Back to Search Begin New Search Save Search Auto-Notify
Process Mining: An X-Ray for Operationa...
Process Mining is a technique that uses event logs to analyze operational processes, providing a visualization of transactions happening across the organization. It can revolutionize the way you understand how efficiently your organization is operating. ServiceNow's in-platform Process Mining automates the process of looking at your workflows to show you where there are opportunities to make process improvements that drive lasting value. This...
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
Economic Development Accelerated with S...
Download this on-demand webinar recording to learn how organizations across the country have leveraged the power of Salesforce CRM and the Summit Technologies Economic Development Accelerator to tackle their everyday challenges. This webinar features esteemed industry leaders, sharing their firsthand experiences, case studies, and insights on leveraging Salesforce for economic development initiatives. After watching the recording, you will: Un...
Add Favorite
Empowering Multilingual Access: Transfo...
Many government agencies, at various levels, grapple with the common challenge of enhancing their Language Access Plans to meet Limited English Proficient (LEP) requirements. The obligation to provide equal access to information for LEP individuals has been in place since 2000, marked by Executive Order 13166, signed by President Clinton. The Biden Administration further reinforced and expanded these requirements through Executive Order 13895...
Add Favorite
Designing Performant Tableau Dashboards
This webinar equipped participants with the knowledge and skills to design dashboards that not only visually appeal but also perform optimally. It covered a range of topics including best practices for dashboard design, techniques to optimize performance, and strategies to handle large data sets. Attendees of this on-demand webinar learned: Why dashboard performance matters Factors that affect can affect dashboard performance Design best pract...
Add Favorite
Accelerating Time to Insights for the P...
For scalable analytics in a secure data environment, the public sector is turning to Plotly Dash Enterprise. As a comprehensive platform for building interactive Python data applications, Plotly Dash Enterprise stands out as a trusted solution for real-time decision-making. During this webinar, attendees: Discovered Python-based analytics use cases across the government sector, from advanced visualization to automated reporting Learned how dat...
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Add Favorite
DocuSign Arizona State User Group
Attendees Joined us on April 16th to discuss how you can do more, with less; with Docusign. Anthony Jacovino, the CIO for the Arizona Registrar of Contractors, discussed how Docusign has enabled him to simplify his workflow. He spoke about the countless ways agencies are optimizing their efficiency with limited resources, all through the use of Docusign.
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Back to Search Begin New Search