Back to Search Begin New Search Save Search Auto-Notify
National Security Space Policy and Arch...
The annual National Defense Industrial Association (NDIA) National Security Space Architecture and Policy Symposium will be held this year on the 29th and 30th of June at the TASC Heritage Conference Center in Chantilly, VA. This year’s symposium will focus on looking forward for national security space (NSS) with discussion of acquisition process and technology enablers and how they will shape the architectural and policy landscape. The...
June 29-30, 2010
Organizer: NDIA
Location: Chantilly, VA
Add Favorite
FortiusOne Webcast: Enable Dynamic Deci...
Enable Dynamic Decision making with GeoIQ - FortiusOne's Web-Based Geospatial Platform Register now to join Sean Gorman, President and Founder of FortiusOne, as he introduces the newest features of GeoIQ, a complete data management, visualization, and analysis platform built for both non-technical and technical users. GeoIQ enables intuitive management, sharing, and collaboration around geospatial information. With GeoIQ, you can quickly and...
June 24, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Joint Base Elmendorf-Richardson (JBER)
The 2nd Annual Information Technology Expo for Elmendorf AFB and Fort Richardson will once again be hosted by the 3rd Communications Squadron - Elmendorf AFB with support from the 611th Air Communications Squadron (ACOMS) - Elmendorf AFB and the 59th Signal Battalion - Fort Richardson. Industry vendors will have the opportunity to display their products and services to personnel that may otherwise be unattainable. This event is part of a 2 da...
June 23, 2010
Organizer: Federal Business Council (FBC)
Location: Anchorage, AK
Add Favorite
Intelligent Log Management for Governme...
Protect your IT assets and meet FISMA and other regulatory compliance requirements Q1 Labs QRadar delivers intelligent log management and the net result for customers is that threats and frauds that were missed in the past are now detected, physical or virtual. A massive and accurate prioritization of data occurs to make overall security response more effective. The value of intelligence and context goes beyond detection and data reduction be...
June 17, 2010
Organizer: The Winvale Group
Location: Webcast
Add Favorite
DATA MINING: FAILURE TO LAUNCH
WHAT'S COVERED The vast majority of BI professionals are excited about the prospects of data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, a recent data mining industry survey of predictive modeling practitioners reports that 51% of data mining projects either never left the ground, did not realize value or the ultimate results were not measurable. Despite its elus...
June 16, 2010
Organizer: The Modeling Agency
Location: Webcast
Add Favorite
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
June 16, 2010
Organizer: En Pointe GOV, Inc.
Location: Boston, MA
Add Favorite
NSA Mobile Technologies Forum
The Mobile Technologies Forum is an annual event that attracts members of the Unites States Government interested in mobile technologies, both current and future features and equipment. Those who are developing or have efforts that benefit NSA's efforts should participate as a government attendee or commercial vendor.This year's conference will take place June 14-18, 2009, with the exhibit day being June 15. The conference will be held in the...
June 15, 2010
Organizer: Federal Business Council (FBC)
Location: Ft. Meade, MD
Add Favorite
INPUT Webinar on State of States 2010:...
Join INPUT’s Chris Dixon for an online presentation that provides detailed insight to help contractors answer the question: “What are the top policy priorities for states in 2010 and 2011, and their impact on my company’s business with state governments?” What You Will Learn: Critical technology initiatives across major verticals How to align your business development strategy with gubernatorial priorities The importanc...
June 15, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Connecting the Dots Isn't What it Used to Be
Connecting the Dots Isn't What it Used to BeA flood of information increases the need for accuracy, including knowing which data to leave out. There was a time when the level of accuracy that our intelligence and law enforcement systems offered was “fine.” We connected the dots well enough to eliminate the greatest threats. Not anymore. Today, there is an intense push for accuracy in our data and in our ability to accurately ...
June 15, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Bicoastal Counter Terrorism Summit
The 2010 Bicoastal Counter Terrorism Summit features several global subject matter experts from US and British Intelligence Agencies. The Summit is designed to facilitate a collaborative data exchange through a workshop environment. Monday: Warrior Mindset The Warrior Mindset is a critical aspect for successfully dealing with high-fear/high-stress situations. This course focuses on what the Warrior Mindset is and how to develop it. Participant...
June 7-11, 2010
Organizer: Halo Corporation
Location: San Diego, CA
Add Favorite
Back to Search Begin New Search