Back to Search Begin New Search Save Search Auto-Notify
Google Cloud 2020 Webinar Series: Strat...
Join Google Cloud and Carahsoft for a webinar to receive a roadmap of database migration options and strategies for migrating to GCP. Moving your existing on-prem workload can be challenging when your agency doesn't have a clear understanding of how to move its databases with minimum risk. Register and attend to learn how to run a comprehensive assessment of existing on-prem environments and provide a list of criteria for decision making, a ro...
Add Favorite
OTA Consortia Overview - And How To Get...
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
NVIDIA Webinar - From Cloud to On-Prem
Artificial Intelligence (AI) promises to unlock new frontiers, but its adoption in government has been limited. Slow-computing architectures can't deliver the resources demanded by modern AI use cases and "shadow-IT" implementations can't scale. This year, government IT managers have the opportunity to lead with an infrastructure strategy that enables their organization to realize the benefits of accelerated AI development across people, proce...
Add Favorite
Show Me the Money: Transforming Gov's B...
Managing hundreds of grants and collecting the proper data is not easy, which is why governments need a grant management strategy. In 2013, the city of Detroit filed for bankruptcy, prompting them to revolutionize their approach to funding by targeting grants. In six years, Detroit went from 156 to 411 grants awarded, transforming the funding model of the city. Watch the on-demand webinar to discover how state and local governments can follow...
Add Favorite
Mitigating Your Data Complexity
Too many organizations struggle with the complexity of their own data. An extensive 50-60 percent of enterprise data is "dark" and serves no valuable insight, according to IBM and Veritas research – don't let your agency be held back by that same confusion. You need to be able to tackle business challenges without worrying about the complexity of your IT environment. Join us for a live webinar on the necessity of abstracting complexity f...
Add Favorite
FAR Part 7- Acquisition Planning
FAR Part 7 outlines the policies and procedures for developing acquisition plans, determining whether to use commercial or government resources when acquiring goods or services, making lease vs. buy decisions, and determining whether functions meet the definition of inherently governmental.
Add Favorite
Live Webinar: Transformative Digital En...
Join Principal Systems Engineer Cary Bryczek for a webinar to discuss how Jama Software's modern approach to digital engineering bridges the gap between modeling tools and the siloed document world. Guidance released by the U.S. Secretary of Defense in 2018 urged government organizations to put in place new practices to modernize delivered systems with an emphasis on accelerating delivery. Is your organization prepared to undergo this digital...
Add Favorite
Protecting Your Election Security Infra...
Join F5 Networks and Carahsoft for an in-depth overview of the election system threat landscape, attack surface, bots and botnets, and zero-trust principles to protect election infrastructure. With the 2020 election cycles on the horizon, now is the perfect time to brush up on election security concepts and how F5 solutions protect this critical infrastructure.This webinar will discuss how F5 provides a variety of security solutions to mitigat...
Add Favorite
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Add Favorite
Back to Search Begin New Search