Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Using Salesforce Gamification to Improve Sales Performance Using Salesforce Gamification to Improve Sales Performance Richard Dumas Regional VP, NewVoiceMedia Aug 31 2016 5:00 pm UTC 60 mins
    Would you like to improve sales performance, grow your active pipeline, increase calls made and meetings booked? Would you like to increase logging of new contact information and improve the overall usage of your CRM?

    Gamification for Salesforce can help you do just that by fostering teamwork, collaboration, and a healthy level of competition within your sales organization that will ultimately boost the performance of your sales team.

    During this webinar you will see a live demonstration of NewVoiceMedia Motivate working alongside Salesforce Sales Cloud and NewVoiceMedia ContactWorld for Sales.

    You will learn how to:

    - Analyze personality types and design incentives that will reward sales reps in a way that will energize them most
    - Run team competitions with incentives to drive performance
    - Increase sales performance through interactive, real-time leaderboards, alerts, recognition and comparisons
    - Use gamification techniques to encourage your inside sales team to make more calls and engage more prospects over the phone
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Informatica Cloud – An Introduction Informatica Cloud – An Introduction Phil Turton, Informatica Cloud Lead, UK & Ireland Sep 1 2016 10:00 am UTC 30 mins
    Cloud technology – cloud platforms (e.g. AWS and Azure) and cloud applications (e.g. Salesforce, Workday, Tableau) are becoming an increasingly prevalent constituent of a company’s enterprise architecture. Informatica Cloud is the Gartner market-share leader (22%) in the key “iPaaS” or “Cloud Integration” sector – technology to connect cloud to cloud or cloud back to an on-premise infrastructure. This presentation sets out the market context, Informatica product overview and position within Informatica’s strategy.
  • Big Data Innovation – From Experiment to Production Big Data Innovation – From Experiment to Production Matt Aslett - 451 Research Director, Data Platforms and Analytics with Aali Masood, Senior Director, Oracle Sep 1 2016 4:30 pm UTC 60 mins
    Big Data projects offer the promise of generating value from previously ignored or under-exploited data. Many enterprises are looking to take advantage of new data sources and combine that with the wealth of information they already hold about their customers, their business, even their competitors to develop new innovative applications and services, such as:

    · combining data from devices, sensors, customers, and analyze that in real time to react better and faster (example, location-based services)
    · pursue new opportunities in an adjacent markets – for example selling predictive maintenance services to the buyers of your products
    · accelerate time to market – for example identifying the most valuable customers and launching special programs to boost loyalty

    Innovation from Big Data is driven by experimentation to uncover new markets or data-driven products and services, as well as trying out new business processes, searching for new insights, and testing new hypotheses.

    However, a well-planned integration strategy is essential to putting this innovation to work in production business environments. The innovation may take advantage of new platforms, but to be taken into production it must work smoothly with existing systems and processes. No matter where the innovation came from, enterprises still need to access data, and figure out how to make it scale. This will involve not only the technology team, but business and strategic leaders as well.

    Join Oracle and 451 Research for a webinar exploring how to take advantage of big data opportunities by coordinating innovation and production. It covers how to manage rapid development in an environment with minimal control—together with the ability to migrate innovation into a production environment to support real-world needs that are constantly changing.
  • Briefings Part 1: The Digital Marketplace & Cybersecurity Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Sep 1 2016 5:00 pm UTC 75 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

    - Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

    - Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

    - Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • Jak platformy typu All-Flash Array zmieniają perspektywę składowania danych. Jak platformy typu All-Flash Array zmieniają perspektywę składowania danych. Bartosz Charliński, Systems Engineer, EMC Sep 2 2016 8:00 am UTC 60 mins
    Czy przyspieszenie aplikacji musi być kosztowne? Czy proces ich rozwoju i testowania musi być oparty o kompromisy związane z niską wydajnością i wysokim poziomem komplkacji? W czasie porannej kawy pokażemy Państwu jak w prosty sposób, z wykorzystaniem różnych rozwiązań All Flash zmienić podejście do serwowania i rozwoju swoich najbardziej wymagających aplikacji.
  • Digitale Transformation und die Auswirkungen auf Ihr Business Digitale Transformation und die Auswirkungen auf Ihr Business Jürgen A. Krebs Sep 2 2016 8:00 am UTC 60 mins
    Erfahren Sie unter anderem

    - wie Sie schneller als die Konkurrenz auf Innovationen reagieren können.
    - was Ihnen zu Umsatz für heute und auch morgen verhelfen kann
    - wie Sie Ihre eigene Unternehmenstransformation gestalten können

    und vieles mehr!
  • Manage any device, anywhere from a single console with HEAT LANrev Manage any device, anywhere from a single console with HEAT LANrev Margreet Fortune Sep 6 2016 9:45 am UTC 60 mins
    HEAT LANrev was Highly Commended in the recent Computing Vendor Excellence Awards in London - Mobile Management category.
    With the fragmentation of technology platforms and proliferation of mobile devices organisations today need a unified management approach for smart connected devices. Join this session to learn how HEAT LANrev can provide end to end multi-platform support for Windows, Mac, Linux, iOS and Android.
  • The FCA Says the Cloud is OK The FCA Says the Cloud is OK Greg Hanson, CTO & VP Cloud EMEA, Informatica & Andrew Joss, Head of Industry consulting – Financial Services, Informatica Sep 6 2016 1:00 pm UTC 60 mins
    The Financial Conduct Authority (FCA) has released guidance for all Financial Services Institutions considering outsourcing to the Cloud, advising a Hybrid or Cloud deployment fosters innovation which can be a driver for effective competition.

    Using a third party provider to integrate with cloud software can open a new world of opportunities including cost efficiencies, increased security and a more flexible infrastructure capacity. These benefits support effective competition.

    Join this webinar and learn:

    1.Trends and drivers of change in Financial Services
    2.The latest guidance, from the FCA, for firms outsourcing to the ‘cloud’ and what it means
    3.Cloud, Hybrid and on-Premise – why no one size fits all and why that’s ok
    4.The benefits and the opportunity available to Financial Services Organisations
  • Experts show how hackers perform web attacks which kills your site ranking Experts show how hackers perform web attacks which kills your site ranking Leon Brown - Product Marketing, Symantec Website Security & Avishay Zawoznik - Security Researcher, Imperva Incapsula Sep 6 2016 3:00 pm UTC 45 mins
    After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.
  • Microsoft Government Cloud: From Mobile to Big Data & More Microsoft Government Cloud: From Mobile to Big Data & More Alex Starykh & Chris Niehaus, Microsoft Sep 6 2016 6:00 pm UTC 60 mins
    Government organizations are undergoing a digital transformation. Across the U.S., government agencies are embracing the cloud, mobile computing, big data, and other advanced technologies to radically reduce operational costs and improve delivery of government services to citizens.

    Microsoft and its ecosystem of cloud solution providers are uniquely positioned to help federal, state, and local government organizations make this transformation. The Microsoft Government Cloud is among the most complete and secure clouds designed to meet the demands of U.S. government organizations.
  • 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 홍세진, 부장, HPE 소프트웨어 보안사업부, 휴렛팩커드 엔터프라이즈(HPE) Sep 7 2016 5:00 am UTC 60 mins
    공격자들은 지하 시장에서 점점 전문화 , 조직화하고 있으며, 공격 기법도 무서운 속도로 고도화하고 있습니다.
    정보 보호 업체인 “Websense Security Labs”이 미국, 영국, 캐나다, 호주의 IT관리자 1,000명 을 대상으로 조사한 결과 보고서에 따르면 대부분의 데이터 유출 사고는 “인가된 사용자”에 의해 이루어지고 있다고 합니다.
    또한 그 동안 국내/외 많은 보안 사고 사례를 통해 알 수 있듯이 대부분의 정보 유출 사고는 탈취된 정상 사용자 계정 권한을 이용해서 이루졌다는 사례를 언론 등을 통해서 접할 수 있었습니다.

    정보 유출 사고 예방을 위해 대부분의 보안 담당자는 이러한 알려진/알려지지 않은 다양한 보안 위협과 고도화된 내/외부에서 발생되는 위협을 식별 및 대응을 위한 위협 관리 체계의 필요성을 느끼고 있으며, 가트너에서는 향후 내/외부 다양한 보안 위협 예측 그리고 예방을 위해User Behavior Analytics (UBA) 사용은 필수이며, 2018년까지 최소 25%이상의 보안사고가 UBA 기술에 의해 탐지될 것이라고 리포트를 통해 예측하고 있습니다.

    프로파일링 기반 이상행위 분석은 정상적인 사용자 및 시스템의 행동과 적절한 연관성의 정상 기준선을 설정하고 사용자 및 동료 그룹 간 이상 현상을 실시간으로 분석을 통해 권한 보유 사용자의 비정상 행위를 시각화 및 위협 예측 그리고 예방합니다.

    또한 전체 IT 환경에 대한 보안을 더욱 민첩하고 지능적으로 변모하도록 요구하고 있으며, SIEM 보안 플랫폼과 연계 가능하며 UBA 기술은 알려진 위협과 알려지지 않은 위협에 관한 조치 가능한 정보를 생성하여, 사용자 및 시스템에 대한 세부적인 가시성을 제공함으로써 위협을 선제적으로 대응할 수 있는 보안 인텔리전스와 내부 위협를 보다 신속하게 해결할 수 있습니다.
  • Data Protection 101: Follow and protect your critical data, wherever it lives Data Protection 101: Follow and protect your critical data, wherever it lives Sunil Choudrie, Global Solutions Marketing Manager Sep 7 2016 10:00 am UTC 60 mins
    When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

    Organizations today face the following challenges:
    •Identifying the type of data that needs to be protected
    •Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
    •Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

    Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

    Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
  • Protection des données:comment gérer & protéger les données,où qu’elles résident Protection des données:comment gérer & protéger les données,où qu’elles résident Hervé Doreau, Directeur Technique – Symantec France Sep 7 2016 1:00 pm UTC 45 mins
    Lorsqu’il s’agit de vos données sensibles, comment pouvez-vous être certain qu’elles sont protégées et qu’aucune ne quitte votre environnement ?

    Les entreprises sont aujourd’hui confrontées aux difficultés suivantes :

    - Identifier le type de données à protéger
    - Contrôler l’accès aux données et garantir la confidentialité des identités, en particulier face aux fortes amendes prévues par la réglementation
    - Empêcher les fuites de données en dehors de l’organisation, les mégafuites et pertes de données s’accroissant d’année en année. 

    En 2015, plus d’un demi-milliard d’enregistrements personnels ont été dérobés ou perdus, et les campagnes de spear-phishing à l’encontre des salariés d’entreprise ont augmenté de 55 %.

    Dans un premier temps, il convient de permettre aux bonnes personnes d’accéder aux données pertinentes, où qu’elles se trouvent, en contrôlant l’accès, en surveillant les flux et en évitant qu’elles tombent entre de mauvaises mains. Vous pouvez alors facilement passer à la seconde étape : appliquer des politiques qui contrôlent l’accès aux données et leur utilisation, que ce soit sur le cloud, les appareils mobiles ou le réseau.

    Assistez à un webinaire Symantec sur les derniers enseignements tirés en matière de protection des données pour l’ensemble des applications qui composent votre environnement.
  • Deep-dive into Linux Based Applications on Microsoft Azure Deep-dive into Linux Based Applications on Microsoft Azure Jose Miguel Parrella, Open Source Product Manager, Microsoft Corporation Sep 7 2016 6:00 pm UTC 60 mins
    As a follow-up to the previous highly rated session, this session will deep dive into all the relevant features of enterprise development pertinent to an open source developer. It’s no surprise that one in three Virtual Machines in Azure run Linux. In fact, over 60% of the images provided by our application partners in Azure Marketplace are Linux-based and chances are you are running applications on top of Linux as well.

    Which applications are a better fit for the cloud, and what are common use cases and patterns for them? How can Azure provide a first-class experience for your Linux-based applications?

    Attend this webcast to discover:

     How Docker, LAMP, Gluster, JBoss, Hadoop and MySQL enterprise-grade applications running on top of Linux can benefit from Azure.

     How Azure offers you a hyper-scale, open and flexible cloud platform that adds value to your existing investments.

     The powerful architectures made possible with Azure Resource Manager and more.
  • Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Protezione dei dati 101: come gestire e proteggere i dati critici, ovunque siano Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Cyber Security Symantec Strategist Sep 8 2016 8:00 am UTC 45 mins
    Quando le comunicazioni condividono dati sensibili, come puoi assicurarti che siano protetti e non filtrino fuori dal tuo ambiente?

    Le aziende oggi devono affrontare le seguenti sfide:

    - Identificare il tipo di dati da proteggere
    - Controllare l’accesso ai dati e garantire la riservatezza delle identità, soprattutto per non esporsi a pesanti sanzioni normative
    - Prevenire le fughe di dati sensibili, considerato che il numero di grandi violazioni e perdite di dati aumenta di anno in anno. 

    Nel 2015, infatti, oltre mezzo miliardo di dati personali sono stati rubati o persi e, nello stesso anno, le campagne di spear phishing contro i dipendenti aziendali sono aumentate del 55%

    Qual è il primo passo? Consentire a specifici utenti di accedere a specifici dati, ovunque siano, monitorando il flusso dei dati per evitare che cadano nelle mani sbagliate. Il secondo: la semplice applicazione di policy per controllare accessi e uso dei dati su cloud, sui dispositivi mobili e/o sulla rete.

    Partecipa al webinar Symantec per sapere come proteggere i dati in molte applicazioni del tuo ambiente.
  • Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Cómo gestionar y proteger sus datos críticos, sin importar dónde estén Ramsés Gallego - Symantec Strategist Sep 8 2016 9:00 am UTC 45 mins
    Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

    En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

    - Identificar los tipos de datos que se deben proteger.
    - Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
    - Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

    En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

    El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

    Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.
  • Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Datensicherheit:Schutz & Verwaltung kritischer Daten, unabhängig von Speicherort Alexander Peters, Senior Manager Office of the CTO - Symantec Germany Sep 8 2016 12:00 pm UTC 45 mins
    Wie können Sie sicher sein, dass wichtige Daten geschützt sind und Ihre Umgebung nicht verlassen?

    Unternehmen stehen vor verschiedenen Herausforderungen. Sie müssen:

    - Die Art von Daten identifizieren, die geschützt werden sollen.
    - Den Zugriff auf Daten kontrollieren und sicherstellen, dass Identitätsdaten nicht offengelegt werden, insbesondere angesichts empfindlicher Bußgelder.
    - Verhindern, dass vertrauliche Daten das Unternehmen verlassen – Mega-Datenpannen und Datenverlust nehmen Jahr für Jahr zu. 

    2015 wurden mehr als eine halbe Milliarde Datensätze mit persönlichen Informationen gestohlen oder gingen verloren und die Anzahl von Spear-Phishing-Kampagnen, die auf Mitarbeiter in Unternehmen abzielten, stieg um 55 %.  

    Der erste Schritt besteht darin, den richtigen Personen von überall aus Zugang zu den entsprechenden Daten zu ermöglichen, indem Sie den Zugriff steuern, den Fluss der Daten überwachen und dafür sorgen, dass sie nicht in falsche Hände geraten.  Anschließend setzen Sie dann Richtlinien durch, um Zugriff und Nutzung zu kontrollieren – in der Cloud, auf Mobilgeräten oder im Netzwerk.

    Nehmen Sie an einem Webinar von Symantec teil, in dem es um gewonnene Erkenntnisse in Bezug auf den Schutz von Daten für die zahlreichen Anwendungen in Ihrer Umgebung geht.
  • HR Transformation on Oracle Cloud HR Transformation on Oracle Cloud Clayton Royal - Oracle Competency Leader, Dell Application Services Sep 8 2016 3:00 pm UTC 60 mins
    As the corporate world becomes more and more talent oriented and outcome driven, modern human resource (HR) applications need to be able to help recruit, reward and retain the best while providing timely actionable insights into employee behavior to HR managers and decision makers. Oracle Human Capital Management Cloud (HCM) delivers a modern, social and engaging solution for HR processes.

    Attend this live webinar to see how Dell Services can help you transform your HR organization using Oracle HCM Cloud and our deploy, optimize and transfer engagement model.

    In this interactive webinar, you will learn about:

    - Why more and more organizations are adopting Oracle cloud-based HR solutions
    - How you can transform your HR landscape with Dell Human Resources Transformation Services
    - How our outcome-based offering can help you define a robust HR roadmap, enable rapid implementation and ensure business process assurance
  • Modelling Deep Learning and Data Science enablement with Juju Modelling Deep Learning and Data Science enablement with Juju Samuel Cozannet, Strategic Program Manager, Canonical Sep 8 2016 3:00 pm UTC 45 mins
    Artificial Intelligence is definitely the buzzword for 2016, and there is a good chance it will continue to be a hot topic in 2017. However from an operational standpoint, there are still no reference implementation of an integration data science pipeline applied to Deep Learning.

    In this webinar, we will discuss the challenges faced by data scientists when assessing which solutions will best suit their needs. We will then show how data science teams can leverage Juju to rapidly model various alternatives, making the decision making process much more agile.
  • Retail Disruption - How GANT Tackled Omnichannel Retail Disruption - How GANT Tackled Omnichannel Kiku Mlosch, Global E-Commerce Project Manager, GANT and Gustav Rosen, Integration Architect, Entiros Sep 8 2016 5:00 pm UTC 60 mins
    Retail stands as one of the most digitally disrupted industries to date with over 60% of purchases now said to be influenced by digital interactions, according to Deloitte. Against this backdrop, global retailer GANT is trailblazing a strategy which enables digital transformation to be the catalyst for innovation within the GANT ecosystem.

    Hear direct from Kiku Mlosch, Global E-Commerce Project Manager at GANT, and supporting partner Gustav Rosen, Integration Architect at Entiros, as they reveal their journey and approach to making omnichannel “a piece of cake”.
  • HPC Trends in the Trenches Update HPC Trends in the Trenches Update Chris Dagdigian, BioTeam Sep 8 2016 5:00 pm UTC 60 mins
    Chris Dagdigian, co-founder and CTO of BioTeam, Inc., delivers a candid assessment of the best, the worthwhile, and the most overhyped information technologies (IT) for life sciences. He’ll cover what has changed (or not) in the last year regarding infrastructure, storage, computing, and networks. This presentation, designed for those responsible for information management and support in research institutes, will help you understand what technologies will help you build and support data intensive science.

    This webinar is sponsored by Avere Systems and is being presented in cooperation with AIRI (airi.org).

    We'll also highlight exciting content to be unveiled at the 2nd Annual Converged IT Summit coming to San Diego in October. You won't want to miss it!
  • Key to Productivity & Collaboration: The Right Project Management Tools Key to Productivity & Collaboration: The Right Project Management Tools Prasanna Adavi Partner, EPMA, Inc. Microsoft Project MVP Sep 8 2016 6:00 pm UTC 60 mins
    Project Management can mean different things to different people, depending upon the kind of work they do. In that context, it becomes very important to select the right tool for the job at hand.

    Microsoft Office 365 suite has many products that enable project management and collaboration at various levels of maturity of organizations. Project Online, Office 365, SharePoint Online, and Planner each give a different set of capabilities to the users. It is extremely important to select the right tool for the right work, to help maximum productivity and efficiency.

    This session will cover each of these products and discuss when these tools are appropriate and what can and cannot be achieved with them.