3,235 webcasts found
+ 57111 past events found
Back to Search Begin New Search Save Search Auto-Notify
Red Hat OpenShift Virtualization Workshop
This workshop was tailored for VM administrators and infrastructure architects looking to explore new virtualization solutions. Attendees gained hands-on experience with OpenShift Virtualization, diving into key concepts such as importing, networking and storage.
Add Favorite
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Add Favorite
Learn How Jira Service Management Impro...
Government employees deserve tools to simplify their work and improve citizen satisfaction. Discover how Atlassian's Jira Service Management (JSM) can transform the way state and local government agencies deliver services.This Atlassian webinar hosted on September 19th explored how to: Improve citizen experience by simplifying service requests and incident trackingDecrease response times and improve resolution ratesEnhance transparency and acc...
Add Favorite
Smartsheet Gov Dynamic View Webinar
Smartsheet Gov, Prime Consulting Group, and Carahsoft hosted a webinar on how to use Dynamic View in your solutions to allow your Vendors and External Collaborators access to the information they need but not see the information they shouldn't. Customer were taught how to begin integrating the collection of external information into your organization's workflows in a seamless and secure manner. In this webinar, James Green shared a real use ca...
Add Favorite
Accelerating Investigations and Increas...
One of the main goals of law enforcement agencies is to catch and prosecute those who have committed crimes of any sort. After all the evidence of a crime has been collected for review, the real hard work begins as investigators begin to sift through the mounds of physical and digital evidence. As they do this, they try to search and locate key artifacts that will assist them in identifying the suspect(s), the motive(s), and any other critical...
Add Favorite
Data Warehouses, Lakes, Clouds and Mesh...
Explore the diverse landscape of data architectures, including data warehouses, lakes, data mesh/fabrics, data clouds, or a combination of these patterns, in Snowflake's recent webinar. This session examined the unique characteristics, functionalities, and use cases specific to each platform type, equipping attendees with a comprehensive understanding of leveraging these technologies to optimize their data management and analytics strategies.W...
Add Favorite
Benchmarking the Battle Against Deepfak...
Thank you for your interest in our Deep Media webinar!This webinar delved into the critical role of Deepfake Detection and Disinformation Security in the public sector, highlighting the need for standardized benchmarks and the importance of scalable, accurate, and explainable AI tools. Watch the on-demand recording to discover how users can fortify their defenses against the next wave of AI-driven threats. This webinar discussed these key topi...
Add Favorite
Commonwealth Innovation: Leading Tech S...
Red Hat and Dynatrace hosted a Tech Day in Richmond, VA dedicated to the future of open source, cloud-native application development and automation. The morning sessions covered best practices for building and deploying scalable applications, empowering your agency's digital transformation.The afternoon focused on OpenShift Virtualization, learning directly from experts on the essentials, including importing, networking and storage to moderniz...
Add Favorite
Empowering the U.S. Army's Hybrid Workf...
Palo Alto Networks Prisma Access IL5 protects hybrid workforces with superior security, while providing exceptional user experiences from a simple, unified security product. Purpose-built for cloud-enabled DoD agencies, Prisma Access IL5 consolidates multiple point products into a single integrated service, reducing complexity while increasing organizational agility. With a common policy framework, consistent visibility, single-pane-of-glass m...
Add Favorite
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Dung Lam, and Gabe Romero provided live demonstrations as well as answering any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications using...
Add Favorite
Back to Search Begin New Search