F5 Air Force TechTalk Secure Your Appli...
Authentication, application security, and remote access are a challenge when supporting an agency's enterprise and its customers, whether you have legacy or enterprise applications. F5 improves application performance and simplifies enterprise architecture, while reducing the total cost of ownership of your solution. Join F5 and Carahsoft to discuss how F5 provides dynamic web access control, ensures endpoint security, simplifies authenticatio...
Simplified Meeting Management & Video S...
Today’s citizens expect real-time access to information from local officials and decision makers. Clerks, recorders, and administrators struggle to meet these demands with outdated processes. IQM2’s Agenda Automation, allows local officials and decision makers to post and update agendas, solicit public opinion, and stream live board meetings right into residents’ homes. Join us for a complimentary webcast to learn how IQM2 ca...
Introducing IronKey Workspace W700 - A...
View our complimentary on-demand webcast to learn about the IronKey W700 Workspace — the only FIPs certified Windows To Go™ device that provides Windows 8.1. Over the last decade, technological advancements have minimized the need for employees to be as physically present in a traditional office setting. The nature of actual workspaces has shifted away from four walls to the highly mobile, highly connected workplace. Federal agenci...
Learn How Auto-Categorization Can Benef...
The effort to comply with government regulations can be time-consuming and expensive due to the volume of information created and stored in electronic form. As a result, users can easily become bogged down in manual content management processes. Register now to join Steve VonVital, Chief Information Officer at the U.S. Department of Energy (DoE), and Dean Gonsowski, Vice President of Business Development at Recommind, as they discuss how the D...
Supporting Federal Civilian Agencies th...
Join Carahsoft and TerraGo to learn how GeoPDF technology can support Federal Civilian agencies and programs through untethered, portable GIS. GeoPDF technology enables users to collect, collaborate, and share geospatial information to better support field work and critical decision making. During this webinar, attendees will learn how to: Manage and control what content and data layers are available to your users Add geo-located (Geomark) ann...
Adobe Acrobat Tips & Tricks Webinar for...
Acrobat XI offers data theft prevention technology to restrict read-only activities and help protect against attackers seeking sensitive information on a user's computer. With tools to create accessible and standards compliant documents, along with new automation options, Acrobat XI not only helps you work better with everyone, it also saves time and money. Come see why standardizing on Acrobat XI can help your organization be more secure, dis...
Efficiently Maintain and Improve Your I...
Proper management of intellectual capital is key to the success of any economic development organization. Move away from using spreadsheets or older apps that aren't easy to use. Maintaining and improving contact information, key metrics, and lead sources are critical to increasing both employment and capital investment. To achieve these goals effective strategy development and technology deployment are necessary. Since 2003 Conrin has been do...
Salesforce1 World Tour - Chicago
Welcome to the Internet of Customers. Join us for this complimentary event to experience the all new Salesforce1 Customer Platform in Chicago on Thursday, April 24. See how you can connect your apps, devices, and customer data, all with one powerful Customer Platform designed for the new hyper-connected world of customers. Learn firsthand from leading customers how to sell, service, and market like never before. Register today for this day of...
Detect and Remediate Advanced Targeted...
Despite huge investments in anti-virus software, next-generation firewalls, and IPS platforms, agencies are still getting hacked. The new generation of advanced targeted attacks bypasses traditional defenses and puts sensitive data at risk. It takes just minutes from the time an organization is compromised to the exfiltration of sensitive data. What's needed is a security solution that can detect and block advanced and sophisticated threats wh...
Hybrid Cloud Management: Red Hat CloudForms
Red Hat CloudForms - Manage Your Virtual, Private, and Hybrid Cloud Infrastructures Focused on gaining control of your virtualization environment? Need to build and manage a private or hybrid cloud? Red Hat® CloudForms can meet your needs today with a comprehensive management platform to do both. As your needs change, CloudForms evolves, protecting your investment and providing a continuum of capabilities as you progress toward Infrastruct...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.