̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

BentleyLOGO_BLK_type.png
Bentley Systems

Better Predict and Understand Vulnerabilities of Drainage Systems


Event Date: September 07, 2023
Hosted By: Bentley & ̽»¨ÊÓÆµ

Urban flooding poses risks to residents, property, and infrastructure, and disrupts urban services. Hydraulic simulations help engineers to better predict and understand vulnerabilities like water velocities, depth, and floodwater extent. That understanding leads to more resilient drainage systems and more consistency maintaining utility service.

OpenFlows SewerGEMS has long offered fully dynamic, 1D analysis capabilities to help engineers design and assess hydraulic systems. It now also provides new tools for connecting 1D network elements with 2D overland flows. This integrated 1D/2D analysis provides a more detailed picture of flooding extents and impacts, helping engineers as they contend with increased flood frequency and severity, aging infrastructure, and other design challenges.

Access this on-demand webinar to explore the latest functionality, features, and benefits of using OpenFlows SewerGEMS for your collections systems modeling.

In this webinar, you will learn about:

  • Model applications and benefits of integrated 1D/2D hydraulic analysis

  • 2D Hydraulic Modeling features and tools available in OpenFlows SewerGEMS

  • 2D model results visualization


Fill out the form below to view this archived event.


Resources


Infoblox for Protective DNS
Solutions Brief

Infoblox for Protective DNS

With cybercrime on the rise, CISA and other US agencies have issued robust directives, some of which mandate the adoption of Protective DNS Services (PDNS). PDNS leverages DNS protocol and architecture as a pivotal security checkpoint to scrutinize DNS queries and implements proactive measures against various threats including malware Command and Control (C&C), ransomware, Domain Generation Algorithms (DGAs), phishing, and more.


Fill out the form below to view this Resource.