Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.
We’ll provide an overview of:
o What the General Data Protection Regulation (GDPR) is
o What is pseudonymization and the benefits of pseudonymizing data
o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities
Choosing to move to the Cloud is a great decision, but it’s the first of many more decisions. You have to choose from 70 instance types, with 14 purchase options, running your choice of 4 operating systems, across dozens of availability zones and regions with distinct choices for tenancy and block storage. When you add it up, there are over a million options. In fact, Gartner has calculated that the number of decisions just for deploying an EC2 instance is over 1.7 million.
It’s easy to make the wrong decisions and spend too much or be underprepared to meet demand. There’s only one way to make such decisions reliably and efficiently and that is to automate and follow best practices. In this in-depth discussion and demonstration, Todd Bernhard, CloudCheckr Product Marketing Manager, will show how to use CloudCheckr's Best Practices tool to manage costs.
Join us for a "Deep Dive" into some of the 450+ Best Practice Checks offered by CloudCheckr to:
- Make sure you are not paying for unused resources
- Ensure the resources you are indeed using are being used at a high level of utilization
Assessing performance of a general and flexible business process management (BPM) products and solutions is challenging. It's notoriously difficult to assess, measure, and accurately predict how a product or solution will scale under normal use and load. Each user's unique business requirements and specific implementation design must be taken into account.
Red Hat has partnered with Vizuri, an IT consulting firm, to provide you with a performance test tool for any BPM framework or process server. The BPM performance test tool can be used to model and assess many different scenarios simulating a set of reusable resources. The results will be a uniform performance evaluation that accounts for as much end-user process design and implementation variability as feasible.
Join this webcast to learn more about this tool through a case study on Red Hat® JBoss® BPM Suite.
When you don’t have a solution for data, you fall back on slow, suboptimal tactics for accessing data, denying business users and decision makers access to the most accurate, up to date, and relevant information.
Learn how Talkdesk went from a chaotic world like the one above to being a company where people can easily explore data and quickly get a 360° view of every account. Using FiveTran and Looker, Talkdesk’s product manager was able to tie all their now-centralized data together to create a powerful and stable environment for data discovery.
From this webinar, you will learn:
• What a centralized data store can do for you and how you can achieve that
• Why you should be transforming your data at the time of query, not before you load it into your database
• How one man created a company-wide data platform in one month
Watch to understand how to take control of your data and use it to drive results.
En este webinar, aprenderá sobre los principales pilares que impulsan la estrategia Retail First de Openbravo y entenderá cómo se traducen en innovaciones tangibles de producto diseñadas para ofrecer una ventaja competitiva a minoristas especializados. Describiremos las mejoras ya liberadas como parte de nuestro Roadmap estratégico de producto y presentaremos alguna de las innovaciones hoy en día en desarrollo para su incorporación en futuras versiones del software.
Over the past 20 years, Enterprise IT has evolved from a rigid, buying all IT equipment up-front and provisioning for the next 5 years approach, to the on-demand, agile, scale-out, software defined data centers that the hyperscale companies enjoy today. But if you are not one of those hyperscale companies and need to compete with them, what do you do? Then you will need a solution like Supermicro Rack Scale Design (RSD).
Based on Intel® Rack Scale Design software framework, Supermicro RSD is a total solution comprised of Supermicro server/storage/networking hardware and an optimized rack level management software. Designed with the whole rack as the new management unit in mind, Supermicro RSD leverages industry standard Redfish RESTful APIs developed by DMTF (Distributed Management Task Force) and provides the agility and efficiency for cloud scale data center operators to perform operations such as resource pooling and composability.
In this webinar, experts from Intel and Supermicro will discuss motivations behind Intel® Rack Scale Design software foundation and the unique benefits Supermicro RSD brings to cloud service providers, telecoms, and Fortune 500 companies to build their own agile, efficient, software-defined data centers.
In this webinar you will learn about the business drivers for Openbravo’s Retail First strategy and understand how these translate into tangible product innovations designed to give retailers a competitive edge. We will describe the enhancements already delivered as part of our Strategic Technology Roadmap and discuss the product innovations currently being developed for future releases of our software.
As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.
Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.
The webinar will cover:
• Overview of the VM-Series next-generation firewall
• How the VM-Series prevents cyberattacks in the public cloud
• Key differences between the VM-Series and other cloud security offerings
In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).
In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:
-Evaluate and understand the value and impact of PaaS in your organization
-Devise a migration vetting process
-Create a migration plan to optimize business value
-Use lessons learned from other organizations
The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:
- How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
- Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
- Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.
That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.
Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.
In this webinar, you'll:
* Identify the most effective subscription plans and promotions
* Compare your trial program performance against industry benchmarks
* Use best practices to create a frictionless subscription experience
* Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
* Emma Clark, Sr Product Manager, Recurly
It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.
Register for a chance to win an Apple Watch 2.
As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.
In this session, we will discuss:
- What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
- What benefits your organization should expect from SDS technology
- What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.
Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
IoT is being embraced by an increasingly diverse set of sectors and one which is reaping the benefits is the retail sector, specifically supermarkets and how they are using data in cold-chain (refrigeration) solutions. For this webinar, join Paul Edrich, CTO of IMS Evolve, who is helping major supermarket chains to manage billions of data points in real time to inform operational processes, reduce energy consumption and increase product quality.
This webinar will include the following topics:
- Refrigeration and IoT: problems, new industry trends and benefits
- What IMS Evolve does to solve the problem
- The technologies enabling their solution today
Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.
Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:
• Who is part of APT32, where they are based, whom they target and how they operate
• Advice on how to defend against, hunt for and respond to APT32
• How your organization can improve your ability to detect, prevent and remediate APT32 attacks
Are you or your finance users struggling with time constraints in entering manual FI/CO type entries into SAP? Are you limited by your current financial custom uploading tool? Don’t worry, there is a cure.
Entering financial or journal entries into SAP efficiently is essential to managing all aspects of your business, yet manually keying all those entries (one line at a time) into inflexible SAP T-code entry screens can be time consuming and painful. The IT Department can build your staff a home-grown custom loader for loading journal entry information into SAP; however, these batch loaders tend to be limited and inflexible, don’t handle errors well, and require ongoing IT support and maintenance. It is merely a band aid to a larger issue.
GLSU is an Excel add-in for uploading financial data into SAP. It streamlines financial data entry and reporting without the dependency on IT making it the ultimate cure. Additional GLSU features include:
1. Park and Post all from Excel
2. Sophisticated error handling and business logic
3. Excel templates created and modified in seconds with no programming or scripting.
Attend this webinar to learn:
• What current SAP financial uploading tools are often used today
• The limitations for SAP users in their current FI/CO entry process
• How GLSU, a financial spreadsheet uploader for SAP, can help reduce the manual waste and increase efficiency.
If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?
AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.
Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.
In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.
- Understand why you may use Amazon Machine Learning with IoT and how to set it up.
- Understand how to use IoT Rules Engine
Watch a demonstration of an end to end loan application built with Bizagi. The demonstration will show you how you can deliver a customer experience across multiple channels both from the perspective of the customers and the employees. Also, walk you through the process model for this application, designed in the Bizagi Modeler.
Bizagi is a digital business platform that wraps around existing legacy systems to transform organizations into agile, engaging and connected digital businesses. The platform comprises of Bizagi Modeler to design the process models, Bizagi Studio to turn process models into running applications and Bizagi Engine to run the applications enterprise-wide.
Headquartered in the UK with customers across the world, Bizagi is a global leader in digital business platforms. With a global user community of over 650,000 process pioneers, Bizagi has helped over 500 enterprises in 50 countries to survive and thrive in the digital age.
Developers must often build and deploy applications that rely on isolated products. Instead of focusing on development, they find themselves worrying about the deployment and management of underlying services, as well as the configuration of historically error-prone areas like clustering, resource constraint tuning, and software updates.
Red Hat addresses this challenge by making its middleware portfolio available as containerized services, transforming them from isolated products to integrated application services running in a managed container environment.
Join this webcast to learn how to quickly and easily build a wide range of application types using Red Hat® JBoss® Middleware as containerized services on Red Hat OpenShift Container Platform.
The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.
During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:
- Going all-in with the cloud as a major competitive advantage
- Understanding the differences between on-prem vs. operating in the cloud
- Choosing the right cloud management tools to gain complete visibility
The shift of customer service from a cost center to an engagement center will spur investments in more intelligent automation and conversational approaches to service and commerce. With 76% of customers preferring digital channels to communicate with businesses, and roughly 40% choosing to chat with a business through SMS, social media or Facebook messenger, conversational technologies have forever changed the customer service experience. Learn first-hand, from industry peers, how smart chatbots are improving how businesses converse with customers, and nurture relationships across the customer journey.
Join the 451 Group, Ticketmaster and Inbenta for this session to discover how:
•Digital engagement will shift commerce and service from interactions to conversations [The 451 Group predicts that 80% of all customer interactions will eventually be contained in a self-service channel].
•Customers want self-service options on their own terms, in their preferred channels, including SMS, web or mobile chat. [The 451 Group data shows 55% of survey respondents prefer self-serve tools to avoid calling a customer service agent]
•How businesses like Ticketmaster leverage enterprise-class chatbots; key factors to include and what to to avoid when launching a chatbot pilot [55% of companies employ self-service solutions; and 26% say they plan to build a chatbot as part of their self-service strategy]
What we know and have trained users about phishing attacks has changed. Old methods no longer apply.
IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.
None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.
Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.
In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.
Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:
* Identify trends and techniques in methods used for credential theft and abuse.
* Review how cybercriminals have changed their tactics to compromise networks.
* Examine who is being targeted, and why.
* Discuss techniques to stop credential leakage.
* Review the FBI’s role in combating this destructive attack.
Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.
Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.
Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
•Security considerations when moving to Azure
•Top 3 VM-Series recommendations to protect your data
•Tips and techniques to streamline your efforts
Your enterprise and applications need to communicate – to collect information from many sources and get data where and when it needs to be, which increasingly means in real-time. Complicating matters, as you migrate applications to the cloud and implement IoT strategies, they need to connect increasingly diverse endpoints and systems running in diverse public cloud, private cloud and on-premise environments.
In this webinar, we’ll describe and demonstrate how the Solace Virtual Message Router can give applications and microservices running in Pivotal Cloud Foundry the ability to exchange information using open APIs and protocols like AMQP, JMS, MQTT, Qpid, Paho, REST and WebSockets. Jonathan Schabowsky of Solace’s office of the CTO will show how easily you can enable real-time communications between microservices with the new Solace Messaging Tile for Pivotal Cloud Foundry and how you can integrate Solace into your crucial data movement solution.
Jonathan Schabowsky is a Sr. Architect in the Office of the CTO at Solace. His expertise includes architecting large-scale, mission critical enterprise systems in various domains, such as for the FAA, satellite ground systems (GOES-R) and healthcare. Recently, Jonathan has been focused on the use of event driven architectures for microservices and their deployments into platform-as-a-services (PaaS) running within public clouds.
Government-developed malware is loose and IT teams are scrambling. Avanan customers were protected and we had the resources of multiple partners to analyze the attack.
In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future email phishing outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them.
We will introduce the zero-day monitoring tool at www.avanan.com/gauge and show how different tools on the Avanan platform responded to the outbreak.
Today, more than ever, the only protection is a multi-layer, multi-technology, multi-vendor solution. True defense-in-depth that includes the best technology that the security industry can offer.
The WannaCry ransomware attacks a great example how neglecting security patches can have a catastrophic impact for businesses.
While many discuss whether their anti-virus could have stopped the attack, the plain facts are:
-This attack uses a vulnerability on a component of Windows and Windows Server that was patched by Microsoft two months ago
-The vulnerability was part of the recent NSA leak, a highly publicized scandal, and not an obscure vulnerability that no one had heard of before
-Applying the patch would prevent any successful attack
Join us for a discussion on the challenges of patch management and how to improve patching processes to avoid falling victim of attacks like WannaCry.
Predictive analysis, mass provisioning, and building large, scalable clouds can all happen more quickly, less expensively, and with less risk when it's on the right infrastructure.
In this webinar you'll learn:
How to stair-step from simple digitization to innovation.
How to become bimodal—an environment with both traditional and emerging technologies.
How being bimodal makes you more agile and better able to align with your business priorities.
You'll leave this webinar knowing why the right infrastructure—Red Hat® Cloud Infrastructure, which includes Red Hat Insights and Red Hat CloudForms—is your stairway to the cloud.
Since its advent in 1974, POS has managed almost 100% of transaction processing with utmost efficiency. Even though modern Cloud POS helps to establish digital experience, traditional legacy POS systems cannot meet digital requirements and diminish the customer experience, online reachability as it lacks real-time access, inventory management & Omni-channel capabilities.
Learn how you can make your existing legacy POS more powerful & connected with your digital strategy to meet modern customers.
En este webinar, explicaremos los cambios que introduce el "Suministro Inmediato de Información" (SII) y cómo afecta a la gestión diaria de facturación y liquidación del IVA de las empresas. La sesión también incluirá una breve presentación de cómo Openbravo cubre estas nuevas necesidades de una manera sencilla y eficaz para soportar la gestión telemática de este impuesto de acuerdo a los nuevos requerimientos.
AWS Elastic Block Store (EBS) is Amazon’s most widely used cloud storage service— and with good reason. It is designed specifically for use with EC2, is suited to a wide variety of use cases, offers four different volume types, and boasts an extensive range of options and features. However, it also represents a significant chunk of your monthly AWS bill. So, it’s essential you use EBS wisely by striking the right balance between cost and performance, and eliminating unnecessary waste on storage resources.
To make the most of your organization’s cloud spend and leverage resources efficiently, it’s important to understand Amazon EBS. This webinar will help you by:
• Explaining the four different EBS volume types from a cost and performance perspective
• Discussing some of the hidden costs of EBS
• Providing a few monitoring tips to help you reduce EBS expenditure
Join us to learn about JupyterLab, the new open source computational environment for Jupyter. Increase the performance of your data science projects by working in an integrated environment for your notebooks, editor, terminal and console. We will also discuss R-Brain cloud platform and its new R Python Cloud IDE which is built on JupyterLab.
Learn how to securely configure host settings and Docker Engine.
Docker allows teams to increase the speed and scale that they can deliver software. As a result, adoption rates for docker are accelerating as more organizations are looking for ways to innovate faster.
As you move down the path to containers, it is important to note that an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, but it will leave your host exposed to many security and performance concerns if not configured properly.
Join us for this webinar to learn how to:
- Configure host settings to harden and protect it from unauthorized access
- Install and configure a Docker Engine with minimal attack surface
- Ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.
Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.
This webinar will cover
• Auto Scaling the VM-Series architecture
• Auto Scaling and ELB integration details
• Alternative architectures for protecting many VPCs
Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
Container-native storage offers developers the ability to dynamically provision storage for their modern applications. With the release of Red Hat® OpenShift Container Platform 3.5, enterprises now have the option of persisting their container registry on Red Hat Gluster Storage.
In this webinar, you'll learn from a Red Hat expert how:
- To make container registries persistent.
- Advanced data services, like asynchronous geo-replication, are natively supported.
- The advanced data services can be used to provide better disaster recovery.
- To optimize day-2 management operations for container storage.
Join SAP and Zebra Technologies to learn how you can partner with SAP to develop and monetize your own applications connecting Zebra devices using SAP Cloud Platform services. The session will also highlight the asset intelligence solutions and services which you can leverage with your own manufacturing, logistics, healthcare and retail applications to drive increased worker productivity and product line efficiency for your customers.
Don’t miss this opportunity to hear from product experts and senior members from both SAP and Zebra Technologies!
Most industry analysts agree that big data warehouses, built on a relational database, will continue to be the primary analytic database for storing much of the company’s core transactional data. These data warehouses will be augmented by big data systems. Even though this new information architecture consists of multiple physical data repositories and formats, the logical architecture is a single integrated data platform, spanning the relational data warehouse and the data lake.
Join the discussion to find out more about how high performance, high density all-flash storage can help.
Challenged by IT infrastructure bottlenecks? Certification, compliance and security issues impeding your roll out of new applications? Are you an IT, Ops or Automation person working in the financial services industry? Then, this webinar is for you!
Join this 60-minute webinar with a demo and Q&A to learn:
•Overview of how IT infrastructure updates impact security and compliance faced by financial services
•Application and Infrastructure modernization initiatives including in brownfield deployments
•How to efficiently introduce, test and validate IT infrastructure and application updates
Customer loyalty is won with both marketing messaging and customer service that anticipates needs, answers questions, and solves issues on the fly. And a well-integrated, data-soaked AI platform can deliver that perfectly timed, exquisitely personalized customer service with the right message, right time, right place support and communication that leads to big jumps in engagement rates. Not to mention enduring loyalty.
But while integrating AI technology into your marketing automation systems can help build profitable long-term relationships, there are security issues to tackle, privacy issues to consider, and data integration to execute flawlessly.
Want to do it right? Join our free VB Live event to learn how master marketers join marketing insight with AI intelligence execution to significantly boost customer loyalty.
In this webinar, you’ll:
* Learn how deep learning can help your customers get a "human" through chat
* Cut through the hype around chat bots and learn what really matters
* Understand privacy issues around AI and how it may impact your org's security
* Integrate a successful marketing campaign using chatbot interactions
Stewart Rogers, Director of marketing technology, VentureBeat
Wendy Schuchart, Moderator, VentureBeat
With several layers of your IT stack living in the cloud, how do you identify health issues? And pinpoint the root cause? Join us for a fireside chat with Greg Hohertz, principal solution architect at Blue Medora, to provide insight into how you can quickly identify health issues in your cloud environments and leverage industry best practices to improve troubleshooting.
In today's retail environment, retailers need to adopt smarter inventory management systems that enable them to deliver the right goods at the right time and at the right cost. In this introductory webinar, we will explain how to optimize inventory in your warehouse to satisfy customer demands while ensuring the business is not carrying excess inventory that wastes money and acts as a drag on financial performance. In a second webinar we demonstrate some the new features in Openbravo software that allow retailers to adopt sophisticated warehouse management techniques that optimize stock, space and staff use to reduce working capital requirements and so enhance financial performance.
Hoy en día, los minoristas necesitan adoptar sistemas de gestión de inventario más inteligentes que les permitan entregar los productos adecuados en el momento adecuado y con el coste adecuado. En este webinar introductorio explicaremos cómo optimizar el inventario en su almacén para satisfacer las demandas de los clientes mientras se asegura que el negocio no gestiona un exceso de inventario, lo que implica costes innecesarios que actúan como un obstáculo para el rendimiento financiero. En un segundo webinar demostraremos algunas de las nuevas características de la solución de Openbravo que permiten a los minoristas adoptar técnicas avanzadas de gestión de almacenes que optimizan el uso de stock, espacio y personal para reducir el capital circulante y así mejorar el rendimiento financiero.
Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:
•How to secure your company’s cloud expansion
•Which assets should be hosted in the cloud vs. on-prem
•What pace you should be moving at to reach your end goal
•How to maximize flexibility and performance for IT operations with cloud security