Aldermore discusses developments within the mortgage market.Read more >
Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?
1. Increase security and compliance, while maintaining user-friendliness
2. Deploy encryption without interrupting normal business processes
3. Ease the daily burden of your data security administration
Have you ever wondered how Microsoft does deployment? Get your questions answered about how Microsoft IT approaches migrations and rollouts.
Performing a system-wide migration across a large or complex environment is no easy task, but new Windows 10 deployment options, streamlined application rollouts, and enhanced cloud capabilities can ease the path. Find out how Microsoft IT approached the deployment of Windows 10 across a global user base, plus how they think about Windows as a service.
You'll also hear about Microsoft IT's best practices and lessons learned—from application compatibility testing and upgrade strategies to smoothing the deployment path through end user readiness.
Join this webinar to:
- Learn how Microsoft IT is using new features in the Windows 10 Creators Update.
- Find out how Windows IT approaches Windows 10 update management.
- Get your questions answered in a live Q&A.
Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?
Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.
Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.
Attendees will learn:
- How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
- The strategic role that delivery partners can play in supporting cloud migration initiative
- How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
This DTG (Direct-to-Garment) printing webcast offers a valuable overview of the entire decorating process: what you can print, what you can’t print, and what equipment you need to be successful. It also includes lots of insider “best practices” from one of the leading experts on DTG, Terry Combs of Equipment Zone. There will be time during the presentation and at the end to help cover any questions you may have about the technology. If you are looking to get into the DTG market, or add DTG to your existing business, this is a must-attend webcast.Read more >
Education is not only about reading textbooks, but also about learning from brand-new technologies. Firmly believing in this, Professor G.Q. Max Lu, President and Vice Chancellor of the University of Surrey, encourages students to learn and innovate by experiencing cutting-edge technologies within their on-campus research park. In this speech, Professor Lu presents the history of technology commercialization at the University of Surrey. In doing so, he discusses successful cases of technology commercialization, as well as revealing early-stage and upcoming technologies. Furthermore, he draws on his experience and deep knowledge of industry-academia partnerships to discuss the importance of collaborations in technological innovation.Read more >
Blockchain is an innovative and commercially valuable technology that has repeatedly been at the centre of intense debates. Bitcoin is the most well-known example of blockchain implementation within the financial sector. Dr Langen Shu discusses his company’s successful applications of blockchain technology to energy internet, in addition to providing inspiring insights into the functioning of the energy internet market and into related government policies.Read more >
Hongbin Zhuang, CEO of award-winning artificial intelligence startup Emotech, shares his insights into recent AI developments during his speech “Building products in the age of AI”. From PCs to smartphones, technological products have progressively acquired more and more features and personalization functions. When people connect more easily, the technology being used is expected to adapt to the needs of an increasingly dynamic user base. Many innovative products, such as Olly robot, are designed to enhance the way people interact with their environment: the robots can even refine and expand their functions by learning about one’s personality. The development of specific techniques, such as the ‘deep learning model’, will eventually make our daily lives hassle-free.Read more >
Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.
Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.
Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them. These include:
• Virlock, which encrypts files and also infects them, making it a polymorphic file infector
• CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
• CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
• The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.
•What SNIA is doing to advance persistent memory
•What the ecosystem enablement efforts are around persistent memory solutions
•How NVDIMMs are paving the way for plug-n-play adoption into containers environments
Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
Управлять жизненным циклом приложения сегодня значительно сложнее, чем было вчера. Динамика событий и абсолютная свобода выбора компонентов автоматизации процесса разработки и поставки приложений требуют новых решений класса ALM. Решение HPE ALM Octane предназначено для работы в рамках концепции DevOps и поддерживает все вовлеченные роли. Более подробно о продукте на базе живой демонстрации можно будет узнать в рамках вебинара.Read more >
Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.
In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.
Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go
Was bringt das SP 8 an Mehrwerten für Sie und Ihre Kunden?Read more >
Learn how to incorporate consumer-grade design principles to radically simplify datacenter operations and management—saving IT administrators time, reducing overall TCO and increasing end-to-end infrastructure efficiency.
- Tarak Parekh, Principal Product Manager, Nutanix
- Melina McLarty, Staff Designer, Nutanix,
- Sree Pentela, Director, IT Architecture & Engineering, Valeant/Bausch and Lomb Pharmaceuticals
- Christian Pedersen, CEO, Zentura
Are you wondering how to solve repetitive tasks with software automation, but you struggle every time you see the word “developer” or “code?” In this session, we’ll explore the framework that can apply to mundane tasks (i.e. powershell, pester), and we’ll discuss what open source tools are available to help solve these problems. Walk away with the advice you need to get started!Read more >
This 30-minute webinar will elaborate on how you can apply Design Thinking to your BI and analytics projects with a few real-world scenarios.
In Scenario 1, we’ll explore a dashboard application project to illustrate best practices for designing for straight-up “data consumption” by your users.
Scenario 2 explores the design possibilities for an intuitive analytics app (InfoApps™), which moves us from pure data consumption to data interaction and discovery.
We’ll look at examples of research documentation, prototypes, and wireframe samples to understand how we can use Design Thinking to focus our ideas into tangible, workable solutions.
All registrants will receive a Design Thinking Starter kit with wireframe templates.
Register now for this live webinar!
Drastic career changes can be intimidating but realizing your full potential can be worth the risk. After 9 years in manufacturing Paul Woodward Jr (@ExploreVM) made the leap into IT, leaving it all behind for a 3 month contract. Follow Paul's journey from CNC operator to VCP, to VMUG presenter & Nutanix Technology Champion .NEXT Session speaker with all the twists, turns, and roadblocks he encountered along the way.Read more >
Infrastructure can make or break a VDI project. Successful Citrix XenDesktop and XenApp deployments require efficient, high performance and scalable IT infrastructure to deliver a great user experience. Hear from actual VDI project owners about what it takes to make Citrix VDI successful, and get a sneak peek into where Citrix + Nutanix integration is headed next.Read more >
During the call, Adam Rudd will discuss our Global Absolute Return Strategies covering key themes within the portfolio and a summary of our current portfolio positions and outlook. You'll also have the opportunity to ask Adam questions during the webcast.
+44 (0) 20 3059 2627 - Standard International Access
0800 368 0707 - UK Toll Free
1 877 406 7969 - USA Toll Free
Access PIN: 9975890#
Hear the latest update from Standard Life Wealth's managed Portfolio Service from our investment experts. You will also have the opportunity to ask questions during this webcast.
+44 (0) 20 3059 2627 - Standard International Access
0800 368 0707 - UK Toll Free
1 877 406 7969 - USA Toll Free
Access PIN: 9975890#
Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
Join us for this live webinar to discover:
oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
oThe pitfalls and limits of vertically scaling your ADC
oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
oExamples of organizations who have accomplished this with HAProxy
Discover how and why welcome campaigns are an important part of your email marketing strategy, and how best to use them.Read more >
Explore how Nutanix has helped customers in Ireland and experience a real time demo of our software!Read more >
In this update for the Ignis Absolute Return Government Bond Fund, Shayne Dunlap, Ross Crawford and Tristram Miners-Jones will discuss fund performance, positioning and give an overview of the team’s macro-economic outlook for the months ahead.Read more >