Back to Search Begin New Search Save Search Auto-Notify
Wired Government: How to Build and Buy...
Technology and communications approaches change rapidly, and government contracting tools can become outdated, no longer meeting the purpose they were originally designed to serve. Innovative networking advances such as unified communications and Bring Your Own Device (BYOD) are approaching the threshold of mainstream adoption by commercial companies with 50% of companies projected to implement them by year's end. How are agencies ensuring the...
June 17, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Add Favorite
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Add Favorite
Enterprise Mobility Management: Deliver...
Agenda: 8:00-8:30am - Registration, Breakfast, and Networking 8:30-10:00am - Panel Discussion 10:00-10:30am - Questions The government is transitioning from a legacy mobile environment to one that captures the emergence of smart phone and tablet technologies to support agency missions. This new mobile ecosystem includes the wireless carriers, the devices, security/monitoring tools, and the management of the lifecycle and expenses associated wi...
May 6, 2014
Organizer: FedInsider
Location: McLean, VA
Add Favorite
Transformative Technology: Desktop Virt...
JOIN US FOR THIS COMPLIMENTARY WEBINAR
April 10, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Catalysts for Government’s Big Data Rev...
JOIN US FOR THIS COMPLIMENTARY WEBINAR The Administration’s big data initiative looks to harness huge quantities of data to accelerate the pace of discovery in science and engineering, strengthen our national security and transform teaching and learning. These data stores are characterized by a mix of relational/structured data and non-structured files such as video, images, PDFs, and office documents. A number of new solutions are emerg...
April 9, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Improving Cybersecurity and Resilience...
The Challenge: Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity and availability of Federal information and information systems. The requirement to manage information security risk on a continuous basis includes the requirement to monitor the security controls in Federal information systems and the environments in which those systems operate on an ongoing basis using continuous diagnostic monitori...
April 8, 2014
Organizer: FedInsider
Location: McLean, VA
Add Favorite
Maximizing ROI Through Data Center Cons...
JOIN US FOR THIS COMPLIMENTARY TRAINING WEBINAR Maximizing ROI Through Data Center Consolidation Data center consolidation goes well beyond simply conserving space in agency computer rooms. A host of factors are driving agencies to consolidate including business continuity and disaster recovery, environmental sustainability goals, cyber security and cost savings. The government’s information technology budget for 2015 is looking to data...
April 3, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Women2Women: How We Do It
In celebration of the Women's History Month, and the women who inspire us, please join us for a breakfast panel and peer learning circles, "Women2Women: How We Do It", scheduled to take place from 8-10 a.m. (EST) on Thursday, March 27, 2014, at the GW Foggy Bottom Campus. The discussion will focus on how women support each other in a multi-sector environment. All attendees will have an opportunity to share and ask questions through peer learni...
March 27, 2014
Organizer: George Washington University Center for Excellence in Public Leadership
Location: Washington, DC
Add Favorite
Moving to the Cloud... What's the Best...
JOIN US FOR A COMPLIMENTARY TRAINING WEBINAR
March 27, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search