Store, Manage, and Discover Critical In...
IT professionals are constantly challenged with deciding what to do with their data. Should you keep or delete it? What retention policy should you apply to it? How do you maintain user access to it? With Veritas Enterprise Vault, you can join the tens of thousands of customers who have found an easy solution to all of these challenges. Enterprise Vault is the most widely-deployed archiving solution in the market, with over 16 years of experie...
Migrating from Oracle to Postgres
Migrating from Oracle to EnterpriseDB Postgres can seem like a daunting task, but breaking it down with the proper methodologies in mind makes it easier. Once you have an overall strategy, the database migration itself is often the simplest part of the process. View our on-demand webinar as speaker, Craig Silveira, VP of Sales Engineering at EnterpriseDB, discusses the key methodologies that all members of your team should consider before pla...
Google Road Show: Design IT Like Google
Please join us in person at the Google Reston office on Wednesday, March 16, 2016 to learn more about how Google technology can be used to support enterprise strategies in your environment. Google and Carahsoft are bringing together a limited number of customers to exchange information with other government agencies and contribute to improving Google’s offerings to you. Attendees will be able to: Explore the underlying technology and dat...
Adobe | Department of Defense Joint Ent...
Are you a public affairs or design professional who needs the best creative tools? Do you manage forms, digital signatures, and document workflows? If so, this webinar can offer insight on the software and capabilities available to you through the Adobe JELA. The U.S. Army, U.S. Air Force, Office of Secretary of Defense (OSD), Defense Information Systems Agency (DISA), and Joint Chiefs of Staff (JCS) are currently enrolled in the Adobe JELA, b...
Gloria Larkin to Present at Opportuniti...
Every year, the US Government spends more than $500 million for various products and services. Thousands of contracts bypass small business that do not know about or understand how the Government buys. Join TargetGov President Gloria Larkin at Opportunities 2016, March 14, at the US Cellular Center in Ashville, NC where small businesses will learn how to tap into the government market. Larkin will present “Benchmarking and Assessing Comp...
Build Your Mobile Applications with AEM...
With Adobe Experience Manager (AEM) Mobile, your agency will have access to an industry-leading mobile platform that can bring content to life across tablets and smartphones. NASA Science, Spinoff, and Tech are just a few of the applications that have leveraged AEM Mobile to build engaging mobile applications.View our complimentary on-demand webinar, to hear Dave Roy, Adobe Mobile Solutions Manager, and Ahren Cardosi, Adobe NASA Account Manage...
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn two (ISC)2 CPE credits and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based Ap...
Adobe ColdFusion Government Summit
Adobe and Carahsoft would like to cordially invite you to save the date for our complimentary Adobe ColdFusion Government Summit on Wednesday, March 9th in Washington, DC. Join us for an interactive government summit with the ColdFusion team on how government agencies across the U.S. are leveraging Adobe ColdFusion to rapidly build and deploy web and mobile applications. This event will: Reveal how Adobe is committed to ColdFusion, both now an...
Data Security Tech Talk - San Diego
Vormetric and Guidepoint Security are proud to host an event with guest speaker, Jay McGowan, US Liaison Officer to CYBERPOL and Former Cyber Counter-Intelligence Chief at NRO. We will be discussing how to protect classified or sensitive data from Insider Threats and APT (Advanced Persistent Threats) that comprise credentials. Insider-implemented breaches, such as those by Edward Snowden and Bradley Manning, can not only severely cripple the a...
Next Generation TechTalk for DoD The Ev...
Today’s IT organizations face new demands and changes at a faster pace than ever before. Meanwhile—with cloud migration, virtualization and mobile applications on the rise—network complexity and security risks increase at every turn. As enterprise environments evolve, getting the best possible results requires a new approach—one that embraces the potential of next-generation networking. Join Force 3, Cisco and F5 on Wed...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.