Hi [[ session.user.profile.firstName ]]

“Rubin’s Law” (and Why IT Spending is About to Hit the Wall)

Moore’s Law (a doubling of capacity approximately every two years), has been an ally in helping CIO’s manage the dynamics of upward demand and downward cost pressure for years but market forces are overwhelming the effects of Moore’s Law and a new “Law” is now required to understand what’s next: “Ru
Moore’s Law (a doubling of capacity approximately every two years), has been an ally in helping CIO’s manage the dynamics of upward demand and downward cost pressure for years but market forces are overwhelming the effects of Moore’s Law and a new “Law” is now required to understand what’s next: “Rubin’s Law.” Hear from renowned expert Dr. Howard Rubin, Professor Emeritus of Computer Science at Hunter College of CUNY and MIT CISR Research Affiliate, about the unexpected market shift that is coming and how you can prepare for it.
Recorded Jun 26 2012 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Howard Rubin President and CEO, Rubin Worldwide
Presentation preview: “Rubin’s Law” (and Why IT Spending is About to Hit the Wall)
Recommended for you:
  • Date
  • Rating
  • Views
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.
  • How to deliver optimised customer experience through digital transformation How to deliver optimised customer experience through digital transformation Adam Kobeissi, Product and Services Director, Niu Solutions & Chomoi Picho-Owiny, Creative Director & Founder, Made Carefully Recorded: May 4 2016 31 mins
    In the age where customer experience is becoming a primary mode of competition and markets are being shaken up by digital disruptors such as Uber and AirBnB, traditional organisations are left wondering, how can we compete? Do they look to scrap their legacy systems and start again, or find a way to integrate these systems with new digital applications?

    Join our webinar, where we will discuss what today’s customers are looking for when they interact with a company, what does good customer experience look like and how can you differentiate? We will explore the key considerations when building your roadmap to digital business transformation; highlighting that this is a journey, not a destination.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • AOL discusses IT Efficiency and Server Decommissioning AOL discusses IT Efficiency and Server Decommissioning Jeff Davis - AOL Recorded: May 3 2016 14 mins
    Jeff Davis, AOL's Technical Director of Data Center Operations, discusses server decommissioning and energy savings.
  • DCIM Market Overview and Procurement Strategies DCIM Market Overview and Procurement Strategies Matt Stansberry Recorded: May 3 2016 44 mins
    The pursuit of Data Center Infrastructure Management (DCIM) benefits leads, too often, in a procurement and implementation process take too long, the software costs too much and the tools often under-deliver. Often, organizations fail to define business requirements for DCIM and evaluate options in a holistic and consistent framework. This webinar can help provide insight into why those outcomes occur and how to avoid.
  • Achieving Management and Operations Excellence Achieving Management and Operations Excellence Lee Kirby Recorded: May 3 2016 7 mins
    No matter how well designed and built your data center infrastructure may be, ultimately it is the day-to-day operations activities and management decisions where the success of your mission stands or falls. In fact, the leading cause of downtime is human error. To mitigate risks, achieve your business goals, and meet uptime requirements, it is critical to unify operating behaviors with the functionality of your infrastructure. These panelists will discuss how they have achieved M&O excellence across their global portfolios leveraging the Uptime Institute M&O Stamp of Approval.
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Key Findings from Symantec’s 2016 Internet Security Threat Report Key Findings from Symantec’s 2016 Internet Security Threat Report Kevin Haley, Director, Symantec Security Response Recorded: May 3 2016 57 mins
    Cyber attacks are increasing in number and sophistication. Today’s threats differ from those encountered a month ago. What can you do to improve your security posture?

    Register for our webcast and receive insights into protecting your organization and its brand, including simple steps to take now and in the future.
  • Corporate Governance for CISOs: Asset Management Corporate Governance for CISOs: Asset Management Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 3 2016 58 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: “Rubin’s Law” (and Why IT Spending is About to Hit the Wall)
  • Live at: Jun 26 2012 7:45 pm
  • Presented by: Dr. Howard Rubin President and CEO, Rubin Worldwide
  • From:
Your email has been sent.
or close
You must be logged in to email this