Intelligent Image and Video Search
Image and full motion video content are among the fastest growing digital assets for government and commercial enterprises, yet over 95% of this content, particularly full motion video, goes unviewed and unexploited for important information. While a range of advanced tools exists to support text and web-based data search and analysis, government and commercial enterprises currently have no viable solutions for indexing and searching image and...
Theoretical Underpinnings of Common Cri...
Red Hat is committed to providing secure and stable software that can be easily used in security-sensitive environments. Red Hat works closely with US Government customers and security specialists to ensure that Red Hat products are certified for government use, and are easily accredited by the appropriate authorities. To date, Red Hat Enterprise Linux is one of the most certified operating systems available. Join this webinar and you will: Ga...
Best Practices for Logistics in Supply...
It is a daunting task to stay informed and in control of every stage of the supply chain as globalization has increased the complexity of the suppliers and consumers of goods and services. Having online visibility into any supply chain issues or disruptions, as well as the ability to perform real-time collaboration with suppliers and partners, is crucial to the success of your agency’s mission. Being able to manipulate the organizational...
DC Gov TechTalks Lunch & Learn Series:...
Redefining the Next Generation of Mobile Computing Join us for an in depth discussion on the future of computing technologies. During this time we will discuss how mobile devices are not only driving that future, but also changing the paradigm of computing and the very foundation of information technology as we know it today. A word of advice: fasten your seatbelt and hold on tight. If you want to stay in the game, you’re going to have t...
i2 Web-Based Training: Analyst’s Notebo...
i2 training is pleased to offer a complimentary short web-based training session focusing on: Importing large data sets Link multiplicity Filter, histogram, and HeatMatrix Conditional formatting Join Jennifer Davis, i2 Training Instructor, to learn how to create charts by importing large data sets held in Excel. The focus will be on using the predefined designs and fully understanding multiplicity to get the right chart for your analytical wor...
Harnessing Temporal Signals for Cyber Defense
Government and defense organizations are faced with fast evolving cyber threats and Recorded Future provides groundbreaking temporal analysis to help analysts find intelligence buried in big data. Recorded Future, an In-Q-Tel and Google Ventures backed startup, has been featured by Wired Magazine, The New York Times, NPR Marketplace, and MIT Technology Review, and was named in the Top 5 Disruptive Search Engines by Big Think.Register now to he...
Information Assurance and Successful So...
Facebook and social networks are being used extensively for both public engagement and interagency communications. Agencies need to be aware of the risks associated with the explosive growth of social media use and how to protect themselves for successful data exchanges. There are new technologies that protect social media networks for information assurance, user behavior, data leakage, eDiscovery, and human and technology threats. Join us now...
Ten Tips for Moving to a Least Privileg...
Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks. Thus, moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks. Join Viewfinity and Carahsoft as they discuss the top ten tips for remo...
Strategies for Compliance with Executiv...
An October 2011 Executive Order makes individual Federal agencies responsible for striking the right balance between protecting sensitive data on their networks and ensuring fast access to valid users. This directive, carrying the force of law, puts added pressure on agencies to reduce the network vulnerabilities that are putting Federal applications and data at risk. Join us for an informative discussion that will highlight steps you can take...
New Analysis Solution Capabilities for...
Thetus Corporation would like you to join us for an informative webcast where we will demonstrate the new capabilities being released in the latest version of the Savanna application. Savanna is a multi-source, model-enabled analysis solution that builds on existing investments and programs bringing together various analysis techniques to enable faster, more informed decision-making. With its intuitive user interface, backed by the powerful se...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.