Back to Search Begin New Search Save Search Auto-Notify
SAP Business Objects 4.0 - Harnessing Y...
Today’s executives and managers face an overload of data and find it progressively difficult to sift out actionable information. Companies and enterprises world over are dealing with data volume explosions. To maintain your competitive advantage, it is important to be able to rely on your data quality and have the right tools and infrastructure that will transform data into actionable information. In this economy, it is crucial to maxim...
August 4, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Boston All-Hazards/All-Stakeholders Sum...
Network with Peers and Share Your Experiences Whether it's a catastrophic accident, severe blizzard, or act of terror, Boston cannot predict when or how disasters will strike. What we do know is that effective disaster preparedness and emergency management requires expanded collaboration and response capabilities with all stakeholders. This is truly a must attend event for all those responsible for the safety and well-being of the public. You...
August 3, 2011
Organizer: Emergency Management
Location: Boston, MA
Add Favorite
Getting on the GSA Schedule: Compliment...
A GSA Schedule contract is one of the most widely used procurement vehicles by the federal government. If constructed and negotiated properly, it will be a powerful and efficient sales tool that gives you access and visibility to the entire federal market and in some instances state and local governments. Join Winvale and examine the benefits of holding a GSA Schedule contract, the process of submitting and negotiating a quality offer that wi...
August 3, 2011
Organizer: Winvale
Location: Washington, DC
Add Favorite
Adobe Connect Webcast: Enhance Existing...
Join Carahsoft and Adobe for an informative one-hour session to learn about leveraging the full suite of the Adobe Connect capabilities with Video Teleconferencing (VTC). With VTC, presenters and participants can securely engage with one another through real-time video and audio. We will also discuss how to leverage a scalable and secure (FISMA) platform to reach audiences and users outside your network.Connect, the award-winning web conferenc...
August 3, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Live Event: Google For Defense Technolo...
Join Google and DLT Solutions at Google Technology Seminar for the Department of Defense to discover how Google solutions can bring value to your program or enterprise. Bring the Google Search power you know and use online to your program artifacts or enterprise data – behind the firewall! Even classified information can be searched, with security needs enforced by implementing a Google Search Appliance. Collaborate with ease using Goog...
August 3, 2011
Organizer: DLT Solutions
Location: Pensacola, FL
Add Favorite
A Primer for Data Methodology in the Cl...
Establishing a foundation for data governance has never been more critical as federal agencies face more data center consolidation pressures. Many agencies are following the IT trend of breaking their problems into smaller pieces to make a complex problem more solvable. Your agency may be planning to send “some data” and “some applications” to the cloud, but do you have a methodology for optimizing your data once it...
July 28, 2011
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Leveraging Information Dashboards for S...
The Advizor Group, a leading IT provider of content management and business intelligence solutions, has teamed up with SAP, the market and technology leader in business management software, to develop a "manage by exception" dashboard platform. Dashboards eliminate the task of sifting through long reports to extract those few lines of information that matter in decisive action. In this economy, it is crucial to maximize an organization's value...
July 28, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Mobile Data Protection: Secure Access t...
Join Carahsoft and IronKey for an educational webcast on the 2011 threat landscape. Sophisticated malware is increasingly growing, driven by a thriving criminal ecosystem built around financial and related fraud against both commercial and government organizations. It is time for a new approach to securing online access to sensitive applications and data, especially as organizations move mission-critical functions into the cloud. Learn about h...
July 26, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
LIVE EVENT: Getting Ready for IPv6 - Th...
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babel Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: • Setting up your DNS fast and securely with easy to use workflow wizards • Running name servers over IPv6 • Registering and delegating to IPv6 ...
July 26, 2011
Organizer: Infoblox, Inc.
Location: Annapolis, MD
Add Favorite
Stealth Tactics for Continuous Visibili...
Don’t be caught with your guard down, your networks open to attack. Today’s threat environment is constantly evolving and maturing in levels of sophistication and capabilities. The old ways of doing things are no longer enough. Relying solely on the organization ‘s perimeter to detect and prevent these threats is full of holes. Security Operations must mature along with the threat and leverage the internal network as a sensor...
July 26, 2011
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search