̽»¨ÊÓƵ

̽»¨ÊÓƵ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Smartsheet-Logo-70height_1.png
Multi-Vendor

Building Enterprise Applications on Smartsheet with Huddle


Event Date: March 06, 2025
Hosted By: Smartsheet, Cronos Consulting Group & ̽»¨ÊÓƵ
We hosted an insightful webinar that explored how Huddle transformed Smartsheet into a powerful enterprise application development platform. Designed to extend Smartsheet’s native capabilities, Huddle introduced intuitive portal interface functionalities and advanced configuration management tools, enabling teams of all skill levels to streamline workflows and drive efficiency. Whether your focus had been on optimizing collaboration, managing complex workflows, or scaling operations, this webinar demonstrated how Smartsheet and Huddle together empowered enterprises.
 
What Participants Learned
  • In Real-Time App Development: We built an application in Smartsheet and exposed it in Huddle in real time.

    Intuitive Portal Interface: Participants discovered how Huddle’s user-friendly portals allowed teams to interact seamlessly with Smartsheet processes. Task execution was simplified, and adoption was accelerated with minimal training.

Who Attended

  • This webinar was ideal for IT leaders, business managers, and process owners who sought to modernize enterprise workflows, streamline service delivery, and maximize their investment in Smartsheet.

Fill out the form below to view this archived event.


Resources


Creating a Future-Ready Security Operations Center
Solutions Brief

Creating a Future-Ready Security Operations Center

Whether they have a formal security operations center (SOC) or a small team of one or two cybersecurity personnel, state and local governments and education institutions face a changing world when it comes to monitoring for, identifying and responding to today’s threats. An explosion of new devices and endpoints: the expansion of organizational boundaries, and a nonstop volley of phishing, ransomware and other attacks have put enormous pressures on security analysts.


Fill out the form below to view this Resource.