7 Worst Mistakes in Virtual Training
Watch this on-demand webinar where Becky Pike Puth, President and CEO, The Bob Pike Group, uncovered the common pitfalls that can make virtual learning sessions fall flat. Attendees learned how to identify these mistakes and gain practical solutions to transform your training content, making it more interactive and engaging for your learners. Specifically, learned:The 7 worst mistakes that make virtual learning dullEasy and effective fixes to...
Build Your Virtualization Transformatio...
Government organizations may face several challenges with virtualization, including complex cloud implementation, speed and security of virtualization, and inefficiencies with existing IT infrastructure. Oracle Linux Virtualization addresses these concerns by ensuring the virtualization process is simple, secure, and supportive.Watch the on-demand webinar and discover how Oracle Linux Virtualization helps your agency accelerate its cloud devel...
Finding Zero Trust to Alternatives to R...
Are aging VPNs still relevant in your long-term network strategy? VPNs are plagued by vulnerabilities and regularly exploited by attackers. Their network-centric design backhauls traffic and allows for lateral movement by putting users directly on the network. During this webinar, a panel of experts discussed the challenges of connecting employees and third parties to private applications using traditional VPNs, explored why fully remote and h...
NYU Transforms Business with Enterprise...
In this webinar, key takeaways were:Understanding the challenges of managing multiple data warehousesThe benefits of adopting an enterprise-scale data architecturePractical steps to implement a data vaultLessons learned from NYU's journey
Turning Real-Time Data Into Action for...
Attendees joined us and learned how real-time data analysis can help institutions gain fuller insights into cybersecurity posture, IT and HPC systems operations, public safety and student well-being. Attendees also explored sustainability and Wi-Fi optimizations use cases. For example, real-time data can enable risk-based alerting, so staffers are not overwhelmed with security alerts that aren’t important. In addition, many institutions...
Red Hat OpenShift Virtualization Workshop
This workshop was tailored for VM administrators and infrastructure architects looking to explore new virtualization solutions. Attendees gained hands-on experience with OpenShift Virtualization, diving into key concepts such as importing, networking and storage.
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Learn How Jira Service Management Impro...
Government employees deserve tools to simplify their work and improve citizen satisfaction. Discover how Atlassian's Jira Service Management (JSM) can transform the way state and local government agencies deliver services.This Atlassian webinar hosted on September 19th explored how to: Improve citizen experience by simplifying service requests and incident trackingDecrease response times and improve resolution ratesEnhance transparency and acc...
Smartsheet Gov Dynamic View Webinar
Smartsheet Gov, Prime Consulting Group, and Carahsoft hosted a webinar on how to use Dynamic View in your solutions to allow your Vendors and External Collaborators access to the information they need but not see the information they shouldn't. Customer were taught how to begin integrating the collection of external information into your organization's workflows in a seamless and secure manner. In this webinar, James Green shared a real use ca...
Accelerating Investigations and Increas...
One of the main goals of law enforcement agencies is to catch and prosecute those who have committed crimes of any sort. After all the evidence of a crime has been collected for review, the real hard work begins as investigators begin to sift through the mounds of physical and digital evidence. As they do this, they try to search and locate key artifacts that will assist them in identifying the suspect(s), the motive(s), and any other critical...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.