Hi [[ session.user.profile.firstName ]]
Sort by:
    • Kong 1.0 and Beyond: Preparing for a Cloud-Native World
      Kong 1.0 and Beyond: Preparing for a Cloud-Native World Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, Kong Recorded: Dec 13 2018 6:00 pm UTC 49 mins
    • With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.

      As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.

      In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.

      Webinar takeaways:

      - Learn about the three forces leading us towards cloud-native first architectures
      - Understand how we got here – the milestones marking the maturity of Kong
      - Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
      - Why you need a solution that can support all of your deployment patterns.

      Read more >
    • Security that Scales: Automating Security and Compliance for DevOps
      Security that Scales: Automating Security and Compliance for DevOps Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Upcoming: Dec 18 2018 6:00 pm UTC 60 mins
    • There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

      Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

      During this session, you will learn:

      -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

      -Why continuous compliance management is a new business imperative

      -How to build security in to your Continuous Integration/Continuous Development pipeline

      Register Today

      Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!

      * subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.

      Read more >
    • Outsourcing: Necessary Evil or Valued Partner?
      Outsourcing: Necessary Evil or Valued Partner? Jennifer Kaufman and Debbie Roemer Recorded: Dec 12 2018 6:00 pm UTC 60 mins
    • Adding a vendor to your staffing model can be a strategic move if you need to reduce budget, deliver new content types, scale fast, or co-locate writers in new geographies.

      Join Scott Abel, The Content Wrangler, and his special guests, Jennifer Kaufman a Senior Content Services Manager at NetApp, and Debbie Roemer, a highly experienced content consultant, for this free, one-hour webinar. Jennifer and Debbie will talk about how to find the right vendor, plan for the engagement, and nurture the relationship. You'll learn how to plan for success when building a mixed team of vendor and staff content creators.

      Read more >
    • Using Universally Faceted Nano Content to Improve Findability
      Using Universally Faceted Nano Content to Improve Findability John O'Gorman Recorded: Dec 12 2018 9:00 pm UTC 59 mins
    • Technical communications has progressed from monolithic paper and digital manuals, to structured, topic-based authoring, and more recently down to 'microcontent' to improve quality, ease of access and consistency of message. 'Nano-content' is the next logical step in that progression and lives at the 'coalface' between content and data. It is the bridge between structured data and structured topics which, when properly managed, can add several new dimensions to technical publications work.

      Universally faceted nano-content is a technique that takes a page from GPS applications that use triangulation (latitude, longitude, and elevation) to locate things in geographic space. Locating things in digital space should be just as intuitive and precise.

      Join Scott Abel, The Content Wrangler, for this webinar with his special guest, John O’Gorman, Principal and Chief Disambiguation Officer at Quantum Semantics. John will walk through the process of identifying, classifying and using terminology to connect the language of a business or application to the content that supports its use. He will demonstrate how the same process can be extended to the content itself and how, in combination, faceted terminology takes findability to a whole new level.


      John O'Gorman is a 30-year veteran of the information management trenches. He is the inventor of a universal classification protocol called Q6, and co-founder of Q6FSA, an enterprise information management collaboration with Robert Vane in the UK. His experiences run the gamut from terminology stores and data catalogs, to executive information reporting, data warehousing, activity-based costing and technical communications, localization and internationalization. His big 'aha' moment came when he realized that all of them are made of the same stuff and follow the same rules.

      Read more >
    • Becoming a Connected Campus is a big vision. So where do you start?
      Becoming a Connected Campus is a big vision. So where do you start? Jitterbit: Andrew Leigh --- CloudforGood: Eric McCune and Kristin Kiester --- Salesforce.org: Ali Ganjalizadeh Upcoming: Dec 19 2018 6:00 pm UTC 60 mins
    • Advancement, Student Success, Marketing, Recruitment and Admissions--You need a 360-degree view of your students and alumni. We’ve all heard about becoming a connected institution before, but what does that really mean? Learn how to overcome the challenges of multiple systems and student databases with a powerful connected campus solution.

      Join Cloud for Good and Jitterbit to learn about what it really takes to become a connected institution. Get details from experts in integration and implementation for institutions including:

      - How the Salesforce platform is built to eliminate both data silos and departmental process silos.
      - How do you know if your systems can integrate with Salesforce?
      - How to overcomes challenges like connecting to a Student Information System (SIS) where Salesforce will not be the system of record.
      - Ideas for enabling your school to better serve the needs of your students, staff, alumni and donors.

      - Andrew Leigh, VP of Alliances
      - Eric McCune, Account Executive and Kristin Kiester, Alliances Manager, CloudForGood
      - Ali Ganjalizadeh, Product Manager, Salesforce.org

      Read more >
    • Enforcement & Containment with Segmentation
      Enforcement & Containment with Segmentation Josh King, Director of Security Solutions; Mark Moretti Vice President of Infrastructure and Security Recorded: Dec 12 2018 6:00 pm UTC 55 mins
    • You don't have to look far to find a current news story about ransomware taking down networks in record time, or a data breach involving millions of customer records by a malicious actor who has hid in an environment for months.

      In an "Assumption of Breach" world, we accept that it's statistically impossible to keep all the bad guys out. That inevitably at some point, we will receive that phone call or email that says it's happened to our organization. But that doesn’t mean we are powerless against it either. We have the tools and practices to help limit the impact that such an incident can have on our business, we just have to exercise them.

      Segmentation is one of those practices that has the ability to significantly impact your overall security posture, but it's impact depends on how well it's implemented. The industry has been using VLANs for segmentation for decades, but they are combat ineffective when it comes to stopping the spread of ransomware and other malicious threats.

      We need to look at more advanced capabilities like Data Center Next Generation Firewalls, Micro-Segmentation practices, Behavior Analytics, and even Network Access Control (NAC) among others to help us contain, mitigate, and eventually remediate the threats that face us.

      Join Josh King, Carousel's Director of Security Solutions to discuss what an assembly of the right mix of people, process, and technologies might look like to combat this evolving threat landscape.

      Read more >
    • What is your Security Strategy with Vanishing Perimeter?
      What is your Security Strategy with Vanishing Perimeter? Vamsi Ponnekanti, Director, Systems Engineering, Symantec Upcoming: Dec 20 2018 10:00 am UTC 60 mins
    • Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.

      Are you Responsible for:
      - Setting security objectives and strategies for your IT department
      - Identifying, controlling and reporting security incidents
      - Developing enterprise wide security programs
      - Driving security or compliance or regulatory initiates

      Then this webinar is for you!

      What will the webinar address?
      - How to plan for security in the move to the cloud?
      - How to protect your users from an evolving threat landscape?
      - How to make sure your data is secured and maintains compliance with legal regulations?
      - How to effectively manage new types of devices and your mobile/remote users?

      Register Now!

      Read more >
    • 4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
      4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence Yaacov Ben-Yaacov, CEO, Catch Media Recorded: Dec 13 2018 4:00 pm UTC 59 mins
    • In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.

      Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.

      On this webcast you’ll learn:
      • Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
      • 4 steps needed to engage consumers, drive lifetime value and increase revenue
      • Why Catch Media chose Vertica for scale, performance, and flexibility
      • How businesses that embed Vertica can deliver higher value to customers

      Read more >
    • Passwords: The Keys to your (Online) Kingdom
      Passwords: The Keys to your (Online) Kingdom David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Upcoming: Dec 18 2018 11:00 am UTC 75 mins
    • 24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

      Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.


      Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
      A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

      David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.

      Read more >
    • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
      Ensuring Healthcare Delivery through Complete Visibility & Threat Defense Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 4:00 pm UTC 61 mins
    • The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

      With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

      Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

      •The current threat landscape and unique security challenges healthcare organizations face
      •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
      •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency

      Read more >
    • Bridging the online and offline marketing gap
      Bridging the online and offline marketing gap Mark Coffey, SVP of Strategic Partnerships, GasBuddy Recorded: Dec 12 2018 5:00 pm UTC 57 mins
    • While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.

      Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.

      To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!

      Registration is free.

      Attend this webinar and learn:
      * How to use martech to digitize offline channels
      * How to integrate traditional marketing efforts into their newer tech-driven marketing stack
      * The importance of combining online and offline marketing
      * How to track offline conversions

      * Evan Jones, CMO, Fender
      * Mark Coffey, SVP of Strategic Partnerships, GasBuddy
      * Myllisa Patterson, Senior Director, Event Cloud Marketing, Cvent
      * Shannon Ryan, Head of Marketing, CI&T
      * Dilan Yuksel, VentureBeat

      Sponsored by Cvent

      Read more >
    • MEGWARE HPC Clusters – an Energy Efficient Intel® Select Solution for Simulation
      MEGWARE HPC Clusters – an Energy Efficient Intel® Select Solution for Simulation Axel Auweter, CTO, MEGWARE Recorded: Dec 11 2018 4:00 pm UTC 35 mins
    • This webinar introduces MEGWARE’s certified Intel® Select Solution for Simulation and Modeling, an optimized platform specifically tailored to deliver stellar performance in all kinds of HPC applications. Backed by the power of cutting-edge Intel® Xeon® Scalable processors and supplemental Intel® technologies, MEGWARE offers a carefully pre-configured solution for those workloads including computational fluid dynamics (CFD) and computer-aided engineering (CAE). With more than 28 years of experience in building High-Performance Computing Clusters, MEGWARE has proven to be one of the leading vendors in Europe. Also, MEGWARE puts a strong focus on R&D with various software and hardware products developed in-house. One prominent example is the hot-water direct liquid cooling solution ColdCon® supporting high coolant inlet temperatures of up to 55°C. Hence, the Intel Select Solution for Simulation and Modeling is not only available with standard air-cooling but alternatively TCO-optimized with MEGWARE's extremely efficient ColdCon® technology.

      Read more >
    • IFLR Women in Business Law: using coaching to advance your career
      IFLR Women in Business Law: using coaching to advance your career Julie Smith, Pressurevalve (with introduction from IFLR managing editor Amelie Labbe) Recorded: Dec 13 2018 1:00 pm UTC 56 mins
    • Coaching is now a key component of many development packages, but do we really understand what it is and how to use it to our advantage?
      In this practical session we’ll explore the following questions:
      - What is coaching and what isn’t coaching?
      - What type of challenges and goals can coaching help with?
      - What happens in the coaching process?
      - Are you ‘coachable’?
      - How do you find a coach and assess whether they are the right fit for you?

      Julie Smith

      Julie Smith is diirector and coach at Pressurevalve Ltd. As well as being a qualified executive coach, she’s also an experienced leader with 15+ years in management positions, 10 of which were in senior posts, including heading national operations and an interim CEO post. This means she understands the complexities, challenges and rewards of leadership. Key success factors in her coaching include helping people develop: skills in viewing situations from different perspectives, self-awareness, decision-making, confidence, self-belief, self-coaching and resilience. As well as coaching, Julie designs and facilitates sessions for leadership programmes in London and New York, runs network groups for leaders and is chair of the Global Taskforce of the American Express Leadership Academy, Alumni Network. If you’d like more information on Julie’s coaching services, plus self-coaching resources, visit: https://www.pressurevalvecoaching.com/free-stuff

      Read more >
    • How Assisted Self-Service Will Power Up Support
      How Assisted Self-Service Will Power Up Support Chris Savio (Prompt.ai by LogMeIn); Roy Atkinson (HDI Moderator) Recorded: Dec 11 2018 6:00 pm UTC 61 mins
    • IT and technical support would love for end users and customers to take advantage of self-service resources. End users and customers would love for self-service to be easier. Finding articles, videos, documents and other resources intended to make life easier for users—and for the analysts and technicians who support them—can be difficult and confusing.

      Next-generation tools are here, set to enable users and customers to get accurate answers quickly and easily and solve many common issues for themselves, allowing analysts to concentrate on more complex problem-solving and other tasks. Analysts can benefit as well, having powerful assistance at their command to find knowledge and implement solutions without making users and customer wait.

      What You Will Learn:
      - What “assisted self-service” means
      - Why self-service adoption can be a struggle
      - How next-generation tools can help both end users and support analysts

      Who Should Attend:
      - Knowledge Management professionals seeking ways to improve
      - ITSM professionals tasked with building self-service portals
      - Support organization leaders who wish free analysts up from repetitive tasks

      Read more >