Back to Search Begin New Search Save Search Auto-Notify
Operationalize Patient Data with Tableau
View this on-demand recording from Tableau around Veteran mental health. Operationalizing patient data to uncover unseen insights is critical in today’s connected world. Tableau makes it simple to visualize and share insights in a way that’s easy to understand for providers, decision makers, and analysts. This webinar helped attendees discover the key attribute making Tableau so important - that they can quickly discover new insig...
Add Favorite
Announcing the PlatCore LMS Federal Edi...
In this webinar we discovered how PlatCore’s new Federal Edition 1.2 provides a unique learning solution for government agencies to help streamline training, reduce risk, and achieve compliance. During this discussion we went over these topics: Government Learning Management System (LMS) Basics The Benefits of a Native LMS New Federal Edition 1.2 Demo, including a sneak preview of OPM Competencies and the new SF-182 template Resources an...
Add Favorite
Splunk Carahsoft Virtual Workshop
Partcipants joined us for our infromative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization. Register to view this on-demand recording.
Add Favorite
Splunk Carahsoft Virtual Workshop
Partcipants joined us for our infromative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization. Register to view this on-demand recording.
Add Favorite
Federal Civilian Virtualization Webinar
During this on-demand webinar, attendees learned how: Virtual environments have evolved, and some of the biggest challenges IT pros face SolarWinds can help you diagnose and troubleshoot virtualization problems with ease To plan for virtualization as data is spread across multiple virtual machines and devices To get the most return on investment from your SolarWinds virtualization tools
Add Favorite
Automating Employee Workflows to Maximi...
As the federal workforce evolves, so do the expectations of its employees. Government agencies continue to invest in digital transformation and new technologies, and it's increasingly critical to unify employee experiences across systems to ensure the workforce remains productive, engaged, and focused on mission. By consolidating cross-departmental employee experiences into a one-stop-shop portal and delivering a single-pane-of-glass view into...
Add Favorite
Effectively Manage User Access for Priv...
Identity governance solutions help IT teams answer “who has access to what?” The integrated BeyondTrust and SailPoint solution allows organizations to answer “is that access appropriate for privileged users?” and “is that privileged access being used appropriately?” Attendees joined BeyondTrust for a live product demo to understand how BeyondTrust and SailPoint integrated to: Automate Access: Increase produc...
Add Favorite
Google Cloud Canada EDU Apigee Webinar
During this webinar, attendees learned how: Service New South Wales provides an easy one-stop-shop app for all of its services to over 5 Million citizens with 6 Million API interactions per month and 97% citizen approval. Harvard University and UCLA embrace Apigee as their digital platform for cross campus collaboration. Apigee can securely share government or student data and services creating a more efficient organization & partner ecosy...
Add Favorite
Introduction to Advanced Analytics with...
View an interactive Alteryx session on conducting end-to-end analysis. To start off, they unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, they went hands-on and learn how to apply these techniques. You will learn how to bring in and merge different sources of data...
Add Favorite
Design & Implementation of Zero Trust A...
The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never t...
Add Favorite
Back to Search Begin New Search