economic crimes quickly in order to preserve evidence and prevent harm to additional individuals, organizations, or governments. These cases typically involve multiple computers and devices making it hard to know which devices to seize.Regi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.