Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Air Force Achieves Mission Success With...
The Air Force has embraced market-leading low-code development tools and industry best practices to quickly and cost-effectively design, develop, and deploy applications to accomplish their mission. Application development projects that formerly took years are now deployed in weeks or months. Tune in to this exclusive on demand webinar as Bryant Stevens from the 402nd Software Maintenance Group (SMXG) joins us to discuss how Robins AFB selecte...
Add Favorite
Reinvent Readiness with Cognitive Technology
General Gustave "Gus" Perna, Commander of the Army Materiel Command, repeatedly stresses readiness as the Army’s most fundamental priority. Defined broadly as the ability of the U.S. armed forces to perform their required missions, whether against near-peer or asymmetric threats, “readiness” is shaped by many factors. These include the ability and well-being of military personnel and the availability and performance of milita...
Add Favorite
Achieving Compliance and Handling Sensi...
AWS GovCloud (US) isn’t just for government agencies – U.S. commercial companies in aerospace, defense manufacturing, law enforcement, healthcare, financial services, and energy with regulated workloads, sensitive data, and export-controlled data rely on AWS GovCloud (US) to modernize IT. IT professionals with limited compliance experience are invited to attend this webinar to learn about AWS security frameworks (e.g. Shared Respon...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Protecting Criminal Justice Information...
AWS GovCloud (US) helps state and local agencies embrace cloud technologies while securing sensitive data and complying with federal mandates. IT professionals without compliance experience can attend this webinar and learn how to address their state’s Criminal Justice Information Services (CJIS) Security Policy and protect Personally Identifiable Information (PII) data, details on federal-to-state interconnections with the FBI, and auto...
Add Favorite
DoD Scaling RPA to Improve Mission Readiness
During this webinar attendees learned: How building automations from the ground up, capturing innovation money, and developing robots will not only work at on Air Force base but will rapidly scale across the service and DoD Why a bot for every soldier, airman, and sailor needs a Robotic Operations Center (ROC) Why RPA is a major transformational technology/solution Why hyperautomation is the framework for an integrated and robust digital force...
Add Favorite
Heli-One Case Study Webcast: Break Down...
The OPUS Suite is the leading tool for systems and cost optimization currently in use by more than 150 customers in 30 countries on 5 continents including the US DoD and the defense forces of Australia, the United Kingdom, Brazil, Denmark, France, Italy, Sweden, Singapore and Thailand. The flexible model and fast system based optimization makes the OPUS Suite an invaluable tool for design and dimensioning of logistic support solutions as well...
Add Favorite
Optimizing Asset Management: A Predicti...
Clockwork Solutions, LLC provides predictive analytics software for strategic enterprise asset management. We enable A&D (Aerospace and Defense) and federal organizations to save a significant amount of operation and sustainment costs for a variety of assets including command and control equipment, fixed wing aircraft, helicopters, weapons systems, ground vehicles, and surface ships. View our complimentary on-demand webcast as we discuss h...
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
Add Favorite
Training Net-Centric Warriors for Opera...
There’s never been a greater need for training and simulation tools that facilitate missions in Afghanistan and elsewhere. View our on-demand webinar, where we will discuss the following topics: The military runs on data and communications and has few greater challenges today It's critical that warfighters receive net-centric training for operations in the digital battlespace There's ever-growing complexity of equipment and demand for ef...
Add Favorite
Back to Search Begin New Search