Hi [[ session.user.profile.firstName ]]

E-commerce

  • 7 common web application security attacks & what you can do to prevent them
    7 common web application security attacks & what you can do to prevent them
    Jon Wallace, Technologist at Instart Recorded: Jul 18 2019 63 mins
    Join Instart Technologist, Jon Wallace, to learn about the 7 most common website and web application attacks and how you can prevent them with the right preparation.

    Anyone who operates a website should be concerned about security, especially the security of your sensitive customer information - this much should be obvious to you by now. However, unless you keep an ear to the ground about security news, it is often only the most high profile or sophisticated attacks that you actually hear about. The reality is that common, low level attacks are executed every single day against websites and web applications. There is a reason the OWASP top 10 hasn’t changed in years. The good news is these types of attacks are preventable with the right preparation.


    In this webinar, you will learn:

    -What motivates hackers
    -What makes an application a target
    -What are the 7 most common website and web application attacks
    -How you should protect your assets
  • Achieving and maintaining compliance with NYDFS cybersecurity regulation
    Achieving and maintaining compliance with NYDFS cybersecurity regulation
    Antonio Anderson, Executive Director -Trustmark, John Ford, Founder&CEO - Sienna group, Yomar Rosendo, Director - Informatica Recorded: Jul 18 2019 40 mins
    Join us for this case study that takes you through a NYDFS compliance journey featuring Trustmark, Sienna Group and Informatica. Three thought leaders who bring a wealth of experience share how organizations are protecting their most sensitive information. Learn the importance of the regulation and how leading organizations are able to get ahead of critical mandates using innovative technologies that support data privacy governance along with data retention requirement in mind that create risk. Hear from the experts and start your journey to NYDFS compliance today!
  • 4 ways to improve customer retention - for B2B SaaS companies
    4 ways to improve customer retention - for B2B SaaS companies
    Arun Trivedi Recorded: Jul 17 2019 20 mins
    According to Gartner, 34% Product Marketers at Technology & Service Providers select retaining clients as one of their most important challenge. Growth continues to be a strategic business priority for CEOs. This webcast presents 4 strategies companies can adopt to improve customer retention & grow the business
  • Chop Suey mit Pommes - CIAM von Amerika bis China
    Chop Suey mit Pommes - CIAM von Amerika bis China
    Dr. Heiko Klarl, CMO, iC Consult Group und Kaltrina Ademi, Channel Manager, Central Europe & South Africa, Ping Identity Recorded: Jul 15 2019 47 mins
    Die digitale Transformation, weltweite neue digitale Geschäftsmodelle und technologische Trends wie künstliche Intelligenz werden die Kundenbeziehungen revolutionieren. Es wird unabdingbar, die Kommunikation mit dem Kunden weltweit zu personalisieren und ihn stets im richtigen Kontext anzusprechen. Basis dafür ist ein integriertes Kundendatenmanagement, das neue Vertriebspotenziale erschließt und das Kundenerlebnis verbessert.

    In diesem Webinar erfahren Sie:
    Mehr über die strategischen Herausforderungen, die mit der Einführung von Customer Data Management-Lösungen einhergehen, und wie diese angegangen werden können: Von Time-to-Market-Anforderungen über den internationalen Rollout von Amerika bis China bis hin zur Unterstützung neuer Services bei Fusionen & Übernahmen.
  • What British Airways teaches us about web skimming attacks & avoiding GDPR fines
    What British Airways teaches us about web skimming attacks & avoiding GDPR fines
    Andy Wyatt, Sr. Technologist at Instart Recorded: Jul 12 2019 13 mins
    Recently, the first GDPR fine was imposed against British Airways for the Magecart breach of its website. Shocking news to the world, this huge hit cost British Airways 1.5% of their 2017 revenues. As one of the most common threats behind attacks these past few years, it's come time for organizations to develop a strategy for dealing with web security threats like Magecart.

    Join our security expert, Andy Wyatt, and learn:
    -What is a web skimming attack
    -What is your responsibility as a website owner
    -How to avoid GDPR fines related to web skimming
  • Why security teams need a Magecart plan
    Why security teams need a Magecart plan
    Andy Wyatt, Sr. Technologist at Instart Recorded: Jul 12 2019 18 mins
    It was only last year when British Airways failed to prevent a data breach leading to a $230 million fine. And now, news has broken that over 900 eCommerce sites were recently compromised by a Magecart attack in a digital skimming campaign. As hackers continue to exploit vulnerabilities exposed in eCommerce platforms and third party tools that allows Magecart to be on a site, organizations need to take the next step to ensure their customers' data is secure.

    Join Andy Wyatt, Sr. Technologist, to learn:

    -Why companies need a contingency plan for Magecart
    -Why Magecart is so dangerous
    -How to prevent Magecart from stealing your customers' data
  • Beyond the Hype: A Wirecard Labs view on blockchain opportunities
    Beyond the Hype: A Wirecard Labs view on blockchain opportunities
    Jannis Riesz, Vice President of Wirecard Labs Recorded: Jul 11 2019 38 mins
    Is blockchain just a hype, or is there more to the much-discussed technology? In this webinar, we will start off discussing the potential of blockchain and will acquire a holistic understanding of the technology. Next, we will discuss blockchain from the perspective of Wirecard’s innovation engine: Wirecard Labs. Our innovation team entered the blockchain world in 2018 and since then has explored many exciting opportunities for the company, which you will hear about in this webinar. Last but not least, we will present some of the world’s most exciting blockchain use cases.

    Here are your key takeways from this webinar:

    * Look beyond the blockchain hype – rise, hype & fall
    * See how Wirecard Labs is exploring opportunities in blockchain
    * Learn about some exciting blockchain initiatives
    * Discover the outlook of blockchain technologies

    Join Jannis Riesz, Vice President of Wirecard Labs, as he discusses the potential of blockchain and presents exciting use cases and initiatives from diverse industries around the world.
  • Data Governance: Achieving Sustainability Among Whiners
    Data Governance: Achieving Sustainability Among Whiners
    Seth Maislin, Principal Consultant, Earley Information Science & Seth Earley, CEO, Earley Information Science Recorded: Jul 10 2019 60 mins
    Let’s face it - no one likes the ‘G’ word. It’s too often a sour antidote to excitement and nimbleness: Triple checks, security barriers, privacy forms, council reviews. It’s as awful as pulling teeth and paying taxes, right?

    Thankfully it doesn’t have to be, and many organizations have found an effective rhythm for long-term, sustainable data stewardship.

    Join us on Tuesday, August 28th, at 11:00 AM ET as we discuss ‘Data Governance: Achieving Sustainability Among Whiners,’ where we’ll explore how you can implement this necessary rhythm, even if you’re surrounded by governance resistors.

    You will learn:

    1.Good governance is empowering, not (only) a “necessarily evil”
    2.The Effective As: Automation, Assignment, Attitude
    3.Analytics for achieving fast failure (and recovery)

    Speakers:
    Seth Maislin is a Principal Consultant with Earley Information Science. For more than 20 years he has demonstrated strengths in classification and taxonomy, indexing and content modeling, information architecture, search, and usability. He has dedicated the last 10+ years to providing sustaining information management solutions to clients facing real and complex findability challenges.

    Seth Earley is the Founder and CEO of Earley Information Science. An expert with 20+ years experience in Knowledge Strategy, Data and Information Architecture, Search-based Applications and Information Findability solutions. Seth has worked with a diverse roster of Fortune 1000 companies helping them to achieve higher levels of operating performance by making information more findable, usable and valuable through integrated enterprise architectures supporting analytics, e-commerce and customer experience applications.
  • Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Ramesh Veerappan, Shawn Petway, - Railinc, Dharma Kuthanur- Informatica Recorded: Jul 10 2019 58 mins
    As Railinc modernizes its data infrastructure, critical data has become distributed across Oracle, data lake and tools like SAS, and business users have been challenged to find and understand the data they need. Railinc embarked on a major effort across business & IT to address this problem by cataloging all data assets and adding business context to the data to enable easy search and discovery. Confidence in the data was improved through visibility into how datasets were created and business descriptions and tags that added business context, along with a focused/phased approach to drive business user adoption. Railinc will share valuable lessons and best practices related to both: (1) deployment and scaling; (2) driving business user adoption.
  • Is the End of Cookies Near?: What ITP 2.x Is and How to Navigate
    Is the End of Cookies Near?: What ITP 2.x Is and How to Navigate
    Ty Gavin, VP of Software Development, Tealium Recorded: Jul 10 2019 57 mins
    The GDPR and CCPA have put digital privacy at the forefront of consumers’ concerns. With its Intelligent Tracking Prevention (ITP), Apple is leveraging consumer concerns to promote the security of their browser, Safari.

    The question for marketers and data professionals is whether ITP’s changes to cookies will alter their data and analytics strategies. When Apple first introduced ITP in 2017, it disrupted third-party ad tech companies and their ability to create cross-site tracking. With ITP 2.x this year, Apple has updated how Safari, the most popular mobile browser in the U.S., handles first-party cookies.

    The changes to first-party cookies will have a big impact on personalized mobile campaigns for seasonally-driven industries and campaigns in mobile browsers (i.e. Safari). Short-term workarounds are available to digital marketers, but they may be quickly undone as Apple works to clamp down on them in subsequent updates.

    Join this webinar and learn how to build a better long-term strategy that balances the customer experience with customer privacy, as well as:

    - A deeper understanding of ITP’s limitations
    - Gaining clarity on the true impact it has on analytics
    - Key strategies to improving implementation of first-and-third-party cookies
    now and in the future
    - Ideas for Customer Experience and Marketing teams to improve cookies-related experiences like authentication
  • National Minimum Wage: Identifying and Mitigating Risk
    National Minimum Wage: Identifying and Mitigating Risk
    BRC, PwC Recorded: Jul 10 2019 41 mins
    In this webinar, with experts from PwC, we will discuss progress with regulatory reform, delve into the complexity of the current legislation and provide practical advice on how to manage risk as the legislation evolves (including the current NMW consultation), all brought to life with a number of case studies.
  • How to Secure Code Signing at the Speed of DevOps
    How to Secure Code Signing at the Speed of DevOps
    Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor Recorded: Jul 9 2019 46 mins
    When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.

    As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.

    Join our experts as they discuss:
    - Code Signing: What is it? Why does it matter?
    - Recent Attacks: The Risks and Challenges of Code Signing
    - How to Secure Code Signing at the Speed of DevOps
    - How Thales and Keyfactor Make It Possible
  • Operating Off-the-shelf IAM with a DevOps methodology
    Operating Off-the-shelf IAM with a DevOps methodology
    Tim Hobbs, DevOps Evangelist, iC Consult Group Recorded: Jul 3 2019 38 mins
    IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can be adjusted at the same pace. Modern data centers are configuration-driven, resilient environments designed to meet rapidly changing application needs, and modern IAM solutions must be in line with this paradigm.
    Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's micro-service-enabled, service-mesh-oriented infrastructure expects simple, resilient, self-discovery services instead of brittle monoliths that rely on manual configuration.
    Operating IAM products with a DevOps setting in terms of automation, repeatability, and continuous improvement is possible through close collaboration between IAM, application, and infrastructure experts.
  • Turning your Documentation into Answers Using Taxonomy
    Turning your Documentation into Answers Using Taxonomy
    Lawrence Orin Recorded: Jun 27 2019 60 mins
    In today's world, like it or not, your documentation is part of your company's overall digital experience. The goal of your content must be to provide relevant answers to technical questions about your product as quickly as possible. In most tech-related businesses, technical content resources make up the large majority of content assets across your web presence, providing potential for the greatest impact on the overall digital experience and customer satisfaction. In this session we will demonstrate how taxonomy helps you to facilitate that excellence in personalized content delivery.

    Join Paul Perrotta, The Technical Communication Wrangler, and his special guest, Lawrence Orin, Product Evangelist and Customer Implementation Expert for Zoomin Software for this free, one-hour webinar.
  • Is Your Company’s Data Ready for Machine Learning?
    Is Your Company’s Data Ready for Machine Learning?
    Ted Sfikas, Director of Solutions Consultants, North America and LATAM, Tealium Recorded: Jun 27 2019 47 mins
    Machine Learning (ML) is a new field, and there is a competitive advantage to those first adopters. Yet, many companies are buying ML technologies and developing strategies before they have taken the appropriate step back to evaluate whether their data is ready or not.

    In this webinar, we’ll explore the evolution of Machine Learning as part of the broader data science discipline, and discuss why the fundamental need for data readiness is so crucial. Learn key steps to evaluate the readiness of your data and review how a governed data supply chain using automated orchestration can deliver a reliable engine for Machine Learning platforms today.
  • 3 ways to navigate your way to Business Transformation enabled by digital
    3 ways to navigate your way to Business Transformation enabled by digital
    Arun Trivedi Recorded: Jun 26 2019 42 mins
    Digital Transformation is dead! As you plan your journey, one of the first steps is to think about what needs to be done, why and how. The webinar presents 3 ways to navigate your way without losing track of your goal(s).

    Each path has its own set of focus areas. Irrespective of he approach you take, their are 6 dimensions of transformation that you must plan around to be successful.
  • The financial impact of a cyber-attack
    The financial impact of a cyber-attack
    James Martin, Crime and Security Advisor, BRC & Giles Taylor, Head of Data & Cyber Security, Data Services, Lloyds Bank Recorded: Jun 26 2019 56 mins
    In a world of increasing digitalisation, where homes, businesses and wider infrastructure are more connected than ever, the impact associated with cyber-attacks is growing.

    Cyber threat to business should be taken seriously, The BRC Crime Survey 2019 reported that between 1st April 2017 to 31st March 2018 the combined cost of spending on crime prevention and losses from crime to the industry was £1.9 billion, and although retailers are spending 17% more on cybersecurity than last year, nearly 80% of the retailers surveyed have seen an increase in the number of attacks and/or breaches.

    BRC and Lloyds are coming together to support BRC members to understand and manage their financial exposure to potential cyber-attacks.

    This webinar will discuss the evolution of the cyber threat and will help prepare retailers on the steps they can take not only to prepare but how to both respond and recover financially and operationally from an attack.
  • Kafka, Cassandra and Kubernetes: Real-time Anomaly Detection at Scale
    Kafka, Cassandra and Kubernetes: Real-time Anomaly Detection at Scale
    Paul Brebner Recorded: Jun 25 2019 45 mins
    Apache Kafka, Apache Cassandra and Kubernetes are open source big data technologies enabling applications and business operations to scale massively and rapidly. While Kafka and Cassandra underpins the data layer of the stack providing capability to stream, disseminate, store and retrieve data at very low latency, Kubernetes is a container orchestration technology that helps in automated application deployment and scaling of application clusters. In this webinar, we will discuss how we architected a massive scale deployment of a streaming data pipeline with Kafka and Cassandra to cater to an example Anomaly detection application running on a Kubernetes cluster and generating and processing massive amount of events. Anomaly detection is a method used to detect unusual events in an event stream. It is widely used in a range of applications such as financial fraud detection, security, threat detection, website user analytics, sensors, IoT, system health monitoring, etc. When such applications operate at massive scale generating millions or billions of events, they impose significant computational, performance and scalability challenges to anomaly detection algorithms and data layer technologies. We will demonstrate the scalability, performance and cost effectiveness of Kafka and Cassandra, with results from our experiments allowing the Anomaly detection application to scale to 19 Billion anomaly checks per day.
  • Staying ahead of the security challenges of modern web apps
    Staying ahead of the security challenges of modern web apps
    VP, Research Director at Forrester Research, Amy DeMartine and Chief Customer Officer at Instart, Mitch Parker Recorded: Jun 25 2019 48 mins
    Join VP, Research Director at Forrester Research, Amy DeMartine and Chief Customer Officer at Instart, Mitch Parker, to learn how you should be thinking about web app security as the web continues to evolve.

    In this webinar, you will learn:
    -About the changing threat landscape of modern web apps, and where your security teams should be spending their time
    -How attacks are becoming more sophisticated and harder to differentiate from real human traffic
    -How existing CDN and edge architectures fall short of protecting your web applications
    -Why going beyond the edge, and into the browser, is the only way to prevent sophisticated attacks
    -How Instart is the only platform to combine an intelligent cloud service with a browser virtualization layer for complete visibility and protection against both application threats as well as emerging threats
  • Industrial Data 4.0: Observations from the Frontlines
    Industrial Data 4.0: Observations from the Frontlines
    Stephan Zoder, Informatica Sr Dir Industry Consulting and Malik Azeez, Paradigm Technology Dir of PIM Recorded: Jun 25 2019 52 mins
    In far too many manufacturing organizations, data is treated as overhead instead of a strategic advantage. In this webinar, Informatica and Paradigm Technology will explore the convergence of Operational and Information Technology and how data management plays an integral part in realizing key benefits from business-transformational projects. In order to support an Industry 4.0 world, a Data 4.0 precursor is a must-have requirement.
  • How to start using the Luminati Proxy Manager
    How to start using the Luminati Proxy Manager
    Roi Paz, Product Manager Recorded: Jun 19 2019 10 mins
    Learn how to start with Luminati’s Proxy Manager.

    Agenda:
    - What is the Luminati Proxy Manager
    - Proxy ports and preset’s
    - IP rotation
    - Long single session
    - Geo, ISP, ASN and carrier targeting
    - Success metrics
    - HAR viewer and session logs
  • How to create a web performance budget for third-party tags
    How to create a web performance budget for third-party tags
    James Carter, Senior Sales Engineer Recorded: Jun 18 2019 30 mins
    More than half the content on modern websites comes from third-party services. While this enables businesses to easily leverage personalization, tracking, and other advanced functionality like live chat — this also means that a website must rely on performance and security of third parties.

    Finding a way to manage and monitor these services is critical to ensuring the performance and reliability of your website. However, many organizations struggle since multiple teams can add new third-party services which exist outside of your dedicated monitoring and control systems.
  • Mobile Apps and Single Sign-On
    Mobile Apps and Single Sign-On
    Andre Priebe, CTO, iC Consult Group Recorded: Jun 14 2019 57 mins
    When it comes to integrating mobile apps into the single sign-on environment, conflicts of interest often arise between designers, IT security, and what the customer really wants.

    What influence does the chosen login procedure have on security, and which approaches have proven themselves in practice? What compromise could satisfy the customer and still offer a sufficient level of security? Discover current best practices and find out what role OAuth 2.0 plays in them.

    1. Conflict of interest – designer, end customer, and IT security
    2. Influence of login method on user satisfaction
    3. Security assessment
    4. Best practices, procedures, and recommendations
    5. OAuth 2.0 as a possible solution
  • Mobile Apps und Single Sign-On
    Mobile Apps und Single Sign-On
    Andre Priebe, CTO, iC Consult Group Recorded: Jun 13 2019 61 mins
    Wenn es um die Integration von Mobile Apps in die Single Sign-On-Umgebung geht, dann entstehen oft Interessenskonflikte zwischen Designern, der IT-Sicherheit und dem, was der Kunde wirklich möchte.

    Welchen Einfluss hat das gewählte Login-Verfahren auf die Sicherheit und welche Ansätze haben sich in der Praxis bewährt? Wie kann ein Kompromiss aussehen, der sowohl den Kunden zufriedenstellt, aber trotzdem ein ausreichendes Sicherheitsniveau bietet? Erfahren Sie, welche Best Practices es gibt und welche Rolle OAuth 2.0 dabei spielt.

    Interessenskonflikt – Designer, Endkunde und die IT-Sicherheit
    Einfluss der Login-Methodik auf die Benutzerzufriedenheit
    Sicherheitsbetrachtung
    Best-Practices, Vorgehensweisen und Empfehlungen
    OAuth 2.0 als Lösungsoption
  • Introducing Certified Apache Cassandra
    Introducing Certified Apache Cassandra
    Ben Slater, Chief Product Officer, Instaclustr Recorded: Jun 11 2019 28 mins
    Gain confidence to build on open source Apache Cassandra

    Introducing the Instaclustr Open Source Certification Framework and Certified Apache Cassandra. Learn about Instaclustr's new Open Source Certification Framework and first certified product, Apache Cassandra. The certification framework aims to build on Instaclustr’s extensive open source experience to provide additional assurance to companies that the open source software they are building on is robust and well supported. This webinar will explain the details of the framework and the certification process for Apache Cassandra.

    Bio: Ben Slater, Chief Product Officer at Instaclustr. As Chief Product Officer, Ben is charged with steering Instaclustr’s development roadmap and overseeing the product engineering, production support, open source and consulting teams. Ben has over 20 years experience in systems development including previously as lead architect for the product that is now Oracle Policy Automation and over 10 years as a solution architect and project manager for Accenture. He has extensive experience in managing development teams and implementing quality controlled engineering practices.
  • How to Win in Business with Content Intelligence
    How to Win in Business with Content Intelligence
    Colleen Jones Jul 23 2019 5:00 pm UTC 60 mins
    Make smarter content decisions for better business results with content intelligence. That sounds great, but how?

    Join Scott Abel, The Content Wrangler, for this free, one-hour webinar with Colleen Jones, CEO of Content Science, and learn why content decisions are like playing poker. This webinar reveals secrets to succeeding with content intelligence inspired by world-class poker.

    Three Takeaways:

    • Recognize three types of content decisions that benefit from content intelligence.
    • Understand four ways content intelligence can improve content decisions.
    • Find out what it takes to win big on content.

    ABOUT COLLEEN JONES

    A content expert and Star Wars fan, Colleen Jones is the founder of Content Science, a content strategy and intelligence firm where she has advised or trained many of the world's leading organizations to become Jedi Masters of digital content. She is also the former head of content at MailChimp, the marketing platform recognized by Inc. as 2017 Company of the Year. Colleen has earned recognition as one of the Top 50 Most Influential Women in Content Marketing by a TopRank study, a Content Change Agent by the Society for Technical Communication's Intercom Magazine, and one of the Top 50 Most Influential Content Strategists.
  • Content Meets Data: Building Bridges using Knowledge Graphs as a Base
    Content Meets Data: Building Bridges using Knowledge Graphs as a Base
    Thomas Burg & Rahel Anne Bailie Jul 24 2019 3:00 pm UTC 60 mins
    Large tech companies have been hoarding data and information for years, many of it sitting in various departments, untouched. Organizations are beginning to understand the need for automation to process all of their unstructured and structured data into meaningful knowledge, helping to drive content and creating new forms of distribution channels with the help of augmented intelligence. 

    Join Paul Perrotta, The Technical Communication Wrangler for this free one-hour webinar. Paul’s special guests will be Thomas Burg, Business Solution Architect at Semantic Web Company (PoolParty), and Director of Content for Babylon Health, Rahel Anne Bailie. Attendees will learn about leveraging an organization’s content offerings and how to optimize its production and delivery to help meet your goals.

    This webinar will also discuss the importance of using Semantic AI in Knowledge Graphs, including:

    • Learning how to develop and deliver strategic content solutions based on semantic knowledge models

    • Showing you how to link content to external data sources and the benefits it can bring to a content strategy

    • Demonstrating to data engineers how to benefit from semantic text mining

  • [#ContentOps] Content Operations: Myths vs. Facts
    [#ContentOps] Content Operations: Myths vs. Facts
    Moderator: Rahel Bailie. Panelists: France Baril, Angus Edwardson, Jörg Schmidt, and Deane Barker Jul 24 2019 5:00 pm UTC 60 mins
    Content operations is an emerging practice, aimed at scaling content production, for more efficiency while maintaining content quality.

    We know what we want, and why we want it, but the most misunderstood question is how do we go about it? Are the tools, skills, and processes we have today good enough? Is it a matter of adding more sprints to our agile board, or putting more business rules into the CMS? Or do we need to get our inspiration by thinking outside the box?

    Join veterans in the content field, who have developed models for large-scale content operations inside multinationals and government agencies, as they separate fact from fiction and provide some perspective on this new area of ContentOps.
  • How Customer Data Maturity Powers the Modern Enterprise (Part 1)
    How Customer Data Maturity Powers the Modern Enterprise (Part 1)
    Matt Parisi, Senior Product Marketing Manager Jul 25 2019 4:00 pm UTC 32 mins
    In this four-part series, we will help your organization learn how to create a strategic approach to customer data. Top performing companies are using customer data insights from across the organization to power better customer experiences from awareness to renewals. For many companies, however, much of the necessary data remains locked away in departmental and technological silos.

    In our first installment, we’ll be taking a deep dive into the Tealium-commissioned Forrester research report, “Customer Data Maturity Powers the Modern Enterprise,” as well as looking at the state of customer data maturity to understand why so many companies struggle to break down the barriers and put data into action. The recent report surveyed the state of customer data and found that even though almost 90% of organizations have some level of customer data strategy in place, many struggle to impact key business outcomes effectively.

    By surveying 330 decision makers at companies across the globe – including the US, UK, France, Germany, and Japan – the report gives insight into businesses’ approach to using customer data to drive customer satisfaction, increase revenue, implement better data governance, and improve profitability.

    Join us for a deep dive into the state of customer data maturity and uncover the key takeaways to help your organization build a sound customer data strategy that can drive business results.

    You’ll also learn :
    - The 6 dimensions of customer data maturity in an organization
    - How you can put your own organization’s customer data maturity to the test
    - Recommendations for beginning to build your customer data strategy and establishing a center of customer data excellence
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Jul 25 2019 6:00 pm UTC 60 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • How to Overcome Challenges When Implementing Customer Data Management Solutions
    How to Overcome Challenges When Implementing Customer Data Management Solutions
    Dr. Heiko Klarl Jul 30 2019 1:00 pm UTC 46 mins
    As AI and other digital business models and technological trends revolutionise customer relationships, it's imperative that you start to personalise communication with customers.

    By addressing your customers personally - and in the right context - this approach to integrated customer data management can supercharge sales potential and improve the customer experience.

    Join this webinar to learn more about the strategic challenges associated with implementing customer data management solutions and how to address them, including:

    - Time-to-market requirements

    - International rollouts from America to China

    - Supporting new services in mergers & acquisitions
  • Operating Off-the-Shelf Identity Access Management with a DevOps methodology
    Operating Off-the-Shelf Identity Access Management with a DevOps methodology
    Tim Hobbs, DevOps Evangelist, iC Consult Group Aug 1 2019 1:00 pm UTC 37 mins
    As modern applications require short development cycles and IAM systems that can be adjusted at the same pace, modern data centers are becoming configuration-driven, resilient environments designed to meet rapidly changing application needs - and modern IAM solutions must be in line with this paradigm.

    Identity Access Management (IAM) products are highly configurable systems tailored to the diverse needs of customer environments and applications.

    Introducing traditional IAM products into cloud containers is not a simple "lift and shift" operation, as it once was with the virtual machine infrastructure. Today's micro-service-enabled, service-mesh-oriented infrastructure expects simple, resilient, self-discovery services instead of brittle monoliths that rely on manual configuration.

    Join this webinar to understand how operating IAM products with a DevOps setting in terms of automation, repeatability, and continuous improvement is possible through close collaboration between IAM, application, and infrastructure experts.
  • The Secret to Successful Marketing to the Technical B2B Buyer
    The Secret to Successful Marketing to the Technical B2B Buyer
    EarleyInfoSci, Mouser Electronics, Brock White Aug 7 2019 5:00 pm UTC 59 mins
    The B2B technical buyer is a unique persona with specialized needs. In order to get and keep this valuable customer on your site you must speak directly to their needs. So, how are the needs of technical buyers defined and translated into an engaging experience? The B2B and B2C ecommerce experiences have many similarities. Some lessons learned from B2C can be valuable to B2B. However, the two markets also have important differences, and the customer journey needs to reflect them.

    In this panel you will learn specifics about:

    --The archetypes of B2B buyer
    --Motivators and demotivators for making purchases
    --How to identify, structure and present content and assets that move the sale forward
    --The critical role of personalization
    --How merchandizing, cross-sell and up-sell leverage organizational knowledge about customer challenges

    This roundtable delivers valuable insights for CMOs, VPs of Digital, and Senior Marketing executives in organizations that operate as manufacturers, suppliers, and/or distributors in the industrial, high-tech, aerospace, life-sciences, and MRO spaces.
  • The Role of Server-Side in the Future of Your Data Foundation
    The Role of Server-Side in the Future of Your Data Foundation
    Chris Slovak, Global VP, Solutions Consulting & Jamie Wells, US West Manager, Solutions Consulting at Tealium Aug 13 2019 5:00 pm UTC 60 mins
    In a hyper-competitive, cross-device, cross-experience world, consumer expectations for personalized, omnichannel experiences have put increasing pressure on brands to utilize their customer data well. At the same time, technology limitations like ITP 2.x, Google’s same-site cookies, ad blockers, and more are eliminating access to that data in an increasing push for more privacy on the web. So how do brands navigate these opposing drivers?

    Data professionals will need both client-side and server-side data collection capabilities to build a scalable, future-proofed foundation to manage the increasing number of customer data sources and channels in this landscape – but each approach comes with its respective benefits and drawbacks.

    In this presentation, you’ll learn about the state of server-side capabilities today as well as key considerations and use cases. We’ll also talk about how to build out a data foundation with both client-side and server-side data collection capabilities so you have the power to make the right choice for your data strategy, business needs, and budget.

    Join this webinar and you’ll also learn:

    - Use cases where server-side data collection can help your customer experience efforts
    - The difference between client-side and server-side tracking
    - The history of server-side data collection and how new models are being applied today
    - Key considerations and questions you should be aware of as you move to server-side
  • The Truth About Personalization: Using a CDP to Personalize Marketing
    The Truth About Personalization: Using a CDP to Personalize Marketing
    Erik Archer Smith, Director of Marketing, Arm Treasure Data Aug 14 2019 5:00 pm UTC 60 mins
    For the last several years, pundits have predicted that THIS would be the year mass personalization takes off. Industry giants like Facebook and Amazon have been held up as shining examples of how to personalize at scale. But is this level of personalization really needed for all companies on all channels?

    In this webinar we’ll share the results of a new Forbes personalization survey with industry benchmarks collected from marketing leaders from global 2000 companies to help better define what’s working, what’s not, and how a Customer Data Platform can be used to maximize personalization results on the right channels that matter for your business.

    Marketers will learn:
    1. What personalization consumers expect and want from companies and which channels actually matter to customers and prospects and where to get the best ROI for your marketing dollars
    2. Strategies for segmenting your customers/prospects by using the data you already have to compete with the data goliaths like Amazon, Netflix and more.
    3. How a Customer Data Platform can help enable marketers to be more data driven.
  • Beyond Marketing BI: How AI Is Transforming Business Growth
    Beyond Marketing BI: How AI Is Transforming Business Growth
    Jonathan Joseph, Chief Strategy Officer, and John Zicker, Chief Data Scientist, at conDati Aug 14 2019 6:00 pm UTC 45 mins
    As marketing leaders build out their marketing stacks in the pursuit of better understanding and delighting their customers, the steady stream of disparate data from these platforms is constantly being accumulated. One critical component to achieving their goal, which ultimately will drive business growth, is unifying all of that data and applying data science. AI driven marketing intelligence is the new standard in marketing analytics. And it’s all within your reach today.


    Join conDati’s Chief Strategy Officer Jonathan Joseph and Chief Data Scientist John Zicker to learn about the evolution of marketing intelligence, and best practices in applying AI/ML for higher pipeline and revenue conversions including:

    - building data science into the tech stack and workflow
    - modules for optimization, budget allocation and forecasting
    - Journey analytics and attribution using statistical models
  • Apache Cassandra 101
    Apache Cassandra 101
    Alok Dwivedi, Senior Consultant, Instaclustr Aug 20 2019 5:00 pm UTC 60 mins
    If you are a Software Engineer, Database developer, DBA, DevOps, Enterprise or Solution Architect who has heard of Big Data and NoSQL but doesn't know exactly what the fuss is all about and want to learn more then this webinar is for you.

    Apache Cassandra is a highly available, linearly scalable, fault-tolerant database that can offer extremely high throughput and very low latency. It's one of the most popular and most successful NoSQL databases. It has been widely adopted by biggest tech names, major world-renowned brands and research institutes alike. This list includes companies like Apple, Twitter, Facebook, Netflix, Rackspace, Reddit and also research institutes like CERN.

    Instaclustr is organizing a multi-part webinar series on Apache Cassandra with an aim to help you in your journey of learning and making the best use of Apache Cassandra.

    In part-1 of this series, we will start with demystifying NoSQL, look at Cassandra basics, compare it with RDBMS for good and bad, and then move on to explore concepts like replication, partitioning, token ranges, consistency etc.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Aug 21 2019 4:00 pm UTC 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Payments & Retail: the impact of friendly fraud
    Payments & Retail: the impact of friendly fraud
    BRC & The Chargeback Company Aug 22 2019 1:00 pm UTC 60 mins
    This webinar will explore how retailers can manage payment disputes and stop revenue loss with key trend analysis and case study examples.
  • Navigating the future of work
    Navigating the future of work
    BRC & Kronos Sep 3 2019 1:00 pm UTC 60 mins
    Tune in on the 3rd September at 2pm to join discussions on how the delivery of the ‘Good Work Plan’ and recent ECJ rulings will impact the future of work and how technology can empower your workforce to deliver sustainable performance.
  • Beyond Taxonomy - How Manufacturers & Distributors are Innovating in Ecommerce
    Beyond Taxonomy - How Manufacturers & Distributors are Innovating in Ecommerce
    Seth Earley, EIS, Marc Shimpeno, Etsy, Noel McDonagh, Dell EMC, Megan Koleff, Genuine Parts Company Sep 4 2019 5:00 pm UTC 57 mins
    In this session our panel of experts discuss the challenges in building more powerful capabilities based on a foundation of a well-constructed taxonomy.

    Host: Seth Earley, Earley Information Science, CEO
    Panelists:
    --Marc Shimpeno, Etsy, Taxonomist & Data Specialist
    --Noel McDonagh, Dell EMC, Director of Information Development
    --Megan Koleff, Genuine Parts Company, User Experience Lead

    Topics to be covered include:

    * How are manufacturers and distributors using taxonomies to improve site search?
    * How are taxonomies used in merchandising – assessing product mix and grouping products for specific targets or solutions?
    * How do taxonomies help with personalization?
    * How are part relationships managed and presented?
    * How are multi-tiered product entity models like base-variant being leveraged to improve data management, reporting and navigation?
  • Apache Kafka 101
    Apache Kafka 101
    Alok Dwivedi, Senior Consultant, Instaclustr Sep 5 2019 5:00 pm UTC 60 mins
    Are you responsible for building Data pipelines for your organization or for your customers? Are you coming from a background where you worked on traditional ESB (Enterprise Service Bus), Middleware and ETL based systems but are no longer comfortable with modern trends in these domains? Or are you just interested in learning a technology that provides framework for message processing, stream processing, real time analytics, event sourcing, or acting as a central data bus for your organization.

    Apache Kafka is the leading distributed streaming and queuing technology for large-scale, always-on applications. Kafka has built-in features of horizontal scalability, high-throughput and low-latency. It is highly reliable, has high-availability, and allows geographically distributed data streams and stream processing applications. It’s used by pretty much all the big tech giants; LinkedIn, Netflix, Uber, Twitter, AirBnB and traditional names like Adidas, Goldman Sachs; the list goes on.

    Instaclustr is organizing a multi-part webinar series on Apache Kafka with an aim to help you in your journey of learning and making the best use of this technology.

    In part-1 of this series, we will start with the basics of Apache Kafka, Kafka ecosystem, overview of its architecture and explore concepts like brokers, topics, partitions, logs, producers, consumers, consumer groups, etc.
  • The Business Value and Bottom Line Impact of Taxonomy
    The Business Value and Bottom Line Impact of Taxonomy
    Seth Earley, CEO, EIS & Carla Pealer, Taxonomy Consultant, EIS Oct 2 2019 5:00 pm UTC 52 mins
    Business agility rests upon a well-architected environment of business processes, workflows, and communications.

    So how does taxonomy fit in? It’s everywhere - taxonomy is the foundational building block that improves efficiencies, collaboration, and cost reductions across the enterprise. And the more agile you are, the better opportunity you have to compete and win.

    In this webcat you will learn:

    • Industry-agnostic best practices to boost your bottom line and beat your competition through taxonomy design and semantic integration
    • How taxonomy design enables customer acquisition, search relevancy, structured data, faster time to market, asset reuse, and more.

    Speaker: Carla Pealer, Consultant, Earley Information Science
  • Storing and Using Metrics for 3000 nodes - How Instaclustr use a Time Series Cas
    Storing and Using Metrics for 3000 nodes - How Instaclustr use a Time Series Cas
    Jordan Braiuka, Senior Software Engineer Oct 3 2019 5:00 pm UTC 60 mins
    At Instaclustr, we use one of our own Cassandra clusters and a custom monitoring application to store, process, and retrieve metrics on every single node in our fleet. The talk will introduce how we collect, process, store, and rollup all the metrics which pass through our monitoring system every second. We will discuss why using Cassandra, time buckets, and Spark is really suited to efficiently and quickly store, and query all that monitoring data.
  • Product Data - the Great Enabler for IoT, Marketplaces, and more
    Product Data - the Great Enabler for IoT, Marketplaces, and more
    David Bonk Graco | Russ Sharer, Fulham | Luis Marcos, Honeywell Nov 6 2019 6:00 pm UTC 59 mins
    In this webinar we explore how intelligently enriched product data drives growth and differentiation in the marketplace. Ecommerce websites, replacement part reference guides, online marketplaces and IoT monitoring platforms all have one thing in common.  They all depend on detailed, accurate and comprehensive product information databases.
    Product data is a critical driver for core offerings today, and will be even more critical as organizations innovate across their value chains in the future.

    In this session our leadership panel discuss:
    •    What is enriched product data
    •    Enhancing your brand position and value to customers
    •    How enriched product data enables innovation
    •    Preparedness for interoperability

    This webinar will be of interest to marketing, product management, service management and data management executives with manufacturers, distributors, and service providers.  Also, anyone exploring the role that product data plays in defining and growing their offerings and transforming their customer value propositions.
  • Instaclustr's Open Source Tools For Cassandra - LDAP/Kerberos, Prometheus Export
    Instaclustr's Open Source Tools For Cassandra - LDAP/Kerberos, Prometheus Export
    Adam Zegelin, Co-Founder of Instaclustr Nov 19 2019 6:00 pm UTC 60 mins
    This session walks devs through Instaclustr's Cassandra tools and how they add key functionality and ease-of-use to their deployments.
    -An LDAP authenticator plug-in for Cassandran. The open source LDAP authenticator plug-in works closely with the existing CassandraAuthorizer implementation. The plug-in enables developers to quickly reap the benefits of secure LDAP authentication without the need to write their own solutions, and to transition to using the authenticator with zero downtime.
    -A Kerberos authenticator plug-in for CassandranThe open source Kerberos authenticator plug-in enables Cassandra users to leverage Kerberos’ industry-leading secure authentication and true single sign-on capabilities. The open source project also includes a Kerberos authenticator plugin for the Cassandra Java driver.
    - Cassandra Prometheus Exporter. The cassandra-exporter is a high-performance metrics collection agent that allows for easy integration with the Prometheus monitoring solution. It has been designed to collect detailed metrics on production-sized clusters with complex schemata with minimal performance impact while at the same time following Prometheus's best practices for exporting metrics. - Additional utilities and debugging toolsnIncluding a utility to assist with backup and restore to various cloud providers, and tools to provide debug-level information about SSTables. - A Cassandra operator for running and operating Cassandra within KubernetesnThe open source Cassandra operator functions as a Cassandra-as-a-Service on Kubernetes, fully handling deployment and operations duties so that developers don’t have to. It also offers a consistent environment and set of operations founded on best practices, which is reproducible across production clusters and development, staging, and QA environments. The audience for this presentation will learn the specifics of how to implement – and get the most out of – these open source solutions.
  • From Homegrown to Commercial PIM: Transition Strategies for Success
    From Homegrown to Commercial PIM: Transition Strategies for Success
    Alison Tran, Client Partner, EIS; Chantal Schweizer, Principal Consultant, EIS Dec 4 2019 6:00 pm UTC 53 mins
    As your business and product data complexity grows, so too may your need for an enhanced PIM system that accounts for numerous operating units, separate companies, global operations, and more.

    How do you judge whether you are ready to jump from your homegrown solution? And if you’re ready to make the jump, what is the best path to ensure that you transition from one system to another successfully?

    In this session you will learn:

    * The milestones that signal your readiness to take on a commercial PIM
    * Best practices when making the transition to a commercial PIM
    * How to align your PIM strategy to a logical data model

    SPEAKERS
    Alison Tran, EIS, Client Partner, brings over 14 years of business and technology consulting experience in technology adoption, software implementation, organizational redesign, change management and process reengineering.
    Chantal Schweizer, EIS, Principal Consultant, a senior information organization professional with over 10 years experience in product information and taxonomy design.