Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Deploy Top-Tier Tools to Guard Supply Chains Ryan Witt, CISO Proofpoint and Government Technology Experts Today’s supply chain risk management (SCRM) strategies possess flexibility that can help alleviate the burden placed on agencies, and the right partne... 3 days ago | 59 mins Reduce complexity & increase storage efficiency with multi-protocol Ceph Philip Williams, Product Manager Ceph Traditional storage systems do a great job in servicing the needs of most enterprises. However, to meet multiple requirements, it's typical to deploy ... 3 months ago | 44 mins OpenEdge Users Discuss How Managed Database Administration Brings Peace of Mind Mike Furgal, Director of Database & Pro2 Services, Progress Your databases are critical to your business but maintaining a powerful, advanced database is a fulltime job. Unchain your IT staff for more important... 2 years ago | 41 mins Doug Berg, Jobs2web Recruiting Geek Continues the Social Recruiting Discussion Doug Berg, Jobs2web Chief Recruiting Geek Did you miss Doug Berg's Measuring Your Apply Chain presentation at last week's ERE Innovation Summit held at Facebook Headquarters? No worries. B... 11 years ago | 47 mins Acing Your Next Quarterly Business Review Jon Greene, Director Client Services and Jess McCoss, Client Strategy Director The latest webinar in the Jobs2web educational series is how to conduct a Quarterly Business Review. Designed especially for a client's leadership tea... 10 years ago | 31 mins How social networking and your e-reputation affects your career Orville Pierson, Robert Bertrand, Lee Hecht Harrison How social networking and your “e-reputation” affects your career in a Web 2.0 world. 12 years ago | 58 mins Why Cloud-based Secure Web Gateways are becoming so darn popular George J. Anderson, Product Marketing Director at Webroot Inc. Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizin... 7 years ago | 31 mins Deploying Google Chrome on Apple Devices Sam Weiss, Solution Partner Program Manager, Jamf Used on over 2 billion devices worldwide, Google Chrome is one of the most popular web browsers. As an Apple device administrator, it's your job to ma... 1 year ago | 36 mins 5 key Takeaways from AWS Re:Invent 2018 Sebastian Straub - System Engineer N2WS, David Ball - Consultant NWN, Rahul Karnik - Cloud Engineer St. Johns University Did you miss this year’s AWS Re:Invent in Las Vegas? Have no fear! We are here to brief you about the main announcements that could potentially have a... 4 years ago | 43 mins Tweet, Like and Poke Your Network into Disaster: The Dangers of Web 2.0 Apps Corey Nachreiner, CISSP, Director of Security Strategy, WatchGuard Technologies, Inc. Social networks like Facebook and Twitter pose the biggest threat to your network. But, as security professionals, we often pay more attention to inte... 10 years ago | 49 mins Load more