F5 Gov TechTalk
Secure Your Applications with F5 NetworksAuthentication, application security, and remote access are a challenge to supporting an agency's enterprise and its customers, whether you have legacy or enterprise applications. F5 improves application performance and simplifies enterprise architecture, while reducing the total cost of ownership of your solution. Join F5 Networks for this complimentary TechTalk to learn about: F5 – Coop Solution...
The Importance of DEM Accuracy and How...
Intermap Technologies has mapped more than 15 million square kilometers of the Earth’s surface under our NEXTMap 5m program. With the introduction of NEXTMap World 30, Intermap has also created one of the largest and most accurate libraries of Digital Elevation Models (DEMs) available. Leverage our expertise and view our on-demand webinar where we will cover what influences DEM accuracy, how it's calculated, and how it relates to your ap...
2013 Gangs Across the Carolinas
The North Carolina Gang Investigators Association (NCGIA) is scheduled to host our 12th annual Gangs Across the Carolinas conference and the Gang Free North Carolina (GFNC) conference August 13th – 15th, 2013 at the Sheraton Greensboro at Four Seasons in Greensboro, North Carolina. Please feel free to visit our website at www.ncgangcops.org The NCGIA conference is open to local, state and federal law enforcement officials who have been t...
The NSA's 'Two-Man Rule' and Trust in Y...
The insider threat has come into greater focus in the wake of Edward Snowden’s admission that he leaked government secrets. The director of the NSA, Gen. Keith B. Alexander, said his agency would institute “a two-man rule” that would limit the ability of each of its 1,000 system administrators to gain unfettered access to the entire system, writes the New York Times. “The scariest threat is the systems administrator,...
Cloudera - Integration to Accumulo: A S...
Join Cloudera for a three-part webinar series to learn how Accumulo integrates with CDH, Cloudera Manager, and Cloudera Impala. Attendees will hear from our experts as they highlight the key features of these combined technologies and their importance to the Intelligence Community and Department of Defense.July 16th - Innovation and Control with Accumulo and CDHAugust 6th - Streamlined Operations for Hadoop and Accumulo with Cloudera ManagerAu...
Cyber Intelligence: Monitoring the Glob...
Cyber Intelligence: Monitoring the Global Threat Landscape There’s no question cyber security risks to government operations are growing and evolving rapidly; so fast that nearly half of government CIOs say they are “not prepared for cyber attacks,” even with a swell of cyber threat intelligence emerging on the open web.Despite being unclassified, the web contains a wealth of information about the cyber threat landscape. When...
Demystifying Release Management and Dep...
In a world of distributed applications, developed in parallel using agile methodologies, hundreds and even thousands of new releases are required every month. This reality has created a new set of challenges for IT operations. Join Automic and Carahsoft for this complementary webcast to learn how to make deployment easier and more efficient. Our speakers Marc Roth, Director of Automic Federal, and Jason Boylan, Solutions Architect, will discus...
HP Software Webinar Series
HP Software Webinar SeriesSession 1: Application Performance Management Thursday, May 16, 2013 at 3pm ET HP Application Performance Management (APM) allows you to have a 360 degree view of application performance across traditional, mobile, virtual and cloud environments. It provides insight into every transaction, for quick resolution of application issues, and helps reduce costs by giving you a common tool for pre-production and production....
The New NIST Guidelines for Virtualizat...
The New NIST Guidelines for Virtualization Security: What Does it Mean for Your Agency? In April, the National Institute of Standards and Technology (NIST) released its most comprehensive security controls update to-date to address the growing threat space of sophisticated cyber attacks faced by federal agencies today. Several new technology areas were added to the guidelines, including mobile and cloud computing, applications security, and as...
Cloudera - Integration to Accumulo: A S...
Join Cloudera for a three-part webinar series to learn how Accumulo integrates with CDH, Cloudera Manager, and Cloudera Impala. Attendees will hear from our experts as they highlight the key features of these combined technologies and their importance to the Intelligence Community and Department of Defense.July 16th - Innovation and Control with Accumulo and CDHAugust 6th - Streamlined Operations for Hadoop and Accumulo with Cloudera ManagerAu...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.