Are Your Web Applications Safe? Identif...
Are Your Web Applications Safe?Identify and Remediate Security Vulnerabilities with HP Web applications have become a key method for government agencies to deliver information and services to their users, including services being driven by the Open Government Initiative. However, a simple defect can provide attackers with complete access to all the information stored within secure databases and servers. This is your last chance to join HP, Ca...
Deliver Agentless Application Virtualiz...
Deliver Agentless Application Virtualization with ThinApp Over the years, Federal agencies have accumulated thousands of legacy applications. Running these applications on different operating systems and hardware configurations has become a major challenge for government organizations. Join us Thursday, January 28 to learn how ThinApp from VMware delivers age ntless application virtualization to simplify application deployment, reduce Q...
Marine West 2010
This annual event brings together leading defense contractors with those who depend on the equipment and information they provide. It is the perfect opportunity for product developers to meet with the 'real experts', those who rely on these products every day. Developers can now find out what works, what doesn't, and what can be done to make their products invaluable to the Marine Corps. The Marine West exhibits will once again include visiona...
Pentaho Webcast: Government Adoption of...
Government Adoption of Open Source on the Rise Attendees of this webcast learned about the advantages of open source for business intelligence, such as: Reliability and security Reduced dependence on expensive proprietary software Non-restrictive licensing that enables rapid provisioning Lower licensing costs and lower total cost of ownership The ability to customize software for new missions and changing situations
Space Security and Defense
The United States is dependent on space assets to sustain economic prosperity and support military operations worldwide. Exploitation of outer space has provided the United States with distinct competitive and strategic advantages. America's reliance on space has also created vulnerabilities in defense strategies that assume U.S. Space Control. Adversaries have cited a reliance on space as the potential Achilles Heel of U.S. military power. It...
Defense Healthcare
The Department of Defense Healthcare costs have surged by more than 140% over the last eight years, a reflection of the trends that are propelling the current national discourse on Healthcare Reform. Prolonged conflicts overseas have stressed the Services' manpower capacities to their limits. At the same time, transformational advancements in Battlefield Medicine and Information Technologies are being funded, developed and implemented at a fan...
2009 Defense Manufacturing Conference (...
This year's conference will build on the continuously evolving DMC venue by addressing our theme which involves the role of Government and Industry Leadership for Affordable Defense Systems. We plan to emphasize this concept by exploring a number of military service case examples of where leadership collaboration involving the development and application of manufacturing technology enabled successful program outcomes. Example; Navy Virginia Cl...
Maritime Security West
Maritime security and domain awareness are so pervasive in scope and depth, they both impact not only our naval and coast guard forces, but also those organizations committed to anti-terrorism and operators of the nation’s ports. This outstanding conference brings together experts and organizations at the forefront of developing the necessary technologies and management strategies to assure domain awareness goals are met and that persistent pr...
Cyber Security East
This exceptional conference brings together senior level military, government and industry experts in cyber security and network operations. They will provide you with first-hand insight on how OSD, the Services, DHS and other government agencies are planning to meet current and emerging cyber security challenges.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.