Free online learning for government employees.
Digital Comms and Collaboration: Case Studies in Transformation
Legacy digital communications and collaboration services, many of which were patched together during remote work, have emerged as a big sticking point in digital transformation efforts, lacking the flexibility to adapt to emerging work processes or to enable automation for operational efficiencies. In this video interview, Matt Mandrgoc, Head of U.S. Public Sector at Zoom, discusses common and emerging use cases that show how transformation is possible.
Related Videos
Nov-24-2025
After making significant investments in artificial intelligence and developing numerous use cases and proof of concepts, many a...
Turn AI Investments Into Meaningful Outcomes
Nov-24-2025
It’s one thing to develop use cases for artificial intelligence, and to launch proof-of-concepts and pilot programs to test tho...
Combine the Power of Search and Cloud to Deliver on AI
Nov-18-2025
Agencies depend on software applications to deliver reliable, effective digital services to constituents, but old-school testin...
Getting Serious About Software Testing: The Model-Based Approach
Nov-18-2025
Old-school approaches to software testing are ill-suited for today’s fast-moving and complex environments and can undermine the...
The Software Testing Advantage: Model-Based Automation
Nov-07-2025
Artificial intelligence places new demands on data management, as it pulls from multiple data sources and configurations and ma...
Scaling Up Data Governance for AI
Nov-07-2025
Artificial intelligence makes analytics more accessible to non-technical users, but places new demands on data governance. Agen...
The Right Platform to Increase Data Access
Oct-30-2025
The cyberthreat landscape has changed. Adversaries are now organized, industrialized and backed by nation-states. Agencies oper...
Combatting the New Cyberthreats With Automation and AI
Oct-30-2025
Artificial intelligence is the double-edged sword of cybersecurity, both raising the risks and providing new and more effective...
Fighting Fire With Fire: Cybersecurity in the Age of AI
Oct-23-2025
Agencies often contend with legacy tech and data silos that develop over time, jeopardizing government readiness and creating s...
How to Fix the Fragmentation That Hinders Government Readiness
Oct-23-2025
Legacy technology and data silos often develop organically over time — as IT teams address individual challenges — but they und...
Overcoming the Fragmentation That Hampers Government Readiness
Jul-10-2025
As agencies look to transform their operations and services, their legacy digital communications and collaboration solutions ha...
How Digital Communication, Collaboration Service Can Transform Operations
Mar-07-2025
Internet connectivity is at the heart of most digital transformation efforts as agencies look to provide employees or constitue...
Digital Transformation: How to Reduce the Risks of Internet Connectivity
Mar-07-2025
As part of digital transformation efforts, agencies look to the Internet to deliver services to employees and constituents anyt...
How to Deliver Secure Connectivity Without Compromising Service
Dec-20-2024
Autonomous agents, one of the hottest developments in artificial intelligence, are poised to have a transformative effect both ...
What You Need to Know About AI Agents (and Why You Should Care)
Dec-20-2024
One of the hottest developments in artificial intelligence (AI) is the emergence of the autonomous agent, an advanced form of A...
How Autonomous AI Agents Could Transform Agencies
Nov-18-2024
As agencies accelerate their adoption of artificial intelligence-based solutions, they need to ensure the underlying data is AI...
How to Ensure Your Data Is AI-ready
Nov-18-2024
As agencies step up their efforts to leverage artificial intelligence (AI) and AI-based tools, they are quickly realizing they ...
How Data Hygiene Is Key to AI Initiatives
Jan-05-2023
The VPN has been a constant in the life of remote workers for such a long time, it's difficult to imagine another option. If th...
How to Break up With Your VPN (and Improve Security)
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Oct-19-2021
The adoption of hybrid cloud is becoming the norm for government IT operations. Unfortunately, ransomware and other cyber threa...
Your Playbook for Protecting Against Cyberattacks
Sep-15-2021
Walk through a case study of a federal agency responsible for insuring almost 8 million mortgage loans for properties in Americ...
A ‘How to Build the Plane While You Fly It’ Approach to Loan Modernization
Jul-13-2021
When measuring total cost of ownership on a Windows-to-cloud migration, there’s more to consider than just price. This video, c...
How to Build a Better Cloud Migration Strategy
Apr-16-2021
Information overload and low engagement are common to both in-person and virtual training. But no matter where government emplo...