This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We’ll ask if turning to “synthetic” data is the answer to generate insight on sensitive data while not compromising personal and identifiable information. To view this webinar: Unlocking Your Agency’s Data Treasure Trove with Large Language Models. Tune in on your favorite podcasting platform today. Department of Defense.
This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. David currently leads the endpoint productmanagement team and the security team at Lookout.
Our August online training list is ready to go, with experts lined up to chat about everything from pitching innovation to leadership to managing successfully while being an introvert. PT , to hear government and industry experts discuss how to transform your data to make it more impactful. Join us online Wednesday, Aug.
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data. He has twice been awarded Jessie H.
My best advice is to play the long game by building relationships,” said Carlos Rivero, Virginia’s former Chief Data Officer. They create friction between end users and the goals they want to achieve, whether that’s analyzing data or driving better decision-making. That includes human-centered design, productmanagement and agile.
Patrick Thompson, Director of Infrastructure for the US Coast Guard showcases their leap forward with high-speed satellite services, turning ships into what he calls floating data centers. Close Chief Technology Officer, Communications, U.S. He has twice been awarded Jessie H.
This CPO demand has pushed vendors that may have offered point solutions for sourcing, CLM, spend analytics, or SRPM to expand their portfolio to include all four products.” As AI applications evolve and are increasingly embedded in S2P suites, quality data is critical to generating and presenting actionable insights.
This CPO demand has pushed vendors that may have offered point solutions for sourcing, CLM, spend analytics, or SRPM to expand their portfolio to include all four products.”. As AI applications evolve and are increasingly embedded in Source to Pay suites, quality data is critical to generating and presenting actionable insights.
Tuesday, March 19, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Federal agencies collect vast amounts of data that often goes untapped because unlocking its full value is complex. Dr. Widener joined BAE Systems in 2002 after serving in several leadership positions for the U.S. Department of Defense.
Tom Gilmore, Enterprise Data Architect in the USMC, drops a staggering statistic: in just 2.5 Joshua Stageberg, Vice President of Product at SolarWind, dives into the exponential growth of network monitoring tools, cautioning against “tool sprawl” and the siloed observability it creates. He has twice been awarded Jessie H.
This system enables real-time data sharing across departments, streamlining care coordination and improving efficiency for millions of patients. Prior to taking on this new role, she served in the United States Digital Service as a productmanager.
Immigration and Customs Enforcement Efficiency Through Innovation: Skills, Tools, and More to Make AI a Reality As AI continues to revolutionize various sectors, ensuring that the data consumed by AI systems is properly managed, secured, and compliant is paramount. Join us online Thursday, Feb. 13 at 2 p.m. 26 at 2 p.m. 26 at 2 p.m.
Michael Woolfe × Michael Woolfe Associate Vice President, ProductManagement & Cloud Michael Woolfe is a seasoned technology professional with extensive experience in cybersecurity and systems engineering, currently serving as the Associate Vice President for ProductManagement and Cloud at Fortinet Federal.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content