We Are Anonymous: Inside the Hacker Wor...
Parmy Olson, author of We are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Little, Brown, 2012) has gone into the cyber hacker world of Anonymous and Lulzsec to bring forward a thrilling narrative filled with conversations with the members themselves. Olson begins the story with the hacking and theft of emails from the HBGary consulting firm, by the small cadre of hackers who accomplished that dee...
Managing Development Projects Smarter a...
Agencies often manage software releases using an initiative-oriented approach with multiple projects running in parallel that need to be tested and released together. For these agencies, a Quality Center of Excellence (CoE) is ideal to facillitate collaboration and communication between all teams across the core application lifecycle.We will look to address the following needs for agencies: Reduce risk by clearly identifying project risks aga...
How IKANOW Uses MongoDB to Solve Big Da...
When building a solution like IKANOW's Open Source document analysis platform Infinit.e, the choice of your underlying data store is a critical part in determining the overall architecture of the platform. IKANOW’s engineers had some pretty clear ideas of how they wanted to approach the problem of merging structured and unstructured data into a unified, semi-structured format. Fortunately for the team, finding a database that fit Infini...
Continuous Monitoring Federal Requireme...
Federal Requirements and SolutionsHow compliant are you? Do you have visibility? Want to see what you are missing? Learn successful strategies for creating, implementing and managing your Continuous Monitoring program with help from HP Enterprise Security Products. Learn Continuous Monitoring challenges, solution components for a complete Continuous Monitoring Solution and the methodologies to tackle Enterprise deployments during this webcast....
Simplifying the Cloud with Network Virt...
Make Cloud Computing Easy to Understand and Easy to Use The concept of cloud computing is enticing to those building new data centers and consolidating infrastructure, but can also be filled with confusion for those using the cloud to deploy applications and get their jobs done using IT resources. At Nicira, we have been building technology that changes how clouds are conceived, deployed, and used for real-world applications. The enabler is n...
Big Data and Hadoop: Information You Ca...
Apache Hadoop is a software framework that supports data intensive distributed applications under a free-to-use license. Hadoop has been the driving force behind the Big Data industry. It enables applications to work over massive quantities of data with built-in features enabling enhanced reliability, scalability and functionality over old style data tools. If your legacy data storage methods are costly, or if you need to access your data fas...
Virtual Infrastructure Optimization: So...
Unprecedented data growth from Virtual Machines, more abstraction from cloud computing, and vSphere’s inability to see what is happening inside the SAN presents significant challenges for VMware administrators responsible for virtualizing mission-critical applications. Join Virtual Instruments and Carahsoft to learn more about how VirtualWisdom® can help you to: Eliminate the risk of unplanned outages and performance slow-downs when...
Achieving Mission-Critical Security wit...
Your VDI deployment may not be as secure as you thinkMany organizations are considering desktop virtualization to reduce the cost of maintaining desktops and tightening corporate data security by bringing desktops into the data center. However, traditional approaches using thin clients or repurposed PCs still require patches and protection from viruses. Register today to learn from federal solutions experts how VMware View and PCoIP zero clie...
Connect with Carahsoft: Safegaurd Serve...
Symantec Critical System Protection allows organizations to monitor and protect physical and virtual data centers using granular, policy-based controls. It allows organizations to proactively safeguard heterogeneous server environments and the information they contain. Join Symantec and Carahsoft to learn how your customers are able to utilize the key features of Symantec’s Critical System Protection including its ability to: Identify a...
Migrating from LoadRunner to Performanc...
LoadRunner has been synonymous with the words performance testing for more than a decade. Ten years ago the need for the LoadRunner product was to test and expose volume and concurrency related deficiencies in applications and environments without the need to utilize technical resources and stopwatches to achieve the same task.Today, organizations are faced with a new challenge. Information Technology/Management is being forced to adapt by th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.