Back to Search Begin New Search Save Search Auto-Notify
Flexible IT Strategies in a Hybrid Clou...
Cloud smart, the Federal cloud computing strategy, challenges agencies to assess their IT requirements and find the environments and solutions that meet their unique goals. In response, most agencies are using a hybrid cloud approach with some applications and systems running in their data centers and others in public cloud environments. Choosing the proper model for a project depends on several factors and the outcome can have long-term ramif...
Add Favorite
Reimagine the Workforce Analytics for D...
The Biden Administration is focused on diversifying and modernizing the federal workforce hiring practices to increase diversity, equity, and inclusion (DEI), employee well-being, and upskilling are critical factors. Typically this is regarded as a lengthy process, but today this must happen rapidly and evidence towards Administration goals need to be shown. Tableau can help you reimagine your workforce by providing the insight you need to hir...
Add Favorite
Beyond IT Security, Cyber-Physical Conv...
Well past cyber "wake-up calls", recent security events prove that there is nothing more important for organizations than to be prepared for the unexpected. In this era of digital transformation, the line between cyber and physical worlds has faded. Today's blended threats attack deep within connected industrial control systems and networks, yet most organizations still manage and operate their security in silos. In this on-demand session, lea...
Add Favorite
Why Excel Is No Longer Sustainable for...
2020 drove home the need for grant modernization in a new and urgent way. As governments learned, managing grants through spreadsheets, legacy systems, and paper-based processes was implausible with the pandemic forcing many agencies to move their workforces online. As future emergencies arise that stress the system, managing grants through these paper-based processes is no longer sustainable, leading to more human error, single audit finding...
Add Favorite
Building ScientificML Communities and A...
The value of Google Cloud & NVIDIA to Scientific Computing extends far beyond the core cloud tenets of elasticity, cost savings, and improved agility. Researchers and scientists see a faster path to discovery with NVIDIA GPU Accelerators & Google Cloud services for data, networks, compute, and AI/ML. View this on-demand roundtable to learn how Google's effectively limitless compute, AI/ML, and Quantum Computing, combines with NVIDIA GP...
Add Favorite
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Add Favorite
Protect and Defend Your Most Sensitive Data
When protecting your most critical personal assets, you take a defense-in-depth approach. Beyond the lock on your door, you have a video doorbell, perimeter security sensors, active security monitoring, locks on your windows, a fire-proof safe for your most valuable assets, and more. This same approach is often overlooked when protecting sensitive data in your databases. View this on-demand webinar to learn: How to implement a proven database...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
Red Hat Enterprise Linux 8 Technical Overview
Every technology within your IT stack needs to work well together and because those connections rely on the operating system (OS), it must be consistent, reliable, and flexible. Deliver value to your agency while maintaining existing infrastructure. Join Red Hat to discover why Red Hat Enterprise Linux 8 (RHEL 8) is the foundation to scale existing apps and roll out emerging technologies across bare-metal, virtual, container, and all types of...
Add Favorite
The RPA Journey: Hyperautomation with U...
Robotic Process Automation (RPA) has the potential to automate entire processes or parts of processes that are repetitive, monotonous and occur in high volumes. Named by Gartner as a #1 strategic technology trend, Hyperautomation validates automation yet elevates it to show how the combination of RPA and disruptive technologies such as AI, machine learning (ML), process mining, decision management, natural language processing (NLP), and more c...
Add Favorite
Back to Search Begin New Search