Accelerating GIS for Big Data
Much of the world's data is now location-enriched, resulting in a big opportunity to combine location intelligence with conventional big data. This influx of data presents a big challenge as GIS tools can't handle today's data volumes. Join this webinar to learn how to redefine the limits of scale and speed to solve these problems. We will discuss how Graphic Processing Unit accelerated analytics solve today's data analytic challenges for gov...
New Relic Technical Workshop at Topgolf...
Join us for the New Relic Technical Workshop at Topgolf Virginia Beach!New Relic's product expert will guide you through the finer points of Application Performance Management (APM) to help you start monitoring your app performance and run your digital business like a boss.This is a hands-on learning workshop and there is no fee to attend! You only need to bring your own laptop or tablet. Don't miss out, register now! 8:30amCheck-In ...
Step-by-Step Approach to Securing Data Files
How confident are you in your agency's ability to secure the nation's most sensitive data and other highly-sensitive information stored in applications and files? By combining SailPoint's Identity Governance and Data Access capabilities, government agencies can significantly enhance their ability to prevent data breaches. To learn how integrating these capabilities can improve your agency's cybersecurity posture, join us for a webinar on Octob...
How the World's First FedRAMP Authorize...
From Trusted Internet Connection (TIC) to Zero Trust SecurityFor years, TIC and VPN were the primary solutions to optimize and standardize security for remote users looking to access agency applications. Today, the government is transforming. Apps are migrating onto the government cloud and agency workers are mobile. This uncharted territory requires agencies to rethink how to secure remote access to apps for all users, devices, and locations,...
Imperva's Web Application Firewall
There are two types of web applications, those that have been compromised and those that will become compromised. The fact of the matter is that websites typically have vulnerabilities. The problem is so widespread that - according to a report by Cenzic, a leading vulnerability scanner - 96% of today's web apps have vulnerabilities. These vulnerabilities leave websites susceptible to attack. So it almost goes without saying that a good web app...
VMware Workspace ONE Workshop
As people, devices, and objects become more connected, IT organizations need to secure each and every interaction between users, applications, and data—however and wherever they are connecting. They need to do it in an environment that is constantly changing, and increasingly dynamic. VMware lets organizations maximize the visibility and context of the interaction between users and applications, so they can align their security controls...
Measuring Your Website's Community Engagement
Government websites are quickly becoming citizens' preferred channel to engage with government - yet many fall short of meeting expectations. To tackle this common challenge, Granicus teamed up with Jacqueline Lambiase, a TCU professor who recently evaluated more than 200 local government websites, and measured how well these websites perform when it comes to connecting people with government. Join this complimentary webinar for an exclusive...
GPU Technology Conference
EXPERIENCE THE POWER OF GTC NVIDIA's GPU Technology Conference (GTC) is the premier AI and deep learning conference series, providing you with training, insights, and direct access to experts from NVIDIA and other leading organizations. Join us at the Ronald Reagan Building and International Trade Center to discover the latest breakthroughs in self-driving cars, accelerated data science, healthcare, big data, high-performance computing, virtu...
VMware Sacramento Day
VMware is back in Sacramento! Please join us on October 23 to hear VMware subject matter experts as they discuss how their software-defined approach can enable your organization to implement a unified hybrid cloud and fully realize the mobility that is changing the landscape of government organizations today. Please visit our event website for additional event details. Register today and join us in Sacramento!
Defend Against Ransomware with Dell EMC & RSA
Explore how Dell EMC's Data Protection Suite and RSA's NetWitness can successfully secure your infrastructure, increase your platform efficiency, and simplify management processes. Both Dell EMC and RSA ransomware solutions can be found on Carahsoft's Continuous Diagnostics and Mitigation (CDM) Tools Special Item Number (SIN) 132-44 on our GSA IT Schedule 70. Join us on October 23rd to learn how these solutions can protect your workspace with...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.