Intelligence, Surveillance & Reconnaiss...
Dealing with the New Realities, Opportunities and Challenges in Global ISR Continuing gaps in intelligence information sharing capabilities post 9/11, emerging requirements for new “ISR surges” in Afghan and Iraqi operations, ISR challenges associated with new counter-insurgency and counter-terrorism operations, increased roles for ISR assets across a broad range of new and evolving missions (space defense, maritime domain awarenes...
Simplify and Automate Data Exchange and...
Over the past decade, agencies have been working to implement a consolidated integration strategy by focusing on optimizing their internal core infrastructure technologies to achieve better integration benefits. However, today’s infrastructure achieves only a portion of the efficiencies that are possible. This is your last chance to join us for this complimentary webcast to learn how you can benefit from a complete integration solution t...
Military Airlift & Mobility 2010
DoD and the Services have sustained a tremendous operational tempo through a period of unprecedented requirements, while being burdened with severe asset constraints. Performance has been improved by up to 50% in velocity and precision throughout the supply chain system, and almost $700 million in savings have been implemented. However, this ongoing stress, in terms of constant change and overwhelming requirements, has led to daunting sustaina...
Application Whitelisting: Allow Known G...
Application Whitelisting: Allow Known Good to Prevent the Bad In the days following the recent IE vulnerability (Aurora) attacks, Gartner’s Neil MacDonald advised, "Application whitelisting at the endpoints would have stopped these attacks." Shortly after, companies targeted by this attack chose Bit9 – named 2010 Technology of the Year by InfoWorld – to protect their systems. Carahsoft invites you to join Bit9 for this live w...
Intelligence Community Executive Forum
The Role of Industry and Commercial Technologies in Addressing the Comprehensive National Cybersecurity Initiative Join us as we welcome senior government thought leaders and guest panelists from the IT industry for a complimentary seminar where we will discuss the key role of industry and commercial technologies in addressing the Comprehensive National Cybersecurity Initiative. Attendees of this seminar will hear a first-hand assessment of t...
Prioritize Application Testing Using A...
Prioritize Application Testing Using A Risk-Based Approach Risk-based quality management allows project leaders to evaluate the level at which to test each requirement, based on the nature of the requirement and available project resources. Understanding the priority and risk associated with each requirement also allows project leaders to drive the right focus in the development, validation efforts, and staffing levels. This is your last chan...
Monitoring and Performance Management f...
Monitoring and Performance Management for Modern Applications and Infrastructure As Federal, State, Local, and DoD organizations migrate thousands of critical custom web applications from physical to virtual environments, understanding the performance and health of those applications is critical to avoiding unplanned outages and ensuring high availability and high integrity. SpringSource, a division of VMware, can help government organization...
Introducing Chatter for Government: Sec...
In today's world, it is almost impossible to keep track of all the people, projects, documents, and data spread across different government agency departments and applications. Traditional collaboration tools do not consolidate information, causing critical data to be difficult to track. This is your last chance to join us for this complimentary webcast where we will discuss how Chatter, the new government collaboration tool from Salesforce, c...
Real World Best Practices for Accounts...
Real World Best Practices for Accounts Payable Automation Across all government agencies, invoice processing not only represents a significant overhead, but with financial reporting and regulatory compliance issues, the importance of vendor and contract management, cost controls, and the need to optimize cash management are critical parts of an organization's value chain. End-to-end accounts payable (AP) automation, comprising of invoice capt...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.