Zoom Phone for Government: Digital Tran...
As your agency plans their digital transformation strategy, here are challenges you are likely facing: Bringing your people back Incumbent Fatigue Juggling the personal/ professional personas Not E911 compliant? That will cost you. Customer Experience Times Up! - The mandate to transition off TDM is March 2025 Difficult to use, Difficult to Deploy, Difficult to scale On June 22nd, Zoom will be hosting an interactive session that will highlight...
2022 Unit 42 Ransomware Threat Report Webinar
Ransomware groups turned up the pressure on their victims in 2021, demanding higher ransoms and using new tactics to force them into paying. In fact, the average ransomware demand in cases handled by Unit 42 in 2021 climbed 144% since 2020. At the same time, there was an 85% increase in the number of victims who had their names and other details posted publicly on dark web “leak sites'' that ransomware groups use to coerce their targets....
Managing and Securing Your Docker Workflows
Picture this: You have hundreds of developers using Docker every day. How do you go about onboarding and managing your users at such a scale without limiting dev productivity, and keeping security in mind? Docker Business was designed to help you do just that. With a Docker Business subscription, you get access to Docker Hub’s powerful management features, including a centralized admin center to help you better manage and secure Docker w...
June 22, 2022
Organizer:
Docker Location:
Webcast
What�s Restore Got To Do With It? The R...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up yo...
Boston Red Hat User Group
This hybrid session, aimed at intermediate to advanced developers, will explore the system performance analysis and tuning of Red Hat Enterprise Linux® (RHEL) comparing Performance Lab results of RHEL 9 vs RHEL 8.4. During this time, we will: Share how to maximize the performance of systems by choosing a tuned targeting throughput or latency using the web-console Show how to analyze the system performance using several performance analysis...
June 21, 2022
Organizer:
Red Hat Location:
Virtual
8(a) STARS III GWAC DPA Training
This course provides Delegation of Procurement Authority Training for GSA's 8(a) STARS III Governmentwide Acquisition Contract (GWAC) for IT services. The training defines GSA GWACs, identifies the features and benefits of the 8(a) STARS III GWAC, provides an understanding of 8(a) STARS III ordering procedures and outlines responsibilities of ordering contracting officers. Please note: This training is limited to Federal/Military personnel.
Reporting Excess Property
FOR FEDERAL USERS ONLY Reporting Excess Property This FREE virtual training will examine the excess process, how to properly report excess property through GSAXcess, how to upload photos, and some common reporting mistakes to avoid. Registered participants will receive one (1) Continuous Learning Point (CLP) for attending. Registration for this training is required. KEEP YOUR CONFIRMATION EMAIL - your link to join the training is included in...
EMEA Virtual Database Summit
Cloud mandates. Digital transformation initiatives. Data sprawl. Change is happening, no matter what. But with change comes new possibilities, and we have assembled a group of database deployment and operations experts who can help you recognise and capitalise on these opportunities. Seven speakers each have seven minutes. Bookended by opening and closing keynote addresses, this fast paced Database Digital Summit will feature 7 experts sharing...
June 21, 2022
Organizer:
Nutanix Location:
Webcast
Introducing New Wireless and Remote Ope...
Safety concerns, talent shortages, supply chain issues and digital blind spots hold back many organizations. To overcome, they are connecting and automating industrial environments and establishing remote operations. Deployments of AGVs, robots, tele-remote operations, and automatic data collection using sensors and cameras are growing. These use cases require: Reliable fiber-like wireless connectivity in more places, supporting a broader rang...
June 21, 2022
Organizer:
Cisco Location:
Webcast
Roundtable: Supply Chain Risk Managemen...
Federal government agencies rely extensively on IT products and services to carry out their operations. There is, however, cybersecurity supply chain risk in connection with acquiring, deploying and using these products and services. This is evidenced by the numerous supply chain attacks over the past decade such as the Target data breach in 2013, Solarwinds attack in 2020 and Kaseya attack in 2021. As a result, the federal government has take...
June 21, 2022
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.