Archived Events
In this webinar, attendees learned about:
Managing online attribution and protecting investigator digital fingerprints on the surface, deep, and dark web
Authentic device signatures for secure, cover-consistent operations
Persistent and non-persistent environments to support ...
Participants explored how AI can reduce manual processes, enhance collaboration, and deliver faster, more accurate outcomes for state and local government agencies.
The session also featured a real-world customer use case, highlighting how agencies ...
State and local government agencies are facing challenges with public safety, constituent services, and other critical public services where resources are constrained due to budgetary limitations.
While traditional technology has enabled faster and higher quality public services, the demands on public agencies have ...
In this engaging session, Domino explored how AI is transforming how the Department of War and the Intelligence Community drive mission outcomes—moving beyond pilot programs to deliver operational impact at scale. Experts discussed the growing need to operationalize AI to accelerate ...
Attendees joined the National Cryptologic Foundation for a multidisciplinary dialogue bringing together government, industry, the Defense Industrial Base (DIB), and beyond to explore the latest advancements in securing and assuring AI in high-stakes national security operations.
The ...
Don't just keep up with the demands of public service—work smarter!
Attendees joined us
On November 20, Red Hat hosted an in-depth webinar on how Red Hat Device Edge is transforming the way organizations deploy, manage and scale workloads across distributed environments.
How do you deploy powerful Generative AI while ensuring compliance and full control?
The challenge is embedding this cutting-edge assistance directly into your editor without losing necessary oversight in government and educational applications.
CKEditor AI is the native AI Assistant for highly controlled ...
Ready to move beyond the theory of AI? Attendees were invited to an exclusive, hands-on workshop designed to demystify Retrieval-Augmented Generation (RAG) AI and its real-world applications.
Attendees were able to:
Build sophisticated, analyst-level AI ...
This unique workshop combined multiple technology domains. Attendees learned how to architect and build a cloud native, serverless AI application and apply network, security, and data best practices. We believe this full stack approach to the workshop provided a better context for learning across technology domains for ...