Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Career Conversations with Kerstin Zell Elena Steinke, WSC Founding Board member Career Conversations is a focused chat with female leaders within Cybersecurity. Come join us as Elena Steinke chats with Kerstin Zell about her caree... 1 year ago | 60 mins Monitoring F5 Load Balancers Scott Frymire, Dave Hegenbarth Learn how SevOne monitors the F5 environment and alerts on potential performance and capacity issues: * Are your load balancers keeping up or becomin... 8 years ago | 40 mins How high can YOU go? Managing your engineering career. Steve Young, Managing Director, Experis Engineering and Willis Graham, Engineering Recruiting Director, Experis Engineering Join Experis Engineering for a complimentary webinar designed to provide insights into employer demand for skilled engineers and valuable tips to take... 8 years ago | 60 mins Central Banks in 2014 - Backward Tracking on Forward Guidance David Buckle David Buckle, Head of Quantitative Research Fixed Income, considers the outlook for central banks and its impact on bond markets in 2014. With a chang... 8 years ago | 30 mins Harro Hofliger Andrea Short Frost & Sullivan Analyst Commentary 8 years ago | 5 mins REVTalks 2014: Keeping your marketing simple Neil Cohen, VP of Sales and Marketing, Visage Mobile Join Neil Cohen, VP of Sales and Marketing at Visage Mobile as he discusses the need for marketing to stay focused on engaging the people who matter. 8 years ago | 2 mins Plantronics Amy Torres Plantronics 8 years ago | 4 mins ITAM and ITSM - They do Play Nice Together! Guest speaker Jenny Schuchert, IAITAM and Eric Feldman, CA Technologies Like a cat and a dog? Well, not quite. ITAM and ITSM processes may be different, but are really complementary. Typically, these two disciplines are im... 8 years ago | 47 mins The Threat of Session Hijacking and How You Can Prevent It Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies Session Hijacking is a serious security threat where the cookie used to authenticate a user to a remote server is stolen and then used by an attacker ... 8 years ago | 41 mins Peeking Into the Black Hole: Social Media ROI Roundtable Olivier Choron, Steven Woodgate, Stewart Conway, Louise Tullin, Lauren Harper Social Media has now established itself as a fundamental part of any Marketing Strategy. But when it comes to measure its ROI marketers get sucked int... 8 years ago | 59 mins Load more