How CIOs Can Accelerate Software and Te...
This on-demand webinar showcases case studies on how CIOs and CPOs use a challenge-based approach to drive rapid digital transformation. During this on-demand webinar, you will learn about: How new technology can help make quick work of even the most complex technical acquisition process Ways of getting everyone at your agency on board with your digital transformation efforts Key challenges in digital transformation and what to do about them
Gain Deeper Insights from Your Data
Organizations are accelerating their journey to the Cloud for increased agility, reduced costs, and faster time-to-market. Many of them are increasingly moving towards a multi-cloud approach to drive performance optimization, cost savings, and flexibility. The rise of multi-cloud brings about many challenges to organizations in gaining visibility for monitoring and securing their infrastructure, data, and applications, and in driving business...
Modernizing Major Incident Response for...
With the proliferation of mobile and consumer-facing applications in everyday life, state and local governments are under immense pressure to adopt new technologies and processes that will enable them to provide essential digital services to constituents and do more with fewer resources. View this on-demand from PagerDuty and Carahsoft to hear PagerDuty's Julie Gunderson and Haroon Chohan explore why modernizing major incident response in stat...
Deliver Modern Training Experiences wit...
In today’s remote world, the learner experience is more important than ever. Our current learning culture is evolving with the potential to adapt and create a custom virtual learning environment tailored to each user. Adobe Captivate Prime is a next-generation learning management system (LMS) that can assist in training your workforce effectively with simple reports at-a-glance, a vibrant and easy-to-use learner ecosystem, and an all-new...
Deltek Open Plan & Project Scheduling f...
Project Scheduling is a key best practice in project based organizations and government agencies. Many state and federal agencies leverage project scheduling to manage their work as well as that of their contractors. In this live webinar, Deltek will highlight their project scheduling tool, Open Plan, and many of its key features and advantages over other scheduling tools in the market. View this on-demand webinar as we explain why some of th...
Building ScientificML Communities and A...
The value of Google Cloud & NVIDIA to Scientific Computing extends far beyond the core cloud tenets of elasticity, cost savings, and improved agility. Researchers and scientists see a faster path to discovery with NVIDIA GPU Accelerators & Google Cloud services for data, networks, compute, and AI/ML. View this on-demand roundtable to learn how Google's effectively limitless compute, AI/ML, and Quantum Computing, combines with NVIDIA GP...
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Protect and Defend Your Most Sensitive Data
When protecting your most critical personal assets, you take a defense-in-depth approach. Beyond the lock on your door, you have a video doorbell, perimeter security sensors, active security monitoring, locks on your windows, a fire-proof safe for your most valuable assets, and more. This same approach is often overlooked when protecting sensitive data in your databases. View this on-demand webinar to learn: How to implement a proven database...
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Red Hat Enterprise Linux 8 Technical Overview
Every technology within your IT stack needs to work well together and because those connections rely on the operating system (OS), it must be consistent, reliable, and flexible. Deliver value to your agency while maintaining existing infrastructure. Join Red Hat to discover why Red Hat Enterprise Linux 8 (RHEL 8) is the foundation to scale existing apps and roll out emerging technologies across bare-metal, virtual, container, and all types of...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.