Archived Events
There is no one path or approach to IT modernization; your county, community and agency's priorities shape your strategy.County government IT staff across the United States joined Red Hat online for insights around the efficiency and cost-saving benefits of IT automation and modernization. ...
AI-driven research and development applications are testing the limits of traditional, siloed, HPC architectures. Out-dated architectures limit the ability to share valuable accelerator resources such as NVMe, GPUs, FPGAs, and NICs. This significantly diminishes the ability to scale and meet uneven workload ...
Red Hat Learning Subscription Premium provides a flexible learning experience and self-paced training options with access to recorded video classes, e-books or live virtual classes.Stream now and learn how a Red Hat Learning Subscription can keep the U.S. Air Force up to speed on new ...
As the pandemic has changed the way the world works and operates day-to-day, so has the way in which we disseminate training materials. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement.
On July 15, 2021, DocuSign hosted their second State of California Virtual User Group focused on one topic, building a Center of Excellence (COE).Attendees heard from Kevin See from the Department of Water Resources (DWR) and Dave Hawley from California Department of Corrections and ...
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we ...
Do you know how many citizens feel dissatisfied and frustrated after engaging with your customer service center? Are citizens and agency staff waiting long enough to wonder why things take so long? Are your first contact resolution numbers low and do you pay the cost of escalation to Tier II because Tier I is pressured to ...
Many organizations are rapidly moving to Kubernetes for its proven portability, flexibility, and increased developer productivity. The use of containers allows many organizations and system owners to develop new code and deploy at a fast pace with repeatable and automated processes. However, these benefits present your ...
On July 15, Trend Micro experts shared with webinar attendees how to overcome Zero Trust with Trend Micro. Visibility and analytics are a key part of the DOD Zero Trust Reference Architecture. Avoid cybersecurity risk by increasing visibility and enforcement within your Zero Trust ...
Congressional funding is right around the corner which means project and approval timelines are shrinking, and different project groups are often ...