Out of Sight Out of Control: Asset Inte...
Asset visibility and control is an unsolved challenge, with a huge amount of the attack surface being assets that are un-agentable or traditionally manageable. Allow Armis and Semperis to enlighten you on how organizations have huge blind spots that lead to unknown and unquantifiable cyber risk. During this complimentary webinar, attendees learned about: Examples of unmanaged and IoT devices that can’t be protected by traditional systems...
ChatGPT Use Cases for State & Local Gov...
OpenAI webinar was designed to introduce State & Local Government agencies to ChatGPT Enterprise, a leading AI tool that dramatically enhances productivity and operational efficiency. OpenAI experts did a walkthrough for attendees on how ChatGPT Enterprise can: Support employee productivity Improve public service delivery Increase operational delivery Drive fast application development
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Optimizing Performance and Security in...
On Thursday, May 30, 2024, an expansive panel of industry experts from Heimdall Data, Eon Collective and VMware by Broadcom gathered to present an enlightening event focused on critical aspects of cybersecurity, tailored specifically for IT personnel. This event was hosted by Carahsoft in collaboration with Amazon Web Services (AWS). Click to download a copy of the slide decks presented.
Harnessing the Full Potential of Contin...
CloudBees CI is a powerful enterprise solution for Continuous Integration (CI) that leverages the flexible and robust Jenkins engine. With its added features, this solution significantly boosts scalability, manageability and performance for organizations utilizing Jenkins. Attendees joined CloudBees experts for a webinar and learned how Jenkins and CloudBees CI compare against each other and delve deeper into the best practices for: Software d...
The Anatomy and Drivers of Peak Perform...
Watch a complimentary webinar to build an understanding of the latest research demonstrating the foundational importance of resilience to innovation. Discussion will include a review of key mindsets and behaviors that build the skills that help people navigate ambiguity, as well as strategies for planning amid uncertainty, and various types of creativity that surface novelty. Viewers will leave with practical tips to foster innovation and resi...
Google Cloud & BlueVector AI Webinar
Google Cloud, BlueVector AI, and Carahsoft hosted a one-hour webinar on the power of Document AI. In this session, BlueVector AI demonstrated an end-to-end scanning-to-data extraction process and discuss how the Michigan Department of Vital Records achieved more than 70% reduction in data entry time. This webinar covered:Document AI FundamentalsAn end-to-end scanning to data export workflowAdvanced human in the loop and data validationLessons...
GenAI Revolution: The Next Government F...
This dynamic virtual event, we will delved into the seamless integration of GenAI into existing government systems, showcasing its unparalleled ability to enhance operational efficiency, sharpen decision-making, and bolster mission readiness. Learned from the experts at Google and Knexus as they reveal practical application and shared insights on the collaborative journey. Key Highlights:Transformation Potential: Understand how GenAI is not ju...
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Ammar Jaghlit, and John Vernetti provided live demonstrations as well as answered any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications...
Splunk Attack Analyzer Webinar
Participants joined us for a webinar with Splunk to learn how Splunk Attack Analyzer can help them. Splunk Attack Analyzer automates the analysis of suspected malware and credential phishing threats. Unlike other analysis tools that require cumbersome manual workflows, the solution automatically follows and analyzes each step in complex attack chains to get to the final payload. Splunk Attack Analyzer renders a verdict and extracts forensics t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.