Back to Search Begin New Search Save Search Auto-Notify
Standoff Facial Recognition from UAVs,...
Security forces personnel are required to accomplish hundreds of hours of training each year to accomplish the mission of providing integrated defense and military law enforcement for the base, while developing highly-trained security forces Airmen to support deployed contingency operations. Whether this training entails guarding assets, controlling entry to the installation, increasing security for a distinguished visitor, or a construction p...
Add Favorite
Enhance Collaboration Experiences for P...
Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review and approval processes – providing users with more control and visibility over all document workflows. As Microsoft’s preferred e-signature solution, Adobe Sign works right from the Microsoft tab interface, so you can quickly and securely sign and send documents, contracts, an...
Add Favorite
Boost and Monitor Remote Worker Product...
Join Carahsoft & ISEC7 to learn how to monitor and increase remote worker productivity through digital transformation with VMware End User Computing (EUC) and ISEC7 solutions. Organizations around the world are in the process of digital transformation - integrating digital technology into all areas of business and fundamentally changing operations. While shifting towards a totally digital workplace may seem like a daunting task, it ultimat...
Add Favorite
Investigating SAP in Real-Time with Splunk
Join Splunk, Rhondos, and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for...
Add Favorite
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Add Favorite
Make Your Kubernetes Clusters Productio...
When you first started experimenting with Kubernetes, you may have started locally or on a set of servers. With simple applications, you may only have used a container registry and Kubernetes itself. When looking to move your clusters to a production setting, there are many more considerations, such as how to: Manage clusters Handle monitoring and logging Safely back up cluster resources Ensure that container images are safe and secure View t...
Add Favorite
Splunk Infrastructure Monitoring for Mu...
View this on-demand webinar with Splunk and SHI to learn how our Observability Suite provides a single, consistent user experience across all metric, trace, and log data. We give users a seamless and streamlined workflow for monitoring, troubleshooting, and investigation -- making it easy to go from problem detection to resolution in minutes. Whether you're a front-end developer who needs to know what end customers are experiencing, a back-end...
Add Favorite
Unleashing Data to Advance the National...
View this on-demand webinar where we go over how Splunk aligns with the overarching vision, focus areas, and guiding principles of the newly released Department of Defense (DoD) Data Strategy. Along with that, we see how Splunk meets or exceeds the essential architecture capabilities, and helps you execute the goals necessary to transform the Department into a data-centric enterprise. A team of Splunk experts walk you through the challenges th...
Add Favorite
How to Catch Advanced Persistent Threat...
View this on-demand webinar to hear Richard White, Cyber Security Architect from Tennessee DOT, and Val Bercovici, CEO and Co-founder of Chainkit, explain how the Department of Transportation's solution architecture and Chainkit's eXtended Integrity Monitoring (XIM) platform overcomes the critical integrity gap, protects all systems and data from a SolarWinds-style attack, and reduces DOT's cyber liability premium by 80%. In this on-demand you...
Add Favorite
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Add Favorite
Back to Search Begin New Search