Introducing Recorded Future: The World'...
Recorded Future, an In-Q-Tel and Google Ventures backed analytics startup, will be presenting a demonstration via web conference on Wednesday, May 25 of how its unique, temporal analytic technology and visualization tools turn the real-time stream of open source web content into an invaluable resource for analysts. Join us during this webcast to learn how national security and defense analysts can use Recorded Future's temporally organized eve...
IT Asset Management in Government Agencies
Eliminate Software Security Risks Through Effective ITAMRegister today and join Advanced MarketPlace and HP Software, as they come together to demonstrate how you can implement a seamless suite of tools with IT Asset Management (ITAM). These tools include, Asset Tracking, Expense Control, Process Automation, and Asset Optimization. During this webcast you will learn how: ITAM can assist you with situational awareness To secure your assets and...
Intelligent Image and Video Search
Image and full motion video content are among the fastest growing digital assets for government and commercial enterprises, yet over 95% of this content, particularly full motion video, goes unviewed and unexploited for important information. While a range of advanced tools exists to support text and web-based data search and analysis, government and commercial enterprises currently have no viable solutions for indexing and searching image and...
Federal Government Deduplication Strate...
Want the recipe for a real government shutdown? Combine 30% annual data growth, an explosion of virtual data, and an outdated federal back-up infrastructure. Adding more storage is not fixing the problem. But what's the alternative? According to a new survey from CTOlabs.com and Carahsoft, there are numerous forward-thinking government IT professionals using data duplication technologies to manage virtual machines, optimize infrastructures, a...
Gov TechTalks Webcast Series Session 3:...
Tips for taking control of growing authentication requirements Authentication is only as strong as its weakest link. Authentication is a growing requirement in this new era of heightened technology security. Consequently, applications are critical to the survival of an agency. The ability to offload and consolidate authentication mechanisms and remove the complexity and heavy burden from already overloaded servers, allows agencies to improve t...
VMware Site Recovery Manager
VMware’s vCenter™ Site Recovery Manager 4 makes it easier than ever for agencies to take the "disaster" out of disaster recovery by automating the recovery process while reducing the cost and complexity of managing and testing recovery plans.Join us for this live webcast as we explore the new features and capabilities in Site Recovery Manager 4, along with the business benefits of using SRM in your virtual environment. With SRMs, a...
Carahsoft DoDIIS Partner Pavilion
The Defense Intelligence Agency (DIA) announces the 2011 Department of Defense Intelligence Information Systems (DoDIIS) Worldwide Conference! The conference’s 2011 theme, Secure and Collaborative Intelligence in Defense of the Nation, highlights the DIA Chief Information Officer’s commitment to developing and maintaining secure and reliable networks for Department of Defense personnel, services and information technology customers...
Adobe Government Solutions Going Digita...
Join Adobe in Jackson on Tuesday, April 19th, to learn how Adobe can help your agency transform everyday citizen and employee interactions, while leveraging your existing IT infrastructure. Discover how your agency can benefit from enterprise applications that blend electronic forms, process management, document security, document generation, and web content management to modernize your day to day activities. Our solutions have been used to he...
Government Video Solutions Forum 2011
Several government-wide initiatives requiring more openness and transparency have changed the way agencies communicate with their constituencies and partners, allowing for easier collaboration and information sharing. Online video has become more compelling than text on the Web today because it engages and connects better with the user, allowing agencies to communicate, educate, and inform their audience by keeping them focused on their messag...
HP Fortify Software Webcast Series: The...
Managing Software Risk in the Enterprise The software you depend on to run your agency is putting it at risk. Data breaches from cyber attacks are the single biggest threat to enterprise security today. Cyber attacks range from critical data theft to software manipulation that lays the groundwork for future adversarial advantage. The best defense for software systems, whether they are running mission critical defense weapon systems, the energy...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.