Accelerating Secure Cross-Site Data Col...
The Rhino Federated Computing Platform enables data collaboration using federated learning, edge computing, and generative AI, eliminating the need for data transfer. Trusted by over 50 leading hospitals, pharmaceutical companies, and public sector organizations. Rhino harmonizes data, enables federated analytics, and supports secure AI model training. The webinar covered the application of Federated Computing for:Cross-institution Federated L...
Unlocking the Power of Zoom for Governm...
Zoom for Government is for your mission. We enable the federal mission through an easy-to-use and innovative collaboration platform. Watch the following webinars on demand exclusive to the public sector! Unlocking the Power of Zoom for Government Webinars, Sessions & EventsExplain the difference between Zoom Webinars, Sessions, and EventsDiscuss the Premium features available to our Zoom for Government customersA brief product tour/demo of...
Deliver AI and Advanced Analytics for G...
Government regulations have historically been constrained by shrinking government budgets, inadequate technology solutions, and pressures to “do more with less.” Simultaneously, technology advancements are accelerating faster than ever, increasing the contrast between technology use in both personal and professional life. Oracle is a technology and innovation leader with over 40 years of history partnering with the public sector to...
Streamline Your Software Testing Workflows
Atlassian, SmartBear and Herzum hosted a webinar on February 20th to teach attendees how to streamline your software testing process with Jira and powerful Jira-native apps, improve test coverage and reduce time-to-market In this webinar, experts explored:Ways to harness the power of test management tools Best practices and tips to optimize use of Jira-native test management toolsJira-native apps that drive efficiency and improve quality
Beyond the Bodyguards: Comprehensive Ex...
In this roundtable, ZeroFox experts discussed the four pillars of a strong executive security program, that focused on:Protecting executives’ digital presence and reputationKeeping PII safe across the external attack surfaceLeveraging threat intelligence to make proactive decisionsEnhancing visibility to physical threats emerging from the digital world
Introducing Google Cloud VMware Engine:...
In this webinar, we discussed an overview of Google Cloud VMware Engine (GCVE), hosted by Google Cloud and Carahsoft. This VMware-Cloud approach allows you to move your most critical and demanding legacy applications to an environment that will help accelerate your innovation of applications and the efficiency of workflows. We explored:A Google Cloud VMware overview VMware as a service and platformGoogle Cloud VMware Engine Getting started with GCVE
Simplify CMMC Compliance for Email ...
Attendees learned how to achieve CMMC compliance with Google Workspace (GWS) that is tailored for DIB subcontractors. They discovered how to transition seamlessly to GWS or upgrade your current subscription to compliant editions like Enterprise Plus or Assured Controls Plus.Attendees learned how GWS simplifies CMMC compliance while offering significant cost savings—empowering your organization with secure, efficient, and compliant solutions.
Automate with Red Hat and Unilogik
Regardless of your current stage in IT modernization, automation can help unify processes, optimize infrastructure and Regardless of their stage in IT modernization, attendees discovered how automation could unify processes, optimize infrastructure and empower teams to work more efficiently across their organizations.Unilogik and Red Hat hosted a virtual workshop where participants learned how to:Gather critical device facts to improve visibil...
Cracking the Code: Federal Software Sup...
Chainguard helps software developers build secure applications that breeze through the ATO process so they can support their mission faster and more securely. On February 25th Chainguard hosted a workshop about their secure container images and how agencies can focus on citizen-centric solutions, not vulnerability remediation (blech!). During this workshop, experts and attendees discussed:Docker runtime (Docker Desktop, Rancher Desktop, etc.)G...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.