Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Sustainability in Hardware Provisioning and Why It Matters Wendy Zhang, Michael Barnes, Sören Enholm, Kimberly Liew Is your organization doing enough to build sustainable initiatives, particularly when it comes to purchasing sustainable hardware? Learn from our ama... 3 days ago | 30 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 weeks ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 3 weeks ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... April 20, 2023 7:00am Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... April 20, 2023 3:00pm Anti-patterns of data architectures Dr. Pragyansmita Nayak, Data Industry Thought Leader Data architecture provides a blueprint for how an organizations can collect, store, manage, and utilize their data to meet business objectives. It def... April 19, 2023 9:00pm Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 2 months ago | 41 mins Build a modern threat intelligence program based in automation Ansh Patnaik, Chief Product Officer at CyCognito There is a change underway in terms of how Security teams validate potential exploits using threat intelligence. Until very recently, most Security te... 20 hours ago | 53 mins Talk PIM to Me: Activate Your Product Story on Any Channel Mark Smith, Ventana Research, Sarah Hoffman, Akeneo Shoppers today are omnichannel by nature. A bad product experience on one channel can quickly lead to a lost customer. Join us for this roundtable to ... 22 hours ago | 33 mins Driving Better Business Outcomes: How to Fuel Your MDM Strategy Alyssa Sliney, MDM Global Practice Lead and Ricardo Rosales, SVP Sales America Even the largest avalanche is triggered by small things. Poor Master Data Management can cause similar impacts when seemingly small issues like data e... 2 days ago | 31 mins Load more