Back to Search Begin New Search Save Search Auto-Notify
Maximize IT Operations Observability wi...
Splunk's powerful IT operations analytics platform helps you optimize the performance and availability of IT systems and applications while controlling IT costs and resources. However, IBM i systems have been left out of most Splunk environments because the machine data they generate is unique and requires specialized skills to work with.Ironstream collects and feeds IBM i log data to Splunk, ensuring a true 360-degree view of your IT landscap...
Add Favorite
Science of Visual Analysis for the Depa...
Is it art? Is it science? Is it both? Visual analysis is an iterative process for working with data that exploits the power of the human visual system. The formal core of visual analysis is the mapping of data to appropriate visual representations. What exactly engages an audience effectively? Is it beauty? Is it clarity? Is it great storytelling? Join us for this dynamic conversation in today's world of data visualization.Join this session, w...
Add Favorite
Optimizing Enrollment Outcomes for High...
Over the past decade, colleges and universities in the United States have seen a steady decline in enrollment, and that trend is not expected to reverse any time in the near future. Stretching across various functions from marketing, admissions, financial aid, and institutional research, the need for gathering deeper insights from data and having a strategic enrollment plan has never been greater. Join Alteryx and HAI Analytics as they review...
Add Favorite
Data First Digital Transformation for U...
During this webinar, attendees will learn how universities modernize their data ecosystems to deliver a multitude of outcomes like how: University of Pennsylvania uses Talend Data fabric to enable the movement of data from on-prem to cloud and back in support of their Alumni giving application with improved customer experiences for fundraising Case Western uses Talend Data fabric in a micro-services architecture to move data from both on-prem...
Add Favorite
Don't Get Blindsided by Mobile Gaps in...
Mobile Application Security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include Mobile App vetting is now upon us.Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created a...
Add Favorite
Summertime Refresh: Securing Chromebook...
Join this webinar with SentinelOne, Zimperium, and Carahsoft where our mobile experts will discuss: Why states and educational institutions use Chromebooks Cyber threat challenges and concerns Chromebook users face What can be done to protect Chromebook users, including K-12 students How Chromebooks play into K-12 holistic endpoint security strategy
Add Favorite
Leveraging Artificial Intelligence Tech...
Like most law enforcement agencies across the nation, the Henderson Police Department, located near Las Vegas, Nevada, was not immune to the growing nationwide trend for more public transparency in law enforcement. Over the past year, the number of Freedom of Information Act (FOIA) requests for public access to police audio and video evidence such as body-worn camera, in-car dash cameras, jailhouse calls, and surveillance camera footage, have...
Add Favorite
The Benefits of Digital Document Workfl...
Join us for The Benefits of Digital Document Workflows on Efficiency and Compliance, the first session of the Mission Support Summer Webinar Series presented by Adobe, Microsoft and Carahsoft. A Forrester consultant will share research study highlights on the benefits of automated digital processes for government, and how Adobe's integration with tools like Microsoft 365 can further streamline your workflows and create better employee and citi...
Add Favorite
OMB M-21-31: Essential Insights for Fin...
In August 2021, the Office of Management and Budget released a memo that outlined the requirements for section 8 of Executive Order 14028, Improving the Nation's Cybersecurity. The memo outlines the requirements for each federal agency to collect, retain, and manage logs with a focus on centralized access and visibility for the Security Operations Center (SOC) of each agency. With the upcoming EL1 deadline, learn how to help your agency meet t...
Add Favorite
Distributed Tracing - The Steel Thread
As the public sector continues to adopt modern software development practices and architectures to drive innovation and accelerate the delivery of strategic projects, the complexity of managing distributed environments presents a growing challenge. Cloud computing, microservices, open-source tools, and container-based delivery makes it difficult to quickly diagnose and resolve performance issues and errors that can impact the citizen experienc...
Add Favorite
Back to Search Begin New Search