Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Own your keys, not your HSM Iain Beveridge - Product Marketing Manager, Entrust / Simon Keates - Senior Product Manager, Entrust nShield as a Service is a subscription-based cloud solution for generating, accessing, and protecting cryptographic key material, separately from sens... October 10, 2023 3:00pm Simplified Namespace Management – The Open Standards Way David Slik, SNIA Cloud Storage Technical Work Group Chair; Michael Hoard, Intel The days of simple, static, self-contained file systems have long passed. Today, we have complex, dynamic namespaces, mixing block, file, object, key-... October 18, 2023 5:00pm Simulation Best Practices for the Pharmaceutical Industry Sina Ghods, Senior Simulation Support & Application Engineer, PADT Traditional drug manufacturing and drug delivery process development requires a huge time and financial investment. Pharmaceutical and biopharmaceutic... 1 year ago | 52 mins Post production: The tools for crafting quality content IBC | Avid | Postworks | Twickenham Film Studios From the first cut of a project to the creation of a polished master, the post production process is where the many audio and visual elements of a pro... 2 years ago | 56 mins Mixing and Mastering the Art of Data Security Reiner Kappenberger, Product Management Director, Data Security, Micro Focus As a professional “security artist,” you understand the need to master the necessary tools, technologies, and processes to enable protection and usabi... 3 years ago | 17 mins Own your keys, not your HSM: Hardware Security Module as a Service Iain Beveridge - Product Marketing Manager, Entrust / Simon Keates - Senior Product Manager, Entrust nShield as a Service is a subscription-based cloud solution for generating, accessing, and protecting cryptographic key material, separately from sens... 8 months ago | 33 mins Cloud Truth & WAN Consequences: Remake Your WAN for Zoom, AWS, and Office365 John Burke, CIO and Principal Research Analyst, Nemertes Research You need to rethink your WAN to survive the next 5 years. We can help show you how. Think about it: half of your IT services come from the cloud, fr... 5 years ago | 49 mins Cybercrime finds a way, a look at this year's cybercrime trends Rick Holland, CISO, Digital Shadows In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be include... 3 years ago | 31 mins Extractable Data Mining: Common Extractables From Polymeric Manufacturing Materi Ping Wang, Director at Johnson & Johnson and Donald DeCou, E&L Technology Manager at West Pharmaceutical Services Full Title: Extractable Data Mining: Common Extractables From Polymeric Manufacturing Materials Used in Biologics Production Presented by Ping Wang, D... 4 years ago | 79 mins Cloud Data Warehousing: Explanations, Trends and Best Practices Andrew Brust, Kevin Petrie The popularity of cloud computing is at this point well-understood, but mixing the cloud model with data warehousing can generate unexpected synergies... 4 years ago | 64 mins Load more