Hi [[ session.user.profile.firstName ]]

Research and Development

  • Discover how clean label ingredients can increase your ROI in bakery products
    Discover how clean label ingredients can increase your ROI in bakery products
    Ingredion clean label experts Nov 27 2019 11:00 am UTC 60 mins
    Ingredion, the clean label experts will take you through how the adoption of clean label ingredients has changed the food and beverage industry in Europe forever. Consumers are demanding greater transparency from their labels, whilst being armed with mobile devices to look up anything they’re unsure of in the aisles.

    We all know that clean label is good for consumers and as a result good for your business. Ingredion will introduce to you how clean label can help you achieve faster product development, increased sales during high season and reduced overheads to achieve increased margins.

    See how a leading bakery manufacturer found that using modified starch in its macarons was affecting sales they turned to Ingredion to help them clean up their act.

    Join our webinar to discover how you can increase your return on investment into clean label ingredients today.
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Recorded: Oct 22 2019 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Oct 22 2019 46 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Upstream Viral Risk Mitigation Strategy for High Titer Biologics Manufacturing
    Upstream Viral Risk Mitigation Strategy for High Titer Biologics Manufacturing
    Aaron Mack, Engineer at Biogen & Dave Kolwyck, Director at Biogen and David Gemmell Senior Process Engineer at Merck Recorded: Oct 17 2019 83 mins
    Presented by Aaron Mack, Engineer at Biogen

    This talk will focus on the risk based approach that Biogen used for determining which raw materials to initially include in its upstream raw material viral risk mitigation portfolio. High Temperature Short Time (HTST) at raw material suppliers is an integral part of this risk mitigation approach. The merits of a risk-based approach to upstream viral safety will be explored, highlighting the HTST pasteurization viral mitigation capability suppliers like Merck have introduced and expanded. Treatment parameters have been detailed in publically available peer reviewed literature and confirmed in specific raw material components prior to implementation in commercial manufacturing processes. Additionally, benefits of decoupling materials with high risk of viral contamination will be reviewed.

    Followed by Implementation of a Robust Upstream Viral Mitigation Strategy for Cell Culture Feeds
    Presented by David Gemmell Senior Process Engineer at Merck (Contact at david.gemmell@emdmillipore.com)

    High temperature short time (HTST) pasteurization is a highly effective method to achieve virus inactivation. This technology has been typically used as an in-house pretreatment tool for high risk bioreactor feeds. The availability of HTST-pretreated feeds minimizes the need to install complex and costly systems in the bioproduction facility, which have significant capital expenditure costs and can become a process bottleneck. The availability and use of complementary virus mitigation strategies minimizes the risk of introducing adventitious agents into the bioreactor, which can impact manufacturing operations and ultimately affect drug supply to patients.

    The webinar details the products and capabilities Merck have developed regarding viral removal utilizing viral filtration or viral inactivation via High Temperature Short Time pasteurization, of high-risk raw material feeds for the biopharmaceutical industries.
  • 爱思唯尔卓越科研在线讲座重播:在《柳叶刀》上发表论文——专为中国研究人员打造的中文在线讲座!
    爱思唯尔卓越科研在线讲座重播:在《柳叶刀》上发表论文——专为中国研究人员打造的中文在线讲座!
    Helena Wang Nov 7 2019 3:00 am UTC 63 mins
    与《柳叶刀》亚洲区执行主编王辉(Helena Wang)女士一起学习在高影响力期刊上发表论文的技巧和策略。王辉女士分享了她在整个研究论文发表周期中与研究人员和论文作者合作的经验,介绍如何撰写能够在优质出版物上发表的论文,以及广泛传播研究成果的机会。本次研讨会内容精彩纷呈,不容错过,能够让您的研究过程和研究影响再上新台阶。This webinar is in Mandarin (Chinese).
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • Get to the Point! Communicate More By Saying Less
    Get to the Point! Communicate More By Saying Less
    Diane DiResta Recorded: Oct 16 2019 49 mins
    Do you do most of the talking? Do you take too long to get your point across? Do you allow the conversation to go down a rabbit hole?

    Whether you’re an entrepreneur or business professional, you can’t seal the deal unless you can speak clearly and concisely. In this webinar you’ll learn:
    - how speakers and high level executives lose their audience
    - how to create a message that’s crisp
    - a mantra for keeping you on track

    When you learn to be crisp, you’ll see glazed eyes of boredom turn into raised eyebrows of interest.
  • How to enhance and manage your IoT security in a Microsoft Azure environment
    How to enhance and manage your IoT security in a Microsoft Azure environment
    James Penney, Device Authority and Ian Banham, Microsoft Recorded: Oct 16 2019 52 mins
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • Unified Data Protection: Part 2
    Unified Data Protection: Part 2
    Ankur Chadda, Senior Product Marketing Manager Recorded: Oct 16 2019 38 mins
    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.

    Wednesday, October 16, 2019

    10 a.m. CDT

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate

    Risk-Adaptive Controls – to eliminate the complexity of policy enforcement

    Intelligent & Dynamic Automation – to build a better understanding of context and user intent
  • FDA Perspective on Aseptic Process Simulation for Cell Therapy Product Manufa...
    FDA Perspective on Aseptic Process Simulation for Cell Therapy Product Manufa...
    Dr Lily Koo, Consumer Safety Officer at FDA and Dr Keen Chung, Principal Scientist (Upstream Process) at Pall Biotech Recorded: Oct 16 2019 83 mins
    FDA Perspective on Aseptic Process Simulation for Cell Therapy Product Manufacturing
    Presented by Dr Lily Koo, Consumer Safety Officer at Food and Drug Administration

    The manufacturing processes for cell therapy products can be highly complex, non-conventional, and product-specific. Aseptic techniques are often required throughout manufacture. The challenge to appropriately and effectively validate aseptic processing requires that industry and regulatory bodies rethink how validation strategies are best applied to this novel class of products. This presentation will address FDA perspective on aseptic process simulation for cell therapy products. It will highlight some unique manufacturing/processing features that are shared among cell therapy products and should be considered during aseptic process simulation study design. The presentation will also cover elements of the traditional validation approach and how they could be appropriately applied to cell therapy manufacturing.

    Followed by Process Control Strategy to Mitigate Contamination Risk of an Aseptic Viral Vector Production
    Presented by Dr Keen Chung, Principal Scientist (Upstream Process) at Pall Biotech

    Adeno-associated virus (AAV) vectors are potent gene therapy vectors, used to deliver therapeutic transgenes to target tissues. Gene therapy clinical trials often require high titer vector preparations to adequately deliver the therapeutic transgene, in great excess of research-level production utilized in many laboratories. To bring the virus into the pre-clinical and clinical phases, Pall Biotech simplified, optimized and scaled-up the current upstream and downstream process of viral vector production to industrial scales using the fully-closed, single-use Xpansion® multiplate seed train bioreactor and the production packed-bed iCELLis® 500 single-use bioreactor. In these processes, it is important to ensure that steps are built into the process to ensure adequate control of adventitious agents.
  • Microcontent Architectures for DITA Deployments
    Microcontent Architectures for DITA Deployments
    Rob Hanna, Chief Information Architect Recorded: Oct 15 2019 61 mins
    Microcontent supports emerging technologies including chatbots and conversational user interfaces. One of the keys to intelligent microcontent is the ability to model content for the intended reader response. DITA goes a long way to modeling for intent, but finer-grained semantics are needed to take us the rest of the way.

    Join Scott Abel, The Content Wrangler, and his special guest, Rob Hanna, Chief Information Architect with Precision Content Authoring Services for this free one-hour webinar. This technical session explores the key semantic structures developed by Precision Content to create, manage, and publish with microcontent to both traditional and emerging channels for delivery.

    Participants will learn how to architect:

    • typed blocks from DITA sections
    • process- and principle-type structures, and
    • sub-structures for modeling specific intents.

    About Rob Hanna

    Rob Hanna co-founded Precision Content in 2013 to change the way writers approach structured authoring. Having spent more than a decade helping organizations move to component content management he realized that most organizations need to take a step beyond technology and expert consultants. Without fostering the necessary standards and skills to work in this new media, organizations would continue to stall in their attempt to move to advanced information creation and management techniques, like structured authoring. With this knowledge, he developed the Precision Content® methods, tools, and training. Today, Rob and his team of experts help Precision Content clients make the move to structured authoring as seamless as possible.
  • Trust in Math, Not Humans: Privacy Technology in Crypto”
    Trust in Math, Not Humans: Privacy Technology in Crypto”
    This expert panel include RICARDO G. DIAZ, Julie Goggin, Ulf Mattsson and other experts Nov 13 2019 5:00 pm UTC 60 mins
    Trust in Math, Not Humans : Privacy Technology In Crypto

    The blockchain revolution of the past 10 years has seen the biggest surge in open source projects with 90K+ Github repositories dedicated to blockchain (DLT) projects. This massive paradigm shift to decentralized computing has also advanced the field of cryptography with exciting new math that will deliver on the promise of privacy like never before.

    With over 20 years enterprise software and cyber security expertise, Ricardo Diaz, today is the founder of Blockchain CLT, a blockchain consultancy. He will discuss the future and evolution of trust with innovative privacy technologies powering blockchain projects today and in the future.
  • The Right Chemistry to Lower Your Pulp Costs
    The Right Chemistry to Lower Your Pulp Costs
    Mark Christopher Recorded: Oct 15 2019 41 mins
    Mark Christopher, Global Market Development Manager for Tissue, discusses a tissue manufacturer's most costly raw material, pulp, and how pulp expenditures can be reduced without sacrificing tissue softness and strength.
  • SMBs Market Overview and Technology Buying Trends (EMEA)
    SMBs Market Overview and Technology Buying Trends (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Recorded: Oct 15 2019 40 mins
    ** This is an EMEA focused webinar **

    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • Getting Started with S&OE on Oct 10
    Getting Started with S&OE on Oct 10
    Hear from Kyle Westwood, Digital Strategy & Solutions at Elementum Recorded: Oct 10 2019 27 mins
    See the only supply chain platform designed to help you manage unplanned exceptions in action.
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • Nice to Have or Have to Have? The Case for Cyber Insurance
    Nice to Have or Have to Have? The Case for Cyber Insurance
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator Recorded: Oct 10 2019 59 mins
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Design of remote luminescent thermometers for bio-imaging
    Design of remote luminescent thermometers for bio-imaging
    Dr. Markus Suta, Utrecht University Oct 24 2019 1:00 pm UTC 60 mins
    Join Reaxys Prize Club member Dr. Markus Suta for fascinating insights into luminescence thermometry. In this webinar, he describes the development and validation of remote lanthanide-based luminescent thermometers with applications in bio-imaging. Discover why a combination of in silico modelling and wet-lab experiments were essential to the success of the project. Dr. Suta also talks about the importance of efficient literature research to his work.

    In addition, Dr Marta da Pian will give an overview on tips and tricks for using Reaxys.

    We hope you can join us!
  • Power of Product Data Series: Stop Hiding Product in Your Taxonomies
    Power of Product Data Series: Stop Hiding Product in Your Taxonomies
    EIS Director of Delivery Jason Hein and Principal Taxonomist Chantal Schweitzer Oct 24 2019 5:00 pm UTC 15 mins
    Many product taxonomies start with good intentions but are corrupted over time by a proliferation of “miscellaneous” nodes – virtual “junk drawers” that hide product from customers. In this talk, EIS discusses why “junk drawers” can be a problem in taxonomy and shows how to avoid (or at least manage) them for improved customer engagement.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.
  • Showcasing your research: Present the full picture of your research achievements
    Showcasing your research: Present the full picture of your research achievements
    Heather Williams Oct 29 2019 10:00 am UTC 45 mins
    This 45 minute webinar will discuss how Elsevier supports researchers by providing tools to effectively showcase their research profile and increase their visibility, a skill that is vital in the research world.
  • The Invisible Hand (How Algorithms Shape Our Reality)
    The Invisible Hand (How Algorithms Shape Our Reality)
    Arwen Smit, Author Identity Reboot Oct 29 2019 3:00 pm UTC 30 mins
    In the age of algorithms, A.I.-driven multinationals and an interconnected, global population, our personal identity is more important than ever. With the rise of the internet, our online and offline worlds started to merge, and what identity is and isn’t has become less defined and more complex. In this timely talk, Arwen Smit explains why identity is the most valuable thing you own, standing at the core of your every online and offline interaction. Driving home that when algorithms shape our reality, we humans become the input and output of algorithms. Arwen Smit is the author of Identity Reboot, available early 2020. Find out more at www.arwensmit.com.
  • Texture Team: Expertos en las preferencias de tus consumidores
    Texture Team: Expertos en las preferencias de tus consumidores
    Adriana Monroy, Growth Platform Manager y Francisco Ibarzabal, Gerente de Marketing Segment & Insights Oct 29 2019 4:00 pm UTC 60 mins
    El consumidor está en búsqueda de experiencias sensoriales holísticas cuando se trata de seleccionar sus productos. La textura es uno de los atributos más importantes a la hora de elegir, por lo tanto es uno de los principales retos de los formuladores. Estudios indican cuál es la preferencia de textura de los consumidores mexicanos de acuerdo con su edad y género.
  • Superior Sample Preparation and GC of Fatty Acid Methyl Esters
    Superior Sample Preparation and GC of Fatty Acid Methyl Esters
    Dr. Frank Michel, Analytical & Chromatography Scientific Advisor, Merck KGaA Darmstadt, Germany Oct 30 2019 7:00 am UTC 75 mins
    Fatty acids are important analytes for nutritional value, product taste/texture, shelf-life and place of origin studies. They are not only relevant in food, but also in clinical, biochemical, industrial, agriculture testing.

    In this talk we will give the background of fatty acid analysis and describe some current techniques and new developments for the GC analysis of fatty acids in a variety of applications. A special focus of the webinar is the separation of cis and trans isomers by either a sample prep approach using SPE or by improved GC approaches.
  • Cost & Management of Oncology Combination Regimens
    Cost & Management of Oncology Combination Regimens
    Marcia Palmer, Allen W. Becker, Anthony Chiefari, Howard Deutsch, Nicolle Hamilton, ZS Associates Oct 30 2019 2:00 pm UTC 90 mins
    Overview
    Oncology treatment increasingly involves combinations of novel oral and biologic drugs. While combo approaches aren’t new, there are significant cost implications of combining high priced innovator drugs (versus older, generic chemotherapies).

    Payers are in a difficult spot regarding the cost and management of these regimens. Traditional utilization management tools are still difficult to apply in oncology, given no payer wants to be on the front page of a major newspaper for denying treatment. Pathways have not held up to their promise for containing cost.

    Personalized medicine approaches such as biomarkers serve an important role in targeting therapy to the most appropriate patients, thereby reigning in cost. However, there are limitations in the breadth and utility of these tools. For example, PD-1/PDL-1 drugs have shown conflicting outcomes associated with receptor expression – and these drugs are the backbone for many combo regimen programs in clinical development.

    Environment/perception shifts, new approaches to management, indication-based pricing or other novel pricing approaches, and innovative payment models may hold promise for controlling cost in this new era of combination therapy.

    Focus
    Join ZS Associates for a live expert payer panel discussion on the challenges and potential solutions for managing the cost of combo oncology regimens. Topics will include:

    •Perspectives on oncology drug management and combination regimen pricing today
    •Potential payer-driven and pharma-driven solutions to price and cost management for oncology combo regimens
    •What oncology manufacturers should consider in engaging payers in the future

    The live payer webinar, co-moderated by Nicolle Hamilton, ZS Associates and Dominic Tyer, pharmaphorum, will take place on Wednesday, October 30 2019 from 14:00-15:15 GMT/10:00-11:15 ET.
  • Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Alexis Kushner, Director of Product Marketing, Salesforce and Sam Steiny, Product Marketing Manager, MuleSoft Oct 30 2019 3:00 pm UTC 44 mins
    Business efficiency is the No. 1 priority for CEOs and CIOs. In fact, 84% of IT leaders say improving employee-facing technology is critical for their company’s success.

    Join this webinar for a live demo of Salesforce Lightning Platform with MuleSoft-powered integrations. Learn how to:
    - Deliver a connected experience by integrating back-office applications and systems like Workday and Salesforce.
    - Overcome data silos, IT backlogs, and outdated development tools.
    - Modernize and automate internal processes like onboarding to improve employee experience.
  • Montclair Levels Up: Supporting the Institutional Mission with your Repository
    Montclair Levels Up: Supporting the Institutional Mission with your Repository
    Karen Ramsden and Darren Sweeper, Montclair State University Oct 30 2019 3:00 pm UTC 60 mins
    Montclair State University achieved a major milestone this year, earning the high research activity R2 status by the Carnegie Classification of Institutions of Higher Education. An essential part of their transformation? The institutional repository. On October 30, join Montclair State repository team members Karen Ramsden and Darren Sweeper as they describe the challenges and successes of integrating their IR into a growing culture of research. Topics include:
    -Aligning the institutional repository with strategic goals to give the library a seat at the table
    -Engaging internal and external stakeholders with the IR
    -Outreach to faculty on a changing campus
    -Continuing to leverage the power of the repository over time

    Darren Sweeper is responsible for managing, coordinating and administering all aspects of the Government Documents Department at Montclair State University’s Sprague Library. He is especially interested in data and statistical literacy and how government information can be used to promote life-long learning in the social sciences particularly in education, sociology and the sociology of education. Darren received his BS in Criminal Justice and Sociology, MA in Political Science and Masters in Library and Information Science from Rutgers University.

    Karen Ramsden currently serves as Research and Projects Specialist and Coordinator of Digital Commons for Sprague Library at Montclair State University. In her current position, Karen plays a crucial role in helping to direct and shape the character and overall nature of all library-related projects from conception through development, production, and introduction to the intended audience. Additionally she serves on numerous University-related committees and initiatives, and as lead administrator for Research with Montclair. Karen received a Master’s in Public Administration from Kean University and is currently enrolled in the Master’s Degree Program in Social Research and Analysis at Montclair State.
  • Power Through Presence
    Power Through Presence
    Leah Marone Oct 30 2019 4:00 pm UTC 60 mins
    Stress is a normal part of life that we will continue to experience from time to time. But understanding when stress has gained too much power and is interfering with our daily functioning is critical. Are you constantly multitasking, struggling with sleep, feeling unfulfilled, experiencing symptoms of anxiety? If so, listen in to’ reset’ yourself and regain presence in your world.

    Leah Marone is a psychotherapist who specializes in anxiety, depression, relationships, and Mindfulness. By having a variety of clinical roles in various states and countries, she has developed diverse professional experience and global perspective. Currently, Leah sees individuals and families at her practice in Charlotte. She is also sought out by corporations and non-profits to work with executives and teams on improving communication, productivity and job satisfaction.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 30 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • CIAM, RaaS and the Future of Identity Management
    CIAM, RaaS and the Future of Identity Management
    Andrew Shikiar, FIDO Alliance | Kevin Trilli, Onfido | Dan Rawlings,Trustonic | Scott Johnson, Western Union Oct 30 2019 5:30 pm UTC 60 mins
    Modern customers expect financial services to be accessible from anywhere, using a smartphone, in just a few taps. They want to be able to register for these services without ever setting foot in a branch. And they are extremely friction adverse, abandoning registration processes if they don’t live up to expectations. Simultaneously, fraud is becoming ever more complex and professionalized. So in a world where you might never meet your customer, how can you know them? And how can registration and access management help with that?

    Join this webinar as we discuss:
    - How you can maintain a secure customer identity lifecycle
    - How innovation can mitigate KYC-induced friction at registration
    - How CIAM can deliver benefits to companies and customers alike
    - What the future of identity lifecycle management will look like

    Speakers:
    Andrew Shikiar, Executive Director, FIDO Alliance (Moderator)
    Kevin Trilli, CTO, Onfido
    Dan Rawlings, Chief Commercial Officer, Trustonic
    Scott Johnson, Head of Product, Western Union Business Solutions
  • How Identity Verification Benefits Customers & Businesses
    How Identity Verification Benefits Customers & Businesses
    Kevin Trilli, CTO, Onfido Oct 30 2019 9:30 pm UTC 30 mins
    To the everyday user, ‘identity verification’ is a term that conjures memories of cruel KBA tests, frantic searches for bills, and trips to business branches they’ll never visit again. But innovations in the IDV space mean that secure and remote identity verification can be done in moments, needing just an identity document and smartphone.

    Join us as we discuss:
    - How IDV can benefit both businesses and consumers
    - How systems are adapting to deal with increasingly professionalized fraud
    - How new tech innovations are decreasing friction at registration
    - What the future of IDV looks like
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 31 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Engineering First Principles: Applications to Pharmaceutical Manufacturing
    Engineering First Principles: Applications to Pharmaceutical Manufacturing
    Bernard McGarvey, PhD Chemical Engineering Nov 5 2019 3:00 pm UTC 90 mins
    Within the pharmaceutical industry, creating a robust Operational Control Strategy (OCS) is a key step to accomplishing the goals of Quality by Design (QbD). Along the way to developing this robust Operational Control Strategy many problems will be encountered that need to be solved. The use of a First Principles based approach provides value because it improves the effectiveness and efficiency of our problem solving, thereby leading to solutions that are more likely to work without unintended consequences and were created in a faster and more cost effective manner. Based on the author’s experience, a clear definition of what First Principles are will be given (and what they are not!). Areas of opportunity where the application of First Principles is likely to be successful will be described. An outline of a high-level process for implementing a First Principles based approach will be presented. Finally an example of the application of First Principles in the pharmaceutical industry will be briefly described.
  • DigiCert Trends and Threats Briefing - October 2019
    DigiCert Trends and Threats Briefing - October 2019
    Jeff Barto, Value Strategist, DigiCert Nov 5 2019 4:00 pm UTC 60 mins
    Stay updated on the month’s news and insights regarding the trends and threats in digital certificates (including TLS, SSL and code signing), plus PKI, IoT, encryption, identity and trust.

    In this month’s briefing, we’ll cover:
    - digital certificates, including TLS/SSL, code signing and PKI,
    - trust trends in ACME, blockchain, quantum cryptography, the IoT and more
    - financial impacts of (and to) your security investment.

    We'll also reward you with some fun and positivity.

    Benefit from elevated awareness of current trends, real-world context for your security choices, and refreshed credibility & expertise in website security.

    #cybersecurity #security #TLS
  • Pharmaceutical Forensics for Safe Manufacturing and Supply
    Pharmaceutical Forensics for Safe Manufacturing and Supply
    Ravi Kalyanaraman and Jeremy Peters of BMS and Robert Heintz of Thermo Fisher Scientific Nov 6 2019 6:00 am UTC 76 mins
    Why Use Raman Microscopy for Pharmaceutical Forensics?
    by Dr. Robert Heintz, Senior Applications Specialist at Thermo Fisher Scientific

    Raman microscopy is uniquely suited for providing essential information for pharmaceutical forensic applications. The use of visible lasers allows for analysis of very small samples with spatial resolutions down to a micron or better. Materials can be analyzed in glass containers and through transparent packaging. Mapping and imaging provides information on the spatial distribution of components as well as particle sizes and shapes. Confocal operation allows for probing inside transparent materials and analyze different layers or inclusions without the need to cut or cross-section the sample. Raman microscopy is non-destructive and preserves the sample for further analysis. Raman spectra can be used not only for the conformation of expected components but also the identification of unknown contaminants or impurities. Spectral features are very sensitive to molecular structure and can be used to distinguish polymorphs and other very chemically similar materials.

    Followed by Pharmaceutical Forensics for Safe Manufacturing and Supply
    by Ravi Kalyanaraman, Director at BMS

    Pharmaceutical Investigations and Technology (PIT) is a group within Global Analytical Technology (GAT) department in the commercial Quality organization within Bristol-Myers Squibb. The PIT group has been a key part in BMS for 30 + years in providing analytical support for commercial manufacturing and in pharmaceutical forensics. This include particulate and foreign matter characterization in pharmaceutical products and screening counterfeit drugs. Several analytical tools and techniques are used by PIT to support the pharmaceutical forensics.This talk will feature all the analytical techniques used by PIT and how the results are used in resolving manufacturing issues and to protect patients from counterfeit drugs.
  • Discover how clean label ingredients can increase your ROI in dairy products
    Discover how clean label ingredients can increase your ROI in dairy products
    Ingredion clean label experts Nov 6 2019 11:00 am UTC 60 mins
    Ingredion, the clean label experts will take you through how the adoption of clean label ingredients has changed the food and beverage industry in Europe forever. Consumers are demanding greater transparency from their labels, whilst being armed with mobile devices to look up anything they’re unsure of in the aisles.

    We all know that clean label is good for consumers and as a result good for your business. Ingredion will introduce to you how clean label can help you achieve faster product development, increased sales during high season and reduced overheads to achieve increased margins.

    See how a dessert manufacturer, launching a new cheesecake, found its texture was dry and chalky, not rich and indulgent enough. See how Ingredion devised a winning solution, fast.

    Join our webinar to discover how you can increase your return on investment into clean label ingredients today.
  • Building a platform for digital insurance
    Building a platform for digital insurance
    Ben Turner, CTO, Legal and General and Dan Snowdon, UK&I Financial Services Marketing Lead, MuleSoft Nov 6 2019 5:00 pm UTC 43 mins
    Digital insurance platforms enable insurance companies to connect with their ecosystem of customers, partners, and vendors on a single, unified platform. Hear firsthand from CTO Ben Turner how Legal and General’s digital insurance platform helped the company diversify product offerings, and scale quickly to meet customer expectations.

    Key Takeaways:
    - How industry leaders have digitally transformed insurance offerings with a platform business model.
    - How to build an integrated insurance platform to connect your ecosystem of suppliers and exceed customer expectations.
    - Best practices to increase customer retention and profitability with a single view of the customer.
  • Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Michelle Drolet, Tony Yodice Nov 6 2019 6:00 pm UTC 60 mins
    In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.

    Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:

    -What is Zero Trust Network Access
    -Why modern enterprises require access policies built with an identity centric approach
    -How to protect your organization from the inside out
  • Product Data - the Great Enabler for IoT, Marketplaces, and more
    Product Data - the Great Enabler for IoT, Marketplaces, and more
    David Bonk Graco | Russ Sharer, Fulham | Luis Marcos, Honeywell Nov 6 2019 6:00 pm UTC 59 mins
    In this webinar we explore how intelligently enriched product data drives growth and differentiation in the marketplace. Ecommerce websites, replacement part reference guides, online marketplaces and IoT monitoring platforms all have one thing in common.  They all depend on detailed, accurate and comprehensive product information databases.
    Product data is a critical driver for core offerings today, and will be even more critical as organizations innovate across their value chains in the future.

    In this session our leadership panel discuss:
    •    What is enriched product data
    •    Enhancing your brand position and value to customers
    •    How enriched product data enables innovation
    •    Preparedness for interoperability

    This webinar will be of interest to marketing, product management, service management and data management executives with manufacturers, distributors, and service providers.  Also, anyone exploring the role that product data plays in defining and growing their offerings and transforming their customer value propositions.
  • Operational Risk Management for 2020 and Beyond
    Operational Risk Management for 2020 and Beyond
    Sam Abadir Nov 6 2019 5:00 pm UTC 60 mins
    Operational risks have been constantly increasing due to immature processes, unmanaged third parties and more. With the growing number of complex products and services, this issue is intensified, and traditional operational risk management can't keep up.

    In this live webinar, Lockpath’s Sam Abadir will share what operational risk management for 2020 and beyond looks like, including:

    • What areas operational risk management encompasses

    • How your organization can gain efficiency from proper operational risk management

    • Advantages of managing operations on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage operational risk in 2020 and beyond by attending this educational webinar. Register now!