Back to Search Begin New Search Save Search Auto-Notify
Building ScientificML Communities and A...
The value of Google Cloud & NVIDIA to Scientific Computing extends far beyond the core cloud tenets of elasticity, cost savings, and improved agility. Researchers and scientists see a faster path to discovery with NVIDIA GPU Accelerators & Google Cloud services for data, networks, compute, and AI/ML. View this on-demand roundtable to learn how Google's effectively limitless compute, AI/ML, and Quantum Computing, combines with NVIDIA GP...
Add Favorite
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Add Favorite
Protect and Defend Your Most Sensitive Data
When protecting your most critical personal assets, you take a defense-in-depth approach. Beyond the lock on your door, you have a video doorbell, perimeter security sensors, active security monitoring, locks on your windows, a fire-proof safe for your most valuable assets, and more. This same approach is often overlooked when protecting sensitive data in your databases. View this on-demand webinar to learn: How to implement a proven database...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
Red Hat Enterprise Linux 8 Technical Overview
Every technology within your IT stack needs to work well together and because those connections rely on the operating system (OS), it must be consistent, reliable, and flexible. Deliver value to your agency while maintaining existing infrastructure. Join Red Hat to discover why Red Hat Enterprise Linux 8 (RHEL 8) is the foundation to scale existing apps and roll out emerging technologies across bare-metal, virtual, container, and all types of...
Add Favorite
Deconstructing the 4 Benefits of Virtua...
Register now to view this this on-demand informative panel discussion. Hear from experts in the field as they come together to discuss government virtualization and the challenges agencies are facing during these unprecedented times. It has become apparent that remote work is not a short-term inconvenience, and the landscape for government agencies may look different post-pandemic. Our virtualization team of Teradici, HPE, Microsoft, and NVID...
Add Favorite
The RPA Journey: Hyperautomation with U...
Robotic Process Automation (RPA) has the potential to automate entire processes or parts of processes that are repetitive, monotonous and occur in high volumes. Named by Gartner as a #1 strategic technology trend, Hyperautomation validates automation yet elevates it to show how the combination of RPA and disruptive technologies such as AI, machine learning (ML), process mining, decision management, natural language processing (NLP), and more c...
Add Favorite
Accelerate Security, Agility, and Visib...
Maintaining physical, on-prem servers can be expensive. Between the hard cost of on-prem equipment and the soft labor cost to maintain these systems, it's no wonder that more businesses are taking their holistic digital ecosystem to the cloud.View this on-demand webinar supporting your cloud migration efforts. As more critical workloads move to AWS, you need to gain critical security, operational, and cost management insights across your entir...
Add Favorite
Nebraska's DHHS Data Nexus: Modernizing...
Nebraska’s Department of Health and Human Services (DHHS) team contributes to the lives and health of Nebraskans every day. Their mission, “Helping people live better lives," provides the motivation to make a difference. To ensure the continued success of that mission, Nebraska’s DHHS recognized a need to modernize the data management strategy and the need to deliver the data the organization needs, when they need it, at the...
Add Favorite
MF Compliance with Splunk: Continuous M...
The Risk Management Framework (RMF) was introduced to help federal agencies better manage the many risks correlated with operating an information system. Splunk offers a flexible, cost-efficient, and integrated solution to allow agencies to meet their RMF compliance requirements. NIST Special Publication 800-53 is the set of security and privacy controls designed to protect organizations from cybersecurity risks that are the result of an ever-...
Add Favorite
Back to Search Begin New Search