Integrating Enterprise Architecture and...
Capital Planning and Enterprise Architecture have operated as two separate functions within the Federal Government since their inception. With no clear linkages between the two disciplines, Enterprise Architects and Capital Planners have rarely crossed paths outside of completing portions of the Exhibit 300 and the organizations Target Architecture… until NOW. By properly integrating the two disciplines, Senior Managers of an organizati...
Introduction to Federal Government Cont...
This four-day course covers the key elements of the entire federal government contracting process. Introduction to Federal Government Contracting is designed to provide those new to government contracts (or those looking for a basic refresher) with an understanding of the entire government contracting process. By providing this framework, you will be able to understand how your work relates to the overall process and will be able to more easil...
GAO's Principles of Federal Appropriati...
In 1982, GAO released the first edition of Principles of Federal Appropriations Law – a collection of the body of law governing the expenditure of federal funds commonly known as the Red Book. Today, agency program managers, general counsel, contracts administrators and financial officers are all faced with significant challenges in meeting organization needs within current budgets. What are the rules? How are they applied in practice? W...
Chesapeake Systems' - GV Expo Presentations
Join us at booth #322 for educational demonstrations of:Apple's Final Cut Studio/Server, Xsan using Active Storage, CatDV Asset Management, Archiware PresSTORE Archive, Telestream Episode Encoding Software, AJA Video Hardware and more...
2010 Chemical and Biological Defense Sc...
The Defense Threat Reduction Agency (DTRA), executing the Joint Science and Technology Office (JSTO) function within the Chemical and Biological Defense Program (CBDP), will host the 2010 Chemical and Biological Defense Science and Technology (CBD S&T) Conference. It will be held November 15-19, 2010, at the Hilton Orlando in Orlando, Florida. Accelerating Science for the Warfighter and Beyond This will be the second time that the latest d...
The K12 Technology Summit
The K12 Technology Summit is a private, invitation-only event created specifically for senior-level administrators who are responsible for overseeing the information technology strategy of the nation's leading school districts. This summit was developed with the goal of enabling K12 CIOs to share best practices for supporting the academic mission and meeting the increasing demand on their IT organizations.The K12 Technology Summit is a discuss...
The K12 Facilities Summit
The K12 Facilities Summit is a private, invitation-only event developed specifically for senior-level district administrators who are responsible for directing the facilities strategy of the nation's largest school districts. This summit was developed with the goal of encouraging collaborative relationships across all departments to assist districts in their efforts to maximize all available resources and create greater operational efficienci...
***CANCELED*** Explore Apple's Color wi...
Chesapeake Systems' host, Apple, has partnered with Avid to enhance your "Color" experience with the Euphonix Artist Series Control Surfaces. Come witness the benefits of using a fully integrated Control Surface to unleash the immense power behind Apple's Color application.Colorists, Editors, Motion Graphics Artists, Digital Filmmakers, Final Cut Pro/Studio enthusiasts and professionals in Digital Video, Digital Cinema, New Media, Broadcast an...
Eoffer GSA/VA Schedule Preparation Workshop
Attendees will be taught how to prepare a new GSA or VA Schedule or a major modification to each using Eoffer/Emod.Instructor,Bob Griffin, has 17 years of experience in preparing Schedules(more than +300) and 30 years experience in Federal Contracting.Register at www.keynote-connections.com
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.