Back to Search Begin New Search Save Search Auto-Notify
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Leveraging APIs for IT Modernization wi...
The ability of government agencies to leverage application programming interfaces (APIs) has led to faster deployments, advanced automation and tighter integration between both hardware and software. The Application Programming Interface (API) defines methods for communication from multiple sources, formats to be used, standard structures and how the requests should be made.Join Red Hat and Carahsoft on June 4th to learn how Red Hat's enterpri...
Add Favorite
Stay on Top of Records Release
While Law Enforcement agencies have implemented more ways to capture audio, video, and text-based evidence, many are now considering how to store and find key moments within their records to quickly respond to requests for release to the public. Regardless of your agency size or type, the impact of slowly responding to records requests can be damaging, yet the average agency lacks the resources and time to properly find and redact records with...
Add Favorite
Develop a Dynamic Multicloud Strategy
"If the public cloud is not our least expensive option, what is?" "I'm tired of compromising our resiliency capabilities." "How can we ensure the best performance of my agency's applications?" The above concerns from our customers are based upon the fact that 85% of all stored data is dark (i.e., data that is not completely and/or accurately known, or relevant to the agency mission). What measures can your agency take to fully understand and u...
Add Favorite
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
How to Maximize Revenue Through Cost Al...
Traditionally, cost allocation and indirect cost planning seem like an ancillary matter in the scheme of all that leaders in state, local, and tribal governments have to do. However, reporting the true cost of services agency-wide is hard to capture, especially in the wake of COVID-19 bringing revenue shortages, and several grants and funding streams to navigate.The challenges that are compounded when individual departments complete their fina...
Add Favorite
Being Data Driven Through Crisis: How O...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? Hear inspirational stories from government customers who found creative data and analytics solutions during COVID-19 pandemic that were critical to their organization. Join us for the second webinar on Healthcare: Transformation & Readiness in response to COVID-19, and discover how Tableau can help you to r...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
Why Mezzanine Helps Achieve the Best Si...
With teams distributed around the country, federal agencies need to collaborate effectively. Remote meetings are the new standard, and they require participants to share and view content in real-time. With current collaboration solutions, only one person can share content at a time, resulting in poor engagement and making situational awareness difficult. Oblong's Mezzanine solution allows you to share 10 live streams of information simultaneou...
Add Favorite
Splunk ESI Contract & Air Force
Air Force has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to Air ForceHow to leverage the contractDon't miss...
Add Favorite
Back to Search Begin New Search