Back to Search Begin New Search Save Search Auto-Notify
Microsoft Virtualization and Windows Se...
Learn about Microsoft’s Virtualization products and what’s new in Windows Server 2008 R2Join En Pointe and Microsoft to learn more about Microsoft Virtualization technologies in the Public Sector environment. Private clouds allow you to reap many of the same benefits of public clouds within your own environment. Take advantage of the scalability, self-service management, and elasticity of cloud computing with the additional control...
March 3, 2011
Organizer: En Pointe Technologies, Inc.
Location: Virtual, MA
Add Favorite
Integrating Enterprise Architecture and...
Capital Planning and Enterprise Architecture have operated as two separate functions within the Federal Government since their inception. With no clear linkages between the two disciplines, Enterprise Architects and Capital Planners have rarely crossed paths outside of completing portions of the Exhibit 300 and the organizations Target Architecture… until NOW. By properly integrating the two disciplines, Senior Managers of an organizati...
February 28 - March 1, 2011
Organizer: Government Horizons Inc.
Location: Arlington, VA
Add Favorite
Introduction to Federal Government Cont...
This four-day course covers the key elements of the entire federal government contracting process. Introduction to Federal Government Contracting is designed to provide those new to government contracts (or those looking for a basic refresher) with an understanding of the entire government contracting process. By providing this framework, you will be able to understand how your work relates to the overall process and will be able to more easil...
February 8-11, 2011
Organizer: Government Horizons Inc.
Location: Arlington, VA
Add Favorite
GAO's Principles of Federal Appropriati...
In 1982, GAO released the first edition of Principles of Federal Appropriations Law – a collection of the body of law governing the expenditure of federal funds commonly known as the Red Book. Today, agency program managers, general counsel, contracts administrators and financial officers are all faced with significant challenges in meeting organization needs within current budgets. What are the rules? How are they applied in practice? W...
February 1-3, 2011
Organizer: Government Horizons Inc.
Location: Arlington, VA
Add Favorite
FAA Mike Monroney Aeronautical Center V...
Join today's leading industry exhibitors who will be onsite for one day demonstrating their latest products and services. This event is free and open to all FAA MMAC personnel to attend and will run from 10am- 1pm. Refreshments will be served throughout the day.
January 27, 2011
Organizer: Federal Business Council (FBC)
Location: Oklahoma City, OK
Add Favorite
***CANCELED*** Explore Apple's Color wi...
Chesapeake Systems' host, Apple, has partnered with Avid to enhance your "Color" experience with the Euphonix Artist Series Control Surfaces. Come witness the benefits of using a fully integrated Control Surface to unleash the immense power behind Apple's Color application.Colorists, Editors, Motion Graphics Artists, Digital Filmmakers, Final Cut Pro/Studio enthusiasts and professionals in Digital Video, Digital Cinema, New Media, Broadcast an...
November 2, 2010
Organizer: Chesapeake Systems, Inc.
Location: Reston, VA
Add Favorite
Cyber Solutions Conference at Johns Hop...
The Cyber Security Conference, held in collaboration with the National Cyber Security Alliance, will be a one-day conference and exposition on October 14, 2010 at the John Hopkins-APL Kossiakoff Conference and Education Center.This one day conference will bring together Government, Industry and Academia and the roles each play in the Cyber Security World. Session topics and the agenda will be available soon.Presenters and attendees will be com...
October 14, 2010
Organizer: Federal Business Council (FBC)
Location: Laurel, MD
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
October 13-14, 2010
Organizer: Government Training Inc.
Location: Washington, DC
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Back to Search Begin New Search