Hi [[ session.user.profile.firstName ]]
Sort by:
    • In Vitro Models For Studying Angiogenesis
      In Vitro Models For Studying Angiogenesis Paula M. Flaherty Recorded: Oct 30 2014 4:00 pm UTC 58 mins
    • Angiogenesis is the process by which a new blood supply is established from pre-existing blood vessels. It is initiated by degradation of vessel basement membrane, endothelial cell proliferation, invasion, and directional migration towards chemoattractants, tube formation, and finally the establishment of a new vasculature.

      We will discuss a portfolio of Corning products designed to investigate specific stages of angiogenesis through standardized and quantitative in vitro cell-based assays.

      •HUVEC-2 Endothelial Cells—Widely studied endothelial cells that have been pre-screened for responsiveness to VEGF, a prototypic stimulator of angiogenesis
      •ECMs and Chemoattractants—ECMs and key pro-angiogenic chemoattractants for optimal EC propagation, attachment, differentiation, and other key functions
      •Endothelial Cell Invasion and Migration Assays—An enabling platform technology consisting of Corning® FluoroBlok™ microporous permeable supports coated with our unique extracellular matrix proteins for quantitation of endothelial cell migration and invasion
      •Endothelia Cell Tube Formation Assay—A rapid assay system allowing direct screening of angiogenic compounds for their effects on endothelial cell tube formation


      Biography:

      Paula Flaherty is a Technology Manager at Corning Life Sciences. Her team develops strategy and products focused on the modulation of in vitro cell behavior using extracellular matrix, media, vessel design, and growth factors. Prior to joining Corning Life Sciences, Paula studied retinal degeneration at the Berman-Gund Laboratory, Harvard Medical School in Boston, MA. She received her bachelor’s degree in Microbiology from the State University of New York and is an In Vitro Cell Biology Fellow, W. Alton Jones Cell Science Center in Lake Placid, NY.

      Read more >
    • Creating Brand Advocacy with Technology (The Art and Science of Engagement)
      Creating Brand Advocacy with Technology (The Art and Science of Engagement) Sean Flaherty, EVP of Strategy at ITX & Jeremy Durham, Director of Program, Product and UX at Paychex Recorded: Aug 20 2014 6:15 pm UTC 46 mins
    • Join ITX’s Executive Vice President of Strategy, Sean Flaherty and Paychex’s Director of Program, Product and UX, Jeremy Durham for an informational webinar that discuses how your technology plan can earn your company brand advocacy.

      Abstract: As a marketer, brand advocacy is always your end goal. There is no better feeling than one of your customers, being so inspired by your solution and sharing that experience with their connections. In order to move clients to brand advocates, you must have a centralized technology strategy.

      So what strategy do you choose? In the webinar, Sean Flaherty and Jeremy Durham will take you through the questions you must answer in order to obtain a technology plan that puts you on a track to inspire brand advocates. The key is to have technology solutions that are worthy of your brand and fully represent the experience clients and prospects can expect from partnering with your company. Creating digital experiences that engage, inform, inspire, and influence the people that matter to you most, where and when they need it, is critical to your success. With so many opportunities to explore, like mobile, social, and location-based offerings, the clever use of technology needs to be a differentiator for your business.

      Be sure to listen in as Sean and Jeremy go through the steps and thought processes required to come up with a winning solution around your technology experiences.

      What You Will Learn:

      It’s important to understand why you do what you do.
      Learn the steps you much achieve to obtain brand advocacy.
      How various technology features can engage your users.
      How various organizations aligned their top executives and executed their technology roadmaps

      Read more >
    • Detect and Eliminate Advanced Malware in Email Traffic
      Detect and Eliminate Advanced Malware in Email Traffic Dan Flaherty, Product Marketing Specialist; Catherine Hwang, Senior Product Marketing Manager Recorded: Sep 24 2014 1:00 pm UTC 27 mins
    • The vast majority of cyber-attacks on business begin with a phishing email, tailored to deceive an unsuspecting employee into clicking on a link or attachment containing malware. Do you have a strategy to defend against these attacks? Does it involve stopping malware before it enters your network? In this webcast, we’ll discuss how advanced malware detection technologies can detect and eliminate advanced malware in-line with traffic, before it has a chance to deliver its payload and attempt to steal your sensitive information.

      In this webinar:
      • You will learn about the multiple infiltration mechanisms used by cybercriminals in phishing attacks
      • You will see how advanced malware detection engines can detect these attacks
      • You will walk away with an understanding of how advanced malware detection technologies fit into a connected security infrastructure

      Don’t miss this webcast if you are responsible for the security of your organization’s sensitive information. We will cover the latest in advanced malware detection for a critical element of your security practice – email traffic – and how this technology fits into the larger picture of defence against malware.

      Read more >
    • Disrupting Attacks with Email, Web, DLP, and Advanced Malware Security Solutions
      Disrupting Attacks with Email, Web, DLP, and Advanced Malware Security Solutions Daniel Flaherty, McAfee Product Marketing Manager Recorded: May 27 2014 4:00 pm UTC 39 mins
    • Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, Advanced Anti-Malware, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

      Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it.

      Read more >
    • Sales Essentials:  Selling Email Protection
      Sales Essentials: Selling Email Protection Daniel Flaherty, McAfee, Product Marketing Manager Recorded: Feb 21 2014 4:00 pm UTC 48 mins
    • McAfee Email Protection goes beyond anti-spam to deliver an integrated email security solution with threat defense, information protection (encryption and data loss prevention), and email continuity capabilities to ensure email access — even during server outages. With flexible deployment options (onsite, in the cloud, or a hybrid of both), customers can deploy what they need now and have the flexibility for future changes.

      Join this webinar and hear the latest on how to sell McAfee Email Protection; including how to qualify an opportunity, handle customer objections and counter the competition. Learn about the enablement, profitability and demand generation resources available to help you increase your revenue selling McAfee’s Email Protection.

      Read more >
    • Targeted attack defence: Email Protection on the front line
      Targeted attack defence: Email Protection on the front line Daniel Flaherty Recorded: Mar 19 2014 2:00 pm UTC 38 mins
    • Does your organization have sensitive information to protect? What would happen if an employee clicked on a link within an email, and malware infected one, or many, of your internal systems? Do you have the resources to recover if customer data or intellectual property is stolen? These are all key considerations when building your defence strategy against targeted attacks. This webinar will cover the tactics that can be used to stop targeted attacks before they infiltrate your organization.

      Join this webinar on McAfee email Protection as:

      •You will learn how to cost-effectively establish front-line defence against targeted attacks

      •You will hear about the leading technologies that are becoming instrumental in stopping the most advanced malware

      •You will walk away with a blueprint for your business to prepare for and defend against evolving targeted attacks

      Read more >
    • Disrupting Advanced Attacks with McAfee Email, Web, and DLP Security
      Disrupting Advanced Attacks with McAfee Email, Web, and DLP Security Dan Flaherty, McAfee Recorded: Apr 16 2014 1:00 pm UTC 36 mins
    • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

      Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
      Join this webinar as:
      •You will learn the tactics used by attackers today to infiltrate businesses
      •You will hear about the leading technologies available to disrupt advanced attacks
      •You will walk away with the knowledge to assess your own environment, and optimize your security
      Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

      Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.

      Read more >
    • You Heard About SiriusDecisions' Next-Gen Demand Waterfall® - Now What?
      You Heard About SiriusDecisions' Next-Gen Demand Waterfall® - Now What? Amar Doshi, VP of Product, 6sense Recorded: Jun 28 2017 4:00 pm UTC 54 mins
    • In this webinar for sales and marketing, join us for a discussion on the steps you should consider to implement the new B2B Next Generation Demand Waterfall® that Kerry Cunningham and Terry Flaherty covered in this year’s SiriusDecisions Summit keynote.

      Learn about:

      • How to identify Total Addressable Market
      • How to find Total Addressable Market Now (TAMnow®)
      •How to execute on a TAM NOW, account-centric approach to demand creation; full funnel activation from brand to demand to closed-won
      • How to measure the success of your TAM NOW full-funnel activation strategy
      • How to use this approach to build trust, efficiency, and improved metrics across sales and marketing

      We will cover these topics while referencing examples of organizations who are aligning their demand centers and sales teams to this approach such as Cisco, Netsuite, PGi, Arkadin, Panasas, Lenovo, Dell, Box, Qlik and others who have implemented the Next-Generation Demand Waterfall and witnessed success across the entire funnel, including increased pipeline, optimized spend, higher win rates, larger average deal sizes and improved campaign efficiency.

      Examples include:

      • PGi: witnessed a 58% faster time to close, lift in win rates and 4x the average deal size
      • Dell: saw a 3x lift on MQL to SQL conversion, a 2x-6x lift in opportunity size, 50% higher deal sizes, and a 12x return in media spend
      • Cisco: achieved a 3x higher MQL to SQL conversion rate than any other campaign ever run, 5x higher average opportunity size and 13x more pipeline that three other intent vendors combined

      Read more >