Back to Search Begin New Search Save Search Auto-Notify
How to Pick Tech Solutions that Reduce...
Implementing effective technology is essential for government agencies to drive digital service adoption. But without a human-centered approach, data analytics, and alignment across departments, it can quickly become a costly endeavor. With these unique challenges in mind, government must go beyond implementing technology and strive for ongoing strategic alignment of people, process, and technology. Key takeaways:Reduce risk: Use human-centere...
September 17, 2024
Organizer: GRANICUS
Location: Webcast
Add Favorite
Dynatrace Lunch Bytes Webinar Series
Instead of settling for a regular break, participants are joining Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Attend to upgrade your lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases on the following topics across three 30-minute sessions.CI/CD Secrets: Dynatrace & Red Hat OpenShiftEnhance th...
September 17, 2024
Organizer: Dynatrace Government Team at Carahsoft
Location: Webcast
Add Favorite
Serving Smarter with Docusign: The Digi...
Join us on September 10th and 17th, as we explore the transformative impact of eWarrants on law enforcement operations. This session will demonstrate how using Docusign's modern digital platform streamlines warrant issuance, improves efficiency, and enhances inter-agency collaboration. Hear from experts share real-world examples and best practices, showcasing how agencies are accelerating the administration of justice while reducing paperwork.
September 17, 2024
Organizer: DocuSign Government Team at Carahsoft
Location: Webcast
Add Favorite
Use a Value Chain to Identify GenAI Bus...
Technology providers often think of technology as a stack, from infrastructure to business results. Generative AI (GenAI) is no different. While adopting a stack-based view of GenAI tells providers what to include in their solution, it does not identify the sources of business value from that solution. Identifying that value requires adopting a value chain model, which highlights the actions and dependencies required to create a valuable end r...
September 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
CIOs, Partner With Your CFO to Get the...
Artificial intelligence is not cheap. So how can CIOs secure the needed financing while ensuring they apply it to initiatives that will yield a strong return on investment? Join this complimentary Gartner AI webinar as Gartner experts help CIOs discover how to strengthen their relationship with their CFO to ensure AI initiatives are properly funded so they can maximize the potential. We will address the vital conversations you need to have wit...
September 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
The Modernization Balancing Act: Priori...
The pressure is on. The need to modernize your IT infrastructure is clear, but limited budgets, staffing shortages, and competing priorities make it a challenge. How do you balance the need to update your digital infrastructure, improve data management, and meet the evolving expectations of your residents?Join Government Technology, Tyler Tech and AWS for a live webinar where we'll explore the findings of a recent survey on mid-market governme...
September 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Solving the SIEM Problem: A Hard Reset...
Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems like firewall data, system logs, and endpoint events to name a few. Security Information and Event Management, or SIEM for short, was designed to make sense of it all. Centralizing these logs...
September 17, 2024
Organizer: Huntress
Location: Webcast
Add Favorite
The Role of Mitigation in Insider Risk...
Dr. Shaw’s critical pathway to becoming an insider risk illuminates the behavioral and event-based journey the individuals take prior to acting out in a way defined as an insider threat action. When following the pathway, the first milestone is professional and personal stressors. These all too often go overlooked or undetected but should be the first opportunity an organization can take to mitigate potential insider threat acts. Prior t...
September 17, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Sunshine State Innovation: Leading Tech...
Red Hat is coming to Tampa for a dynamic day of innovation and automation! Discover the latest advancements from industry leaders Red Hat and Dynatrace as they showcase cutting-edge solutions designed to streamline operations and drive digital transformation. Gain insights into the future of IT automation and learn how these technologies can help your organization achieve efficiency and agility. Discover how Red Hat’s robust open source...
September 17, 2024
Organizer: Red Hat Government Team at Carahsoft
Location: Tampa, FL
Add Favorite
7 Worst Mistakes in Virtual Training
Join us for this complimentary webinar where Becky Pike Puth, President and CEO, The Bob Pike Group, will uncover the common pitfalls that can make virtual learning sessions fall flat. You’ll learn how to identify these mistakes and gain practical solutions to transform your training content, making it more interactive and engaging for your learners. Specifically, attendees will learn:The 7 worst mistakes that make virtual learning dullE...
September 17, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search