Centralize and Transform Your Support a...
Government IT support teams operate in a complex environment. They need to manage different devices, enterprise applications, and multicloud environments, all while balancing user productivity, ease of use, and security. Together, BeyondTrust and ServiceNow provide a more automated, efficient, and secure ITSM solution that helps organizations provide a familiar workflow to create a seamless user experience.Watch the on-demand recording from Tu...
2024: Big Tech In FED Gov - NVIDIA (12 of 15)
This Webinar Series will profile the BIG TECH companies and their intersection with the US Federal Government. We will look at the big tech contracts within the Defense Department, Civilian Departments and Independent Agencies as well as stock price, current news, federal contracting trends, lobbying information if available, and more. Don't miss this lively data filled webinar series courtesy of federal data and analysis from GovSpend. Webina...
HISPs in 2025: The State of Federal CX
We invite you to watch this Federal News Network event as Reporter Jory Heckman sits down with technology leaders from across government to learn what’s on the horizon for HISP agencies as they continue to evolve customer experience, employee experience and total experience. This exclusive event wrapped a year-long focus on federal HISP and CX efforts to digitize and drive better service to the public. The event began with a fireside cha...
Atlassian's Jira Service Management Dem...
In this demo series, Atlassian experts, Jason Falcone and Vish Ankolekar held an exclusive demo exploring how AI can transform citizen services, modernize citizen operations through AI powered service management and empower developers to accelerate citizen service delivery.
CTO Sessions: The Underappreciated Tact...
Databases are key targets for hackers looking to steal data. However, there is insufficient emphasis by the MITRE ATT&CK Framework on the Collection tactic regarding access of data from a database. Hackers collect data through eavesdropping/man in the middle attacks of data in transit, by capturing data at the point of collection (such as point of sale devices), exfiltrating files containing sensitive data, etc. But the motherlode is the d...
MariaDB: The Open Source Standard
Is your organization tired of overpaying for database solutions that don't meet their needs? Introducing MariaDB Enterprise Server, a reliable, cloud-native database that allows organizations to have the freedom to go anywhere at a fraction of the cost of proprietary databases. MariaDB Enterprise Server offers unmatched performance, scalability and reliability. It's designed to handle the demanding workloads and complex data requirements of go...
Alfresco Content & Governance Services...
Hyland Federal and Carahsoft gathered in Washington, DC for a hands-on workshop on Alfresco's Digital Business Platform. The platform's Content and Governance services empower organizations to improve their digital flow by managing content without compromising security and compliance. During this two-day workshop, attendees gained insights on how to:Integrate the platform with existing frameworks in their organizationCustomize the platform's f...
Modernize and Optimize Government Servi...
Modern citizens and city staff today expect the same level of service from government agencies as they do from the private sector. Yet, citizen experiences are broken. Government agencies are far from becoming truly digital-first organizations. Listen on demand from subject matter expert John Gambaro as he discussed:Top technology trendsFreshworks' integral GenAI based capabilitiesAffects of government and education institutionsModernization i...
F5 Webinar: Protect the APIs You Never...
We all use APIs, work with APIs, and attempt to secure APIs. But are you sure you have them all discovered? Are you sure that the calls to the APIs are sanitized and protected from malicious calls?This webinar covered F5 Distributed Cloud ability to scan applications for rogue APIs, understand them, then apply a comprehensive protection that includes passive scanning to continuously tune your protection. In this webinar, attendees learned abou...
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.