(800) 995-8696

Governmental Information Processing Association of Wisconsin

IQM2 was proud to offer our streaming services to GIPAW for the 2010 Fall Meeting.

Duration: 2 hours and 7 minutes Full Screen

Click to use External Viewer  |  Watch IQM2 Videos


Click to Play [2 hrs, 7 mins]
Social Media: What is it, how to use it, and how to avoid trouble

Social Media: What is it, how to use it, and how to avoid trouble

Justin Barnes and Andy Wallman of KW2I. It seems like everyone these days - from your grandmother to your next-door neighbor's new baby - has a profile on Facebook or a blog about their favorite chili recipes. Many companies and organizations do, too. Andy Wallman, president of Knupp & Watson & Wallman (KW2) and KW2’s interactive technology director, Justin Barnes, take a look at social media spaces (like Twitter, Facebook and LinkedIn), how they’re being used, and how social media can be successfully implemented by local and state governments, while keeping basic legal, human resources and IT security issues in mind.

Duration: 2 hours and 7 minutes


Click to Play [1 hr, 18 mins]
Virtualized Desktops – Robert Miller and Gio Savaglio of MNJ Technologies

Virtualized Desktops – Robert Miller and Gio Savaglio of MNJ Technologies

Robert Miller and Gio Savaglio of MNJ Technologies will provide information on virtualizing your desktops utilizing the Pano System from Pano Logics. The Pano System includes everything you need to deploy virtual desktops on top of your VMware virtual infrastructure. In one package and for one price you get both our unique award-winning zero client Pano Device and a unified management interface provided by Pano Manager that lets you easily deploy, monitor, and control your virtual desktops.

Duration: 1 hour and 18 minutes


Click to Play [1 hr, 16 mins]
Stopping data leakage – Andrew Tomaszewski of Core BTS

Stopping data leakage – Andrew Tomaszewski of Core BTS

Sensitive data exists in every environment. Whether the data holds health information, personally identifiable information, credit card information or incubation information that is not ready for release, knowing where the data resides in your environment and who has access to it is an almost impossible task for people. Applying the discovery capabilities of data loss prevention (DLP), you can find out where this sensitive information exists on file shares, sharepoint, databases and e-mail systems so you can apply your organizations’ policies to protect the data. In this session you will learn how to apply DLP discovery capabilities to locate sensitive data and then apply policies to protect the data.

Duration: 1 hour and 16 minutes

GIPAW

Follow Us:

facebook twitter newsletter