What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Deploying and Managing Scalable Applications in the Cloud

During this webcast attendees will get an OpenShift overview covering both the business value, but also the technical benefits of developing with PaaS. You will see a live demo on how to quickly provision, develop, deploy and manage web applications to the cloud using Red Hat's JBoss Middleware and OpenShift software.

Date: Sep 23, 2014

Time: 2:00pm


Case Studies in Implementing a Cloud Based Development Environment with DevOps, Agile Processes and ALM

Government agencies and Healthcare Insurers are on a journey to modernize their IT processes and tools in order to respond to rapid change with greater speed, agility and efficiency. This presentation reviews the overall goals, process and design challenges encountered and addressed within IT modernization initiatives.

Date: Sep 25, 2014

Time: 2:00pm


Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.

Date: Sep 30, 2014

Time: 2:00pm


Increase Data Security through Your Print Solution

You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

Date: Oct 02, 2014

Time: 2:00pm


Big Data Marries End User Behavior – Mitigate the Insider Threat

Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Director of Insider Threat Programs, Daniel Velez, who will share over a decade of lessons learned regarding insider threat solutions.

Date: Oct 09, 2014

Time: 2:00pm


Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

Date: Oct 23, 2014

Time: 2:00pm


On Demand

IBM i2 Intelligent Law Enforcement Demo

Law enforcement software enables agencies to generate actionable insights that can help reduce crime and improve public safety. Learn how your agency can integrate analysis, lead generation and communication technologies to provide a holistic view of data for policing and partner agencies.


IBM i2 National Security and Defense Intelligence Demo

In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.


'Mocking' Reality: The Power of Service Virtualization

A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.


Investigative Teamwork: The Case for Case Management

Investigations hinge on good teamwork. To collaborate effectively, team members need to be confident that everyone has a complete, shared view of case details. They also need flexibility in managing the content of a case, easily bringing in new evidence and artifacts and securely managing updates to that content. That is why a case management system is so critical. Join this webcast to learn how your organization can leverage case management capabilities.


Flash Storage: The Next Generation of Storage has Arrived

Today, Government IT organizations are being forced to do more with less due to budget cuts and increased requirements for performance, features and scalability. Storage infrastructure is a key component of overall database, virtual server and VDI environments that has a direct influence on performance. But the complexity and cost of creating the best storage environment to support high performance architecture can be daunting. Join this webcast to learn how to take the complexity out of storage infrastructure and deliver breakthrough performance for your tier-1 applications.


Auditing Your Data for Insider Threats

It’s not easy to discover the malicious insider. In most organizations, employees are credentialed users of an agency’s system and are assumed to be trusted. That’s because the prevalent technology used to help pinpoint security threats — intrusion detection systems, data loss prevention systems, security incident and event management tools, anti-spyware software, and data from firewalls, routers and switches — don’t provide the context required to know what’s normal behavior and what’s not, often the difference between innocent behavior and the actions of a malicious insider.


Navigating Certification and Accreditation (C&A) - A Primer

Whether you are new to the Certification and Accreditation (C&A) process, or need a refresher on the principles and processes, this webcast will help guide you on the C&A path. C&A is essential when deploying products within the US Government; therefore, it is important to understand the basic principles, approaches, and processes involved with successfully navigating the C&A processes.


How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.


Enabling Government to Citizen Engagement through Mobility and Identity Solutions

In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.


Big Data and Your Data Warehouse

Just a few years ago, big data was a problem in terms of scaling up IT systems and discovering the business value. Thanks to advances in vendor platforms and user practices, most enterprises today consider big data an opportunity...


Future Architectures for Business Intelligence

A revolution is coming in the information delivery market and we are poised at the beginning of that change. The overall picture is fuzzy, but we can see...


Experts Agree: Teradata Solutions Help Customers Know More so they can Do More

In just one four-month period, the most respected industry analysts named Teradata a leader in big data warehousing and analytics.


Make Your Big Data Strategy a Reality with the Teradata Unified Data Architecture

Stop hoping that your big data strategy will magically result in business value. Build a Unified Data Architecture with the value in mind.


Flash Storage: Optimizing the Infrastructure for Mission-Critical Operations

Flash technology solutions are imperative in today’s mission-critical IT infrastructure. The requirements for performance, endurance, agility, scalability, security and reliability in the public sector are driving sophisticated flash memory solutions that require a new level of expertise. Join this webcast to learn how high-performance flash solutions can enable the warfighter’s data-focused, mission-critical applications from the core to the tactical edge.