Next-Gen Search Mastery for PubSec: Ela...
Struggling to navigate the vast data landscape of your organization? Traditional search methods can't keep up with the complexity and volume of modern data. Discover the transformative power of Elastic's Vector Database. During this Elastic webinar experts dived into how AI-driven search delivers unparalleled relevance and speed, turning data into actionable insights for enhanced citizen engagement and rapid security threat analysis. Vector da...
Veritas & Everfox: Secure Cross Domain...
Data is the lifeblood of your organization. If something were to happen to it, especially when it is vulnerable during large transfers, the damage could be disastrous. To minimize this risk, Veritas and Everfox have come together to offer a joint-solution: Cross Domain data backup that meets Raise The Bar guidelines. Attendees joined our Carahsoft demo team for a display of this interaction, learned how their organization can incorporate these...
Accessibility Solutions for Partners: C...
As part of our commitment to driving innovation and inclusivity, we presented a session focused on the importance of accessible Salesforce implementations, ensuring that people with disabilities can perform their work independently and effectively. This session focused on helping customers meet their compliance objectives and align with best practices in inclusivity and accessibility.Attendees gained valuable insights into creating more inclus...
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Attendees joined Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Attendees registered to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate t...
Bridge Conditions & Economic Inequity m...
The $9.6 billion in grants provided for the Bridge Invest Program funded by the Infrastructure Investment and Jobs Act allows us to target high value opportunities for improving the quality of our bridges. The National Bridge Inventory database includes helpful information such as the Average Annual Daily Travel for each bridge, but it does not include the trip types, the origins/destinations of those trips, or user demographics/characteristic...
ServiceNow Federal Creator Studio Virtu...
This half-day, hands-on, no-code Creator Studio Innovation Workshop showed how organizations can re-imagine their approach to automation and app development with ServiceNow's Creator Workflows. Attendees learned how to boost productivity at scale by building high-value, no-code mission apps with Creator Studio. Whether you're a pro developer of any level looking to streamline repetitive tasks, a business process owner looking for ways to solve...
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
Transform Public Sector Pay with Earned...
Curious about transforming public sector pay? Attend the next DailyPay event or webinar hosted by Carahsoft.Attendees learned about:The benefits of changing how you pay your employees.Boosting recruitment and retention by adding new benefits like earned wage access (EWA).Implementing EWA without changing your payroll systems.Empowering employees with control and peace of mind.
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
5G for the Tactical Edge
Participants in this webinar discovered how the US Department of Defense collaborated with technology providers to enhance 5G capabilities for mission-critical applications in tactical edge networks.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.