Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Better Together: Exploring Cloud and Edge Computing Synergies Alex Hilton, Cloud Industry Forum | Aidan Walden - Fortinet | Stefan Schachinger - Barracuda and more According to Statista, ‘the total installed base of Internet of Things (IoT) connected devices worldwide is projected to amount to 30.9 billion units ... September 13, 2022 3:00pm The Fastest way to Train & Optimize Large Scale Machine Learning Models Hoang Phan, HPE AI Solution Engineering; Chun Sun, HPE Product Manager; Andrew Taylor, NVIDIA Alliance Manager at HPE Time is precious. As data scientists and developers, you are tasked with accelerating time to production but doing so with lower cost. Sound like an... August 18, 2022 3:00pm The First 4 Things to Do (After Installing H4000 Essential) Skip Levens, Media & Entertainment Product Marketing You may have heard that the award-winning H4000 Essential is the fastest to set up shared storage and media asset management solution around – but pro... 1 week ago | 47 mins OAuth Webinar Orr Semmell Mark your calendar to hear from Orr Semmell, our Sr Product Manager, as he will walk through our next major product release, and outline how DoControl... 2 weeks ago | 46 mins Exciting Product Launch! Orr Semmel, Sr. Product Manager The DoControl No-Code SaaS Security Platform is extending its reach into 3rd party applications Mark your calendar to hear from Orr Semmell, our Sr P... 2 weeks ago | 48 mins Webinar - Certificates Management: Stop worrying about it. David Muniz - Cybersecurity Expert at senhasegura In this webinar, you will have the chance to understand about: ➤ Avoid unavailability due to expiration or revocation of digital certificates; ➤ Red... 2 weeks ago | 88 mins Making Your Workforce Productive and Secure with Application Containment Eugene Yew Users constantly seek ways to bypass organizational internet access control policies for personal use by using VPN software or anonymous proxy applica... 1 month ago | 31 mins The Perfect Storm: The Ransomware 3.0 Explosion and New Risks to Your Data John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Asigra and Kevin Johnson, CEO of Secure Ideas Cyber attackers have been enjoying favourable conditions for attacks in recent years. The shift to remote working created huge vulnerabilities within ... 1 month ago | 40 mins Collaborating in a Hybrid Work World Natalie Lo, Google Workspace New Business Specialist, Google Workspace Navigating hybrid work in APAC has opened our eyes to how the sociocultural landscape impacts the future of work. Unlike other regions, where flexible... 1 month ago | 12 mins Catching Active Directory Reconnaissance from Rogue Devices Robert Crisp, VP of Technical Services, Todd Rosenberry, Sr Consulting Engineer, Nick Houck, Director Security Engineering Attackers target Active Directory (AD) as part of their discovery and data gathering tactics to identify high-value assets such as privileged accounts... 2 months ago | 36 mins Load more