Hi [[ session.user.profile.firstName ]]

Research and Development

  • Mixed mode Chromatography in Purifying biologics - Overview
    Mixed mode Chromatography in Purifying biologics - Overview
    Vivek Halan Zumutor Biologics Pvt Ltd, Bangalore, India Recorded: Aug 20 2019 41 mins
    This Webinar will discuss MMC in purifying biologics which includes monoclonal antibodies (mAbs), Bispecific antibodies (BsAbs), antibody fragments (Scfv,Fab) and other recombinant proåteins. My discussion is intended for audience from biopharmaceutical industry as well as active collaborators from academic institutes.
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Recorded: Aug 20 2019 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator
    Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research. Recorded: Aug 20 2019 59 mins
    In case you missed it, we wanted to share a recent webinar about how to use a Cloud Access Security Broker (CASB) to protect your organization from next generation cloud attacks.

    Join Garrett Bekker, Principal Security Analyst at 451 Research, and Ryan Kalember, EVP of Cybersecurity at Proofpoint, for a discussion about:

    • The different CASB use cases, features and architectures
    • What the most prevalent cloud attacks are, and how they target your VAPs, or Very Attacked People
    • What to look for in a CASB solution to mitigate your cloud risks
  • The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    John Spooner, H2O.ai and John Howe, H2O.ai Recorded: Aug 19 2019 51 mins
    Due to popular demand, we are presenting this webinar at a UK-friendly time!

    This discussion will explore real-world examples and how to democratize AI in your organization.

    1. Build a Data science culture
    2. Ask the right questions
    3. Connect to the community
    4. Technology considerations
    5. Trust in AI
  • Sepsis Overview: Challenges and Solutions for Laboratories
    Sepsis Overview: Challenges and Solutions for Laboratories
    Mirta Gamez, M.T.(A.S.C.P.), C.L.S. Recorded: Aug 16 2019 47 mins
    Sepsis presents a global healthcare crisis, with more people dying from sepsis than from prostate cancer, colon cancer, breast cancer and AIDS combined.(1,2) Early intervention is critical, and the clinical laboratory plays a crucial role in early detection.

    View this on-demand webinar to hear Mirta Gamez, MT(ASCP), CLS, explore the laboratory’s role in clinical sepsis diagnosis and treatment.

    After attending this webinar, you will be able to:
    -Articulate the basic etiology of sepsis and its impact on healthcare
    -Identify the challenges that affect the rapid diagnosis of sepsis
    -Guide how—and when—common sepsis biomarkers are used for detection and monitoring
    -Advise on the role of the laboratory in sepsis diagnosis and management

    P.A.C.E. credit is available for your participation.*

    (1)Kumar G A et al. “Nationwide Trends of Severe Sepsis in the twenty First Century (2000-2007). Chest, 2011;16:1223–1231. doi: 10.1378/chest.11-0352.
    (2)Hall MJ, Williams SJ, DeFrances CJ, Golosinsky A. “Inpatient Care for Septicemia or Sepsis: a Challenge for Patients and Hospitals.” Accessed on http://www.cdc.gov/nchs/data/databriefs/db62.pdf Apr 16, 2019.

    *Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
  • BitDam Breach and Attack Simulation
    BitDam Breach and Attack Simulation
    Simon Cuthbert, BitDam Recorded: Aug 16 2019 5 mins
    Today’s cyber world is so dynamic that it makes security professionals constantly wonder if their security is sufficient. BitDam offers a FREE Email-centric Breach and Attack Simulation (BAS) online tool that helps organizations assess their vulnerability immediately.
    Watch this short video to get a glimpse into this tool, including a demo that will show you how to user BitDam BAS and answer the question ‘Is my email really secure?’ within less than 20 minutes.
  • Cloud-Native Operations with Kubernetes and CI/CD
    Cloud-Native Operations with Kubernetes and CI/CD
    Paul Czarkowski, Principal Technologist, Pivotal Software Recorded: Aug 15 2019 62 mins
    Operations practices have historically lagged behind development. Agile and Extreme Programming have become common practice for development teams. In the last decade, the DevOps and SRE movements have brought these concepts to operations, borrowing heavily from Lean principles such as Kanban and Value Stream Mapping. So, how does all of this play out if we’re using Kubernetes?

    In this class, Paul Czarkowski, Principal Technologist at Pivotal, will explain how Kubernetes enables a new cloud-native way of operating software. Attend to learn:

    ● what cloud-native operations are;
    ● how to build a cloud-native CI/CD stack; and
    ● how to deploy and upgrade an application from source to production on Kubernetes.

    We look forward to you joining us.
  • From Skeptics to Champions: Selling the Value of Security Awareness Training
    From Skeptics to Champions: Selling the Value of Security Awareness Training
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader Recorded: Aug 15 2019 106 mins
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Building a connected service experience with Salesforce Service Cloud
    Building a connected service experience with Salesforce Service Cloud
    Esther Chen, Product Marketing Manager, MuleSoft & Jimil Patel, Technical Product Marketing Manager, MuleSoft Recorded: Aug 15 2019 38 mins
    Salesforce Service Cloud to systems like ERP, OMS, and databases to give agents a single view of customers and orders. Rather than switching between different systems, agents can instead focus on delivering superior service. Together, MuleSoft and Salesforce increase agent productivity by 25% by automating workflows and service actions and improve customer satisfaction by 35% with personalization throughout the service experience.

    Watch this webinar to:
    * See a live MuleSoft Flow designer demo with Salesforce Service Cloud to create a holistic view of your customer.
    * Learn how customers are transforming their service experience using MuleSoft to synchronize Service Cloud with other systems of record.
    * Get best practices to integrate Service Cloud with ERP, OMS, and third-party systems.
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Alyssa Dver, CCO at American Confidence Institute Recorded: Aug 15 2019 62 mins
    This week Alyssa Dver joins us to discuss total BS; using brain science to debunk and transform the business of speaking.

    Join two of Boston’s best speakers as they candidly discuss why so many speakers fail -- and the real secrets to speaking success. Whether you’re a speaker or an event professional, learn a bit of brain science to give yourself, and your audience real, sustained confidence.

    Innovation Women founder Bobbie Carlton will act as both host and mythslayer while she interviews the refreshingly candid Alyssa Dver. After years as a CMO for several companies, Alyssa founded and now helms the American Confidence Institute and the ERG Leadership Alliance. She speaks professionally 8-10 times every month and has trained over 300,000 people how to use the science of confidence to pitch, coach and be kickass. As both pro speakers and event planners, Bobbie and Alyssa will share real secrets and science so you can have remarkable impact on your audience and your career. Seriously, no BS.
    -The benefits and challenges of being a part- or full-time pro speaker
    -How to use brain science to make speaking more fulfilling for you and your audience
    -Expert tips to optimize speaking revenue and/or career opportunities

    About Alyssa

    Alyssa Dver is Co-Founder and Chief Confidence Officer at the American Confidence Institute. Recognized as the world’s Chief Confidence Officer and one of Boston’s Best Speakers, Alyssa helps students and professionals use brain science to inspire confidence in themselves and to anyone they pitch, coach, or care about. Alyssa is the co-founder of the American Confidence Institute which conducts and collects research that is then shared through keynotes, workshops, online and certification programs. Clients include Spotify, Wayfair, Pepsi, The US Air Force, State Street, Staples, The Royal Bank of Canada, plus dozens of other confidence-committed organizations, conferences, and associations. 
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Vendor Risk Management for 2020 and Beyond
    Vendor Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Aug 15 2019 48 mins
    Vendors are essential to your company's success; most organizations can’t operate without them. However, vendors require a different approach to risk management.

    Outsourcing your activities does not mean you outsourced managing the risk of those activities. The public, the regulators and the courts still hold you responsible. Without a considered approach to third-party risk management, the risk management of vendors and suppliers can easily get out of your control.

    In this live webinar, Lockpath’s Sam Abadir will share what vendor risk management for 2020 and beyond looks like, including:

    • What vendor risk management encompasses

    • How your organization can gain efficiency from proper vendor risk management

    • Advantages of managing vendors on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage vendor risk in 2020 and beyond by attending this educational webinar. Register now!
  • Cell Culture Fundamentals
    Cell Culture Fundamentals
    Kyung-A (Katie) Song, Ph.D. Recorded: Aug 15 2019 44 mins
    Cell culture is a fundamental technique for a variety of applications. Cells are cultured in controlled conditions including temperature, gas exchange, pH, and culture media (energy and nutrients). This webinar will introduce basic concepts of cell culture and provide tips on how to succeed in culturing mammalian cells.

    In this webinar, we will review:
    •Introduction to cell culture
    •Critical factors for successful cell culture
    •Cell culture tips and techniques

    Presenter Bio:

    Dr. Kyung-A Song graduated from Sungkyunkwan University with a Ph.D. in molecular biology and cancer immunology. She completed her postdoctoral fellowship in pharmaceutical research and drug discovery at Virginia Commonwealth University. She has extensive experience in a variety of cell culture techniques including isolation and culture of primary patient cells. She has worked with xenograft models and many cancer cell lines, and she has expertise in in vitro cell based functional assays and in vivo experiments. She is currently a Scientific Support Specialist for Corning Life Sciences where she answers customer inquiries about all products in the extensive Corning Life Sciences product portfolio.
  • Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Susana Lopes, Biometrics Product Manager & Niamh Cassidy, Head of Content Recorded: Aug 15 2019 21 mins
    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?

    Watch this Q&A with Onfido’s biometrics expert, Susana Lopes, to learn:
    The new trends and tech that are seeing biometrics replace traditional identifiers
    Why a single biometric isn’t a silver bullet, and why multi-factor doesn’t always mean more secure
    The difference between behavioural and biological biometrics, and which will work best for your users
    What should be on your checklist when implementing biometric solutions.
  • 5 Lessons learnt from 5 real-world AI Deployments
    5 Lessons learnt from 5 real-world AI Deployments
    Iain Brown, Head of Data Science, SAS UK&I Recorded: Aug 15 2019 46 mins
    Aiming to dispel the AI myth from the AI reality.

    This session provides practical real-world applications of AI solutions detailing the lessons learned and the pitfalls to avoid. You will understand the critical factors that will make your AI strategies successful and see what AI could deliver within your organisation.

    In addition we will discuss how to make sure AI is ethical by design, and why a governance framework is the crucial first step in ensuring AI is used in the right way.

    Speaker: Iain Brown

    Dr. Iain Brown (Twitter: @IainLJBrown) is the Head of Data Science at SAS UKI and Adjunct Professor of Marketing Analytics at University of Southampton working closely with the Financial Services sector, providing thought leadership on the topics of Risk, AI and Machine Learning.

    During his time at SAS he has been involved in delivering numerous projects, and driving innovation in the fields of AI and the corresponding fields of machine learning, deep learning and natural language understanding.

    As an experienced public speaker, he has presented at a number of internationally renowned conferences and conventions and has papers published in the European Journal of Operational Research, International Journal of Forecasting and the Journal of Expert Systems with Applications on the aforementioned areas of expertise
  • Today’s State of S&OE
    Today’s State of S&OE
    Hear from Victoria Chen, who has been helping F500 companies achieve supply chain operational excellence for over a decade Recorded: Aug 14 2019 33 mins
    Time is running out, so register today to save your spot.
  • Optimize Materials Knowledge and Applications with ANSYS Granta
    Optimize Materials Knowledge and Applications with ANSYS Granta
    Robert McCathren, Application Engineer, PADT, Inc. Recorded: Aug 14 2019 33 mins
    Every product is made from materials, and in order to correctly select and apply said materials, decisions need to be based on analysis on the right information. ANSYS Granta software ensures accurate, consistent, traceable materials information every time and provides the tools you need to support design, research and teaching.

    This toolkit is divided into three main products, each designed to accomplish a variety of different tasks when it comes to enabling smart material choices:

    ANSYS GRANTA MI is the leading system for materials information management in engineering enterprises. A single “gold source” for your organization’s materials IP saves time, cuts costs and eliminates risk. Capture and re-use vital knowledge about your metals, plastics and composites in order to provide reliable data for CAD, CAE and PLM, and drive material innovation, empower design, and solve materials-related business problems.

    ANSYS CES Selector is the standard tool for materials selection and graphical analysis of materials properties. A comprehensive materials data library, plus unique software tools enable you to use materials to innovate and evolve your products; quickly identify solutions to material issues; confirm and validate your choice of materials; and reduce material and development costs.

    ANSYS Materials Data allows users to gain easy access to the material property data you need for structural analysis, from within ANSYS Mechanical. Find coverage of many important materials classes, save time wasted searching for and converting data and gain greater confidence in your data inputs.

    Join PADT's Application Engineer and ANSYS Granta expert, Robert McCathren for a deep dive into the capabilities of this new release and how you can benefit from applying it in your organization.
  • How to Make a Recipe with H2O Driverless AI
    How to Make a Recipe with H2O Driverless AI
    Michelle Tanco, H2O.ai Recorded: Aug 14 2019 60 mins
    *** Please be aware that the content presented in this webinar will be technical and "code heavy." ***

    H2O Driverless AI employs the techniques of expert data scientists in an easy to use application that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months.

    We're excited to add the ability for users, partners and customers to extend the platform with Bring-Your-Own-Recipe. Domain experts and advanced data scientists can now write their own recipes (Python snippets) and seamlessly extend Driverless AI with their favorite tools from the rich ecosystem of open-source data science and machine learning libraries. In this webinar we'll demonstrate how make a recipe with Driverless AI.

    Michelle's bio:
    Michelle is a Customer Solutions Engineer & Data Scientist for H2O.ai. Prior to H2O she worked as a Senior Data Science Consultant for Teradata, focused on leading analytics projects to solve cross-industry business problems.

    Her background is in pure math and computer science and she is passionate about applying these skills to answer real world questions. When not coding or thinking of analytics, Michelle can be found hanging out with her dog or playing ukulele.
  • How to reduce IoT device onboarding time to seconds and improve IoT security
    How to reduce IoT device onboarding time to seconds and improve IoT security
    Richard Kerslake, Intel and James Penney, Device Authority Recorded: Aug 14 2019 57 mins
    Want to realize faster IoT device onboarding with additional security capabilities such as credential management and data security?

    Today, a manual process exists where device ownership is transferred, activated in the field, configured on the network, and registered with the device owner in an IoT management platform. This time-intensive and costly process is fraught with security holes, as exemplified by recent large-scale attacks in which device manufacturers have shipped default credentials that were co-opted for botnet-style DNS attacks.

    Imagine you’re going to install 10,000 smart light bulbs in a factory. How much time should you schedule? Before they can start streaming data, you need to key in each device identity, coordinate network credentials with IT, and register each device with the operational technology (OT) smart building control platform. If you guessed 20 minutes per bulb, you’re about right. For 10,000 bulbs, you’d need almost two years!

    You can imagine that if you have thousands and thousands of devices in larger projects this leads to quite some costs.

    Once you’ve onboarded the devices, what next?
    Do you need help managing credentials such as PKI certificates or default passwords?
    Do you have the correct level of data security and privacy for your use case?
    Are you leveraging automation without human intervention for IoT devices out in the wild?

    With speakers from Intel and Device Authority, the discussion will include:
    • Secure by Design: An approach to address IoT security challenges
    • Ownership transfer, zero-touch onboarding and registering of devices (in seconds!)
    • Credential management
    • Data security
    • Automation
  • Achieving Big Business Value from Big Data Initiatives
    Achieving Big Business Value from Big Data Initiatives
    Rick Karl, Vice President of Value Engineering, Zaloni Recorded: Aug 13 2019 34 mins
    Risk reduction.
    Cost savings.

    Ask 3 different people what their idea of business value means and you’ll often get three different answers. When you’re trying to implement an enterprise-wide data hub, it’s often necessary to show value early and often but how can that be easily done when there are multiple stakeholders?

    To justify the investment, it’s critical to show how your new data hub will meet the goals of IT, Finance, and any other departments involved in the initiative. By accurately measuring value, your project will be poised to cut costs, generate revenue, and radically transform the business.

    Join Rick Karl, Zaloni’s VP of Value Engineering, as he shows what’s needed when trying to highlight the value an enterprise data hub can provide to an organization.

    Topics include:
    - Challenges in demonstrating business value for complex data initiatives
    - How to perform a business value assessment for modern data efforts
    - Making the business case that aligns IT and Finance objectives
  • Determinación de macro y micronutrientes
    Determinación de macro y micronutrientes
    Omar Ruiz Sotelo,Field Marketing Specialist, Merck KGaaA Darmstadt Germany Recorded: Aug 13 2019 44 mins
    Aplicaciones para agricultura, acuacultura y agua de mar a través del Método fotométrico.
  • AI for Identity Verification: Going Beyond the Buzzwords
    AI for Identity Verification: Going Beyond the Buzzwords
    Parker Crockford – Director of Policy & Strategic Accounts, Onfido | Mohan Mahadevan – VP of Research, Onfido Recorded: Aug 13 2019 55 mins
    The way we verify our identities is changing. With traditional enterprises evolving and taking their operations fully digital, and newer all-digital businesses are growing exponentially, it makes sense that identity verification and KYC move online too. But in a remote setting, it’s hard for businesses to scale up their user onboarding without also increasing risk. Now, many are turning to AI-based solutions to meet that need.

    From hybrid to augmented, machine learning to deep learning, there are lots of new approaches to identity verification out there. But how can businesses tell the difference between buzzword and true black box, and what are the benefits of each?

    In this discussion, we’ll decode the various different applications of AI to the identity verification problem. We’ll also discuss how to use these new technologies to increase efficiencies at scale and provide exceptional customer experiences.

    Join this expert panel webinar to hear a dynamic panel discussion on:
    -The challenges of traditional methods of identity verification, and why enterprises are turning to AI
    -The different ways AI can be applied for more efficient identity verification
    -The benefits of a hybrid human-AI approach
    -A new identity reality: How will we be able to use our identities in future
  • Uniper | Achieving digital transformation using RPA
    Uniper | Achieving digital transformation using RPA
    Nancy Sachdeva, RPA CoE Lead, Uniper, Hamza Muhammed, AI & RPA Expert, Uniper Recorded: Aug 13 2019 49 mins
    Uniper is a leading international energy company with operations in more than 40 countries and around 12,000 employees. Uniper’s business is to provide a reliable supply of energy and related services. Its main operations include power generation in Europe and Russia and global energy trading, including a diversified gas portfolio. Uniper’s headquarters are in Düsseldorf, Germany.

    Uniper, is on its way to becoming a truly digital enterprise with Blue Prism’s connected-RPA. With RPA, the company is driving transformation of its processes and culture to deliver better outcomes.

    Achieving a top 5 position in ROM Excellence for a Blue Prism award, the Uniper team will discuss how Business Areas, IT and CoE collaborate to achieve seamless integration between digital colleagues and human colleagues. Also highlighted, will be how processes are assessed, re-designed and implemented across various parts of organization, and how a strong, internal training program ensures that Uniper’s workforce is ready to sustain its digital future.

    In this webinar you’ll find out:
    • How RPA was set up, functions and remains sustainable
    • How the governance structure was built
    • Real-life examples of use-cases that have transformed the employee and customer experience
    • How Uniper builds tomorrow’s RPA talent
    • Lessons learned - what worked and what didn’t – along the Uniper’s RPA journey

    PLEASE NOTE : the live viewers had the opportunity to view an exclusive live demo but this is not available in the recorded version.

    • Nancy Sachdeva, RPA CoE Lead, Uniper
    • Hamza Muhammed, AI & RPA Expert, Uniper
    • Dogan Dersüneli, RPA Expert, Uniper
    • Xina Seaton, VP Customer Experience, Blue Prism
  • Keynote by Emil Eifrem, CEO & Co-Founder Neo4j, at GraphTour Europe 2019,
    Keynote by Emil Eifrem, CEO & Co-Founder Neo4j, at GraphTour Europe 2019,
    Emil Eifrem, CEO & Co-Founder Neo4j Recorded: Aug 12 2019 37 mins
    See the world of opportunity that graph technology and Neo4j opens for your business!

    Emil Eifrem, CEO at Neo4j, delivers the Opening Keynote – your chance to hear first-hand what the future holds for Neo4j.
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Aug 20 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • The machine says….I don't know where I got that number from
    The machine says….I don't know where I got that number from
    Gary Richardson, MD, Emerging Technology, 6point6 Aug 20 2019 12:00 pm UTC 60 mins
    How data lineage is more important than ever in the drive towards AI-driven analytics:

    Historically Business Intelligence and Analytics has been providing businesses with the insights into how their businesses are operating and what trends are emerging. If a number looked funny an eagled eyed executive could take action and reset the machine, in the world of AI-driven analytics these days are drawing to an end as we increase the ability of machines to take action. The result is data lineage and governance in the age of AI-driven analytics is more important than ever.

    Gary Richardson, MD, Emerging Technology, 6point6
  • Manufacturing Intelligence: come tenere i processi sotto controllo
    Manufacturing Intelligence: come tenere i processi sotto controllo
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. Aug 20 2019 12:00 pm UTC 25 mins
    L'attuale tendenza nella produzione industriale è verso prodotti su misura, in lotti più piccoli e con tempi di consegna ravvicinati. Questo cambiamento può portare a frequenti modifiche della produzione, con conseguente aumento dei tempi di fermo macchina, maggiori costi di produzione, sprechi di prodotto e la necessità di rilavorare prodotti difettosi.
    Partecipa a questo webinar per capire come le soluzioni di Smart Manufacturing di TIBCO possono aiutarti per affrontare al meglio questa nuova sfida
    Gli argomenti trattati saranno:
    Applicazione delle tecniche di advanced analytics & machine learning / AI per ottimizzare complessi processi manifatturieri
    Come con il controllo statistico multivariato di processo è possibile evidenziare deviazioni da un riferimento non rilevabile con il metodo univariato
    Come monitorare in tempo reale l’OEE di fabbrica ed avere una vista a 360 gradi della produzione.
    Casi di studi dei nostri clienti
  • A guide to biotechnology commercialisation
    A guide to biotechnology commercialisation
    Pete Hotten Aug 20 2019 3:00 pm UTC 60 mins
    Over the past century, life sciences has exploded with innovation and it continues to promise excellent commercial opportunities for those with scientific and academic research in this area. However, research on its own is not enough for these discoveries and inventions to reach their commercial potential. With over thirty years' experience in the biotechnology sector, expert Pete Hotten provides a framework for commercialisation, what to look out for in market research and how evaluating the competition can help determine next best steps.
  • How To Gain Board of Director Support For Cybersecurity Initiatives
    How To Gain Board of Director Support For Cybersecurity Initiatives
    24by7Security, Inc Aug 20 2019 4:00 pm UTC 45 mins
    When a company makes their case to the Board of Directors and C-Suite, they don’t always seem to appreciate the urgency and often turn down your request for funding. As such, there must be a better way to gain Board and C-Suite support. Hear directly from Michael Orenchuk, Principal of 24by7Security, discuss how the Board of Directors interest in cybersecurity is increasing and how regular discussions with the Board has started to increase.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Aug 20 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How to Win in Business with Content Intelligence
    How to Win in Business with Content Intelligence
    Colleen Jones Aug 20 2019 5:00 pm UTC 60 mins
    Make smarter content decisions for better business results with content intelligence. That sounds great, but how?

    Join Scott Abel, The Content Wrangler, for this free, one-hour webinar with Colleen Jones, CEO of Content Science, and learn why content decisions are like playing poker. This webinar reveals secrets to succeeding with content intelligence inspired by world-class poker.

    Three Takeaways:

    • Recognize three types of content decisions that benefit from content intelligence.
    • Understand four ways content intelligence can improve content decisions.
    • Find out what it takes to win big on content.


    A content expert and Star Wars fan, Colleen Jones is the founder of Content Science, a content strategy and intelligence firm where she has advised or trained many of the world's leading organizations to become Jedi Masters of digital content. She is also the former head of content at MailChimp, the marketing platform recognized by Inc. as 2017 Company of the Year. Colleen has earned recognition as one of the Top 50 Most Influential Women in Content Marketing by a TopRank study, a Content Change Agent by the Society for Technical Communication's Intercom Magazine, and one of the Top 50 Most Influential Content Strategists.
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Aug 20 2019 5:00 pm UTC 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Aug 20 2019 5:00 pm UTC 75 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    Register today to learn (almost) everything you need to know about stateful workloads on Kubernetes
  • Structure your Frontline Workforce to Drive Continuous Improvement
    Structure your Frontline Workforce to Drive Continuous Improvement
    Joel Beezhold, Kepner-Tregoe Aug 20 2019 6:00 pm UTC 60 mins
    The potential to improve operations through an increased focus on front line employees is a big opportunity that is vastly overlooked. Already participating in Kaizen and 5S events these teams possess deep operational experience and knowledge. Embedding a designed structure for frontline employees to become a high-performance team can vastly improve operational efficiency and productivity.

    We discuss a way to give employees “skin in the game” by offering a path for career improvement through a structured skill development program. We’ll offer tangible actions to put together a process that will arm teams with the key questions to ask when problems arise. The benefits for the team include; early detection of impending issues, improved communication, the ability to rapidly problem solve and clear and concise documentation. The benefits to the business include the ability to meet or exceed customer expectations, the bandwidth to increase your organizations' competitive advantage and a large improvement in overall operational excellence.

    Takeaways include:
    How to put the disciplines of problem-solving into your employees’ toolbox

    How to increase problem-solving proficiency to the extent where teams ask for harder and more complicated issues to solve

    How to focus on root cause through stating and specifying the problem accurately

    How to ask the correct critical questions to gather relevant information, and know when not to leave the question until the accurate answer is received

    Tools to design the path for frontline employees to grow personally & professionally
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Aug 21 2019 4:00 pm UTC 60 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Aug 21 2019 5:00 pm UTC 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Aug 21 2019 5:00 pm UTC 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • What can we learn from radiosurgery platform comparison studies?
    What can we learn from radiosurgery platform comparison studies?
    Ian Paddick Aug 22 2019 12:00 pm UTC 60 mins
    Various SRS treatment platforms are available, and there has been an increasing number of platform-comparison studies in recent years, but most of these are limited to single-centre studies. The recently published NHS England study, a national commissioning programme benchmarking different planning cases to evaluate current practices across clinical centres treating SRS cases for benign brain tumours and metastases, will be reviewed in detail during the webinar. Bias is common, due to various study flaws, including comparison of non-contemporary equipment, unequal expertise and comparison of plans created in a clinical versus study environment.

    However, this NHS study, arguably the "study to end all studies", provides a unique dataset of current practice across a large number of providers and equipment platforms.
  • Payments & Retail: the impact of friendly fraud
    Payments & Retail: the impact of friendly fraud
    BRC & The Chargeback Company Aug 22 2019 1:00 pm UTC 60 mins
    This webinar will explore how retailers can manage payment disputes and stop revenue loss with key trend analysis and case study examples.
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Aug 22 2019 1:00 pm UTC 60 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Aug 22 2019 4:00 pm UTC 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • How to Leverage NIST CSF
    How to Leverage NIST CSF
    Sam Abadir, Lockpath Aug 22 2019 4:00 pm UTC 60 mins
    Many organizations have difficulty leveraging information in their cybersecurity and business operations to make the right risk decisions, establish the right risk priorities and appropriately allocate budget to best achieve their risk management goals.

    Many believe that NIST CSF is another standalone methodology instead of a tool designed to help your organization understand and build a roadmap to achieve the right level of cybersecurity. Successful NIST CSF programs help integrate, message and prioritize cybersecurity efforts not only within IT but across the entire business.

    In this live webinar, Lockpath’s Sam Abadir will share what implementing a NIST CSF solution entails, including:

    • Framework support
    • Budget expectations vs. reality
    • Correctly assessing an organization’s needs to implement NIST CSF
    • Proper management and management skills
    • Prioritizing cybersecurity within an organization

    Find out what you need to know to implement a NIST CSF solution by attending this educational webinar. Register now!
  • WebRTC and You
    WebRTC and You
    Adam Bavosa Aug 22 2019 4:00 pm UTC 20 mins
    Have you ever thought about building your own Skype or Google Hangouts video chat? It is necessary in futuristic connected shared experiences. Here’s the easy way to do it!
    Adam will go over: - What WebRTC is - Why it is important for developers - How it works - The necessary code to integrate WebRTC into a video chat app - and finally, write a simple website that uses WebRTC. Audience members need only a basic understanding of front-end web development to be engaged.
    PubNub has been an essential resource for WebRTC app development since its inception. Adam Bavosa has taken it upon himself to learn how to develop thoroughly with PubNub and WebRTC, so he can spread the word, and reduce friction for developers building video chat.
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Brian McClain, Assoc. Principal Product Marketing Manager & Tyler Britten, Sr. Principal Technologist, Pivotal Aug 22 2019 5:00 pm UTC 60 mins
    As the popularity of microservices continues to rise, so does the need for an efficient means of intercommunication. Features such as service discovery, client-side load balancing, and circuit breakers become invaluable tools as the complexity of your landscape grows. Thus, the rising popularity of the service mesh as means of delivering those capabilities.

    While this technology space is still young, Istio and Envoy have already become the tools that many use to solve these problems. The Pivotal Application Service (PAS) integration with these solutions introduced weighted routing and guaranteed service identity—and now we’re bringing these features to Pivotal Container Service (PKS) via the new Pivotal Service Mesh.

    In this webinar, we’ll explore why a service mesh matters and how Pivotal Service Mesh works, and we’ll give you a sneak peak into its future.
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Aug 22 2019 5:00 pm UTC 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Cost Optimize Your Success in the Cloud
    Cost Optimize Your Success in the Cloud
    Mike Boudreau, Director of Cloud Optimization at Mission Aug 22 2019 5:30 pm UTC 60 mins
    There is a lot of information out there about saving money/cost optimization on AWS, but a lot of it comes with a catch. In this webinar, the Director of Cloud Optimization at Mission, Mike Boudreau, will identify these potential snags and how to avoid them, so you can optimize your success in the cloud.