F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
Salesforce California Innovation Day
Salesforce is excited to invite you to our California Innovation day in Sacramento. Join your fellow Trailblazers and learn how revolutionary technology platforms easily integrate with your current infrastructure - enabling automation, collaboration, mobile, and rapid response to change. 12:00pm - 1:00pmRegistration and Networking Lunch 1:00pm - 1:10pmOpening Remarks 1:10pm - 2:00pmKeynote SpeakerCasey Coleman, Senior VP of Global Governmen...
Kyndi Webinar: The Need for Explainable AI
The term "black box" has long been used in science and engineering to denote technology systems and devices that function without divulging their inner workings. The inputs and outputs of the "black box" system may be visible, but the actual implementation of the technology is opaque and hidden from understanding. To realize the full potential of artificial intelligence, trust is crucial. Trust comes from understanding -- and being able to ju...
Digital Workplace Breakfast
Join Box, DocuSign, and Carahsoft for an upcoming breakfast on the Digital Workplace in the Public Sector in Washington D.C on Tuesday, June 12th. Together, Box, DocuSign, and Carahsoft are building the next generation of Cloud Content Management capabilities that are designed to enable digital workplaces and digital citizen services. We have helped tens of thousands of companies and government agencies undertake this transformation, through r...
F5 SPAWAR Charleston TechTalk
Hosting workloads in an off-premise Cloud Service Offering (CSO) is becoming more prevalent in DoD. Taking advantage of cloud computing efficiencies is necessary when trying to keep up with an agile application deployment approach to IT. When utilizing these cloud compute resources, applying access control, monitoring, security and visibility as we do to our on-premise workloads is paramount in protecting the Mission Owner's applications and...
F5 Peterson Certification Prep Course
Join F5 Networks and Carahsoft for the F5 BIG-IP Administrator certification prep course. During the meeting we will be covering all of the exam blueprint points for the F5 101 & 201 exams. These blueprint points are the basis for the exam content and can be found on the F5 certification page of our website. This class is not a guarantee of a passing score on the exam, but is simply meant to be a review of the content contained in the exam...
Dell EMC & RSA Ransomware Government Briefing
How do you effectively defend your organization against something that's never been seen before? The key is to have secure endpoints and a trusted recovery process. Join us for a Government Briefing in Washington, DC that focuses on Dell EMC's Ransomware and Cyber Recovery and RSA Archer. Dell EMC's vendor-agnostic Ransomware and Cyber Recovery solution has advanced air-tight protection services to ensure that the "heartbeat" of your organizat...
Louisiana Innovation Day
Salesforce is headed to Baton Rouge, Louisiana on June 7th! Save your spot today to join us for an innovative afternoon at the Watermark Baton Rouge! Increase your understanding of the Salesforce platform while sharing best practice pathways for platform adoption. Get the chance to hear real customer success stories over lunch. Be on the lookout for a full agenda release. It will be an afternoon you don't want to miss!
Diffeo Analytical Tradecraft and Techno...
During this complimentary event, our featured speakers will touch on: Empowering Analysts Through Innovation - Learn how Collaborative Machine Platforms help researchers from all disciplines make sense of the ever growing massive volume of available data both on internal systems, the surface and deep web.Benefits of Human and Machine Learning Collaboration - Hear from analysts how these new capabilities are changing intelligence tradecraft for...
Secure Software Defined Data Center for...
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. The recent elevation of US Cyber Command to a unified combatant command demonstrates the resolve to embrace the changing nature of warfare in order to maintain US military superiority across all domains and phases of conflict. This ever-changing face of war has c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.