Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
From Data to Decisions: Empowering the...
State governments see the potential of Generative AI (GenAI) but recognize the need for responsible use. Some states have created task forces to explore ethical implications and others are now mandating that agencies seek approval and assess impacts before adoption. On February 28, Elastic experts delved into these policies and explored how Elastic empowers organizations to leverage GenAI responsibly and effectively. Attendees signed up to:Und...
Self-Driving Ops - Reality or Fantasy?
Self-driving ops enable DoD IT pros to depend on AI for faster decision-making, freeing time for critical operational tasks. To attain full autonomy, agencies need observability to prevent tool sprawl and alert fatigue. It enhances visibility, ensuring quicker responses and readiness for automated processes like self-driving ops. Attendees explored:How self-driving ops can improve cost efficiencies, inform decision-making, plan resource requir...
Unlocking Efficiency: DocuSign and Docu...
Attendees who joined us on February 29th experienced an insightful webinar on the seamless integration of DocuSign and Documentum, designed to streamline document workflows in federal agencies. They discovered key features, use cases, and benefits, and heard directly from experts in the field. Guests had the opportunity to enhance their document management capabilities, and unlocked the potential of DocuSign and Forefront Documentum! Register...
Red Hat Brooklyn Tech Day
Experts from Red Hat, Dynatrace and GitLab came together for Brooklyn Tech Day's informative and collaborative sessions on best practices for developing and deploying modern, scalable applications to help agencies achieve digital transformation. Attendees learned: What's happening next in open source and how does it intersect with the needs of enterprise companies with critical workloads in public and private clouds Red Hat’s product off...
Alteryx and Bronson Analytics: Analytic...
This webinar was be an introduction to the Alteryx platform and shed light on how it can help users reduce risk and time spent in spreadsheets performing data analytics. This session provided a comprehensive overview of Alteryx and how it simplifies the data preparation and analytics process. Martin presented an overview of the Alteryx platform using Human Resources data. Following Martin's presentation, Phil Cormier highlighted a practical Al...
WEST 2024 Webinar Series: Self-Driving...
During this webinar, Joshua Stageberg, VP of Product Management at SolarWinds discussed: How self-driving ops can imporove many aspects of your company Why observability is so important for self-driving ops What steps agencies can take to prepare their enviornments for AIOPs How to take a Secure by Design approach to observability Register to view this on-demand recording.
CTO Sessions: Quantum Resistant Security
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum com...
Intro to 10ZiG Technology
Learn more about 10ZiG Technology in this recorded on-demand webinar where you will discover competitively priced hardware with: Hassle-free demo devices Management software with unlimited user licenses Repurposing of software for existing hardware
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.