Adobe Digital Learning Webinar Series:...
Check out Adobe's 4-part on-demand digital learning webinar series, Embracing Human Intelligence into Digital Learning Access our on-demand 4-part webinar series, where Adobe experts and Carahsoft demo specialists explored how AI and human creativity combine to design smarter content, scale personalized learning, and deliver truly engaging virtual experiences. Each session showcased a different phase of the digital learning journey, powered by...
Level Up Your Dashboards with Viz Extensions
This exciting webinar explored how Tableau Viz Extensions can take your dashboards from great to game changing. Attendees learned how to enhance interactivity, embed custom visuals and extend the functionality of dashboards beyond out-of-the-box capabilities. We showcased real examples, shared practical use cases and highlighted the tools and techniques needed to get started with extensions—no code required. During this webinar, attendee...
Using AI to Detect Foreign Influence Ri...
The risk of foreign influence – either by nation state actors or individuals with connections to them – is real and growing more significant all the time. At the same time, foreign investment can play an important role in maintaining the vitality of the U.S. industrial base. Against this backdrop, it is essential that federal agencies and the mission partners that support them are acutely aware of their risk of nefarious foreign in...
CMMC and GCC High: The Roadmap to Compliance
The CMMC Final Rule (CFR 32) took effect on December 16, 2024, and CMMC assessments commenced on January 2, 2025. CMMC is set to enter into contracts (CFR 48) in mid-2025. As deadlines approach and the threat landscape continues to evolve, public sector organizations are rushing to comply with CMMC requirements while also evaluating if transitioning to GCC High is essential. Watch the on-demand webinar on achieving CMMC compliance with Microso...
BMC Helix and Flexera Better Together:...
In today’s complex IT environments, organizations face mounting pressure to reduce software costs, ensure compliance, and streamline service delivery. Watch this on-demand webinar that explored how the integration of BMC Helix and Flexera empowers IT teams with a unified view of assets, real-time intelligence, and automated workflows. Discover how this powerful partnership bridges the gap, enabling smarter and faster decisions across you...
Design Like a Pro with Layout Basics
Clear, accessible, and well-designed documents are key to effective government communication. Adobe InDesign helps improve the quality and consistency of materials like reports, brochures, and digital content. Watch our on-demand webinar for an introduction to Adobe InDesign, the industry-standard tool for layout and publishing powered by Adobe Firefly artificial intelligence. Specifically, this webinar showed attendees how to:Set up your docu...
How Booz Allen Leveraged Deltek and RPA...
In this insightful webinar, attendees explored how Booz Allen, a large, advanced technology company, combined its vision with Deltek Costpoint, the power of UiPath's RPA, and Baker Tilly's expertise to deliver measurable improvements and efficiencies in customer billing operations. Participants discovered how Booz Allen partnered to apply best-in-class innovation and technology to reduce billing days, improve cash flow, and lower costs. The se...
Securing the Future: AI-Powered Office...
Whether you're leading cybersecurity efforts, managing IT systems, or shaping compliance protocols, this webinar delivered practical strategies you can implement right away. This webinar covered: How to secure and retain multi-channel communications across devices.Using AI to detect and stop real-time communication threats.Meeting compliance requirements with flexible, user-friendly tools.
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.