12 webcasts found
+ 2 past events found
Back to Search Begin New Search Save Search Auto-Notify
Optimizing your Splunk Enterprise Envir...
Please join leaders from Kinney Group and Pure Storage for this on-demand webinar as we discuss the foundations necessary to Optimize your Splunk Enterprise Environment with High Performant Storage. During this on-demand webinar, our speakers discuss: Reference Designs, Expertise On-Demand, and Application Suite Deploying, activating, scaling, and deriving business value Considering your Splunk environment through the lens of Technology Busine...
Add Favorite
What is GeoIoT & Why Does It Matter?
Find out what GeoIoT is, why it matters, and how you can benefit from it. On this on-demand webcast, we'll cover: How IoT and GIS join to form GeoIoT How you're already benefiting from IoT Examples of how IoT can impact your business Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, Public Works, Utilities, Restaurant, Retail, Safety and Security, Transportation, an...
Add Favorite
Indoor Positioning Systems & GeoIoT
Indoor Positioning Systems (IPS) & GeoIoT Solutions Providing Blue Dot positioning for indoor solutions. On this on-demand webcast, we'll cover: Indoor Positioning Systems Wayfinding, Routing and Navigation Web vs Native Solutions Esri’s ArcGIS Indoors Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, Public Works, Utilities, Restaurant, Retail, Safety and...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Show Me the Money: Transforming Gov's B...
Managing hundreds of grants and collecting the proper data is not easy, which is why governments need a grant management strategy. In 2013, the city of Detroit filed for bankruptcy, prompting them to revolutionize their approach to funding by targeting grants. In six years, Detroit went from 156 to 411 grants awarded, transforming the funding model of the city. Watch the on-demand webinar to discover how state and local governments can follow...
Add Favorite
Webinar: Putting Public Safety First –...
This webinar will provide an orientation to Oroville Dam and the State Water Control Project, the February 2017 incident and present the immediate recovery response. Five Learning Objectives of This Course: Introduction to Oroville Dam and the California State Water Project Summary of the February 2017 spillway incident Immediate recovery response Main Spillway recovery response Emergency Spillway recovery response
Add Favorite
Webinar: Concrete Repair and Maintenanc...
This course will provide an overview of the best methods and materials for concrete repair and maintenance. It will include a description of a systematic process to follow to achieve best results and will include information from recent industry wide research efforts to ensure long lasting durable repairs. Five Learning Objectives of This Course: Conducting a thorough condition assessment Most common types of concrete damage Selecting the corr...
Add Favorite
Next-Gen, Cloud-Native Switching from E...
Federal agencies embracing digital transformation will need the latest in switching solutions. A next-gen infrastructure built on cloud-native principles that delivers performance, automation and analytics is a necessity to support newer technologies and future business needs. View this on-demand webinar where Jason Diaz, Aruba Territory Account Manager and Milton Denson, Aruba Consulting Systems Engineer, shared insights on Aruba’s swit...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Open Cloud: Accomplishing Your Mission...
As federal agencies increasingly embrace Cloud Smart policies, multi-cloud infrastructures are fast becoming a critical tool in helping to meet rapidly evolving demands of the workforce and its customers. But migrating legacy applications into multiple clouds can be complex. It requires a plan: agility, security, scalability, and the ability to ensure continuity of operations are all equally important. As agencies adopt a multi-cloud approach,...
Add Favorite
Back to Search Begin New Search