Crossing the Chasm: Using Kubernetes to...
Air gapped environments are a necessity in many mission scenarios and a constant management headache for IT operations teams. In this webinar, Mike Wood and Tommy Scherer from Spectro Cloud will explore how you can use Kubernetes to create and operate secure and consistent application environments, across both high-impact air gapped and low-side connected environments. Deep technical insight and real-world examples will bring the concepts to l...
Elastic Transportation Webinar - Managi...
Transportation agencies today are inundated with vast quantities of data generated by IoT devices. To effectively leverage this valuable resource, a sophisticated data management solution is essential. Join us for a webinar exploring how Elasticsearch can transform your agency’s data into actionable insights. You will learn:How to set up Elasticsearch to handle the unique challenges of IoT data, such as high velocity and volumeMethods fo...
IBM TechXchange: AI-Powered Automation
Join us for an enlightening event in New York City where IBM shares its innovative viewpoint on Generative AI and its pivotal role in transforming IT automation. Discover how IBM is leveraging Generative AI to enhance efficiency, streamline processes, and revolutionize the IT landscape through its cutting-edge automation tools. Key Highlights:IBM’s Vision for Generative AI: Explore IBM’s strategic approach to Generative AI, focusin...
September 12, 2024
Organizer:
IBM Location:
New York, NY
A Practical Guide to Third-Party Transf...
Join us for an informative webinar on navigating third-party transfers and retransfers in compliance with the International Traffic in Arms Regulations (ITAR). This session will provide participants with practical guidance and expert insights to effectively manage third-party transfers and retransfers while ensuring compliance with ITAR requirements. In this special one-hour event, we will examine the third-party transfer (TPT) requirement in...
How to Navigate the Fallout After a Dat...
Cyber attacks can cost agencies millions and damage public trust. Knowing how to respond after a data breach is just as crucial as preventing one. Is your organization prepared to handle a data breach effectively? Join Government Technology and Elavon for a live webinar to equip your team with actionable strategies for responding to breaches and preventing future threats. Here’s what we’ll cover:Master Post-Breach Strategies: Learn...
NDIA SO/LIC Division Fall Reception on...
About the SO/LIC DivisionHelping industry, government and the public understand the critical role of special operations (SO) and low-intensity conflict (LIC) forces in our national security strategy and how these forces are integrated into our military structure is the mission of NDIA’s SO/LIC Division. About the Fall Reception on the HillThe NDIA SO/LIC Division Fall Reception on the Hill will feature invited guests that include ASD SOL...
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar delves into the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Join us as we explore how Splunk ITSI’s advanced analytics, machine learning capabilities, and...
AI Infrastructure Experts: How the Gove...
Are you ready to unleash AI’s potential and transform the Federal Government's critical infrastructure? Meet Vertiv, a proud partner of NVIDIA, Dell, and Intel, leading the charge in AI acceleration for the data center space. You’re invited to our Vertiv webinar where you’ll discover:How AI and high-performance computing are driving the need for data centers to handle rack densities exceeding 100kW.The top strategies to ensur...
Using Security Intelligence to Protect...
In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. More than 133 million records were exposed or impermissibly disclosed. That’s just one risk in healthcare ecosystems. The dangers extend beyond that: every hospital bed is connected to the internet. People die when hospitals lose power – and if a hospital’s IT systems are compromised all the electronic pieces t...
September 12, 2024
Organizer:
FedInsider Location:
Webcast
Extraordinary Women in Tech Summit Dallas
Join us for the “Extraordinary Women in Tech Summit Dallas” on September 12th, 2024. This in-person event promises to be a spectacular gathering of brilliant minds and innovative spirits. We’re excited to invite you to be part of this inspirational event. Register now for an opportunity to gather with enlightening keynotes, engaging panel discussions, and fantastic networking opportunities. All women, many voices, one communi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.