Modernizing Application Infrastructure...
As agencies execute initiatives to adopt the cloud, increase agility, and cut costs, they find that their data tier presents significant obstacles. Databases are continuously growing larger and are tied to legacy platforms, making them too important to risk outages during and after modernization projects. Using cutting-edge database virtualization, Delphix enables more agile data management that eliminates redundant infrastructure and slow pro...
Adobe Acrobat: Accelerate Accessibility...
Join Carahsoft and Adobe to learn how using Acrobat X can save over 7 hours a week per knowledge worker in your agency. With tools to create Accessible and standards compliant documents, along with new automation options, Acrobat X not only helps you work better with everyone, it also saves time and money. Register today to join an Acrobat Solutions Engineer, Lisa Croft with Adobe Systems Inc., who will demonstrate how the power of Acrobat X a...
Securing Software The Right Way
Software assurance has become a trending topic in the public sector. There has been a dramatic increase in application attacks and, as a result, many agencies are starting to receive mandates to secure their software. How exactly do we secure our software? Software assurance is much more than just buying security software: a holistic approach must be used to include security in every phase of the software development lifecycle. Fortunately, a...
Leveraging Open Source Technologies for FOIA
How Alfresco and Other Open Source Technologies Can Work Together to Solve Government Business Problems Managing the vast quantities of information government entities need has become incredibly challenging. When the Freedom of Information Act was enacted in 1966, no one considered the vast quantity of information that would need to be accessed or the complexity of keeping private data private, while making public data accessible. Legacy conte...
Security and Access Control in the Virt...
Server virtualization promotes flexible utilization of IT resources, reduced capital costs, high-energy efficiency, high-available applications, and improved business continuity. However, virtualization also brings along with it a unique set of challenges around the management and security of the virtual infrastructure: How do you secure VMware across the enterprise? How do you protect your virtual infrastructure? How do you control privileged...
Adobe Day for Local DC Systems Integrators
Moving Towards eLearning & Virtual Collaboration to Satisfy Internal Projects or Federal Client's R&D Join Adobe Systems and Carahsoft Technology for a half-day seminar and learn how the industry’s top-ranked web communication software, Adobe Connect, can reach thousands of users around the world with its powerful functionalities as a virtual training and collaboration tool. Today, many federal agencies and government contractors...
Online: What's Next for Adobe ColdFusio...
You are cordially invited to attend a complimentary eSeminar focusing on the future of Adobe ColdFusion and what's coming next. Join Carahsoft, Fig Leaf Software, and the Adobe ColdFusion team to discuss Zeus and Twister, the next version of ColdFusion. Discover how Zeus will accelerate ColdFusion application development, making your organization more efficient than ever before! While this event is taking place in Arlington, join us live onlin...
Embrace the Latest Mobile Device Platfo...
Leveraging the power of mobile computing platforms can allow government agencies to securely deliver containerized messaging and business applications while meeting current mobile security policies, requirements, and best practices for regulated data. Whether the focus is citizen, public safety, HIPPA-regulated, or other sensitive information, agencies can securely access, interact with, and leverage data on a broad range of modern computing p...
Exposing the Recent Flood of Targeted Attacks
In the last several months we have monitored an apparent surge in targeted attacks against government agencies. Cybercriminals have shifted the way they target agencies, abandoning large-scale, generalized attacks in favor of more targeted, dynamic techniques with bigger payoffs, including spear-phishing and “whaling”. Because targeted cybercrime is so profitable, perpetrators are highly motivated to find new ways to gather sensiti...
How Strategic Sourcing's Enterprise Sof...
Here’s your chance to hear the contract facts from someone in your own agency! Shantelle Coleman Branch Manager, DHS – Office of the CIO, will be discussing how you can quickly plan, procure, and deploy your agency’s virtualization and cloud solutions through the recently established DHS | VMware BPA (contract # HSHQDC-11-A-00041). Join us as we reveal how DHS’ Strategic Sourcing’s Enterprise Software Solutions ca...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.