This content is provided by Red Hat When an organization makes the change to DevOps, it can be easy to get caught up by the promise of shiny new technological solutions, by buzzwords like automation…
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. How to block posts from people on Facebook without actually unfriending them. And meet America’s first female cryptanalyst.
Dana Laake and her special guest Katie Morra will discuss gut health from a functional medicine perspective.
In this exclusive executive briefing, the following experts discuss practical cyber workforce strategies and ways government and industry can collaborate more effectively
It’s not just during emergencies, as more and more agencies move to voice over IP (VOIP) and other technologies like instant messaging or texting that depend on the cloud and security making secure communications become even more important.
Pegasystems offers low-code and no-code solutions, providing organizations with developer tools to design systems and applications without having to write the code themselves. Organizations can apply automation to increase productivity, using visual tools to build software, allowing business and IT to collaborate in the process.
FEDtalk What do you know about the 2020 Census? Tune in to FEDtalk this Friday, April 5 for a comprehensive discussion of the mission, planning, and execution of next year’s big count. Natalia Castro, Policy…
Working with UiPath, NASA set up four bots that automatically begin processing grant applications for the employees.
Federal agencies and components with as few as 100 employees face unique HR challenges due to limited staff and legacy software systems.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. When it comes to modern digital cables, like HDMI and USB, a cheap cable will work just as well, so do not waste…
Dana Laake and her special guest Dr. Patricia Webbink will discuss mindful eating.
This program will provide a progress report on big data in government.
By minimizing access to applications based on requirements of the specific user, Zero Trust security removes the need to rely on the traditional boundaries of a network perimeter.
Since its inception in 2013, the federal government’s Continuous Diagnostic and Mitigation program (CDM), led by the Department of Homeland Security, has helped agencies discover up to 50 percent more assets inside their systems than they were previously aware of. And they’re able to do it in real time.
This content is provided by BlackBerry In the movies, it’s easy: the federal agent answers his phone and receives a tip, then calls his wife and apologizes for missing dinner, then dials his boss and…