Back to Search Begin New Search Save Search Auto-Notify
AI and Automation in Supply Chain
Join us for an hour packed session! We'll share how AI-powered automations are leading to resilient and sustainable supply chains. You can expect to: Explore strategic use cases that connect the dots -- design, plan, source, make and deliver -- to enable an autonomous supply chain. Witness how experts from UiPath, SAP and Deloitte collaborate and leverage AI-powered automation to break down silos and address the specific needs of the end-to-en...
March 28, 2024
Organizer: UiPath
Location: Webcast
Add Favorite
Data Protection Basics: Learning How Se...
When it comes to data protection, many of today’s organizations are more confused than ever. From distributed data and risky cloud apps to complex deployments, IT teams are looking for new and better ways to control their sensitive data. Enter Security Service Edge (SSE). Purpose built for cloud and mobility, SSE is now the de facto resting place for future data protection deployments. But what do you need to know to join this new revolu...
March 28, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
The Battle of AI: Hackers vs Cybersecur...
When generative AI tools such as ChatGPT came on the scene, cybercriminals quickly found ways to leverage them in their attacks in ways that could increase the success rate of their phishing efforts. Simultaneously, cybersecurity researchers have been tapping into the same benefits of AI and machine learning to counter these attacks. During this webinar, experts Olesia Klevchuk and Prebh Dev Singh will discuss how AI has transformed both the c...
March 27, 2024
Organizer: Barracuda Networks
Location: Webcast
Add Favorite
Addressing Technical Debt in Software-I...
During this presentation, Dr. Ipek Ozkaya and Brigid O'Hearn from Carnegie Mellon University’s Software Engineering Institute (SEI), will give insight into the challenges that DOD and defense industry face in addressing technical debt in software. Technical debt is defined as “an element of design or implementation that is expedient in the short term, but that would result in a technical context that can make a future change costli...
March 27, 2024
Organizer: NDIA - National Defense Industrial Association
Location: Webcast
Add Favorite
Operationalize Kubernetes Performance M...
The adoption of containerization and orchestration platforms, such as Kubernetes, has grown quickly as DevOps teams look to build scalable and resilient applications. Container environments consist of many moving parts. For example, in a busy application environment, hundreds of pods, the smallest execution unit in Kubernetes, are continuously being launched and decommissioned. In this complex and dynamic environment, monitoring the health of...
March 27, 2024
Organizer: SolarWinds
Location: Webcast
Add Favorite
Microsoft Virtual Briefing - The Future...
We are thrilled to invite you to this exclusive event where you will have a unique opportunity to sit down with our fantastic subject matter experts to discover more on how Microsoft can revolutionize your work processes and empower your organization to achieve more!Power your AI transformation with the Microsoft Cloud. Built-in AI capabilities into the Microsoft Cloud solutions customers are already using today help you be more productive, mo...
March 27, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Federal Surplus Sales
Sales of Personal Property describes the sales process and explains to custodians what to expect when property completes Utilization and Donation Screening and receives the Available for Sales email. Registration is required for this training - each participant will get their own unique entry URL, so you must register to be granted access to ZOOM Government. Participants will receive one (1) Continuous Learning Point for attending. GSA Zoom Go...
March 27, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Next-Gen Government: The Crucial Role o...
As everything goes remote and digital, the potential for innovation is endless—but so is the risk. Identity verification and fraud prevention take on a significant role in mitigating that risk. Identity is the digital ‘front door’ of every new account and subsequent transaction on the internet, and ensuring the security and seamlessness of that digital front door is vital to maintaining the integrity of public services. The d...
March 27, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Coffee Break Series: SLED Research Brew...
Our "Coffee Break Series: SLED Research Brew," is designed for professionals navigating state, local and education (SLED) sales and marketing. Each episode serves up a fresh cup of insights and strategies, all before you are finished with your morning coffee. Our experts will dive into the latest products, tools and methodologies that are shaping the future of SLED research – and how to implement these tools to gain a better understandin...
March 27, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search