Watch and learn how EMC is helping companies increase operational efficiency and achieving real business value.Read more >
This webinar explores the convergence of Operational and Information technology as one of the key benefits of the Internet of Things; and how to use this convergence as a way to build a new generatin of integrated digital supply chains which are the base of Industry 4.0.
This webinar will cover the following topics:
* Industry 4.0 and IoT Trends
* Higher efficiency and productivity through end to end integrated digital supply chains
* New business opportunities for all players in the manufacturing supply chain
* Real life examples on industrial process improvements through the use of IoT
About the speaker: Jimmy Garcia-Meza is the co-founder and CEO of CloudPlugs Inc. He has over 20 years of experience running startups and large divisions in private and public U.S. multinational companies. He co-founded nubisio, Inc. a cloud storage company acquired by Bain Capital. He was CEO of FilesX, a backup software company acquired by IBM. He held various executive positions at Silicon Image (SIMG) where he was responsible for driving the world-wide adoption of HDMI. He was a venture director at Index Ventures and held several executive positions at Sun Microsystems where he has in charge of a $1.7B global line of business.
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.Read more >
Learn how to implement operational analytics in NoSQL environmentsRead more >
Organizational Intelligence series
This webcast will combine industry research with actual case studies to illustrate how organizations are:
- Increasing analytic deployment to operationalize decision making and monetize data assets.
- Expanding governance strategies to incorporate data, analytics and user requirements.
- Finding the shortest paths to analytic ROI.
Get ready for 2017 with relevant concepts and examples.
In this webcast, learn the top 5 IoT use cases of Datameer customersRead more >
Es el momento de replantearse la forma en la que abordamos los eventos. En lugar de considerarlos como simples operaciones de bases de datos o transacciones, pensemos en ellos en su contexto. ¿Cómo afectan a los clientes, proveedores y usuarios? ¿Cuáles son las consecuencias si los eventos fallan?
Operational Intelligence complementa al Business Intelligence, aportando inteligencia operativa en tiempo real. De este modo las acciones pasan a ser proactivas en lugar de reactivas, y se traslada a los usuarios la información que necesitan, cuando la necesitan.
451 Research’s Andy Lawrence and RF Code’s Peter Kazmir engage in a thought-provoking discussion of the impact of real-time, wire-free solutions on data center asset lifecycle management and environmental monitoring, and the ways in which they vastly improve data center management and operational efficiency.Read more >
Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?
In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.
What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?
Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.
Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.
Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
Payment fraud losses amounted to $16.31 billion last year — with card-not-present fraud responsible for nearly 40 percent of that total at $6.4 billion. Investigating those cases (and resolving those disputes) is a major burden for card issuers; what’s essential to improving the process is to automate investigation and minimize operational overhead.
Join Ankur Karer, Head of Global Pre-Sales of CA Technologies, and MPD CEO Karen Webster for a digital discussion on the best practices for implementing the ideal case management system that can help to improve operational efficiency by prioritizing cases and reducing inbound call volume.
As a leader in IT, you are constantly challenged to build and deliver higher quality services while minimizing cost. This is difficult to do while managing daily operations, meeting service level agreements (SLAs), and sifting through data to pinpoint areas of improvement.
Service automation is a key strategy to drive major improvements across cost, quality and agility in service delivery. There are many areas that could be candidates for automation. Which would be the ones to drive the greatest business impact? This is where analytics come into play. By taking an analytical approach to automation, you’ll be making the best use of the operational data you already have.
Join us and find out how to:
Establish the value of structured communications as a baseline for organizing business goals and services
Leverage leading and lagging indicators to measure performance of a structured process
Align data and analytics to drive action across all stakeholders in an organization
Integrate benchmarking as the next step in business outcome improvement
Industrial organizations face greater cyber security challenges today as traditionally air-gapped or segmented operational technology (OT) networks become increasingly connected to IT systems and the internet, exposing critical ICS endpoints and other assets to aggressive threats related to abuse of privileged accounts or other currently very common threats like ransomware.
IT/OT convergence and related cyber security risks can threaten uptime and consumer safety. Nearly all users in ICS environments require some level of privileged access and are therefore being targeted. Protecting ICS users and managing those risks should more closely mirror IT privileged account security best practices.
Focusing on aspects and mitigation strategies of securing privileged accounts in ICS/OT environments like:
- Quantify the Risk and Reduce the Attack Surface
- Secure and Monitor Remote Access
- Protect Against Malware and Ransomware Attacks
- Identify Suspicious Activity
Risk Management is not a standalone activity carried out by a company’s risk experts; it is part of the responsibilities of management and a concern to all of the organization’s stakeholders. Risk identification and management are vital to strategic planning, project development and change management. Correctly instituted, Operational Risk Management (ORM) is a cross-functional and dynamic process that is critical in helping decision-makers reach informed choices based on facts and data, not opinions. It helps management prioritize actions and distinguish the best route amid alternative courses of action. Securing information and assets is not a silo within the security or IT business unit.
The benefits are many, but ORM, once implemented, facilitates reducing operational and compliance costs and provides a detection system that will help reduce future exposure to risk. Ultimately it means a more resilient organization.
Some industries are under more regulatory pressure than others, but the federal government is now also pushing forward risk-based frameworks. Organizations dubbed as “Critical Infrastructure” will need to ensure they have the controls and processes in place to meet requirements outlined by risk-based frameworks such as the NIST Cybersecurity Framework.
Attendees will learn:
- How risk based security is defined and harmonized internationally
- What ORM look like in real life business models
- The importance of the combination of People, Process and Technology in reducing risk
- How Operational Risk Management fosters Operational Resilience
Join the webinar to discuss five key steps to achieve marketing operational excellence, including planning, production, execution, measurement, and optimization.
Predictions for 2020 promise 50B connected devices and 1.7 megabytes per person, per second. That’s a lot of data to process, and we’re not even including cows and cats. How will all that data become actionable, operational intelligence? Beyond Limits, a spin-off from CalTech and NASA Jet Propulsion Labs, believes it has the answer.
Chuck Parker, Global Lead of Healthcare and Life Sciences at Beyond Limits, will discuss how the company is migrating artificial and autonomous intelligence technology used by NASA to run the Deep Space Network (including all rovers) to address the zettabytes of data IoT will employ. The technology is built upon high-speed machine learning engines and includes powerful cognition, prognostication and self-learning intelligence. It’s Automated Intelligent Knowledge bases allow for intelligent interaction with humans to drive automated processes, such as how to sign up for insurance or follow up with patients who need healthcare home monitoring. We will take a look at use cases in the healthcare and energy industries, where the technology is currently deployed.
Please join us for what will be a fascinating conversation. And bring your questions!
Chuck Parker, Global Lead of Healthcare and Life Sciences, Beyond Limits
Limor Schafman, Director of Content Development, TIA
This program is not BICSI accredited.
TIA is the Telecommunications Industry Association. Our members are the network operators, service providers, OEMs and suppliers that build the communications and information networks of today and tomorrow. We are a standards, policy, and market intelligence organization. We produce numerous events, and I invite you to visit us to learn more: www.TIAonline.org.
HP Operational Analytics provides real-time and historical analysis of raw (unstructured) and structured machine, log, monitoring and event data. Join us to learn how OpsAnalytics can help you:
•Collect, store and analyze everything
•Consolidate in a single dashboard
•Correlate to understand impact and root cause
•Easily search logs and events for improved services and better decisions
This session features Amex's VP of Credit and Operational Risk BI, Bryan Harrison. At Amex, Bryan's BI team does risk and fraud analytics on billions of daily transactions to protect the business and its customers.
How do you give 1000's of analysts access to big data from tools they already love and use --- like Tableau and Excel --- to do critical, real-time analytics?
In this recorded session, Bryan shares best practices to achieve BI nirvana
No more data movement - Maintain data fidelity
No more pre-aggregation - Get nimble, move faster
No more build and refresh on cubes - Save time & resources