12,912 past events found
+ 1883 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Virtual Training: Practical Strategies...
The best way to understand what HashiCorp Vault can do to upgrade your IT team's security posture is to see it in action. HashiCorp Vault provides organizations with identity-based security to automatically authenticate and authorize access to secrets and other sensitive data. Join HashiCorp online on February 6th for an in-depth, hands-on training with HashiCorp Vault's advanced capabilities, designed to enable highly available, perfo...
February 6, 2025
Organizer: HashiCorp Government Team at Carahsoft
Location: Webcast
Add Favorite
Introducing AI Assistant in Splunk Obse...
A new wave of observability is coming. The accumulation of monitoring tools combined with multi-cloud operating models promise end-to-end visibility but instead create confusion and despair. Now, instead of focusing on delivering cool software, engineers deal with time-consuming investigations, excessive uncertainty, and underwhelming tech stack performance. Enter AI Assistant in Splunk Observability Cloud, a new GenAI-powered experience that...
February 6, 2025
Organizer: Splunk
Location: Webcast
Add Favorite
The Impact of Semiconductor Trends on S...
Supply chain strategies continue to face increased volatility in the semiconductor marketplace resulting in significant changes in the semiconductor supply chain ecosystem. Emerging markets, growing complexity in manufacturing business models and the absence of previously cyclical patterns are driving uncertainty into an already complicated commodity. How can chief supply chain officers (CSCOs) and chief procurement officers (CPOs) create oppo...
February 6, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
CMMC 2.0: What DoD Contractors Need to Know
2025 promises to be a very busy year for the Department of Defense (DoD) and its contractors. In October 2024 the department issued a new rule implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 program, requiring contractors to implement required security measures to protect federal contract information (FCI) and controlled unclassified information (CUI). The rule rolls out the requirements in four phases over the course of...
February 6, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Understanding Your Survivor Benefits
An Overview of FERS & CSRS SurvivorshipDifferences between the two retirement systems’ benefitsQualifying relativesCost of electing benefitsWhat forms should be filled out to ensure qualifying relatives receive the survivorshipOther Information for FERS & CSRS AnnuitantsSpousal Survivor annuities (including former spouses)Cost to give an insurable interest survivor annuityInformation about the basic employee death benefitChild an...
February 6, 2025
Organizer: Serving Those Who Serve
Location: Webcast
Add Favorite
Everything Edge AI
Join us for the Powering AI with Precision and NVIDIA webinar series, where we explore how Dell Precision workstations equipped with NVIDIA Ada Generation GPUs are transforming local AI development. Hosted by Logan Lawler, Dell's Precision AI-ready Workstation lead, and featuring Jags Kandasamy, CEO and Co-Founder of LatentAI. This session will discuss Edge AI solutions that enable efficient, low-power AI processing directly on devices, reduci...
February 6, 2025
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Zero to Generative AI in 4 Hours
Seize the unique opportunity to collaborate with AWS and Databricks.. Together with fellow innovators and practitioners, delve into the process of bringing an LLM application to life using cutting-edge tools.Whether you're an AI enthusiast eager to develop a state-of-the-art GenAI app or aiming to unlock next-gen innovation for your team or organization through GenAI use cases, this hands-on workshop promises to equip you with practical skills...
February 6, 2025
Organizer: Databricks
Location: San Francisco, CA
Add Favorite
Pathways to Zero Trust: How Governments...
As cyber threats evolve, our government is adopting Zero Trust frameworks to protect critical infrastructure, sensitive data, and citizen services. This webinar explores the strategies, technologies, and policies shaping the transition to Zero Trust in 2025. Our expert panel will discuss the latest advancements in identity management, data segmentation, and real-time threat detection. Attendees will gain insights into compliance requirements,...
February 6, 2025
Organizer: ATARC
Location: Webcast
Add Favorite
University Ops: Mastering Your Campus w...
Higher education administrators juggle a variety of tasks. Even the most organized workers experience this, but with the right digital support it can be easier to keep your head above water. In Atlassian's upcoming webinar with Clovity, explore what's possible with digital tools designed for higher education administration. Attendees will learn about:Structuring workflows with Jira to get overload under controlManaging IT requests with Jira Se...
February 6, 2025
Organizer: Atlassian Government Team at Carahsoft
Location: Webcast
Add Favorite
EMSO Update
Today’s wars in Ukraine and Israel highlight the criticality of sensing and understanding on the battlefield. Despite ubiquitous satellite, airborne, and terrestrial surveillance, combatants on both sides of these conflicts have been surprised, with sometimes catastrophic results. The US military should embrace the resulting lessons as it considers how to counter Chinese forces in China’s own back yard. Survival in this highly-cont...
February 6, 2025
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Back to Search Begin New Search