Back to Search Begin New Search Save Search Auto-Notify
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
How to Digitize Your Recruitment and Hi...
Attendees joined to hear of best practices, lessons learned, and a walk through of a live demonstration of the platform. Leveraging the cloud, there's less friction along the way, which empowers agencies to focus their efforts on what matters most: building relationships and mentorship.
Add Favorite
Nuance October Demo Desk
What if there was a single platform that combined the latest artificial intelligence innovations, natural language understanding, and the best of assisted service to enable exceptional customer engagements? Delivered through virtual assistants, live chat, and messaging from automated tools for the savvy self-server, and human assistance that gives the customer one to one personalized service. During this on-demand demo desk, you will learn how...
Add Favorite
Digitizing Agreements with DocuSign
When digitizing your university's paperwork processes, the options are unlimited. So are the benefits: saving time, redirecting resources towards more complex tasks, boosting security and data privacy, improving the student and faculty experience, to name a few. View this on-demand webinar to learn: How the University of Pittsburgh and Virginia Commonwealth University are leveraging DocuSign eSignature today to digitize paperwork Upcoming eSig...
Add Favorite
Zero Trust and Your Agency: What It Wil...
Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. While...
Add Favorite
AI Inference Workloads: Overcoming Chal...
AI and MLOps engineers in federal agencies often struggle to deploy models on GPUs. Most Al research initiatives never make it to production. Why? Researchers are facing bottlenecks due to static allocations of GPUs, and different technology sets complicate moving models from training to production. View this on-demand webinar from Run.AI and Carahsoft to learn Carahsoft to learn how your agency can overcome the challenges associated with new...
Add Favorite
Accelerate Digital Transformation ROI
Many government organizations experience a gap in value between their digital transformation investments and actual return. View this on-demand session to learn how ServiceNow Impact accelerates time to value with an AI-powered digital experience. We discuss how this solution personalizes digital transformation experiences, provides coaching to involved teams, accelerates results, and much more.
Add Favorite
4-Part Adobe Webinar Series: Create Per...
The Future of User-Centric Experiences for Government Laws such as the 21st Century Integrated Digital Experience Act (IDEA), the President’s Management Agenda, the president’s racial equity executive order (EO), and customer experience EO have put the spotlight on customer and employee experience in a fresh, urgent, and elevated way. People expect the same digital experiences and services they receive every day from the private se...
Add Favorite
Enable Public Sector Digital Transforma...
View our on-demand virtual session to gain a thorough understanding of RabbitMQ in a networked, distributed architecture. This is a fantastic chance to discover how RabbitMQ aids in the successful implementation of digital transformation projects in modernization, IoT, edge computing, real-time events/analytics, InfoSec and more.
Add Favorite
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
Back to Search Begin New Search