What's Working in the COVID-19 Response...
Maps and location data have been at the forefront of the COVID-19 response. The geographic information systems (GIS) community has been able to take the lessons learned from disaster response and transfer this knowledge quickly, to carry out meaningful impacts. GIS is helping communities make more data-driven decisions, allocate much-needed resources, and keep the public informed during the coronavirus outbreak. Join us online Tuesday, April 7...
April 7, 2020
Organizer:
GovLoop Location:
Webcast
Leveraging Location to Combat Homelessn...
To address the growing epidemic of homelessness, governments need accurate data collection, strong collaboration tools and advanced analytics. They also need ways to share and collaborate both internally and externally with a variety of stakeholders to produce actionable results. Geographic Information System (GIS) provides the required tools to efficiently address these needs in a comprehensive manner. Join us online Thursday, Oct. 10 from 2-...
October 10, 2019
Organizer:
GovLoop Location:
Webcast
How Automating Suspect Identification S...
Join Prince George's County Police Department, Veritone and Officer.com for an engaging webinar to learn how to harness your department's case evidence and booking database to identify suspect leads faster, accelerate case clearance rates and save money with AI. Topics will include: * Challenges in Identifying Suspects in Video and Image Evidence * Suspect Identification Best Practices from Prince George's Police Department * Harnessing the P...
October 7, 2019
Organizer:
Veritone Location:
Webcast
VoIP Hacking | What's In It For the Hacker?
With so many high profile data breaches making the headlines, it’s easy to forget that IP Communications Systems are routinely targeted for attack. While it may be clear what the criminals are looking for when they steal credit card data or government employee data, it may not be as obvious what hackers are trying to accomplish by attacking a government UC/VoIP communications system. Bad actors can open threat vectors into the entire IP...
April 16, 2019
Organizer:
Ribbon Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.