Back to Search Begin New Search Save Search Auto-Notify
Domino Data Lab Responsible AI Informat...
Everyone needs Responsible AI (RAI) but confusion abounds about what it is, what it delivers and how to achieve it. Done effectively, RAI boosts AI impact by increasing adoption, quality, safety and reliability, while minimizing risks to organizational performance, reputation, litigation and regulatory penalties. In this session with ex-Forrester analyst Dr. Kjell Carlsson, Domino Data Lab discussed practical definitions of RAI, examples of be...
Add Favorite
Safeguarding Tomorrow with Cloud for Good
During our webinar with Cloud for Good: Safeguarding Tomorrow: Transformative Solutions for Child Welfare with Salesforce, experts discussed how ensuring the safety and well-being of every child is a shared responsibility, and how technology can play a pivotal role in achieving this goal. During this 45 minute, in-depth webinar, attendees discovered the power of Salesforce in enhancing child welfare services. Key benefits included: A comprehen...
Add Favorite
Emerging Trends in Capture: From the Ma...
In this on-demand webinar, attendees explored Federal Agencies Digital Guidelines Initiative (FADGI) and discover compliant solutions that future-proof your agency amidst evolving digital mandates.
Add Favorite
Unlocking Healthcare IT Success: Solvin...
This webinar is a part of Carahsoft's HIMSS 2024 Webinar Series exploring how to create tomorrow's health. In this on-demand webinar, SolarWinds Healthcare and Database experts dove into: Critical challenges confronting healthcare organizations and strategies for addressing patient and media scrutiny Essential techniques for enhancing database and IT infrastructure management, including leveraging observability tools and eliminating tool spra...
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Real-Time Decision Advantage
In the fast-paced world of modern data-driven operations, the ability to harness real-time insights at the tactical edge is critical. Whether in the fields of defense, emergency response, or critical operations, minimizing latency in order to ensure immediate access to data are not just important; they are essential for effective and efficient decision-making. During this webinar, attendees were able to: Discover the significance of real-time...
Add Favorite
Architecting Your Data House for Analyt...
In this on-demand webinar, attendees learned how: Qlik helps architect the foundation of your data house Talend enables custom builds and acts as an inspector for your data house Qlik Cloud Government provides secure, end-to-end capabilities - from ingestion to analytics - to build your dream data house
Add Favorite
F5 SLED Lab Series: Go for Gold in F5 S...
State, Local, and Education organizations and agencies are facing a crossroads and F5 is here to help! Attendees joined us for the next step in our “Go for Gold” series for a hands-on lab and earned a gold medal in F5 Distributed Cloud. On one hand, you're under pressure to modernize your IT infrastructure to meet the demands of today's digital landscape. On the other hand, you're swimming against the tide with the ever-increasing...
Add Favorite
Enhancing Security Across Digital Docum...
PDFs are widely used for storing, sharing, and archiving documents, including highly classified or confidential information. Ensuring the security of these PDF documents is crucial to protect against unauthorized access, data breaches, and information leaks that can have severe consequences for national security, privacy, and the integrity of government operations. Adobe is empowering agencies to transform their manual document processes with...
Add Favorite
Dragos WorldView Threat Intelligence: P...
In a rapidly evolving and dangerous cyber landscape, threat intel is essential to keep an organization secure. Detecting threats to Industrial Control/Operational Technology (ICS/OT) systems is difficult, which is why Dragos has organized the industry’s largest and most experienced team of ICS cybersecurity practitioners. During this webinar, attendees learned how Dragos WorldView Threat Intelligence arms organizations with in-depth visi...
Add Favorite
Back to Search Begin New Search