Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Neo4j_logo_fullcolor_microsite.png
Neo4j

Neo4j Good to Great Workshop & Training


Event Date: November 14, 2024
Hosted By: Neo4j & Carahsoft
Location: Reston, VA

Graph technology is a vital component for AI systems, enhancing machine learning algorithms by improving their robustness, precision, accuracy and explainability.

Federal professionals joined Neo4j in Reston, VA for our Good to Great: Graph Database Training + Workshop. This in-person experience offered comprehensive, hands-on training designed to elevate your skills and knowledge in graph database technology.

 Through a series of sessions led by Neo4j experts, attendees learned about:

  • Accelerating Mission Outcomes: Learned how Neo4j technology can speed up your mission outcomes
  • Advanced Graph Insights: Applied Neo4j Graph Data Science (GDS) algorithms to generate valuable insights from your data
  • Powerful Visualization: Used Bloom for advanced graph visualization, making complex data relationships clear and actionable
  • Innovative AI Integration: Explored how Generative AI combined with graph technology can create powerful new solutions

Resources


The 2025 State of Vulnerability Management and Remediation Report
Report

The 2025 State of Vulnerability Management and Remediation Report

Explore how DevSecOps teams handle vulnerability remediation and how Activestate helps strengthen security posture. This report showcases the results of a recent survey of DevSecOps personnel and how they and the companies they support deal with remediating vulnerabilities. The takeaway? Most enterprise applications remain at risk due to insufficient mechanisms for prioritizing and remediating vulnerabilities, whether that stems from a lack of resources, skills, processes, or tools. Read this report to learn how Activestate addresses these gaps to reach a stronger security posture for organizations.


Fill out the form below to view this Resource.