Back to Search Begin New Search Save Search Auto-Notify
Understand the Cloud with Cloud Economics
Join VMware and Carahsoft to learn about Cloud Economics and how it can be used to make better decisions when choosing cloud offerings. Hear about the origins of Cloud Economics and about the key factors state and local governments should consider when moving workloads and virtual machines (VM) to the cloud. Join us on September 9th to hear Bill Roth, Director of Cloud Economics at VMware, discuss: Using VMware Cloud on Dell EMC to extend the...
Add Favorite
How to Deliver an Engaging Employee Exp...
Attendees join Deloitte Digital and Salesforce as they dive into how to deliver a compelling employee experience. Learn how employers use Salesforce as an engagement tool within their HR systems, and see a live demonstration.
Add Favorite
Improve Operational Efficiency with AI...
Data processing at the edge is just getting started. Edge computing extends the open hybrid cloud all the way to the data sources and end users. Red Hat's enterprise open source portfolio of edge products and NVIDIA's EGX-based systems bring the United States Postal Service (USPS) better control over the movement of sensitive data, limits service failures and reduces transmission delays. Join Red Hat experts for an informative session to: Lear...
Add Favorite
Transit Modernization in the 21st Century
Today's era is one of unprecedented disruptive innovations in mobility. However traditional transportation agencies aren't built for rapid innovation. Even as they focus on maintaining critical infrastructure, expanding service, and guaranteeing safety, they must move-with urgency-to renew their focus on infrastructure modernization, which will also include the technology and processes needed to operate in this post-pandemic era. Many transpor...
Add Favorite
BMS Security for Government
Join Tenable and Carahsoft on September 14th as we discuss why industrial cyber security is essential to eliminate many of the core risks associated with the new reality that is present in BMS environments. Learn about the automation and operations technologies employed along with some of the security issues it can introduce; and how you can remain secure. Topics include: The anatomy of a cyber attack on BMS Common vulnerabilities and key sec...
Add Favorite
Create a New Dimension of Design with H...
The 3D generation is here. Substance by Adobe is the leading software solution for designing 3D digital materials, empowering creatives across the public sector to push design boundaries into new dimensions faster than ever. In the Substance 3D ecosystem, smart creative apps and high-end content give both beginners and experts everything they need to make inspiring art. Join our complimentary webinar to learn how to render and compose a scene...
Add Favorite
Identity as the Foundation of Zero Trust
President Biden's Executive Order on Improving the Nation's Cybersecurity states that agencies must "develop a plan to implement Zero Trust Architecture" and "identify activities that will have the most immediate security impact, and include a schedule to implement them." In a Zero Trust Architecture, automation and orchestration of Federal Identity, Credential and Access Management (ICAM) is the first step to address the most critical securit...
Add Favorite
Achieving FedRAMP on AWS: How Automatio...
Navigating the FedRAMP authorization journey can be tedious, overwhelming, and costly. Cloud software vendors looking to get FedRAMP certified often consider a traditional consulting service approach, but this results in high opportunity costs, delayed time-to-revenue, and 12-18 months of manual work. Thankfully, there's a better way to get FedRAMP audit-ready. One that speeds up your FedRAMP ATO timeline at enterprise scale and gets you audit...
Add Favorite
Innovative Defense State And Local Gove...
Join Attivo Networks and Carahsoft to discuss how state and local governments continue to be a top target of ransomware attacks which cause major disruption as well as operational and financial impacts throughout the USA. Active Directory (AD) remains the first target for attackers, often abusing misconfigurations that the SecOps team is unaware of due to the lack of visibility. By evading traditional defense mechanisms, attackers advance thei...
Add Favorite
Splunk IT Essentials (ITE) for the Depa...
During this DOE-focused on-demand webinar, viewers will gained insight regarding: An overview of Splunk's no-cost Splunk offering: ITE Learn and ITE Work Which billable and non-billable Splunk apps are now in ITE (e.g., Exchange, App for Infrastructure, VMware, Windows, Unix, etc.) How ITE consolidates numerous Splunk and 3rd party point solutions into a centralized view How to identify trends or issues impacting KPIs with drill-down capabilit...
Add Favorite
Back to Search Begin New Search