Governmental Information Processing Association of Wisconsin
IQM2 was proud to offer our streaming services to GIPAW for the 2010 Fall Meeting.
|
![Click to Play [2 hrs, 7 mins]
Social Media: What is it, how to use it, and how to avoid trouble](images/GIPAW_SocialMedia.png) |
Social Media: What is it, how to use it, and how to avoid trouble
Justin Barnes and Andy Wallman of KW2I. It seems like everyone these days - from your grandmother to your next-door neighbor's new baby - has a profile on Facebook or a blog about their favorite chili recipes. Many companies and organizations do, too. Andy Wallman, president of Knupp & Watson & Wallman (KW2) and KW2’s interactive technology director, Justin Barnes, take a look at social media spaces (like Twitter, Facebook and LinkedIn), how they’re being used, and how social media can be successfully implemented by local and state governments, while keeping basic legal, human resources and IT security issues in mind.
Duration: 2 hours and 7 minutes
|
|
![Click to Play [1 hr, 18 mins]
Virtualized Desktops – Robert Miller and Gio Savaglio of MNJ Technologies](images/GIPAW_Virtualization.png) |
Virtualized Desktops – Robert Miller and Gio Savaglio of MNJ Technologies
Robert Miller and Gio Savaglio of MNJ Technologies will provide information on virtualizing your desktops utilizing the Pano System from Pano Logics. The Pano System includes everything you need to deploy virtual desktops on top of your VMware virtual infrastructure. In one package and for one price you get both our unique award-winning zero client Pano Device and a unified management interface provided by Pano Manager that lets you easily deploy, monitor, and control your virtual desktops.
Duration: 1 hour and 18 minutes
|
|
![Click to Play [1 hr, 16 mins]
Stopping data leakage – Andrew Tomaszewski of Core BTS](images/GIPAW_DLP.png) |
Stopping data leakage – Andrew Tomaszewski of Core BTS
Sensitive data exists in every environment. Whether the data holds health information, personally identifiable information, credit card information or incubation information that is not ready for release, knowing where the data resides in your environment and who has access to it is an almost impossible task for people. Applying the discovery capabilities of data loss prevention (DLP), you can find out where this sensitive information exists on file shares, sharepoint, databases and e-mail systems so you can apply your organizations’ policies to protect the data. In this session you will learn how to apply DLP discovery capabilities to locate sensitive data and then apply policies to protect the data.
Duration: 1 hour and 16 minutes
|
|
|