F5 Army TechTalk
F5 Army TechTalkSecure Your Applications, Simplify Authentication, and Consolidate InfrastructureWhether you have legacy or enterprise applications, authentication, application security, and remote access are a challenge to supporting an agency's enterprise and its customers. F5 improves application performance and simplifies enterprise architecture, while reducing the total cost of ownership of your solution. This is your last chance to join...
F5 Gov TechTalk
F5 Gov TechTalk:How to Implement, Secure, and Manage Mobility Most defense, security, and financial organizations are in the process of doing their due diligence around mobility. Due to the obvious data sensitivity issues in these environments, no one solution fits all. Join F5 Networks and Carahsoft for an in depth discussion around the approach to implementing mobility, and the things you need to consider along the way. We will discuss: The...
F5 Gov TechTalk
Load Balancing and Keys for Successful Application Delivery ArchitecturesBoost Application Availability, Performance, and Security Simple load balancing is dead. In an increasingly online and web-centric IT environment, application delivery networking is the core of application availability, security, and performance. Application delivery networking encompasses application load balancing, security, performance optimization, access/authorizatio...
Red Hat Michigan Tech Day
Please join us on Thursday, January 31st for a live event and learn how migrating from proprietary technologies to JBoss Enterprise Middleware and open source offers many advantages to agencies, including cost reduction, scalability, freedom from vendor lock-in, and so much more. We will start by exploring how the next generation of JBoss Enterprise Application Platform 6.0 (EAP 6) can get you ready for data center consolidation, cloud, and sp...
Virtualization Security and Compliance...
View our on-demand webcast for an introduction to HyTrust’s virtualization security and compliance management software and free trial offer. The HyTrust appliance offers managers and administrators of virtual infrastructure a centralized, single point of control and visibility for hypervisor configuration, compliance, and access management. HyTrust provides a virtual appliance that provides access control, audit-quality logging and polic...
VMware Mirage: Managing Mobile Infrastructure
Is your agency looking for the manageability benefits of virtual desktop infrastructure, but for physical desktops and laptops or unmanaged virtual machines? VMware delivers a unique solution to federal agencies for managing laptops and desktops centrally, while providing full local functionality for end users. Mirage installs directly into Windows, and it centralizes a complete virtual copy of that end point to the datacenter to keep it synch...
Intelligent Image and Full Motion Video...
Image and full motion video content are among the fastest growing digital assets for government and commercial enterprises, yet over 95% of this content, particularly full motion video containing critical information, goes unviewed and unexploited. While a range of advanced tools exist to support text and web-based data search and analysis, government and commercial enterprises currently have no viable solution for indexing and searching image...
Building the Business Case for Private...
Although OMB's Cloud-First mandate requires federal agencies to increase the adoption of cloud computing, building a strong business case for a cloud project is still essential to receiving the investment required for that transformation. If you can't establish quantifiable objectives up front, you may never get the approval required to get your private cloud off the ground and implemented enterprise-wide. Please join us for this live webcast...
F5 Gov TechTalk
Operational Security Architectures:Defend Your Agency and Securely Deliver Your Applications In order to combat the threat of hacktivist groups and other malicious actors, targeted organizations need to be able to detect and proactively apply countermeasures that are not only part of their tactical incident response capability, but are also enforced by their operational security architecture. These advanced solutions help defend targeted organ...
3rd Annual Adobe Government Technology Summit
Adobe and Carahsoft are pleased to announce the third annual Adobe Government Technology Summit on Thursday, November 1, 2012 at the Mayflower Renaissance in Washington, DC! Our 2012 Summit will offer sessions on Adobe product solutions and how they translate to the processes within your agency. Attend hands-on training sessions for end users on your favorite products and hear highlights and benefits around all new product releases from 2012,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.