Southern Grants Forum
Registration is Full Southern Grants Forum - The Conference for Grants Management - is the region’s premier grants training conference. You and fellow grants professionals will learn about the key requirements for managing awards and the latest developments affecting grant-funded organizations and the future of grants management. Session topics include: Uniform Guidance, Cost principles, Fiscal management, GASB update, Human Resources, I...
Splunk Workshop: Introduction to Machine Data
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity, and more. Splunk turns machine data into valuable insights no matter what business you're in.Join Splunk and True Zero Technologies to learn how to collect and analyze machine data to gain criti...
Project Management Excellence Training...
Join us for a unique, interactive course that "walks you through" the project management process and tradecraft needed to be an effective project manager. This introductory level training in project management helps to prepare the attendee with little-to-no formal project management training to run small, simple projects in the work environment: construction, technology and development. The emphasis is on introducing the terminology along with...
F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.