Phoenix Hosted: Cloud-Based PK/PD Softw...
Research organizations need PK/PD software that is fast, accurate, and flexible to meet the demands of complex studies and tight timelines.In this webcast, you’ll discover why Phoenix Hosted is the ideal solution for R&D companies of all sizes. Whether your organization already uses industry-standard software like Phoenix WinNonlin or Phoenix NLME, or you’re searching for a new solution, Phoenix Hosted offers a simplified, acce...
February 25, 2025
Organizer:
Certara Location:
Webcast
Event-Driven Ansible Technical Workshop
As a part of Red Hat� Ansible� Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
February 25, 2025
Organizer:
Red Hat Location:
Virtual
Red Hat OpenShift Virtualization Workshop
Join us for a hands-on workshop and overview of Red Hat� OpenShift� Virtualization. Learn about all things OpenShift Virtualization from our experts and explore the possibilities that await on your infrastructure modernization journey. A half-day experience, this workshop caters to VMadmins and infrastructure architects, with a tailored, hands-on lab that takes a comprehensive look at OpenShift Virtualization fundamentals, importing, networkin...
February 25, 2025
Organizer:
Red Hat Location:
Hollywood, FL
Red Hat AI Roadshow
A half-day experience, the AI roadshow gives attendees insight into how organizations are using, delivering, monitoring AI-enabled applications with speed across the hybrid cloud. As part of the roadshow – IT operations, data engineers, data scientists, and application developers will have the opportunity to build, train, and deploy an AI model and integrate it into an application with a hands-on lab. They’ll experience what it is...
February 25, 2025
Organizer:
Red Hat Location:
McLean, VA
Vision to Venture: Developing a Compreh...
Every comprehensive business starts with a comprehensive and well thought out business plan. A business plan helps you clearly define your business idea, set goals, analyze your market, develop strategies, project financial viability, and attract potential investors, essentially providing a roadmap to guide your business towards success. The WIT WBO 2025 event series is a highly interactive and hands on experience that will help you build your...
Federal Executive Forum IT Modernizatio...
Technology is evolving quicker than ever before as is the IT modernization strategy in government. How are agencies profiling a successful strategy and what is the vision for the future?
Right of Boom 2025
Right of Boom is a cyber security event purpose built for MSPS. Our goal is to empower MSPS to understand and implement the people, process, and technology capabilities to become cyber resilient while driving both growth and profitability within your organization. Our vision is for all MSPS to continuously operate their and their client's businesses, despite adverse conditions, attacks, or compromises. This year, we’ve expanded our guide...
February 19-21, 2025
Organizer:
Right of Boom Location:
Las Vegas, NV
ISC2 ISSEP Training Boot Camp
This four-day Information Systems Security Engineering Professional (ISSEP) Boot Camp focuses on the art and science of the information systems security engineering (ISSE) process. You’ll learn the technical knowledge required of security engineers operating within the federal government, including ISSE processes and the critical government regulations affecting how security engineering is performed and why. This boot camp not only teach...
February 18-21, 2025
Organizer:
Infosec Location:
Virtual
ISACA CISA Training Boot Camp
Infosec’s CISA Boot Camp extensively prepares you for the ISACA CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors:Information systems auditing processGovernance and management of ITInformation systems acquisition, development and implementationInfor...
February 17-21, 2025
Organizer:
Infosec Location:
Virtual
Denver Cybersecurity Conference
Don’t miss the Denver Cybersecurity Conference! Gain critical insights on tackling 2025’s cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your spot now to stay ahead of emerging challenges and strengthen your organization’s defenses. Admission is $150 (without a promo code) and includes a catered lunch, breakfast, snacks, a cocktail networking re...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.