Back to Search Begin New Search Save Search Auto-Notify
PowerPoint for the Technical Profession...
In order to create presentations that convey technical information to non-technical audiences, you must design slides which are easy to consume in your desired platform (webinar, live, conference hall). Great presentations keep audiences interacting with you and your content throughout the presentation. This webinar will help you incorporate techniques and tools to accomplish this and more! Sure, anyone can throw some text and Power Point grap...
July 11, 2017
Organizer: AtoZ Compliance
Location: Webcast
Add Favorite
Providing Tactical Users Centralized Se...
With the growing requirement for centralized enterprise applications and cloud services, how can we provide our warfighter with the required services at the tactical edge, maintain LAN-like performance and keep the management of those services at the data center? NexTech Solutions has teamed up with Riverbed to build a Software Defined Tactical Edge allowing users to project virtualized services and storage to the warfighter. During this webi...
June 21, 2017
Organizer: Riverbed Technology
Location: Webcast
Add Favorite
A Changing World of Machine Identity
Today's cyber security landscape is more complex and dynamic than ever, competing with resources to modernize federal IT infrastructure while keeping federal networks protected from the most advanced nation, state, and insider threats. Security teams are inundated trying to protect the multitude of both human and machine identities on their networks with extensive resources spent on protecting the credentials that authenticate and authorize h...
June 8, 2017
Organizer: Venafi Government Team at Carahsoft
Location: Webcast
Add Favorite
Insider Tips: How to Protect Your Data...
Every government agency has terabytes of data, everything from social security numbers, to environmental data, to business records. And it’s imperative for agencies to make sure that information is secured properly. The key is to make sure the right people have access to the right data sets at the right time - which is known as privileged access. However, agencies don’t want to just create their own security and privacy standards f...
May 18, 2017
Organizer: GovLoop
Location: Webcast
Add Favorite
Conquer (Un)Predictable Intelligence
The explosion of connectivity and multiplying data sets have opened millions of entry and exit points for data – consequently identifying a breach is about as easy as looking for a needle in a haystack. Hence, advanced analytics and artificial intelligence now stand shoulder to shoulder with our cyber defenders on the thin digital line. So, how are agencies leveraging big data analytics to harden systems without sacrificing performance,...
May 2, 2017
Organizer: MeriTalk
Location: Webcast
Add Favorite
Lossless Packet Capture - Why it's esse...
It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to...
May 2, 2017
Organizer: Solarflare Communicatios
Location: Webcast
Add Favorite
Transforming Federal Data Centers to an...
As the world’s largest owner and operator of data centers, the U.S. Government and its agencies spend enormous sums of money to ‘keep the lights on’. But proven innovations such as virtualization, hyperconverged infrastructure and cloud computing have reduced agencies’ dependence on maintaining massive legacy IT systems. Innovation in the Federal IT enterprise is mission-critical to reducing and avoiding costs, enhancin...
April 26, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Best Practices for Ensuring Successful...
As federal agencies look to evolve their IT infrastructure and explore hybrid cloud initiatives, federal IT teams are increasing their focus on accurately benchmarking the performance of their mission-critical application workloads before migrating to a new architecture, and ensuring performance and availability once the migration is complete. Once your mission-critical apps are migrated, having an accurate and reliable understanding of worklo...
April 26, 2017
Organizer: Virtual Instruments Government Team at Carahsoft
Location: Webcast
Add Favorite
Integrating your Existing Systems into...
As many agencies race to buildout their application backlog with their new microservices architectures, many are grappling with the decision of whether to integrate those services with their legacy systems. Whether or not to reuse a legacy system(s), at the expense of duplicating integration logic across services or rewriting the legacy system is a common dilemma. Join us for this complimentary webinar to explore how agencies can leverage a mi...
April 19, 2017
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Disaster Recovery and Storage Management
Data storage protection and disaster recovery are prime objectives for many organizations today. The Nimble Storage Predictive Flash platform efficiently delivers the benefits of primary storage, backup, and disaster recovery in an all-inclusive package to provide the ideal foundation for comprehensive data protection. TetherView is a proud Nimble replication partner that offers private cloud solutions. TetherView provides Virtual Desktops an...
April 5, 2017
Organizer: Nimble Storage Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search