What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Three Essential Steps in Navigating the Unified Communications Landscape

Unified Communications (UC) enables a wealth of opportunity for federal, state and local governments, allowing agencies to be more mobile and flexible than ever before. Join us for an informative discussion about how to navigate the UC landscape.

Date: Feb 19, 2015

Time: 2:00pm


On Demand






Securing the Mobile Workforce: Device Security is Not Enough

For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.


Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.


Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.


Enabling Mission Success with Mobile Technology

Mobility is proving essential for warfighters, intelligence officers and public-sector professionals who spend much of their untethered from their desktops. Enabling a productive and effective mobile workforce requires the ability to access and interact with information using mobile technologies like smartphones and tablets to support their missions. The first wave of protection that has taken hold in the form of encryption, containment and mobile device management (MDM) solutions are ill-equipped to sufficiently protect the wide range of data sensitivity levels that exist across agencies. Learn why and how agencies must shift their focus to protecting the data, as opposed to the device.


A Flash Crash Course on Flash-Based Architectures

In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.


Using Data Sharing to Fight Crime

Human and/or drug smuggling organizations, among other criminal activity groups, use a variety of methodologies to launder billions of dollars each year. To conceptualize the nature and stature of this evolving threat, law enforcement must analyze voluminous transaction records subpoenaed from U.S. financial institutions regarding suspicious activity. This webcast shows how the Arizona Financial Crimes Task Force and TRAC analysts and investigators use an information sharing network to provide a valuable service to federal, state and local law enforcement across the entire nation in their fight against this type of crime.