Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.
Panel of speakers
Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
Al Huger: VP Engineering - Security, Cisco
Service Asset and Configuration Management (SACM) has been in the core of IT Service Management since the very beginning. As the world changes and different isms come and go, SACM not just remains important but it becomes ever more important. In this presentation we will cover experiences from implementing SACM as well as look to future via fresh perspectives e.g.:
- How SACM is key capability when doing Service Integration and Management;
- How Agile method ideas and SACM fit together;
- How evolvement of technology has affected the perspective what needs to be managed with SACM;
- How SACM is one of the best friends of Privacy and the coming GDPR legislation;
- What are the current challenges in developing SACM and getting the benefits.
SACM is even more relevant today as it was before. As the world changes also SACM needs to develop. Welcome to hear fresh thoughts about hoe to manage the core information that your IT Service Management runs on.
Lari Peltoniemi has worked within IT Service Management for 15 years and 12 years of that with Service Asset and Configuration Management. He has helped both IT Service consumer and IT Service Provider companies and organizations to successfully utilize SACM to enable it ITSM, IT and Business goals of organization. Lari has worked with many of the major tools and his expertise covers industries widely from MSP IT service providers, Telecom, Banking and Finance, Energy, Education and Public Sector. Lari works as consultant and trainer on ITIL, CMDB and ITSM area in general.
Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.
In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
David Cuthbertson will show you methods and techniques to help achieve a baseline map of your IT systems, supporting not just GDPR issues but also change control, operational management and risk assessment.
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
The end of Extended Support for SQL Server 2008 and 2008R2 is coming faster than you know, as of July 2019. It’s important that your organization takes the necessary steps so you’re prepared for the migration.
A database migration is not always straightforward and requires preparation, testing and implementation and these processes could take up to 9 months depending on environment size.
In this webinar, Jeff Duncan will discuss the steps that you need to ensure that you have the smoothest migration to the SQL Server 2016 and beyond.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
Recent theft of business critical information occurred because a Service Desk provided information to a cyber-crook that allowed access to internal business critical servers. The information stolen could impact national security interests. Why did that happen? How could it happen? Expensive technology did not stop this breach. How could the Service Desk have been better prepared?
Security breaches and the theft of intellectual property and personal and financial information are too common. The service desk is KEY to ensuring the early detection of security events and providing the first-line response. So what role should the service desk play in early identification of security events, and how can the service desk best be prepared to respond?
Are there best practices to provide guidance to develop robust cyber-protection? This session explores cyber-resilience best practices and the impact the service desk plays in response and cyber-resilience.
As a retailer SPAR has solved their issues with web store rollout. Vodafone reduced events by over 80%. Boeing evolved most of the users from OM to Operations Bridge in less than 3 months. They have all gained visibility, focus on the right IT issues impacting business, and moreover autonomous operations. They profit from the high degree of automation that the Operations Bridge brings as well as the significant way it helps integrate their tools and data into a single service driven prioritized view.
To launch this SIG, we’ll show you some of their work and the benefits gained. We’ll introduce you to the latest version of Operations Bridge, speak about the containerized version and its roadmap within the new Micro Focus branded software company. All this should inspire many questions for a lively SIG session, one of many more to come.
•Operations Bridge Action – success stories
•What’s new in today’s version 2017.08
•What’s coming up events, sessions, activities and where to get more information
Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
Registrati al webinar per saperne di più!
What if a single shift to your ITSM approach could reduce costs, increase user satisfaction, and improve service delivery?
“Shift left” is that strategy. Join us to hear how this powerful technique for resolving issues as close to the end user as possible enables you to:
•Start with self-service – then add automation, knowledge mgmt., and even AI
•Increase productivity by using resources in the best possible way
•Boost operational efficiency for time and cost savings
•Measure and analyze your shift-left initiative
•Improve ROI for both people and technology
Accelerate ITSM transformation with a new approach.
Awarded "Best Overall Value" from Info-Tech Research Group for the 3rd year in a row, Agiloft provides the fastest time to value because it slashes the time to configure the solution to your requirements. We can customize it for you live during the demo -so you get a trial system that you can actually use and a fast, affordable deployment. Agiloft addresses even the most sophisticated requirements in record time. Start today with a free custom demo.
Many Service and Support professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer are aware of what constitutes acceptable performance. In this session, Jeff Rumburg will share the results of MetricNet’s 2017 Global Benchmarking Initiative for Service and Support, discuss the methodology, define the KPIs used for benchmarking, and share performance data from more than 140 companies worldwide.
Many fortune 200 CEOs are considering a bold move to all "public" cloud or virtual private cloud environment. How do you plan a successful migration to AWS? Join Jeanne Morain with special guest Roger Eisentrager as they way the pros and cons on their cloud migration journey.
Join Tony Fortunato, Senior Network Performance Specialist with The Technology Firm for an hour of networking troubleshooting, tips and tricks.
Troubleshooting performance problems in today’s networks is only getting more complex:
Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.
Tony will be using the OptiView XG on a live network to show you how to do many baselines, tips and tricks that take 5 minutes or less of your time. We will covering topics such as; the value of SNMP, wireless, documentation, dependency analysis, packet capture and traffic generation. Tony will also take questions from the audience as well as review any emails or questions from the last session.
This session is informative for either the Network novice or the seasoned veteran.
Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
The retail industry is bursting with digital innovation driving change. This session will review:
•How differentiation demands digital maturity
•Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
•The role of cloud services and its impact on customer experience, agility, efficiency and risk
After The Wolf brings down a hospital, The Fixer (Jonathan Banks) shows them how to bite back with help from HP Managed Print Services.
HP Secure Managed Print Services:
- Works to identify your risks, then develop and implement a custom print security policy and plan
- Manages your print security from device hardening to deploying advanced security solutions to address people, processes and compliance requirements
- Helps secure your fleet with the industry’s strongest print security protections
The Fixer (Jonathan Banks) is here to put The Wolf on a leash with an HP Enterprise printer featuring Run-Time Intrusion Detection that is constantly protecting against malware attacks.
HP Run-Time Intrusion Detection:
- Monitors complex firmware and memory operations, automatically stops the intrusion and reboots in the event of an attack
- Protects HP business printers from becoming an entry point for attacks on your network
- Offers the only real-time detection, automated monitoring, and built-in software validation to stop threats the moment they start
Armed with an HP Enterprise printer featuring HP Sure Start self-healing BIOS protection, The Fixer (Jonathan Banks) is going to make sure The Wolf never leaves a scratch on this place again.
HP Sure Start:
- Protects against malware by detecting, stopping, and self-healing from BIOS attacks
- Prevents the execution of malicious code during bootup by allowing only HP-signed, genuine code to be loaded
- Restarts with a safe “golden copy” of its BIOS, if compromised
- Is the industry’s only self-healing BIOS
As traditional security perimeters dissolve, companies are becoming more reliant on human-centric cyber security systems that can protect their most valuable assets at the intersection of users, data & networks.
Are you ready for macOS High Sierra, iOS 11 and tvOS 11? These new operating systems are here and chocked full of exciting productivity features that your users can’t wait to get their hands on. To help you empower the masses and seamlessly upgrade all of your devices, Jamf Pro offers same-day support for each new Apple OS and ensures management continuity throughout the process.
In our webinar, Managing iOS 11 and macOS High Sierra Upgrades, we’ll walk you through the upgrade process, explain best practices to follow and point out “gotchas” you’ll want to avoid.
•What’s new for IT management in iOS 11 and macOS High Sierra
•How to leverage inventory data to prepare for upgrades
•Strategies for best rolling out your OS deployments
Nick Thompson, Product Manager, Jamf
Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
Attacks are getting more sophisticated and more targeted. Endgame takes a different approach to security and extends traditional anti virus protection from malware, to exploits, malwareless attacks, and ransomware. Ashwini speaks to the 10 in tech team about the changing nature of security threats.
Saiba mais sobre as preocupações dos seus consumidores!
O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.
Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
What is Software Asset Management (SAM) and how can you develop a SAM practice to reduce risk, save money and empower business agility?
This educational and interactive webinar provides an introduction to SAM for those new to the field. Martin Thompson, founder of ITAM Review, and Michael Krutikov, Global Product Marketing with Snow Software will share how organizations like yours have driven quantifiable efficiencies and delivered ROI by managing their cloud and on-premise software more efficiently.
Learn the key steps to implementing a best-in-class SAM practice and how to avoid the most common pitfalls when starting a SAM practice.
During this webinar you will learn:
•What SAM is and how it differs from basic asset management
•The ROI you can deliver with a SAM practice
•Top 3 common hurdles to avoid when starting your implementation
•Tips to getting your SAM solution started successfully
•Best practices from other successful organizations such as Carnival and Sky.
Register today and all attendees will enter a prize draw to win one of 20 free copies of Practical ITAM – The Essential Guide for IT Asset Managers: Getting started and making a difference in the field of IT Asset Management, by Martin Thompson from ITAM Review. Please click here for full terms and conditions http://ow.ly/7sSW30f6b3W
According to Pulse, over 84% of Digital Transformation efforts are failing. Companies are worried about how they balance legacy systems while keeping pace with new nimble players in the Cloud Era.
How do you overcome the traditional silos between IT and the business to achieve success in Digital Transformation? What are the challenges politically, technically, and operationally that need to be overcome to turn your cloud vision into transformation reality?
Join our host Jeanne Morain, Author & Cloud/Digital Strategist and her special guests Rahul Ravulur, Founder & CEO, appOrbit and Chris Orlando, Co-Founder & Chief Sales & Marketing Officer, ScaleMatrix, as they explore the top 5 challenges and solutions both they and/or their customers have faced to achieve success in Digital Transformation, both from an IT and a business management perspective.
Join us for the first in a series of monthly webinars, presented by Greenlight Group, where Micro Focus and Greenlight Group will provide an introductory session of Micro Focus's container orchestrated IT Operations Management platform. In this webinar, Torrey Jones, Greenlight Group Principal Consultant, will talk through the basics of Micro Focus’s cloud native Container Deployment Foundation – a Docker and Kubernetes centric game changing platform for IT Operations Management in the Enterprise. Prior to diving into the topic of the hour, special guest Roy Ritthaler , VP, Marketing, IT Operations Management, will provide a short update of the New, Combined Micro Focus – post merger with HPE Software.
With the promise of agility and reduced costs, organizations are counting on cloud computing to help with their digital transformation. Yet organizations continue to get sticker shock when they move applications and workloads from on-premises to public cloud.
TrueSight Cloud Cost Control provides visibility into current and future costs, simulated migrations and the insight needed for optimization resources. Keep your digital transformation on track by eliminating surprises and wasted operating spend with TrueSight Cloud Cost Control.
Join this webcast with BMC Software Product Manager, Shyamal Patel, as we discuss how to accelerate your digital transformation and cloud migration strategies without the high price tag.
Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.
From this webinar you will learn:
• How to design SQL server infrastructures for optimal performance
• How the software and hardware infrastructure affect database performance
• Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
• Tools and metrics to find current bottlenecks, inside and outside of the database server
• Tools and best practices for monitoring all layers
Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal "business model" in full deployment, with new abilities to move laterally through networks and infect machines previously thought not possible to infect. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging encrypting ransomware variants--and how you can stay ahead.
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.
PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
Are you concerned about the advancement of AI and cloud technology and how they will impact your business communications? Or perhaps you’re looking for ways to get your business communications AI ready? If you answered yes to either of these, then save your spot at this webinar now.
The hype surrounding AI and its imminent take-over of the business world is creating a sense of panic. But whereas AI, just like cloud technology, is sure to become a driving force as we look to the future of business communications, there is no need to jump in at the deep end and throw all your resources at it just yet.
Join us for this webinar in which we’ll explain the current state of play for AI (spoiler alert: humans are not going anywhere for a while) and cloud technology and impart some useful ways you can prepare your business communications.
Chris Peterson, SVP of Operations at RingCentral, will talk you through:
- Key trends in cloud communications
- The importance of cloud communications
- Team collaboration
- Open platforms
- AI hype vs. reality
- How your business can create value with AI
Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.
This webinar explains:
· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise
· The key requirements for establishing a cyber threat intelligence function
· Basic cyber threat intelligence workflows
· Resource and training requirements to support a Cyber Threat intelligence function
Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.
Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.
During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.
25% of technology projects fail outright, 20-25% don’t show any ROI, and as much as 50% need massive reworking by the time they are finished.
Join our open forum, and ask questions as we walk you through what it takes to have a successful a Ticketing Solution. Hear tips, tricks and horror stories from the best.
Dealing with Employee Onboarding, Tracking, and Provisioning in the Digital Revolution - or Something Better...
What if you could consumerize the Employee Service experience?
Making onbaording a breeze for new employees, perhaps even increasing your employee satisfaction score? It's a no brainer right?
There are a lot of platforms who promise they have the "right recipe" when it comes to HR delivery. Finding out the truth behind a platform can be just as scary as implementing one!
That's why on Tuesday, October 24th, you should join Adam Mason, VP of Solutions and Innovation, and Tom Sweeney, Bussiness Process Consultant, of Acorio for our October webinar. They'll cover ServiceNow's new product, HR Service Delivery, and help you understand the platform's onboarding experience and what success it can bring to your company's future (and current) employees.
Find out if your onboarding experience is working.
Using email and spreadsheets to manage your help desk is a recipe for mistakes and inefficiency. Can you prioritize CEO requests? Do you know how many password reset requests you receive per month? What is the average time each ticket it open?
If you’re using email, or even have an outdated on-prem solution, we doubt you can answer yes to all of those questions.
Join Kyle Shepard, Manager of Customer Success at Samanage, on Wednesday, October 11, at 2p.m. EST, as he discusses:
• The downfalls of using email
• How to quickly create workflows to manage requests
• Reporting available with a modern solution
• How centralized ticketing moves the organization forward
Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:
- Is there command and control activity?
- Did lateral movement occur?
- What other systems were accessed?
- Et cetera…
This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.
After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.
Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.
In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
Digital technologies like AI, automation and blockchain have gone from concept to mainstream over the past 12 months, and in 2018 businesses will start looking at how they can use these to innovate and differentiate themselves.
In this webinar, our experts will outline the forces that will re-shape digital business in 2018. They’ll also reflect on major trends and milestones from the past 12 months that have set the stage for a year of change ahead.
Software revolutionized the data center and it’s changing what’s possible when it comes to your packet visibility architecture.
Tapping into the cost-effective nature of Open Compute platforms, this new generation of software-driven packet brokers promises effortless scalability and pervasive visibility. This is packet broker 2.0.
Join ACG analyst Stephen Collins and NETSCOUT Director of Marketing Ann Sun, as they delve into this major breakthrough in packet broker technology and explain how you can benefit from it.
Register now for an insightful hour of discussion that will cover:
• An analyst overview of the network monitoring landscape
• What a packet broker 2.0 architecture looks like
• Deployment scenarios
• Expert answers to all of your questions
• And much more…
Learn how you can take advantage of this evolution in packet broker technology with the latest research from ACG. Register now.
The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
Now is the time to move from hype to reality.
This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.
About the Speakers:
Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.
For more information on our Advanced Analytics offerings contact us at email@example.com and visit http://www.unisys.com/analytics
One of the first challenges in a big data project is how to ingest data into a data lake from disparate systems across the organizations. Add to this streaming data from devices, sensors and social media and just step one of the journey in big data becomes overwhelming. The key to delivering scalable big data pipelines is automation. Join this session how to learn how to build scalable data lakes by using an automation strategy that will also extend beyond the data lake stage to processing and analytics of this data.
Basil Faruqui is lead solutions manager at BMC, where he leads the development and execution of big data and multicloud strategy for BMC’s Digital Business Automation line of business (Control-M). Basil’s key areas of focus include evangelizing the role automation plays in delivering successful big data projects and advising companies on how to build scalable automation strategies for cloud and big data initiatives. Basil has over 15 years of industry experience in various areas of software research and development, customer support, and knowledge management.
Application container software such as Docker and Kubernetes are among today's most disruptive trends in enterprise IT. While many are contemplating how containers may disrupt or even overtake DevOps in terms of hype or adoption, it's important to remember the reality that both containers and DevOps are part of the larger trend toward digital transformation.
Containers are definitely having an impact on DevOps tenets of faster application releases and more efficient infrastructure management, but are just as likely to be a catalyst to scaling DevOps rather than competition.
This webinar presented by 451 Research and Puppet will offer some perspective on what container software really means for the modern DevOps movement in the enterprise based on industry analysis and experience, survey data and customer case studies.
Recommended Audience: CIO, CFO, Procurement officers, IT Finance, IT Sourcing.
Telecom Expense has traditionally been the most challenging of IT costs to manage. With the emergence of Software-as-a-Service, Cloud Computing, the Internet of Things, and software defined networks, the rest of the IT world is quickly catching up.
This webinar will provide best practices for expanding your existing telecom expense management program into a bigger IT management program to take advantage of the robust capabilities and vendor management experience already in TEM. This presentation will include anonymized end user examples and a list of vendors with experience in managing non-telecom expense categories.