As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.
In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:
• Why the status quo for transportation data collection is no longer good enough
• The types of Massive Mobile Data that are useful for transportation and urban planning
• Algorithmic processing techniques that are critical for making this data useful
• Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
• A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts
Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.
In this webinar, you’ll learn:
- How to identify if an IoT solution will work for your use case.
- What others in healthcare are using IoT for.
- The challenges of IoT in healthcare
Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
As Oracle de-supports Discoverer, many companies are struggling to find the right ‘replacement’ tool that will protect their investment and will minimize the impact on IT staff and end users.
Join Michael Armstrong-Smith, an Oracle ACE, author of all three editions of the "Oracle Press, Oracle BI Discoverer Handbook", and leading expert on all things Discoverer as he discusses:
- His experience with Discoverer, past, present and future
- The opportunity for better reporting
- What to look for in a new reporting solution
- What he is recommending to his clients
- Plus much more
When your SecOps team receives an alarm, investigation and rapid incident response can mean the difference between quick containment and a damaging data breach.
Security Automation and Orchestration (SAO) accelerates threat qualification, investigation, and remediation with incident response workflow and automated playbooks. This embedded feature set in the LogRhythm platform allows your team to securely and efficiently collaborate so they can make quick and accurate decisions.
Watch the video demo to see how LogRhythm’s embedded SAO capabilities can simplify and streamline your SecOps workflow.
The stakes of managing complex infrastructure continue to increase alongside the ever-increasing costs of outages. And while many IT Operations teams are investing in monitoring and ITSM tools to detect issues, they are often forced to react to high volumes of event data without context and without any consistent, well-defined processes. This leads to costly operational inefficiencies, employee burnout, and extended customer downtime.
Join us as we share newly PagerDuty product capabilities specifically designed for modern IT Operations teams. These capabilities take the chaos out of the incident resolution lifecycle — from assess, to resolve, to learn. Learn from the collective wisdom of thousands of the best IT operations teams how to make the unpredictable predictable, so you can spend more time on innovation.
You’ll discover how to:
•Optimize your ITSM toolsets by integrating people, data, and processes
•Maximize cross-functional transparency and consistency
•Prioritize incidents with well-defined rules
•Automate troubleshooting and remediation
•Ensure continuous learning and improvements across your team
Whenever there is data, there is the chance to visualize it and gain valuable insights that can drive change and improvements. Governments have realized the potential that data holds for transforming our towns, cities, living spaces and communities to better address the needs of our modern society.
Governments may want to change public transport services to suit commuters who move away from city centers due to increasing living costs, or develop programs that deliver more support services to areas showing high incidences of mental illnesses, or simply monitor bike traffic to assess the necessity of additional cycle lanes and bike share programs in our capitals. Data and data visualization can help us identify the needs of our communities and can support us in addressing them effectively.
In this webinar Andy and Eva will present examples of Government using data to improve services for communities and will share how you can get involved through analyzing open data and becoming part of the wider 'dataviz' community.
We will examine challenges regarding business model design in the emerging context of the Internet of Things (IoT).
An unrefined IoT business model implies a significant risk in terms of investment and implementation.
The key question is, "How can IoT application models be subjected to a reality check taking into account challenges pertaining technology, organization and target markets?"
Moving from A-B is slowly being revolutionised through data. Car-sharing and ride-hailing are just the beginning. Thousands of connected devices are currently monitoring data points, and although stand-alone analysis can be useful, true innovation occurs when these data sets are combined to transform into something new.
In the near future, IoT data explosion and the API revolution will collide to change city planning, urban movement and the role of the car in the 21st century.
First off, we set out to understand what big data means in the context of transportation, answering questions such as what is it, where is it coming from, and what can you do with it.
- Next, we'll zoom out and apply these learning to transport innovation in a wider context, considering how it will influence concepts such as urban movement, social mobility, and quality of life.
- Finally, we'll discuss the relationship between open data and innovation.
Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.
In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.
Webinar 3: Network Operations Management
Auch an die Sicherheit und Leistungsfähigkeit von Netzwerken stellt die Digitalisierung hohe Anforderungen. Hierbei stehen neben dem Fehler- und Verfügbarkeitsmanagement ein kontinuierlicher Blick auf die richtige Konfiguration des Netzes im Fokus sowie die Einhaltung von fremden und eigenen Compliance-Richtlinien.
Oft sind viele unterschiedliche Werkzeuge im Einsatz, die typischerweise nicht oder nur mangelhaft integriert sind. Die reibungslose Netzwerküberwachung im laufenden Betrieb scheitert, da die Pflege der isolierten bzw. nicht integrierten Systeme zu arbeitsintensiv ist. Informieren Sie sich in diesem Webinar über unsere integrative Netzwerkmanagement-Lösung, die die heutigen Netzwerkmanagement-Anforderungen abdeckt und die Arbeitsaufwände reduziert.
For decades, traditional relational databases have been the primary choice for data storage and persistence. These database systems continue to rely on monolithic architectures and were not designed to take advantage of cloud infrastructure. These monolithic architectures present many challenges, particularly in areas such as cost, flexibility, and availability.
In 2016, Amazon Web Services Premier Partner, 2nd Watch, performed an analysis on the amount of AWS billing data that they had collected, and the number of payer accounts they had processed over the course of the previous year. The results of that analysis revealed that their single MS SQL server instance could no longer support the rapid pace at which the company continues to grow and on-board new clients.
Join AWS Premier Partner, 2nd Watch, for a live webinar on Migrating Microsoft SQL Server to Amazon Aurora on Monday, June 26 at 10am PST / 1pm EST and hear how they successfully migrated their Microsoft SQL Server to Amazon Aurora to help them meet customer demands and prepare for future growth.
As ecommerce merchants scale their business to meet rising demand, the manner in which they manage fraud changes dramatically. Join Skye Spear as he walks through real-world examples of ecommerce pioneers who have grown rapidly while reducing fraud losses.
ABOUT THE SPEAKER:
Skye Spear is the Vice President of Partnerships at Signifyd, the world's largest provider of Guaranteed Fraud Protection. Signifyd eliminates fraud losses with a 100% financial guarantee against fraud, allowing merchants to enter new markets and accept significantly more orders. Skye manages Signifyd's strategic relationships with partners and key ecommerce players. Prior to joining Signifyd, Skye held key positions at Silver Tail Systems and RSA Security.
Industry-leading security analysts have identified publicly available S3 storage buckets on at least one high profile site. While this is a legitimate concern, it presents a timely opportunity for all cloud administrators to revisit their own security policies and take action. Security breaches can rapidly burn through budgets—and destroy businesses.
While public cloud providers provide the foundational security services, the responsibility is on organizations and end users to ensure their cloud infrastructure is secure. CloudCheckr’s Best Practice Checks enable proactive security monitoring and automation to prevent hacks through available S3 buckets, vulnerable ports, and more. Join us to learn tools and tips to keep your cloud secure:
- Best Practice Checks that can detect such concerns before they become an issue
- Fix Now automation tools that can automatically correct such issues
- Regulatory tools to ensure compliance with security standards
While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.
Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this live webinar “Best Practices and Future Direction of Security Awareness Training”. We will discuss emerging industry trends and provide the actionable information you need to train your last line of defense, your employees.
Perry will cover these topics:
- Practical security awareness and behavior management tips
- Outline how and where tools are helpful
- Discuss emerging industry trends
- How to create a “human firewall”
Join Kroll’s expert as we discuss some of the issues relating to the legal, operational, reputational risks which companies must consider when facing such incidents, and how these risks can be mitigated.
Samen met onze partner CGI organiseren wij een webinar waarin wij u uitleggen hoe u onnodige financiële risico's door 'Indirect Gebruik' van SAP kunt voorkomen. Als software experts zien wij in de praktijk dat de licentiering voor SAP nogal complex is. Zoals u vermoedelijk wellicht weet werkt SAP met custom contracts en daarnaast zorgen 3rd party applicaties en add-ons voor veel verwarring. Dit type toegang is bekend als indirect usage.
SAP-klanten lopen steeds vaker tegen financiële risico’s aan door audits. Wilt u dit voorkomen? Volg dan ons Webinar en wij leggen u binnen een uur uit:
- Hoe identificeert u “inactive users” binnen uw SAP domein
- Hoe analyseert u zogenaamde overspent of underspent situatie’s
- Hoe identificeert u Indirect Usage binnen uw organisatie.
- Welke SAP condities en voorwaarden leiden tot financiële risico’s
- Wat kunt u al doen aan indirect usage?
Voorkom een hoge audit boete voor uw organisatie! Zorg ervoor dat u volledig voorbereid bent en verlaag uw risico tot een minimum.
Mocht u nog vragen hebben over het Webinar neem dan gerust contact op via email@example.com
Join us for a mini deep-dive into Automation & Microservices in the context of enabling Agile development.
We will discuss what a transition from a Monolithic to a Microservices Architecture looks like and share perspectives and best practices on Project Methodologies, Automation, Tooling and deploying code.
Duration: 30 minutes
Mark Duhm, Hyperscale Practice Lead, Datapipe Europe
Hiten Mistry, Senior Solution Architect
Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.
This webinar discusses:
- Why Enterprise and Service Provider networks require segmentation
- What is SD-WAN segmentation
- How VeloCloud segmentation is implemented and optimized
On ne vous explique plus ce qu’est WannaCry et l’impact que le ransomware a eu avec plus de 200 000 infections dans 150 pays depuis le 12 mai dernier.
Vous savez également que Wannacry utilise l’exploit ETERNALBLUE et vise donc la vulnérabilité Microsoft (MS17-010).
Mais ce que vous ne savez peut-être pas c’est que seulement 28 jours sont nécessaires pour que l’attaque soit effective !
Autrement dit, les entreprises qui scannent leurs vulnérabilités mensuellement ou moins fréquemment sont à risque.
Lors de ce webcast, Leif Kremkow Directeur Technique, Qualys vous expliquera comment :
* Patcher et limiter les effets de WannaCry et d’attaques du même type
* Détecter et obtenir une visibilité complète des assets touchés pour agir au mieux et au plus vite
* Mettre en place un processus priorisé de remédiation des menaces pour limiter et gérer de façon optimum.
* Enfin pour lutter contre WannaCry, nous avons offert à nos clients un service gratuit et illimité de 30 jours pour identifier et remédier. Nous ferons un bilan de cette opération.
Inscrivez-vous au webcast et découvrez comment Qualys peut vous aider.
GDPR – if you haven’t heard of it yet, you soon will. The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is intended to strengthen and unify data protection for all individuals within the European Union and it will apply from 25th May 2018.
SAP’s strong offerings in terms of Governance, Risk, Compliance and Security help protect organisations at the level of systems, processes and in-built controls. But what about the people part of the picture? SAP Education offers support for both training your people and, testing them so you can prove you’ve taken every step to fulfil the regulation and prevent compliance breaches.
Join us live on June 27th for a 50-minute FREE webinar& demo to find out how SAP Assessment Management by Questionmark can reduce risk and help you comply through thorough and verifiable assessment.
Amanda Maguire is a senior education architect with over 20 years' experience on business transformation programmes. With a career focused on the impacts on people – project team members, end users, suppliers and customers, Amanda has a passion for effective and engaging education, enabling people through innovative learning interventions. Her experience is wide ranging - from national to global programmes in a variety of industries.
27 June 2017, 12:00 CEST webinar on how to improve ICT energy efficiency in your business. Want to become more sustainable in ICT?
Great line-up of experts on ICT sustainability
Alex Bardell, Member of Executive Board at Sustainability for London, will focus his presentation on Data Centres standards, reviewing them in relation to energy efficiency and sustainability. His insights will help you understand what standards are and how they can help you reduce energy and carbon consumption.
Silvana Muscella, founder/CEO of Trust-IT Services and Project Coordinator of ICTFOOTPRINT.eu, will introduce the Self-Assessment Tool for ICT Services (SAT-S). SAT-S is a useful, free, quick and easy-to-use tool to calculate the carbon footprint of ICT services. It is a practical tool for ICT-intensive organisations to position their ICT services footprint. Silvana is the driver behind the development of useful digital tools and services for smaller companies, in several ICT areas, such as energy efficiency, and especially useful for helping novices make their ICT more sustainable. The final version of SAT-S is planned for June 2017.
Andie Stephens, Senior Customer/Project Manager at Carbon Trust and member of ICTFOOTPRINT.eu External Advisory Group, will share insights from ICT Sector Guidance for the GHG Protocol Product Standard, which provides detailed guidance for the foot-printing of ICT products and services in the following areas: Telecommunications Network Services, Desktop Managed Services, Cloud and Data Center Services, Hardware, and Software. Andie’s presentation will provide an overview of the structure and applicability of the ICT Sector Guidance.
The number of sophisticated attacks targeting banks and financial institutions is growing at a rapid pace. Any failure to quickly detect and neutralize these threats puts an organization at risk for huge losses. In fact, only 53% of businesses feel that financial organizations do enough to protect their information and 74% of companies choose a financial organization based on their security reputation. However, not all is lost; Rapid advancements in analytic capabilities changed the way data scientists, security teams and fraud analysts fight threats targeting their organizations.
Please join our special guest – David Balcar – a globally recognized security professional, as he shares real world experience of cyber security in financial institutions.
Here are some of the topics David is going to discuss:
•Security budgets: current trends
•Notable cases of threats affecting financial institutions: DDoS attack on TalkTalk
• Targeted attacks and Mobile threats landscape
• Adaptive Security Strategy
• Kaspersky Enterprise portfolio - Talk about KSIS, KESS KSDC & KATA solutions
Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.
Operational risk is perhaps the most significant risk organizations face. Virtually every major loss that has taken place during the past 30 years, from Enron, Worldcom and Baring's Bank to the unauthorized trading incident at Société Générale and the subprime credit crisis, has been driven by operational failures.
Many financial institutions have spent millions of dollars trying to develop a robust framework for measuring and managing operational risk. Yet, in spite of this huge investment, for many firms developing a viable operational risk management (ORM) program remains an elusive goal.
This webinar is designed for both current students of the “Mastering Operational Risk” - http://www.globalriskacademy.com/p/orm online course and for other busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.
The goal is three-fold:
1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
3. People who are just interested to know more about ORM
During the webinar we will cover:
1. 3 things most organizations are focusing on right now.
2. What are the major steps to take control of operational risks.
3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.
Join our next customer webinar where YOU are the star of the show! Our Ask the Experts panel features Hal Hearst, Principal Product Manager; Utsav Sanghani, Product Manager; and Don Mulrenan, Manager Implementation Services. They’ll present their top three tips for scanning your code, helping you use Black Duck Hub’s features most effectively. We’ll leave plenty of time for Q&A with the panel. Submit your questions now by emailing firstname.lastname@example.org, or ask them during the webinar. We’re excited to have this opportunity to answer your questions and hear your feedback about Black Duck Hub. Register today.
For most enterprises dealing with increased security threats, limiting machine data collection is not an option. But with finite IT budgets, few organizations can continue to absorb the high costs of scaling high-end Network Attached Storage (NAS) or moving to and expanding a block-based storage footprint. Join this webinar to discover options for more cost-effective solutions that enable large-scale machine data ingestion and fast data access for security analytics.
- The common challenges companies see when scaling security workflows
- Why a high-performance cache works to solve these issues
- How to integrate cloud into processing and storage for additional scalability and efficiencies
Presenters will build an actionable framework in just thirty minutes and then take questions.
Migrating to the cloud can transform an organization. But is your organization ready? It can be a struggle to translate buzz words into a successful paradigm shift from a legacy server/data center model to purchasing in a cloud broker model. And, if your move is not properly planned and effectively executed, your cloud initiative may result in unexpected cost overruns, or worse. A successful roadmap is not just about planning and migration, it’s also about aligning your organization to most effectively use the cloud.
In this live webinar, TierPoint Vice President of Professional Services, Matt Brickey and Dell EMC’s Director of Data Mobility, Peter Molnar, will share their combined expertise, including client use cases, derived in helping hundreds of clients “cloudify” their applications and data, and leverage the cloud to full advantage.
Join Matt and Peter as they answer key questions about creating a successful cloud roadmap, including:
- How to assess your organization’s cloud readiness
- How to evaluate which workloads are the best candidates for the cloud
- In a multi-cloud world, which cloud(s) are right for your organization?
- Crucial migration planning considerations and milestones
Data is becoming increasingly easy to come by, but how do you harness it to derive value and drive outcomes? How can you ensure that you are delivering meaningful insights when they are needed and where they belong?
Join this webinar to learn how the IT organization at KAR Auction Services was able to evolve from operating with no visibility or standardized performance metrics to an agile business with real-time insight and the ability to make trusted business decisions. Discover how KAR was able to expand their usage of Performance Analytics and Reporting, leading to marked stability and measurable gains in performance across IT.
The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.
Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.
This webinar will address:
Solutions, support & decisions
40G or 25G lanes?
Preterminated vs field-terminated cables
Duplex or Parallel transmissions
Singlemode, multimode or wideband multimode fiber?
Attendees with earn one BICSI Continuing Education Credit for attending.
The latest version of Data Center Automation (DCA) Suite version is now available. DCA is an end-to-end lifecycle management solution for servers, databases and middleware. Now, DCA comes with new features—container-based deployment, unified compliance, and ChatOps collaboration.
Join Nisarg Shah, Director Product Management, as he discusses the latest release, answers your questions, and shares the new DCA UI.
• See the DCA Suite—provisioning, patching, compliance, open API orchestration
• Learn how container-based deployment delivers quick time-to-value
• Discover why automated compliance and remediation matters
• Hear about unified compliance—not just for servers, but across applications
• Understand how ChatOps helps collaboration in the enterprise
• See a demo: DCA compliance in action—PCI compliance scan, auto-remediation, visual compliance dashboard
MEF's prestigious annual Awards Program, now in its 12th year, is the world's largest, longest-running awards program. It focuses on leadership in emerging Third Network services powered by LSO (Lifecycle Service Orchestration), NFV, SDN, and CE 2.0 networking technologies. The MEF 2017 Awards program recognizes service, application, technology, and professional excellence in the vibrant global Third Network community committed to delivering innovative solutions that are optimized for the digital economy and the hyper-connected world. The most advanced services typically provide an on-demand experience with user-directed control over service capabilities and are delivered over more automated, virtualized, and interconnected networks.
This webinar that will help you identify the award categories in which your company excels. Attend and learn how to prepare an excellent award submission. We will cover:
-MEF award categories and important dates
-How to use the award submissions portal
-Tips for writing concise, compelling submissions
The deadline for submissions is September 13, 2017. Awards finalists will be announced on October 17, 2017.
This is an excellent opportunity to have all of your questions answered and will help you to get one step closer to being an award winner.
If you missed Data Center World conference in April 2017, then you also missed the session explaining what is Network Security Policy Management (NSPM) and why it's a big deal.
Join this Webinar to learn how the complex nature of data centers today drives the adoption of NSPM and what are the benefits to your organization.
Ron Kehoe has over 30 years of experience in security solutions architecture and consulting, and was a network security manager at First Republic Bank prior to joining Tufin as a senior solutions engineer.
In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.
This session will include:
- A deep dive into setting up the physical and virtual network infrastructure.
- Demos you can follow to get NSX quickly running in your environment.
In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. Starting in May 2018, enforcement will kick in on the European Union’s General Data Protection Regulation (GDPR), a move that could have a stronger privacy/security standardization effect than any technological effort has to date. Globalization efforts will make GDPR compliance essential for global companies wherever they are located.
The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data to comply with global regulations such as GDPR. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.
Business is moving faster than ever—and enterprise IT departments are struggling to keep up. Organizations need apps to run faster and more reliably, provision without the hassle, and scale on-demand while staying in budget. Hyper-converged infrastructure (HCI) makes all of that possible. Join us for the webcast to get a closer look at HCI, and find out how it can transform your data center.
You’ll learn about:
—The evolution of the modern data center
—What HCI is and the case for a software-defined approach
—The tangible—and intangible—benefits of HCI
—How HCI works in the real world