Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.
But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.
Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.
Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".
In this webinar, you will:
-Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
-See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
-Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
What if you could package, distribute, and update any application for Linux Desktops, Servers, Clouds, and IoT devices? Snaps are containerised software packages that are simple to create and install, safe to run, and can work on all major Linux systems without modification. Whether you’re a developer, desktop user, or even a device manufacturer; you won't want to miss this!
We’re entering the era of cloud consumption. The market is transitioning from one that has been defined mostly by building clouds to one in which cloud service acquisition is the primary driver of IT spending. For enterprises seeking to take advantage of cloud, the key question is ‘how fast can I go?’ As both the foundation for digital transformation and as the platform to support innovation, cloud will bring profound change in 2018.
Join 451 Research’s leading cloud analysts, William Fellows, Melanie Posey, Katy Ring and Owen Rogers on February 9 for a live webinar as they review and discuss the trends expected to shape the cloud landscape in 2018, and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
It’s no longer business as usual in the multibillion-dollar tech M&A market. New buyers are displacing many of the long-time leaders, while other companies from far outside the tech industry are suddenly looking for ways to buy into new trends. To help you navigate this changing M&A landscape, join Brenon Daly, 451 Research’s Director of Financials, for a look ahead to activity in 2018. Drawing on data and insight from across 451 Research, our annual Tech M&A Outlook webinar will highlight specific trends in key enterprise IT markets – including information security, software, mobility and IoT -- that will shape dealflow and valuations in the coming year.
What if you could move your Linux Virtual Machines straight to containers, easily, without modifying the apps or administration processes? LXD from Canonical is a pure-container hypervisor that takes the speed and latency of containers and brings them to the hypervisor world. LXD is a machine container, meaning they’re just like traditional physical and virtual machines. Join our webinar on February 7th with Technical Lead Stephane Graber to learn...
>The difference between application & machine containers
>How pure-container hypervisors such as LXD can reduce overhead
>How to use LXD in practice from deployment to operations
Software is driving the digital economy. Combining insight across key areas of the software market, we look ahead at what we think will transform in 2018, using predictions from four of our Research Channels: Customer Experience & Commerce, Data Platforms & Analytics, Development, DevOps & ITOps and Workforce Productivity & Compliance.
Join 451 Research’s leading software analysts, Nick Patience, Sheryl Kingstone, Chris Marsh, Matt Aslett, and Carl Lehmann on February 7 for a live webinar as they review and discuss the trends expected to shape the software landscape and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
General Data Protection Regulation (GDPR) takes effect on May 25, 2018, requiring financial institutions to meet stringent new rules on managing the personal data of EU residents, and setting astronomic fines for those that fail to comply. The webinar will discuss the broad data management challenges posed by the regulation, the GDPR articles your data management programme will need to consider, and how compliance can best be addressed. Referring to a recent survey conducted by A-Team Group and sponsored by ASG Technologies, the webinar will also explore approaches to the regulation, explain the importance of governance to successful implementation, and offer guidance on new technologies that support compliance.
Register for the webinar to find out about:
•State-of-play on compliance
•Data management challenges
•Approaches and solutions
•Expert views on implementation
Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a campaign attributed to the cyber-warfare arm of the Lebanese General Security Directorate.
This actor is prolific and has engaged in widespread APT-style attack campaigns around the world — with mobile devices as the primary target.
This joint research effort has obtained hundreds of gigabytes of exfiltrated data across thousands of victims in over 21 countries. Stolen data include enterprise intellectual property and personally-identifiable information.
Register to the webinar to find out:
- the latest details about Dark Caracal, the first globally-active mobile APT
- whether your organisation has been impacted
- the steps you should take to protect data on mobile devices.
Michael Flossman Security Researcher, Lookout
Eva Galperin Eva Galperin Director of Cybersecurity, EFF
Improve IT performance across all mobile devices and business-critical apps for complete end-user satisfaction.
Your workforce is mobile. They need fast, reliable and secure access to corporate resources from their smartphones and tablets to be productive no matter where business takes them.
Attend this webinar to:
-Explore key requirements for mobile application and end-user experience monitoring
-See a demo of how SteelCentral delivers real-time performance analytics from the user’s device to back-end infrastructure
-Move beyond access and control to actually measuring and improving end-user experience
Sie würden mit digitaler Belegarchivierung gerne Einsparpotenziale und Prozessoptimierungen realisieren, sind sich aber unsicher, was die gesetzlichen Voraussetzungen angeht? Hören Sie sich jetzt vom Experten, wie Steuerrecht und Digitalisierung zusammenpassen und wie Sie selbst von papierloser Abrechnung profitieren können.
In diesem 45-minütigen Webinar sind wir den grundlegenden Unterschieden der Cloud gegenüber einer On-Premise-Lösung im Geschäftsreisemanagement auf den Grund gegangen und haben gezeigt, wie Ihr Unternehmen mit einer SaaS-Lösung fit für die Zukunft ist..
Are you planning a migration off Citrix Xenapp or XenDesktop? Or looking for ways to make them run as good as you thought they should? Then this is the session for you.
Join us for a technical deep dive on how to evaluate the state of the Citrix environment, assess project requirements and review real world scenarios. By the end of the session you will know all about the best-practices, tools and services available to ensure your project is a complete success. Come learn how VMware technologies can help solve your Citrix problems!
When you’re responsible for the care and feeding of packaged business applications, it can be quite challenging if not impossible to make meaningful changes that improve responsiveness, especially when the underlying database is struggling to keep up.
Watch this webinar to learn:
- What could be the root of the problems you are experiencing
- Ways to identify your problems
- Simple solutions you can implement without anyone else’s help
Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.
But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.
Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.
Michael Collins from ASG Technologies will address details like:
- How to close the gap between the needs of the enterprise and personalization
- Why it is important to include employees in the planning of their workplace at an early stage;
- How to implement the right mix of standardization and individualization and:
- Why more flexibility & agility for employees leads to higher productivity.
In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
Webinar topics include:
• Ergonomics 101
How it impacts workplace productivity
• Sitting vs. Standing
The benefits and costs
• Employee Retention
Why comfort makes employees happy
Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.
Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
Fürsorgepflicht: Jeder Zweite glaubt, dass Arbeitgeber im Krisenfall überfordert wäre. Mit Concur Locate kommen Sie Ihrer Fürsorgepflicht umfänglich nach. Werfen Sie jetzt einen Blick in das Tool, um zu erfahren, wie Sie sich ganz einfach um Ihre Reisenden kümmern können.
Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.
In this webinar you will learn how:
- To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry
- To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service
- A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies
- We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
Virtual desktop infrastructure (VDI) has seen tremendous growth over the past few years as organizations look to securely and cost-effectively support their ever-increasing mobile workforce. Now VMware is introducing Horizon Cloud, making it easier than ever to deliver on-premises or cloud-hosted virtual desktops and applications from an easy-to-use control plane in the cloud.
In this webcast, you’ll learn how your organization can reap the many benefits of virtual desktops and applications with the speed, simplicity, and predictable pricing of a cloud service.
Organisations struggle to understand their inventory — what they own, who is using it, and what it costs. Add in the complexities of the typical workplace brought on by common workplace changes – mergers and acquisitions, employee attrition – and the challenge of maintaining an accurate inventory becomes too much for most organisations to handle.
Join us for a 10-minute webinar to learn the challenges of managing telecom expenses in-house with a focus on telecom inventory management.
Keep your endpoint devices, apps and data securely managed on or off the domain. With VMware unified endpoint management, you’ll remediate vulnerabilities faster, deploy patches instantly and install Win32 software quickly, reliably and consistently.
•Consolidate Windows management across devices on or off the domain
•Deliver and install Win32 software reliably and quickly
•Deploy security patches instantly and remediate vulnerabilities faster
•Unify endpoint management functions across desktops and mobile devices
•Find out how other organizations are using unified endpoint management for Windows 10
Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.
Attendees will learn:
• How to navigate GDPR without a silver bullet
• The importance of identifying PII data, protecting users, and securing endpoints
• How to integrate, unify, orchestrate, and automate with service management
• Ways to implement solutions that reduce the pain associated with GDPR
It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
Incorporate data into your product, and take advantage of word class databases and a modern data platform. And learn from companies that have been there.
Join this webinar and learn:
- How to incorporate data into your product, and take advantage of word class databases and a modern data platform. And hear from companies that have been there.
- Learn how PDX improved their in house analytical solution and offered their pharmacies a premium level of service — granting them access to collaborate and share the data that they need.
- Learn how Namely, a HR platform, was able to leverage modern technologies ---databases optimized for performance, ETL tools, BI platforms that offer customization and can scale — to build out a scalable go to market solution in 3 months.
2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.
Join this webinar and learn:
- Which new analytic technologies and trends you need to be aware of and how they’ll impact your business;
- How to use new technologies to actually empower business users to self-serve to answers and make better decisions using data in their day-to-day workflows
- Pitfalls to avoid (and flashy technologies to ignore) when you’re planning your analytics strategy
We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.
However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.
Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.
During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:
•Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
•The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
•The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
•Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
•Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.
With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.
Register to today's webinar to learn about:
- The threat landscape
- The evolution of mobile threats
- How does that impact your organization?
- How other other organizations are doing?
- The impact of a breach post GDPR
- How to protect your enterprise data?
Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
>The basics of Juju from Charms to Bundles
>How to easily deploy solutions and scale up from one simple dashboard
>How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
>How you can use Juju to simplify your operations!
We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.
• Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
• Learn how to use a systematic approach to restore trust in affected systems
• Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
• Understand key information that needs to be communicated to various stakeholders in the event of a breach
A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.
How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?
Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network. Reviewed:
How cloud networking compares to previous fixed network approaches
How to remove limitations and achieve faster deployment, simpler management and instant adaptability
Comparing clouds for your network’s future – scalability, security and performance
How to automate complex operations and dynamically change network behaviour based on activity
What cloud-powered big data, AI and analytics could do for you
Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.
Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.
Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
Join us for this 25 minute quick-hit, reviewing 11ax’s most important components:
PHY and MAC layer enhancements for better traffic management and efficiency
Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
Considerations for clients and wider network enhancements
Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who could manage the complexity and capital expense of a new, high-performance infrastructure. Today many organizations of all sizes have highly distributed workforces running a mix of desktop and mobile (BYOD) devices who could also benefit from centralized virtual system management. This session shares how a Predictive Flash data infrastructure helps ensure the VDI benefits of lower TCO, increased agility and security, and not just for large enterprises. It will feature speakers from the HPE virtualization team along with technical details and demos of how this solution improves VDI performance.