Hi [[ session.user.profile.firstName ]]

IT Service Management

  • The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My!
    The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My! Marci Parker, Garrison Ball, Meghan Lockwood Recorded: Feb 22 2018 54 mins
    With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Recorded: Feb 22 2018 54 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed
    IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed Hyoun Park and Valicom Recorded: Feb 22 2018 61 mins
    Recommended Audience: CFOs, CIOs, IT Directors, Network Directors, Telecom Directors, Mobility Directors, Enterprise Architects, Procurement Directors

    Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.

    Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.

    In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.

    This Amalgam Insights webinar is generously sponsored by Valicom
  • How to unlock savings in Mobile Device Deployments
    How to unlock savings in Mobile Device Deployments Craig Riegelhaupt Recorded: Feb 22 2018 9 mins
    Gartner states that companies with 500+ employees could be paying upward of 30% more than necessary on mobile*

    Want to make sure you're not one of them? We'll take 10 minutes to uncover how.

    *Gartner, “Focus on Four Areas to Control U.S. Cellular Voice and Data Service Costs, 2016,” Bill Menezes, 8 December 2016
  • Kilpailut asiakaspalvelun toiminnan kehittämismenetelmänä
    Kilpailut asiakaspalvelun toiminnan kehittämismenetelmänä Elina Soukola ja Liisa Torkkeli Recorded: Feb 22 2018 31 mins
    Tässä webinaarissa saat käsityksen, millaisia toiminnan kehittämisen menetelmiä kilpailut ovat asiakaspalveluyksikölle. Webinaari on jaettu kahteen osaan.

    Ensin käsitellään Vuoden Contact Center -kilpailua ja jäljempänä Vuoden Service Desk -kilpailua. Molemmat kilpailut sisältävät itsearvioinnin sekä finalisteille auditoijien toteuttaman auditoinnin. Tule kuuntelemaan, miksi kannattaa osallistua kilpailuun ja kuka voi osallistua sekä mitä saat osallistuessa kilpailuun ja miten se etenee!

    VUODEN CONTACT CENTER -tittelistä kisaavat Suomen parhaat contact center tiimit! Wave eli Wakarun Asiakaspalveluverkosto järjestää Vuoden Contact Center -kilpailun yhteistyössä Kehittämistoimisto Prakto Oy:n ja Palvelu Plus Oy:n kanssa. Contact Center Assessment -ohjelmassa (CCA) palvelukeskuksen toiminta arvioidaan kuuden keskeisen osa-alueen osalta.

    VUODEN SERVICE DESK -tittelistä kisaavat Suomen parhaat service desk -tiimit! Kisaan voivat osallistua yksityisen tai julkisen sektorin organisaatiot, niin isot kuin pienet yksiköt. Kilpailussa on yksi sarja. Arvioinnissa huomioidaan yksikön koko, toiminnan luonne ja sen luomat tarpeet. Arviointiin on Kansainvälisen HDI-tukipalvelustandardin (The HDI Support Center Standard 2014) lisäksi sisällytetty ITILiä eli IT -palvelunhallinnan parhaita käytäntöjä sekä soveltuvia osia ISO/IEC 20000 -standardista.
  • Continuous Improvement - Business Transformation
    Continuous Improvement - Business Transformation Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Recorded: Feb 21 2018 59 mins
    Not that long-ago business transformation was a major, disruptive event that an organization went through every few years when it felt it had no choice. In this webinar industry expert and ProjectManagement.com contributor Andy Jordan is joined by CA’s Jim Tisch to discuss how today’s world of business transformation is very different. They’ll discuss:

    •How business transformation is now an integral part of every planning session
    •The evolution towards continuous business transformation
    •How project portfolio management (PPM) lessons learned drive transformation
    •The concept of strategic continuous improvement

    If you feel as though your organization could be faster to respond to challenges, could do a better job of managing transformation or simply isn’t evolving as fast as it should, you cannot afford to miss that webinar.
  • Verizon Threat Research Advisory Center - Cryptocurrency Attacks
    Verizon Threat Research Advisory Center - Cryptocurrency Attacks John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Feb 21 2018 89 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Better Cost Allocations. Better Business Decisions
    Better Cost Allocations. Better Business Decisions Ann-Marie Murray Recorded: Feb 21 2018 12 mins
    Don't let inefficient cost allocations cause bad business decisions. Inaccurate allocations diminish the value of reporting, distorting your understanding of where in the business costs are being consumed.

    With the right practices in place, accurate cost allocations are achievable. In 10 minutes we’ll talk about how to get it right.
  • GDPR: Headache or Opportunity?
    GDPR: Headache or Opportunity? Phil Richards, CSO and Simon Townsend, EMEA Field, CTO Recorded: Feb 20 2018 54 mins
    Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.

    Attendees will learn:
    • How to navigate GDPR without a silver bullet
    • The importance of identifying PII data, protecting users, and securing endpoints
    • How to integrate, unify, orchestrate, and automate with service management
    • Ways to implement solutions that reduce the pain associated with GDPR

    It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
  • Risk the Change, or Change the Risk?: IT Change and Risk Management
    Risk the Change, or Change the Risk?: IT Change and Risk Management Greg Sanker, Roy Atkinson (moderator) Recorded: Feb 20 2018 61 mins
    Everyone knows changes are risky; change management is responsible for managing that change-related risk. In theory, it’s simple; in the real world, it’s a far cry harder. This webinar presents a straightforward approach to identifying and analyzing change-related risk, along with practical risk mitigation strategies that you can put to use in your organization right now.

    Attend this session to learn all about:
    * Identifying change-related threats
    * Assessing vulnerabilities
    * Determining risk
    * Risk reduction strategies
    * Prioritizing risk mitigation efforts
  • Vuolearning eLearning platform demo
    Vuolearning eLearning platform demo Stephen Sutton Recorded: Feb 16 2018 63 mins
    In this webinar VuoLearning will introduce how you can transform your learning content from Powerpoints into interactive eLearning products. Come and check out the opportunity. eLearning course generation has never been easier!

    Speaker: Stephen Sutton

    Stephen Sutton is an experienced Customer Trainer with a demonstrated history of working in the telecommunications industry. He is a strong human resources professional skilled in Service Delivery, 3G, Training Presentations, Requirements Analysis, and ITIL.
  • Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä
    Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä Eetu Niemi Recorded: Feb 16 2018 48 mins
    Digitalisaatio ja tietosuojavaatimuksiin (esim. GDPR) vastaaminen ei onnistu ilman hyvin toimivaa käyttäjä- ja pääsynhallintaa (Identity and Access Management, IAM). Se on kuitenkin laaja kokonaisuus, joka vieläpä liittyy organisaatioissa ”kaikkeen”. Siksi käyttäjä- ja pääsynhallinnan kehittäminen on tehtävä harkitusti ja vaatii kokonaisnäkemyksen kehitettävästä IAM-ratkaisusta.

    Tässä webinaarissa opit

    · mistä käyttäjä- ja pääsynhallinnassa on kysymys

    · mitkä ovat käyttäjä- ja pääsynhallinnan hyödyt

    · mistä komponenteista käyttäjä- ja pääsynhallintaratkaisu käytännössä koostuu

    · miten käyttäjä- ja pääsynhallinnan kehittämisessä kannattaa edetä

    Puhuja: Eetu Niemi

    Eetu on arkkitehtuurin monitoimimies, joka on tehnyt erityisen paljon töitä käyttäjä- ja pääsynhallinnan sekä kokonaisarkkitehtuurin parissa. Käyttäjä- ja pääsynhallinnan ratkaisuja hän on suunnitellut ja toteuttanut useilla toimialoilla. Hänellä on kokemusta niin arkkitehtuurisuunnittelusta ja määrittelystä kuin myös teknisestä suunnittelusta ja tuotteiden konfiguroinnista. Eetu toimii arkkitehtuurin sekä käyttäjä- ja pääsynhallinnan konsulttina Coalassa.
  • How API Adoption Boosts Profits
    How API Adoption Boosts Profits Marshall Van Alstyne, MIT fellow & Boston University professor; David Berlind, Editor-in-Chief of ProgrammableWeb Recorded: Feb 15 2018 60 mins
    The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.

    In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.

    Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:

    - Why enterprises need APIs and API strategy models
    - The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
    - About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
  • Accounting for the Endpoint in Your GDPR Strategy
    Accounting for the Endpoint in Your GDPR Strategy Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42 Recorded: Feb 15 2018 45 mins
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • Container troubleshooting with Sysdig
    Container troubleshooting with Sysdig Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Recorded: Feb 15 2018 45 mins
    SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?

    Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.

    In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:

    -Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
    -Debug a 502 HTTP error on a load-balanced Python app with HAproxy
    -Troubleshoot a Kubernetes CrashLoopBackOff error

    Who should attend?

    If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
  • Tehoja ideointityöpajoihin - fasilitoinnin inhimillinen digiloikka
    Tehoja ideointityöpajoihin - fasilitoinnin inhimillinen digiloikka Jussi Simolin Recorded: Feb 15 2018 30 mins
    Webinaari tarkoitettu fasilitointeja tekeville tai niitä järjestäville tahoille, jotka kaipaavat uusia konkreettisia ideoita tuloksellisuuden parantamiseen, diversiteettisyyden huomioimiseen ja workshoppien sosiaaliseen tasapuolisuuteen introvertit mukaan temmaten.

    Webinaarissa kiteytetään osallistavan johtamisen hyödyt ja käydään läpi konkreettisesti miten digitaalisuus voidaan tuoda inhimillisesti mukaan fasilitointeihin.

    Jussi Simolin on 45-vuotias kahden teini-ikäisen lapsen isä, joka 17 vuoden korporaatiouran jälkeen siirtyi start-up -yrittäjäksi eikä kadu päivääkään päätöstään. Jussin työelämän tarkoitus on auttaa ihmisiä osallistumaan heitä koskevien päätösten tekoon ja uskoo osallistavaan johtamiseen ja oppimiseen. Aineenopettajan koulutuksen käyneenä häntä kiinnostaa sekoittaa johtajuutta, oppimista ja markkinointia ja yrittää löytää asiakkailleen ymmärrettäviä hyötyjä näiden yhdistelmistä, ymmärrettävällä tavalla toivottavasti!
  • How To Achieve Single Pane of Glass Performance Management
    How To Achieve Single Pane of Glass Performance Management John Worthington,Director of Product Marketing, eG Innovations Recorded: Feb 14 2018 56 mins
    Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.

    But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.

    Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.

    Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".

    In this webinar, you will:
    -Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
    -See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
    -Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
  • Patch Tuesday: Critical Vulnerabilities & Fixes
    Patch Tuesday: Critical Vulnerabilities & Fixes Chris Goettl, Director of Product Management, Security & Todd Schell, Product Manager Recorded: Feb 14 2018 51 mins
    Nail down your patch strategy and always be prepared for the latest exploits with Patch Tuesday coverage from Ivanti. Join IT security professionals Chris Goettl and Todd Schell in this live, zero-pitch webinar as they go in-depth on each bulletin, share strategies on how to best protect your environment, and answer all your IT security questions. Ivanti’s Patch Tuesday coverage is recognized by leading IT security journalists and is regularly featured by industry analysts.

    • Most recent news on Spectre and Meltdown
    • The latest issues to watch out for on Windows 10, Microsoft Office, Adobe, etc.
    • What products are affected and their severity levels
    • Which patches are highest priority to roll out
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 57 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • [Ep.1] Ask the Expert: ITSM and DevOps 101 with Daniel Breston
    [Ep.1] Ask the Expert: ITSM and DevOps 101 with Daniel Breston Daniel Breston, Virtual Clarity and Harriet Jamieson, Content Manager at BrightTALK Recorded: Feb 14 2018 49 mins
    This webinar is the first in BrightTALK's Ask the Expert Series.

    Join ITSM-DevOps expert Daniel Breston of Virtual Clarity to learn more about:
    - Basic introduction to ITSM and DevOps
    - The future of ITSM and DevOps
    - Audience Questions

    Audience members are encouraged to send questions to the experts, which will be answered during the live session.
  • How to Build an Efficient Security Operation Center with the ArcSight SIEM
    How to Build an Efficient Security Operation Center with the ArcSight SIEM Soma Bola Recorded: Feb 14 2018 34 mins
    With the growth of the number of cyberattacks, having a Security Information Event Management (SIEM) Technology in place can aggregate and correlate data from security feeds. These include: network discovery and vulnerability assessment systems, risk and compliance systems, log management systems, penetration testing tools, firewalls, IPS, threat intelligence feeds, host antivirus systems, web security appliances, and email security appliances. SIEM can be a "single pane of glass" for the security analysts to monitor the enterprise.

    SIEM Technology also allows companies to be able to correlate data from various sources to surface patterns that could represent malicious or suspicious activity. This way, they can prevent, block, or contain all nefarious networks activity and attacks.
  • Chat, tap, talk: how messaging is transforming the digital customer experience.
    Chat, tap, talk: how messaging is transforming the digital customer experience. Nicola Millard, Head of Customer Insight and Futures, BT Recorded: Feb 14 2018 40 mins
    Our latest research reveals a major shift in how consumers want to communicate. Whether it’s contact by phone, email, internet self-service, web chat, social media, chatbot or video, our study shows how ‘type’ based messaging channels sit alongside the traditional ‘talk’ channels of phone and face-to-face, rather than replace them.

    Join Nicola Millard, BT Head of Customer Insight and Futures, as she explores the research and what you need to be doing to ensure you’re designing and delivering the omni-channel experience your customers expect.
  • Revealing the Blind Spots in Your IT Infrastructure Spend
    Revealing the Blind Spots in Your IT Infrastructure Spend John Cole, Solutions Principal, AHEAD Recorded: Feb 13 2018 32 mins
    IT leaders in the driver’s seat of their organization are constantly focused on the road ahead—including forces reshaping the industry and emerging technology trends. But the road to digital transformation is riddled with blind spots—whether in the form of hidden infrastructure costs or obstructed views of multi-year, total cost of ownership (TCO).

    In a “do-more-with-less” world, IT decision-makers are tasked with not only pursuing the latest and greatest in tech initiatives, but also keeping the lights on while improving service levels. So, what if you could take those sunken costs and eliminate or repurpose them to fuel company-wide innovation? This webinar addresses just that: identifying improvements in operations to fund modernization within your organization.

    AHEAD Solutions Principal John Cole outlines a roadmap to data center optimization, including:

    -Top enterprise IT objectives for 2018—and best practices for success
    -Analyzing committed data center costs—and repurposing those funds to eliminate incremental budget approvals
    -IT infrastructure maintenance—and effectively managing multiple vendors and contracts
    -AHEAD’s “Harvest to Invest” initiative—and how we helped a large healthcare system identify significant cost savings opportunities
  • Crossing The Digital Transformation Chasm
    Crossing The Digital Transformation Chasm Shailesh Manjrekar, Sr. Director, Product & Solutions at Vexata, Frederic Van Haren, Senior Analyst at Evaluator Group Recorded: Feb 13 2018 58 mins
    Leverage Vexata Active Data Fabric Ecosystem for AI, Deep Learning, Machine Learning and Cognitive Pipelines

    Digital Transformation is cutting across industries and making a profound impact in our lives. Data is the new oil, however, businesses need a different approach to drill this oil, in a way it impacts the business processes positively and instantaneously. Existing datacenter infrastructure falls short in meeting the requirements of these new distributed and massively parallel pipelines and datatypes and need to evolve.

    Several trends are proving to democratize Digital Transformation vision and technologies are emerging as building blocks. Notably Convergence of HPC, Big Data Analytics, and Artificial intelligence markets, driven by GPU computing, open sourcing of ML / DL frameworks, Distributed architectures, faster storage media like NVMe and 3D-Xpoint and faster networking with NVMeOF are fueling these trends.

    Join this webinar and learn about the latest industry trends, vertical use cases and how Vexata with its Active Data Fabric ecosystem is uniquely positioned to help its customers cross the chasm.

    Webinar takeaways:
    1. Future of Analytics – move from descriptive to prescriptive and now to cognitive, leveraging Deep Learning, neural nets, streaming paradigms
    2. Business Value of Digital Transformation – remain competitive, survive and thrive.
    3. Remove infrastructure bottlenecks, particularly as they pertain to storage and data management when using AI, Deep Learning, Cognitive pipelines for use cases across verticals like:
    - EDA / Manufacturing
    - Media and Video Analytics
    - Genomics, Precision medicine
    - Speech Recognition
    - Industrial IoT
    - Financial and Security Analytics
    - Retail Customer Churn / Sentiment Analysis
  • Live Demo of OptiView XG
    Live Demo of OptiView XG Mike Pennacchi, Network Protocol Specialists Recorded: Feb 13 2018 62 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Troubleshooting Wi-Fi Slow Speeds
    Troubleshooting Wi-Fi Slow Speeds Julio Petrovitch,Principal Technical Marketing Engineer - Wireless Feb 27 2018 2:00 pm UTC 60 mins
    Slow network speeds are one of the most common Wi-Fi problems. This second webinar in our series of Wi-Fi troubleshooting will focus on showing you how to quickly and effectively troubleshoot “Slow Speeds”. We will start by showing how to verify if you really have problems with slow Wi-Fi network speeds, or if the problem is somewhere else (Wired Ethernet network, Internet Service Provider). After that we will show you how to identify the most common reasons for slow Wi-Fi network speeds and we will provide recommendations on how to speed up your network.
  • What’s New in IT Service Management Automation Suite
    What’s New in IT Service Management Automation Suite Vesna Soraic, SMA, Micro Focus, David Baron, SMA, Micro Focus and Bill Dyck, CMS, Micro Focus Feb 27 2018 4:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest releases of Service Management Automation (SMA) and Configuration Management System (CMS).

    Learn how you can use analytics and machine learning to improve service management efficiency and deliver a more engaging end-user experience. See a live demo of the new SMA capabilities.

    You will also learn how you can easily monitor and control your Hybrid IT environment in real-time with multi-cloud discovery.

    New Features:
    • Multi-tenant console in SMA
    • Reporting capabilities in SMA
    • Multi-cloud discovery capabilities to support Hybrid IT
    • New CMS UI for simplified configuration management
  • Building a Connected Customer Experience with Former CIO of Lowe’s and L Brands
    Building a Connected Customer Experience with Former CIO of Lowe’s and L Brands Steve Stone, Former CIO at L Brands and Lowe's; Introduction by Ross Mason, Founder & VP Product Strategy Feb 27 2018 6:00 pm UTC 75 mins
    Hear from Steve Stone, former CIO of L Brands and Lowe's, as he reveals his advice in building a compelling customer experience. Learn how he has led major retailers to embrace technology as a strategic enabler and execute key use cases like eCommerce and omnichannel.

    Attendees will learn:

    - How L Brands and Lowe's digitized the in-store experience to better engage with customers
    - How MuleSoft has helped his companies go 3x faster with self-service across the organization through reusable assets
    - Real-life lessons from a seasoned technology leader who has spent 34+ years in the technology space
    - Practical steps to embrace a new IT operating model that focuses on the customer
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Feb 27 2018 6:00 pm UTC 60 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • Service Portal 360 – Bridging the gap in your IT Service Delivery
    Service Portal 360 – Bridging the gap in your IT Service Delivery Ravi Kumar, Principal Consultant; Mohamed Shoaib, ServiceNow Developer Feb 27 2018 6:00 pm UTC 60 mins
    Designing and developing a user-friendly Service Portal or Self-service portal tops the to-do charts of any IT Service Management leader. But enabling the end-user to use the service portal effectively is a herculean task and that’s where most organizations fail. In this knowledge session, our ServiceNow experts will demonstrate how to build an easy-to-use service portal and achieve your organization’s IT Service Management goals.

    Key topics covered in the session include:
    - Evolution of IT Service Delivery: From simple service request forms to brand/face of IT
    - Key strategies to adopt while building your Service Portal
    - Case analysis: Role of service portal in successful IT Service Delivery
    - Demo: Service Portal creation without coding
    - Q & A
  • Troubleshooting Wi-Fi Slow Speeds
    Troubleshooting Wi-Fi Slow Speeds Julio Petrovitch, Principal Technical Marketing Engineer - Wireless Feb 27 2018 6:00 pm UTC 60 mins
    Slow network speeds are one of the most common Wi-Fi problems. This second webinar in our series of Wi-Fi troubleshooting will focus on showing you how to quickly and effectively troubleshoot “Slow Speeds”. We will start by showing how to verify if you really have problems with slow Wi-Fi network speeds, or if the problem is somewhere else (Wired Ethernet network, Internet Service Provider). After that we will show you how to identify the most common reasons for slow Wi-Fi network speeds and we will provide recommendations on how to speed up your network.
  • The Future of ITSM - From Process to Value Stream
    The Future of ITSM - From Process to Value Stream Troy DuMoulin, VP of Research and Development, Pink Elephant Feb 27 2018 6:00 pm UTC 60 mins
    Join Troy DuMoulin, VP of Research and Development with Pink Elephant, as he discusses the future of integrated service management.
    In order to support changing business needs and digital transformation, IT organizations must begin working in an end-to-end value system versus isolated pockets of technical specialists. IT Service Management is evolving to provide a systematic view of the full value system.
    Hear Troy’s holistic perspective on ITSM’s evolution into an enhanced and expanded proposition that integrates DevOps, ITIL, Agile, and Lean.
  • Call Center Best Practices
    Call Center Best Practices Jeff Rumburg, Managing Partner at MetricNet Feb 27 2018 7:00 pm UTC 60 mins
    An overview of Call Center Best Practices.

    HEAR how the industry's top performing Call Centers Achieve World-Class Status!

    LEARN key strategies for Enhancing your Call Center Performance!

    APPLY Best Practices from your peers in the industry!

    In this webcast, MetricNet will share the Key Success Factors from the industry's top performing Call Centers!
  • Grow Your MSP Business by Helping Customers Build a Hybrid Cloud
    Grow Your MSP Business by Helping Customers Build a Hybrid Cloud Todd Bernhard, Product Marketing Manager Feb 27 2018 7:00 pm UTC 45 mins
    Many MSPs have long-standing enterprise clients that have hesitated to move to the public cloud. They are held back by legacy on-premises applications and the huge logistical undertaking of migrating them. This has made it difficult for the traditional MSP to embrace the cloud and develop services around the new technology.

    As Enterprises move through their hybrid cloud journey, many will rely on a trusted partner to support them, which presents new opportunities for MSPs to break into the cloud and grow their businesses.

    In this webinar, we run through some of the reasons your customers are ready for hybrid cloud adoption, the challenges they’ll face, and the client services you can offer to help overcome them.
  • Container Forensics & Troubleshooting with Sysdig Inspect
    Container Forensics & Troubleshooting with Sysdig Inspect Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Feb 28 2018 10:00 am UTC 60 mins
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • GDPR – Are you ready?
    GDPR – Are you ready? Helen Windle, ITSM Consultant, Pink Elephant EMEA Feb 28 2018 2:00 pm UTC 60 mins
    Everyone’s talking about it!! Are you prepared for GDPR? Do you have the proper standards, processes, and tools in place to keep sensitive customer data safe, even when new software vulnerabilities emerge?
    Join Helen Windle who will talk you through the evolution of Data Security, where we are now and the impact that GDPR will have on many organisations. You will also get to understand the critical aspects of GDPR and discover the key steps you should take to ensure your business is prepared to support your GDPR initiatives and maintain compliance.
  • MEF Network Foundations – Advancing Professional Skills for Today’s Evolving Net
    MEF Network Foundations – Advancing Professional Skills for Today’s Evolving Net Rick Bauer - Director of Certification, MEF; Kevin Marz - Director, Tech 2000; Eric Timm - Chief Arch., TDS Telecom Feb 28 2018 5:00 pm UTC 75 mins
    Building on the success of its MEF-Carrier Ethernet Certified Professional (MEF-CECP) program, MEF introduced its MEF Network Foundations (MEF-NF) certification in December 2017. MEF-NF helps individuals pursue advance skills to keep pace with rapidly evolving network environments. This new certification validates individuals’ concept-level understanding of key modern networking terms, processes, and elements covering knowledge and practice domains of SDN, NFV, Connectivity Services/Carrier Ethernet, and Lifecycle Service Orchestration.

    MEF-NF certification is ideally suited for:

    • Telecom and Network Operators
    • System Administrators
    • Technical Support Professionals
    • Technical Marketing and Sales Professionals
    • IT Pros who need a vendor-neutral certification to complement their vendor-specific network certifications

    This webinar will cover:

    • The value of both vendor-neutral and vendor-specific training/certification in building careers in networking
    • MEF-NF certification benefits to corporations and individuals
    • How MEF-NF fits in MEF’s Professional Certification Framework
    • Expanded options to prepare for the certification exam

    A leading service provider will provide a testimonial on the value of MEF-TN certification and share the business benefits that can be reaped by having a highly skilled workforce.
  • Zero to Productive: A Better Employee Onboarding Experience
    Zero to Productive: A Better Employee Onboarding Experience Jen Kaplan, Solutions Architect, Jamf & Matthew Phillips, Professional Services Engineer, Jamf Feb 28 2018 6:30 pm UTC 60 mins
    Effective employee onboarding programs increase performance by up to 11 percent, according to BambooHR. What makes an effective onboarding program? Reducing the time it takes for new employees to get the tools they need to do their best work.

    In our webinar, Zero to Productive: A Better Employee Onboarding Experience, we show how you to create a smooth and reliable technology onboarding experience that makes it easy, informative, and dare we say, fun for employees to get up and running immediately.

    In this webinar, we’ll cover:

    * Why onboarding matters
    * Advanced zero-touch device deployment tools
    * How to leverage progress feedback apps
    * End user interaction opportunities
  • Monitoring Kubernetes with kube-state-metrics
    Monitoring Kubernetes with kube-state-metrics Eric Carter, Product Marketing & Jorge Salamero Sanz, Technical Marketing Mar 1 2018 6:00 pm UTC 60 mins
    Kubernetes simplifies deployment, scaling and maintenance of container-based services within and across clouds. At the same time, its dynamic nature adds complexity to app and infrastructure monitoring and troubleshooting. How can you ensure visibility into the health of application services in addition to the Kubernetes cluster itself?

    Using Kubernetes metadata and metrics - including kube-state-metrics - you can get critical insight into how your cluster is performing to ensure your users get the best experience.

    Join us for this webinar to discover how to effectively monitor Kubernetes. In this session we will discuss and demo:

    - How to correlate infrastructure, container, and orchestrator metrics for a complete picture of service performance
    - How to use kube-state-metrics to answer important questions about the condition of your Kubernetes cluster
    - How to detect, troubleshoot and resolve common scenarios you will face in your Kubernetes-based cloud
  • Architecting Security for the Future: NetOps and SecOps
    Architecting Security for the Future: NetOps and SecOps Dan Conde of ESG and Graham Melville of Gigamon Mar 1 2018 7:00 pm UTC 60 mins
    Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of their competitors.

    In this session you will learn:
    The issues and challenges facing your industry colleagues.
    How to simplify your security architecture without throwing out security tools or flattening the network.
    How to improve network performance and reduce outages while maintaining security.
    How to spend less yet get more from your network security tools.

    If you or your organization wants to be, or are, a security leader in your industry, you won’t want to miss this webinar.
  • Quantifying Business Value with ITIL® and ITSM in the Modern Software Factory
    Quantifying Business Value with ITIL® and ITSM in the Modern Software Factory Darren Arcangel - Sr. Principal Services Architect - CA Technologies Mar 6 2018 4:00 pm UTC 60 mins
    Every organization needs to become a modern software factory. You're developing new capabilities to quickly deliver high-quality customer experiences. You've deployed software that enables rapid development. And you're nurturing an agile mind-set with a primary focus on customers. At some point during this journey, people up the food chain will ask about their return on investment. Do you have a process or framework in place to respond to the question with knowledge derived from quantifiable data? In this webcast, ITSM author Darren Arcangel dives into how ITIL® metrics and continuous service improvement can help quantify this business value.
  • Changing the Mindset of Your Employees with Service Portal Adoption
    Changing the Mindset of Your Employees with Service Portal Adoption Susan Bonville, Tina Williams & Kyle Shephard Mar 6 2018 8:00 pm UTC 45 mins
    In this webinar, we’ll show you how adoption of your self-service portal can improve both CSAT and service desk efficiency, as well as increase collaboration across the organization. We’ll also introduce you to First Health of the Carolinas, as they share how they creatively pushed portal adoption throughout their large organization, turning thousands of potential help desk phone calls into thousands of quickly-resolved tickets.
  • A new era of mobile threats demands a new form of defense
    A new era of mobile threats demands a new form of defense Orange Cyber Defense & Check Point Mar 7 2018 9:30 am UTC 30 mins
    Mobile devices are now considered to be one of the weakest links in the IT infrastructure of most enterprises. While the cost of a mobile breach is similar to that of a desktop or laptop breach, an astounding number of enterprises are still lacking next generation protection, leaving themselves at high risk of attack.

    Orange Cyber Defense has teamed with Check Point to lay down the hard facts surrounding the mobile threat landscape based on insight from current research and a deep understanding of the global market. The webinar will deliver practical advice surrounding common myths and offer a simple methodology approach which can be applied across the business.

    Join this short webinar to understand:
    •Why 100% of enterprises are at risk of attack.
    •What next generation mobile cyber attacks look like.
    •Vital steps enterprises should take to protect themselves.
  • itSMF-CursoTools18: 01-Autopistas del Conocimiento en organizaciones del futuro
    itSMF-CursoTools18: 01-Autopistas del Conocimiento en organizaciones del futuro Luis Camiro - EasyVista Mar 7 2018 3:00 pm UTC 45 mins
    La primera tendencia en Tools ITSM son los Flujos de Conocimiento. La segunda es la Gestión Más Allá de TI, en otras áreas de negocio.

    Las herramientas TI están siendo demandadas por otros departamentos de la empresa con el fin de alcanzar grados de eficiencia y madurez similares a los de la gestión TI gracias a ITSM (ITIL o ISO20000) y las tools adecuadas.

    En este webinar se profundiza en ambas tendencias, en el consumo de servicios desde el punto de vista del empleado y en cómo se optimiza el acceso a la información a través de flujos de conocimiento, que ofrecen la información adecuada a cada usuario, en el momento adecuado. Presentado por el fabricante EasyVista, a través de Casos Prácticos que utilizan las soluciones EV Service Manager: gestión de activos y servicios. EV Self help: acceso al conocimiento.
  • Centers for Disease Control Journey to ISO20K & ISO27K Certifications
    Centers for Disease Control Journey to ISO20K & ISO27K Certifications Jim Landers and Joseph Ludwig Mar 7 2018 6:00 pm UTC 60 mins
    The Centers for Disease Control and Prevention achieved a milestone when its mid-tier data center in Atlanta earned its Service Management & Information Security Management Systems Certifications, becoming the first federal data center to do so. In this case study, the speakers explore the entire process from the initial discussions about certification through scoping and planning, prepping for certification and the audit process and how the CDC gained buy-in in the organization.

    From the agency perspective, we will hear what the process is like from first-hand experience. If you are considering ISO/IEC ISO/IEC 20000-1:2011 & IT Information Security ("ISO 27001:2013") certification this will be an insightful and useful session.
  • Modernize & Gain Technological Superiority with Enterprise Class Scalability
    Modernize & Gain Technological Superiority with Enterprise Class Scalability Ray Jones, Director, Jason Chaffee, Senior Product Manager & Chris Lucas, Senior Director, NETSCOUT Mar 7 2018 6:00 pm UTC 60 mins
    Government agencies are modernizing their infrastructure at a rapid pace. Whether you are seeking an information advantage and full spectrum superiority or trying to lower costs, increase efficiencies and improve your effectiveness, multi-faceted challenges exist that are impeding modernization success.

    Effective modernization of information infrastructures requires instrumentation flexibility, hardware independent architectures, pervasive system level visibility, and innovative technology to overcome challenges and achieve the outcomes that modernization can provide.

    In this webinar, attendees will learn:
    •Successful strategies and tactics to modernize an infrastructure with state-of-the-art instrumentation options with extensive deployment options to fit any need
    •How software driven, open compute and scalable on demand packet broker technology is radically changing the impossible to the achievable
    •New ways to provide insight into server and network device health, conduct synthetic tests and execute syslog troubleshooting for complete visibility of the information infrastructure
  • itSMF-CursoTools18: 02-Tendencias 2018 en Herramientas de Gestión TI
    itSMF-CursoTools18: 02-Tendencias 2018 en Herramientas de Gestión TI Eduardo Ballesteros - itSMF España Mar 8 2018 3:00 pm UTC 45 mins
    Un recorrido por las principales tendencias en Gestión y Gobierno TI en el año 2018 con relación a las herramientas, y cómo estas se están aplicando en las herramientas de gestión. Además, se presentará una encuesta sobre "La Voz del Cliente", lo que están demandando las empresas y nunca se atrevieron a confesar.

    El año pasado este ponente tuvo más de 500 conexiones en directo durante su webinar.
  • Women in Tech Leadership: Building your Brand & Becoming a Better Leader
    Women in Tech Leadership: Building your Brand & Becoming a Better Leader Jeanne Morain, Emerald de Leeuw, Jill Donahue & Andrea Short Mar 8 2018 4:00 pm UTC 60 mins
    2017 was a historic year for women and feminists around the world. With the #metoo and #knowno campaigns, gender gaps and disparities were brought to light in ways they hadn't been before.

    Now it's a new year and with it comes new challenges for women in hi-tech careers: whether it be navigating your career through these times, finding or becoming a mentor, building your personal and professional brand as a leader, dealing with office politics or maintaining work-life balance, the challenges and opportunities for women in the workplace are endless.

    Join this expert panel with moderator Jeanne Morain and panelists Emerald de Leeuw, Executive Director, EuroComply Data Protection Technology, Jill Donahue, Sr. Director of Marketing, PC Connection, and Andrea Short, Director, Supplier Marketing at Tech Data.

    They will share personal stories and experiences, tips and best practices, problems and solutions around these and other topics for women in tech leadership.
  • Machine First SMO, Automate CSI, and ITSM in a DevOps World
    Machine First SMO, Automate CSI, and ITSM in a DevOps World Dale Shafer Mar 8 2018 4:00 pm UTC 60 mins
    Making DevOps work in a IT Service Management framework can be challenging. How can we Ensure people see the value in ITSM rather than see it as a bureaucratic slow down to the business? Dale Shafer, Senior Consultant at a Service Management Global Consulting Practice and a member of itSMF USA’s Board of Directors, and will discuss how automating ITSM is an important element in ensuring collaboration with Devops and Agile.

    In our sessions we will:

    Explore what processes can be easily automated

    Discuss what automation tools are now available

    Dale is a Senior Consultant at a Service Management Global Consulting Practice. He is a proven leader with 10+ years of experience assessing, designing and implementing large scale Global Outsourcing Delivery engagements focusing on IT Infrastructure Operations, Service Management and Service Integration. His sector experience includes Agribusiness, Banking & Financial Services, Legal, Government, Healthcare, Manufacturing and Retail. Education includes MBA and IT degrees. ITIL and Microsoft Certified.
  • Auditoria de software. ¿Qué debo hacer?
    Auditoria de software. ¿Qué debo hacer? Ivan Ruiz, Jorge Ordonez Mar 8 2018 4:00 pm UTC 30 mins
    La no conformidad de tus activos de software pueden poner a tu organización em riesgo.

    Sabemos que gestionar los activos de software de una organización siempre fue una tarea desafiadora por culpa de la complexidad de las métricas de licenciamiento de los fabricantes y la transformación digital puede empeorar todavía la situación.

    Participe de nuestro webinar y aprenda los pasos necesarios para el suceso en las auditorias de software.