Hi [[ session.user.profile.firstName ]]

End User Computing

  • The 5 Essentials of Data Security & Unified Endpoint Management
    The 5 Essentials of Data Security & Unified Endpoint Management Jason Roszak, Director, Product Management, VMware with Q&A from Sachin Sharma Recorded: Jan 18 2018 57 mins
    Keep your endpoint devices, apps and data securely managed on or off the domain. With VMware unified endpoint management, you’ll remediate vulnerabilities faster, deploy patches instantly and install Win32 software quickly, reliably and consistently.

    Topics include:

    •Consolidate Windows management across devices on or off the domain
    •Deliver and install Win32 software reliably and quickly
    •Deploy security patches instantly and remediate vulnerabilities faster
    •Unify endpoint management functions across desktops and mobile devices
    •Find out how other organizations are using unified endpoint management for Windows 10
  • An Introduction to MaxParallel & SQL Server Parallelism
    An Introduction to MaxParallel & SQL Server Parallelism Rosario Perri, Dir. Channel & Alliances EMEA, DataCore | Mike Prince, Senior SQL Server Consult., Ultima Business Solutions Recorded: Jan 17 2018 44 mins
    Join our webinar and learn new ways to optimise SQL Server leveraging idle cores to improve the responsiveness of highly concurrent, I/O-intensive OLTP workloads. It’s surprisingly simple.

    We also have a special guest, Mike Prince, Senior SQL Server Consultant from Ultima Business Solutions, who will share his experiences testing MaxParallel in SQL environments.
  • Computing in the Mobile Cloud Era: How to Enable the Digital Workplace
    Computing in the Mobile Cloud Era: How to Enable the Digital Workplace Kevin Strohmeyer, Sr. Director, Product Marketing, Workspace Services, VMware. Q&A with Sashin Sharma. Recorded: Jan 16 2018 44 mins
    The digital workspace is the defining model for end-user computing in the mobile cloud era, securely delivering anytime, anywhere access to any application to any device including desktops, smartphones, and tablets.

    This session will provide strategic guidance to the major trends shaping the market and how VMware is delivering the innovation and market leadership across desktop, mobile and cloud infrastructure solutions, making the digital workspace a reality.
  • SQL Server Parallelism: Putting all those Cores to Work
    SQL Server Parallelism: Putting all those Cores to Work Augie Gonzalez, Director of Product Marketing, DataCore Software Recorded: Jan 12 2018 36 mins
    Learn new ways SQL Server can leverage idle cores to improve the responsiveness of highly concurrent, I/O-intensive OLTP workloads.

    It’s surprisingly simple.
  • The Importance of EDR within an Endpoint Security Strategy
    The Importance of EDR within an Endpoint Security Strategy Fernando Montenegro of 451 Research and Erik Kristiansen of Tanium Recorded: Jan 9 2018 53 mins
    Identifying security incidents isn’t always easy. Properly scoping incidents can be difficult. And, most organizations admit they aren’t able to fully remediate every incident. On average, over 80% of organizations are concerned with their ability to address all three of the aforementioned tasks. Organizations struggle because they lack confidence in their endpoint data due to incomplete visibility, control, and accuracy.

    64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. This cycle is doomed to repeat over, and over, and over again. However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, what role does EDR play?

    Join us for this webinar. Speakers will include:
    1.Fernando Montenegro (Sr. Analyst at 451 Research) will provide an EDR market overview and trends
    2.Erik Kristiansen (Sr. Director at Tanium) will explore the findings from a recent security survey
  • Cybercrime Taktiken und Methoden Q3 2017
    Cybercrime Taktiken und Methoden Q3 2017 Helge Husemann, Product Marketing Manager Recorded: Jan 3 2018 66 mins
    Cybercrime Taktiken & Methoden Webinar geben wir einen tieferen Einblick welche Bedrohungen unser grösstes Augenmerk in den vergangenen 3 Monaten hatten und was wir im letzten Quartal 2017 erwarten. Bisher hat uns dieses Jahr Ransomware Wellen und Sicherheitsbrüche rund um den Globus beschert und dies zeigt, warum ein mehrschichtiger Sicherheitsansatz implementiert werden muss, um diesen Gefahren zu begegnen.

    Themen:

    Windows bleibt weiterhin das bevorzugte Ziel für Malware Angriffe
    Malspam hat gezielte Geographische Kampagnen global gestartet
    Malware Vorschau zum 4. Quartal 2017
  • Find Personal Data for GDPR in your ERP/CRM system
    Find Personal Data for GDPR in your ERP/CRM system Ian Rowlands, Product Marketing Manager for ASG Technologies & Nick Porter, Technical Director for Silwood Technologie Recorded: Dec 19 2017 47 mins
    The date for being compliant with the EU General Data Protection Regulations (GDPR) is getting closer. Many organisations are now seriously engaged in programs to ensure that they meet the new requirements and avoid the potential to incur large fines and brand embarrassment.

    One of the key early steps is to create a baseline view of the Personal Data stored within your organization and mapping that to the applications that process it. If you have a packaged application from SAP, Oracle, Salesforce or Microsoft you probably already appreciate the difficulties involved in finding all the Personal Data locations.

    ASG and Silwood Technology have combined to deliver a solution which will help you to complete this task quickly and accurately. Join us and learn how ASG and Silwood Technology can help you prepare for compliance with the GDPR.
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Supplier Segmentation Best Practices Revealed
    Supplier Segmentation Best Practices Revealed Patrick Connaughton, Senior Research Director, The Hackett Group. Recorded: Dec 7 2017 50 mins
    Find out what makes suppliers strategic -- and what to do if they aren't. Watch this webinar with Patrick Connaughton of the Hackett Group.
  • Cybersecurity in Your Print Network
    Cybersecurity in Your Print Network Ron Chestang, Senior IT Security Consultant, HP & Patrick Boyd, Business Development Manager, Staples Recorded: Dec 7 2017 31 mins
    Cybersecurity risks don’t begin and end with PCs. Your networked print devices can be just as big of a risk but often don’t get the right attention.

    Watch this webinar to get a real-world look at print security from industry expert Ron Chestang of HP. He’ll detail some common and surprising security issues lurking in your print network and outline specific strategies and controls you can use to minimize the risk. Also on this webinar, Patrick Boyd of Staples Business Advantage will provide actual examples of security issues discovered during print network reviews with customers.
  • Designing for Safety
    Designing for Safety Michelle Boolton, National Director of Design, Staples & Carl Bergauer, Fields Sales Director of Furniture, Staples Recorded: Dec 7 2017 59 mins
    Workplace emergencies can happen at any time and employees need to know what to do in a worst case scenario, from finding the closest hard wall to knowing where the nearest evacuation point is. Watch the webinar to learn how you can help ensure the safety of building occupants when designing a new office space.
  • Endpoints in the Hyperconnected Era: Weaknesses and Weapons
    Endpoints in the Hyperconnected Era: Weaknesses and Weapons Scott Crawford, 451 Research | Ofer Israeli, Illusive Recorded: Dec 7 2017 60 mins
    If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.

    There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
  • How to Eliminate Cloud Waste with a Holistic DevOps Strategy
    How to Eliminate Cloud Waste with a Holistic DevOps Strategy Chris Parlette, Director of Cloud Solutions, ParkMyCloud Recorded: Dec 7 2017 47 mins
    Renting infrastructure on demand is the most disruptive trend in IT in decades. In 2016, enterprises spent $23B on public cloud IaaS services. By 2020, that figure is expected to reach $65B. The public cloud is now used like a utility, and like any utility, there is waste. Who's responsible for optimizing the infrastructure and reducing wasted expenses? It’s DevOps.
     
    The excess expense, known as cloud waste, comprises several interrelated problems:
    •Services running when they don't need to be
    •Improperly sized infrastructure
    •Orphaned resources
    •Shadow IT
     
    There are a few core tenets of DevOps that can be applied to reducing cloud waste:
    •Holistic thinking
    •No silos
    •Rapid useful feedback
    •Automation
     
    Join Chris to learn why you should include continuous cost optimization in your DevOps processes. Automate cost control, reduce your cloud expenses, and make your life easier.
  • New Attitudes for S&OP / IBP to Keep Pace with Evolving Markets
    New Attitudes for S&OP / IBP to Keep Pace with Evolving Markets J. Eric Wilson, Advisor, Demand and Sales & Operations, Institute of Business Forecasting Recorded: Dec 6 2017 47 mins
    Have you ever wondered why so many companies struggle to implement an effective S&OP strategy? We've had thirty years to fine tune the process and make it flawless. Yet, research shows over two-thirds of companies are not gaining business value from their process. Are we just slow learners, or is S&OP just an illusion?

    Topics Include:
    •Alternative ways to look at the current gaps in your organization and how all the components of a successful business process come together
    •Key questions to ask regarding your S&OP and planning processes
    •Building blocks of a best-in-class S&OP process

    Presenter:
    J. Eric Wilson, Advisor, Demand and Sales & Operations, Institute of Business Forecasting
  • Ten Places To Search For Additional Savings After The Contract Has Been Signed
    Ten Places To Search For Additional Savings After The Contract Has Been Signed Mark Trowbridge, CPSM, C.P.M., MCIPS, Principal, Strategic Procurement Solutions, LLC Recorded: Dec 6 2017 55 mins
    So why is it in our professional life we tend to take things at face value? Your top notch negotiation skills assured you left nothing on the table. You've squeezed that lemon dry, right? Are you sure?

    Topics Include:
    •The Importance of Supplier Relationship Management
    •10 places to search for additional savings after the contract is signed
    •Benefits to Be Gained From Contracted Suppliers
    •Supplier Management Techniques to Capture Greater Value
    •Five "No Cost" Sources for Immediate Value
  • The Perfect Formula for Determining the Right Amount of Inventory
    The Perfect Formula for Determining the Right Amount of Inventory Wesley S. Randall, University North Texas & David R. Nowicki, University North Texas & Jonathan Fife, University North Texas Recorded: Dec 6 2017 55 mins
    For years, supply chain executives have asked how can they reduce inventory without affecting customer service levels or shifting cost to other supply chain partners? The answer could be a new inventory management strategy.

    Topics Include:
    •Why this new approach reduces total supply chain costs instead of pushing inventory carrying costs onto suppliers
    • How to reduce the informational delays that add hidden costs to the supply chain
    •Demonstrate how the use of real-time consumer demand can drive time-phased shipments and production through the supply network

    Presenters:
    Wesley S. Randall, Professor & Chair, Department of Marketing, Logistics, & Operations Management, College of Business, University of North Texas
    David R. Nowicki, Director, Center for Logistics & Supply Chain Management, Associate Professor of Logistics, University of North Texas
    Jonathan Fife, President of the Professional Development Institute, University of North Texas
  • Risk and Resiliency 2.0: Three New Keys to Managing Supply Chain Risk
    Risk and Resiliency 2.0: Three New Keys to Managing Supply Chain Risk Steven A. Melnyk, Professor of Operations & Supply Chain Management, Michigan State University Recorded: Dec 6 2017 49 mins
    Natural disasters. The bankruptcy of a major ocean carrier. Cyber attacks. And exploding batteries. These are just a few of the risks that have laid supply chains low in recent years. Yet the more firms work on risk and resiliency, the more new issues and challenges seem to pop up.

    In this webinar, Michigan State professor Steven A. Melnyk will:

    •Outline the issues critical to most supply chain managers
    •Present the new view of risk management and resiliency at leading firms
    •Provide a task list for managers focused on protecting their supply chains and brands
  • Using Supplier Segmentation to Drive Value and Improve the Bottom Line
    Using Supplier Segmentation to Drive Value and Improve the Bottom Line Amy Fong Senior Procurement Advisor and P2P Program Leader & Jaime Steele Senior Director Procurement Operations, Staples Recorded: Dec 6 2017 48 mins
    •How to align supplier segmentation to bottom-line results
    •Best practices for engaging with suppliers in various tiers
    •The most effective supplier stratification tiers and criteria

    Presenters:
    Amy Fong, Senior Procurement Advisor and P2P Program Leader, Hackett Group
    Ms. Fong is an Associate Principal in The Hackett Group’s Procurement Executive Advisory program and Program Leader for the Purchase to Pay Advisory Program.

    Jaime Steele, Senior Director Procurement Operations & Center of Excellence Staples Inc.
    Jaime Steele has 17 years of experience in procurement and sourcing. She began her career at FreeMarkets Inc., the first provider of online reverse auctions. That experience led to a mix of both advisory and client-side roles in multiple industries, most recently at grocery and retail companies.
  • Long Term Cost Savings in the Restroom: Learn how to maximize your spend!
    Long Term Cost Savings in the Restroom: Learn how to maximize your spend! Neal Duffy, Sr. Mgr. Facilities Solutions Training, Staples & Dr. Ronnie Phillips, Director Omnichannel & eCommerce, GP PRO Recorded: Dec 6 2017 42 mins
    Join Staples Business Advantage and GP PRO as we will spend time highlighting ways that you can uncover waste and unnecessary spend in your restroom and help you identify methods for maximizing your restroom spend. By implementing a few simple changes, you will be able to identify some long term cost savings for your facility and be able to reallocate that spend to other areas of your day-to-day business. ​

    Neal Duffy, Sr. Mgr. Facilities Solutions Training
    ​Neal Duffy has more than 40 years of experience in the janitorial and sanitary maintenance (Jan/San) industry on both the manufacturing and distribution sides of the business.

    Dr. Ronnie Phillips, Director Omnichannel & eCommerce, GP PRO
    Dr. Ronnie Phillips has extensive Jan/San industry experience in product development and innovation, marketing and sales. He graduated from Georgia Institute of Technology with a B.S. in Biochemistry and PhD in Organic Chemistry.
  • Introduction to MAAS: building the agile data centre
    Introduction to MAAS: building the agile data centre Andres Rodriguez Recorded: Dec 6 2017 45 mins
    As more and more applications move to the public cloud, many wonder if it still makes sense to maintain a data centre apart from regulated workloads. In this presentation Andres Rodriguez, MAAS engineering manager, will look into how devops and infrastructure managers can build an agile data centre with a developer agility and a cost base that can compete with public cloud.

    In this presentation you will learn:
    * How to build a low cost / high usage smart data centre based on automation
    * Most common use cases best suited for bare metal provisioning
    * How MAAS, Canonical's server provisioning tool, can be used to build your agile data centre
  • Ubuntu: What's the security story?
    Ubuntu: What's the security story? Dustin Kirkland, VP, Product Development, Canonical Recorded: Dec 6 2017 57 mins
    Of course you know Ubuntu. Your developers use it everywhere. But you're from an enterprise, where the IT Security team has the final say. As they should. Before your app built on Ubuntu can go into production, you need their signoff. So what's the security story with Ubuntu? How is it hardened? Are there best practices around patch management? What about standards and compliance? How can Canonical help?

    In this webinar, join Dustin Kirkland to learn:
    >How Ubuntu is secured out of the box
    >How we ensure that we are compliant
    >How Canonical ensure customers get a first class support experience
    >Why Ubuntu has the leading edge in security
  • [Live Keynote]: Building 21st century infrastructure
    [Live Keynote]: Building 21st century infrastructure Mark Shuttleworth Recorded: Dec 5 2017 36 mins
    In his introduction keynote to the Ubuntu Enterprise Summit Mark Shuttleworth, founder and CEO of Canonical, will be explaining his vision for the future of enterprise architecture.

    In his presentation Mark will look into the various trends at play that are currently transforming the way IT infrastructures are being built and managed. From technology to operations, Mark will expose how enterprises are taking new approaches to containing costs and giving developers the freedom to build new breakthrough services.

    More about Mark:
    Mark Shuttleworth is Founder of Ubuntu and CEO of Canonical. Mark founded Thawte, an internet commerce security company in 1996 while studying finance and IT at the University of Cape Town before selling the company to VeriSign in 1999. In 2000 he founded HBD, an investment company, and created the Shuttleworth Foundation to fund innovative leaders in society with a combination of fellowships and investments. In 2002 he flew to the International Space Station as a member of the crew of Soyuz mission TM34, after a year of training in Star City, Russia. In 2004, he founded Ubuntu and Canonical.
  • Managing Security and Risk for Digital Transformation in Financial Services
    Managing Security and Risk for Digital Transformation in Financial Services Nicholle Lindner, Industry Director; Leon Manson, Lead Cybersecurity Architect; Ian Selbie, Solution Director, Unisys Recorded: Nov 30 2017 75 mins
    Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.

    In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.

    So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?

    We will cover:
     The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.

     How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.

     Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?

    Speakers:
    Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy. 

    Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.

    Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
  • Cybercrime Tactics & Techniques Q3 2017
    Cybercrime Tactics & Techniques Q3 2017 Helge Husemann Recorded: Nov 29 2017 55 mins
    In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
  • Governance, Compliance & Print Security
    Governance, Compliance & Print Security Ron Chestang GCIH, CEH, CISM Print Security Advisor, HP Inc. & Michael Mayberry Technology Account Executive, Staples Recorded: Nov 16 2017 37 mins
    HP and Staples Business Advantage present:
    Governance, Compliance & Print Security - Three keys to protecting business
    • The rise of IoT and its evolving role in Security Challenges
    • IoT Standards & Framework Developments in CyberSecurity
    • Governance and its role in mitigating risk
    • And More: Influential Mega Trends, Risks & Hidden Costs

    Ron Chestang – GCIH, CEH, CISM
    Print Security Advisor
    HP Inc.
    Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
    Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.

    Michael Mayberry
    Technology Account Executive
    Staples Business Advantage
    Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
  • When Cloud Meets VDI: Redefining Virtual Desktops & Applications in 2018
    When Cloud Meets VDI: Redefining Virtual Desktops & Applications in 2018 Joseph Evans & Nina Seth - Senior Product Marketing Managers. Q&A with Sachin Sharma Jan 23 2018 12:00 pm UTC 60 mins
    Virtual desktop infrastructure (VDI) has seen tremendous growth over the past few years as organizations look to securely and cost-effectively support their ever-increasing mobile workforce. Now VMware is introducing Horizon Cloud, making it easier than ever to deliver on-premises or cloud-hosted virtual desktops and applications from an easy-to-use control plane in the cloud.

    In this webcast, you’ll learn how your organization can reap the many benefits of virtual desktops and applications with the speed, simplicity, and predictable pricing of a cloud service.
  • Impacts for Workspace Management and Transformation Providers
    Impacts for Workspace Management and Transformation Providers Dr. Andreas Stiehler, Principal Analyst, PAC & Michael Collins, ASG Jan 23 2018 2:00 pm UTC 60 mins
    Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.

    In this webinar you will learn how:

    - To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry

    - To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service

    - A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies

    - We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
  • 3M & Staples Present: Improving comfort and performance in the workplace
    3M & Staples Present: Improving comfort and performance in the workplace Tom Albin PhD & Cristina Ainslie, LEED AP BD+C Field Sales Director, Furniture, Staples Business Advantage Jan 23 2018 7:00 pm UTC 45 mins
    Gain valuable insight from our expert speakers.

    Webinar topics include:
    • Ergonomics 101
    How it impacts workplace productivity
    • Sitting vs. Standing
    The benefits and costs
    • Employee Retention
    Why comfort makes employees happy

    Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.

    Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
  • Desire & Reality: What is needed for the Workplace of the future?
    Desire & Reality: What is needed for the Workplace of the future? Manfred Bremmer, Senior Editor IoT & Mobile, COMPUTERWOCHE & Michael Collins, Global Vice President, Workspaces Practice, ASG Jan 24 2018 2:00 pm UTC 60 mins
    Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.

    But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.

    Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.

    Michael Collins from ASG Technologies will address details like:

    - How to close the gap between the needs of the enterprise and personalization
    - Why it is important to include employees in the planning of their workplace at an early stage;
    - How to implement the right mix of standardization and individualization and:
    - Why more flexibility & agility for employees leads to higher productivity.

    In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
  • Optimizing SQL Server Instances You Don’t Control
    Optimizing SQL Server Instances You Don’t Control Rodrigo Medeiros, Sr. Solutions Architect, Databases, DataCore Software Jan 24 2018 7:00 pm UTC 60 mins
    When you’re responsible for the care and feeding of packaged business applications, it can be quite challenging if not impossible to make meaningful changes that improve responsiveness, especially when the underlying database is struggling to keep up.

    Watch this webinar to learn:
    - What could be the root of the problems you are experiencing
    - Ways to identify your problems
    - Simple solutions you can implement without anyone else’s help
  • 2018 Trends in Application Software
    2018 Trends in Application Software Nick Patience, Sheryl Kingstone, Chris Marsh, Matt Aslett, Carl Lehmann Feb 7 2018 3:00 pm UTC 60 mins
    Software is driving the digital economy. Combining insight across key areas of the software market, we look ahead at what we think will transform in 2018, using predictions from four of our Research Channels: Customer Experience & Commerce, Data Platforms & Analytics, Development, DevOps & ITOps and Workforce Productivity & Compliance.

    Join 451 Research’s leading software analysts, Nick Patience, Sheryl Kingstone, Chris Marsh, Matt Aslett, and Carl Lehmann on February 7 for a live webinar as they review and discuss the trends expected to shape the software landscape and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
  • Introduction To LXD: The Pure-container Hypervisor
    Introduction To LXD: The Pure-container Hypervisor Stephane Graber Feb 7 2018 5:00 pm UTC 60 mins
    What if you could move your Linux Virtual Machines straight to containers, easily, without modifying the apps or administration processes? LXD from Canonical is a pure-container hypervisor that takes the speed and latency of containers and brings them to the hypervisor world. LXD is a machine container, meaning they’re just like traditional physical and virtual machines. Join our webinar on February 7th with Technical Lead Stephane Graber to learn...
    >The difference between application & machine containers
    >How pure-container hypervisors such as LXD can reduce overhead
    >How to use LXD in practice from deployment to operations
  • 2018 Tech M&A Outlook
    2018 Tech M&A Outlook Brenon Daly, Research Director, Financials and Tim Miller, VP & GM, Financial Markets at 451 Research Feb 7 2018 6:00 pm UTC 60 mins
    It’s no longer business as usual in the multibillion-dollar tech M&A market. New buyers are displacing many of the long-time leaders, while other companies from far outside the tech industry are suddenly looking for ways to buy into new trends. To help you navigate this changing M&A landscape, join Brenon Daly, 451 Research’s Director of Financials, for a look ahead to activity in 2018. Drawing on data and insight from across 451 Research, our annual Tech M&A Outlook webinar will highlight specific trends in key enterprise IT markets – including information security, software, mobility and IoT -- that will shape dealflow and valuations in the coming year.
  • 2018 Trends in Cloud
    2018 Trends in Cloud William Fellows, Melanie Posey, Katy Ring, Owen Rogers Feb 9 2018 4:00 pm UTC 60 mins
    We’re entering the era of cloud consumption. The market is transitioning from one that has been defined mostly by building clouds to one in which cloud service acquisition is the primary driver of IT spending. For enterprises seeking to take advantage of cloud, the key question is ‘how fast can I go?’ As both the foundation for digital transformation and as the platform to support innovation, cloud will bring profound change in 2018.

    Join 451 Research’s leading cloud analysts, William Fellows, Melanie Posey, Katy Ring and Owen Rogers on February 9 for a live webinar as they review and discuss the trends expected to shape the cloud landscape in 2018, and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
  • An Introduction To Snaps
    An Introduction To Snaps Evan Dandrea Feb 13 2018 5:00 pm UTC 60 mins
    What if you could package, distribute, and update any application for Linux Desktops, Servers, Clouds, and IoT devices? Snaps are containerised software packages that are simple to create and install, safe to run, and can work on all major Linux systems without modification. Whether you’re a developer, desktop user, or even a device manufacturer; you won't want to miss this!
  • A Technical Look At Snaps
    A Technical Look At Snaps Evan Dandrea Feb 15 2018 5:00 pm UTC 60 mins
    Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
  • Beyond Visualizations: Drive Revenue with Embedded Analytics
    Beyond Visualizations: Drive Revenue with Embedded Analytics Haarthi Sadasivam, Technical Product Manager, Looker Feb 21 2018 7:00 pm UTC 60 mins
    Incorporate data into your product, and take advantage of word class databases and a modern data platform. And learn from companies that have been there.
  • Bigger, Faster, Connected and More Valuable: Where Data Is Going
    Bigger, Faster, Connected and More Valuable: Where Data Is Going Daniel Mintz, Chief Data Evangelist, Looker Feb 22 2018 7:00 pm UTC 60 mins
    The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem Neil Larkins, Jeanette Garwood Feb 27 2018 3:00 pm UTC 60 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
  • Introduction To Juju: Automating Cloud Operations
    Introduction To Juju: Automating Cloud Operations Tim Penhey Feb 28 2018 5:00 pm UTC 60 mins
    Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
    >The basics of Juju from Charms to Bundles
    >How to easily deploy solutions and scale up from one simple dashboard
    >How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
    >How you can use Juju to simplify your operations!
  • Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe
    Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe Paul Edon, International Services Director, Tripwire Mar 7 2018 3:00 pm UTC 60 mins
    We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.

    • Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
    • Learn how to use a systematic approach to restore trust in affected systems
    • Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
    • Understand key information that needs to be communicated to various stakeholders in the event of a breach

    Paul Edon

    A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.