Getting ready for IPv6 - the first five steps
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babble Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: Setting up your DNS fast and securely with easy to use workflow wizards Running name servers over IPv6 Registering and delegating to IPv6 Setting up forward- and...
Leading With Courage
We read books and watch movies about great war-time commanders, adventurers and founding fathers, and fantasize about being the same inspirational leaders. Yet all around us every day, leaders and managers all around us are inspiring us with similar acts of courage . They command a devoted following by their teams and are followed by top performers from one company to another. Whether they know it or not these leaders are tapping into leadersh...
Industry Day for Native American/MBE Co...
On July 13, SNAP and The Native American Business Enterprise Center (NAEBC) and The OSU Center for Innovation and Economic Development ‘s ASSEST program will be hosting an intimate and well focused event at the Tinker Business and Industrial Park. We are inviting our Native American contractors and other small business contractors to attend and discuss the forecasts of upcoming opportunities at several of our federal installations. Of co...
July 13, 2011
Organizer:
Kay Bills Location:
Oklahoma City, OK
Improving Customer Service with Better...
Automated forms processing can help your organization improve productivity and comply with government standards, including OMB's cloud-first strategy and President Obama’s new executive order, "Streamlining Service Delivery & Improving Customer Service"
July 12, 2011
Organizer:
SpringCM Location:
Webcast
Gov TechTalks Webcast Series Session 5:...
Strategies to simplify unstructured data management, reduce costs, and extend your file storage environment to the cloud The impact of data growth is felt at every level of an agency. The rate of unstructured data growth is pushing storage resources to the limit, increasing management complexity, and driving up costs. The key to simplifying data management is building an agile storage infrastructure that can easily adapt to evolving business a...
IS-907, Active Shooter: What You Can Do...
The Department of Homeland Security (DHS) has developed an Independent Study Course titled Active Shooter: What You Can Do (IS-907), a no-cost training course developed to provide the public with guidance on how to prepare for and respond to active shooter crisis situations. An active shooter is defined in the course as an individual “engaged in killing or attempting to kill people in a confined and populated area. In most cases, there i...
What's New In AutoCAD 2012 Webcast With...
Join DLT Solutions and Autodesk Technical Evangelist and Cadalyst columnist Lynn Allen as she takes you through a tour of the latest features and puts you on the road to instant productivity! Robust Model Documentation tools, the new smarter Associative Arrays, and the instantly productive Multifunctional grips are just a few of the new features in AutoCAD 2012 you’re going to want to know all about. Knowing Lynn, she’s sure to thr...
Federal Executive Breakfast featuring S...
Join Deltek for a Federal Executive Breakfast featuring Simon Szykman, Chief Information Officer, Department of Commerce (DOC) to learn about DOC’s FY 2011 technology infrastructure plans and initiatives. Simon Szykman was named Chief Information Officer (CIO) of the Department of Commerce in May 2010. As the Department’s CIO, Szykman is responsible for providing leadership, establishing policy, and maintaining oversight for the in...
June 30, 2011
Organizer:
Deltek Location:
Arlington, VA
VMware Webcast for Northrop Grumman: Se...
Enhance Datacenter and Cloud Security with Virtualization Virtualization is disrupting assumptions about how security is deployed and operated in data centers and in the cloud. While many of the same basic principles of IT security apply in virtual environments as they do in physical ones, virtualization offers some key additional security benefits, such as: Reducing the interfaces and the attack profile by supporting OS independence Separatin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.