Watch and learn how EMC is helping companies increase operational efficiency and achieving real business value.Read more >
This webinar explores the convergence of Operational and Information technology as one of the key benefits of the Internet of Things; and how to use this convergence as a way to build a new generatin of integrated digital supply chains which are the base of Industry 4.0.
This webinar will cover the following topics:
* Industry 4.0 and IoT Trends
* Higher efficiency and productivity through end to end integrated digital supply chains
* New business opportunities for all players in the manufacturing supply chain
* Real life examples on industrial process improvements through the use of IoT
About the speaker: Jimmy Garcia-Meza is the co-founder and CEO of CloudPlugs Inc. He has over 20 years of experience running startups and large divisions in private and public U.S. multinational companies. He co-founded nubisio, Inc. a cloud storage company acquired by Bain Capital. He was CEO of FilesX, a backup software company acquired by IBM. He held various executive positions at Silicon Image (SIMG) where he was responsible for driving the world-wide adoption of HDMI. He was a venture director at Index Ventures and held several executive positions at Sun Microsystems where he has in charge of a $1.7B global line of business.
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.Read more >
Learn how to implement operational analytics in NoSQL environmentsRead more >
Organizational Intelligence series
This webcast will combine industry research with actual case studies to illustrate how organizations are:
- Increasing analytic deployment to operationalize decision making and monetize data assets.
- Expanding governance strategies to incorporate data, analytics and user requirements.
- Finding the shortest paths to analytic ROI.
Get ready for 2017 with relevant concepts and examples.
In this webcast, learn the top 5 IoT use cases of Datameer customersRead more >
NSX network virtualization represents a major advancement in helping organizations realize the benefits of speed, agility, and security. Enterprises are using VMware NSX to achieve game-changing operational advantages. In this webinar we will cover the NSX Operations Maturity Model that spans across people, process, and tooling – including general operational guidance and best practices based on real world implementations. This unique webinar is ideal for IT executives and managers who want to understand what it takes to operationalize NSX. It is also useful for networking and security professionals in architecture, engineering, and admin/ops who will participate in operationalizing NSX for their organization.
In this webcast, you will:
- Gain a basic understanding of the NSX Operations Maturity Model and what it takes to successfully operationalize NSX across people, process, and tooling.
- Learn about the real-life best practices customers are using to operationalize NSX, as well as the resources and services VMware offers to help you on this journey.
- Learn how to approach your transformational journey gradually, by starting small and taking incremental steps towards a more mature end state.
Es el momento de replantearse la forma en la que abordamos los eventos. En lugar de considerarlos como simples operaciones de bases de datos o transacciones, pensemos en ellos en su contexto. ¿Cómo afectan a los clientes, proveedores y usuarios? ¿Cuáles son las consecuencias si los eventos fallan?
Operational Intelligence complementa al Business Intelligence, aportando inteligencia operativa en tiempo real. De este modo las acciones pasan a ser proactivas en lugar de reactivas, y se traslada a los usuarios la información que necesitan, cuando la necesitan.
The increased interest and adoption of single use systems (SUS) or disposables require that organizations rethink their operational business processes and the design and configuration of manufacturing execution systems (MES). Drawing from their previous experience implementing MES and SUS for biologics manufacturing, the authors discuss the key areas of impact of SUS on operational technology, outline new user requirements, and propose practical solutions for successful MES implementation.Read more >
451 Research’s Andy Lawrence and RF Code’s Peter Kazmir engage in a thought-provoking discussion of the impact of real-time, wire-free solutions on data center asset lifecycle management and environmental monitoring, and the ways in which they vastly improve data center management and operational efficiency.Read more >
Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime. Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink. Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.Read more >
Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?
In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.
What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?
Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.
Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.
Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
Payment fraud losses amounted to $16.31 billion last year — with card-not-present fraud responsible for nearly 40 percent of that total at $6.4 billion. Investigating those cases (and resolving those disputes) is a major burden for card issuers; what’s essential to improving the process is to automate investigation and minimize operational overhead.
Join Ankur Karer, Head of Global Pre-Sales of CA Technologies, and MPD CEO Karen Webster for a digital discussion on the best practices for implementing the ideal case management system that can help to improve operational efficiency by prioritizing cases and reducing inbound call volume.
As a leader in IT, you are constantly challenged to build and deliver higher quality services while minimizing cost. This is difficult to do while managing daily operations, meeting service level agreements (SLAs), and sifting through data to pinpoint areas of improvement.
Service automation is a key strategy to drive major improvements across cost, quality and agility in service delivery. There are many areas that could be candidates for automation. Which would be the ones to drive the greatest business impact? This is where analytics come into play. By taking an analytical approach to automation, you’ll be making the best use of the operational data you already have.
Join us and find out how to:
Establish the value of structured communications as a baseline for organizing business goals and services
Leverage leading and lagging indicators to measure performance of a structured process
Align data and analytics to drive action across all stakeholders in an organization
Integrate benchmarking as the next step in business outcome improvement
Industrial organizations face greater cyber security challenges today as traditionally air-gapped or segmented operational technology (OT) networks become increasingly connected to IT systems and the internet, exposing critical ICS endpoints and other assets to aggressive threats related to abuse of privileged accounts or other currently very common threats like ransomware.
IT/OT convergence and related cyber security risks can threaten uptime and consumer safety. Nearly all users in ICS environments require some level of privileged access and are therefore being targeted. Protecting ICS users and managing those risks should more closely mirror IT privileged account security best practices.
Focusing on aspects and mitigation strategies of securing privileged accounts in ICS/OT environments like:
- Quantify the Risk and Reduce the Attack Surface
- Secure and Monitor Remote Access
- Protect Against Malware and Ransomware Attacks
- Identify Suspicious Activity
Risk Management is not a standalone activity carried out by a company’s risk experts; it is part of the responsibilities of management and a concern to all of the organization’s stakeholders. Risk identification and management are vital to strategic planning, project development and change management. Correctly instituted, Operational Risk Management (ORM) is a cross-functional and dynamic process that is critical in helping decision-makers reach informed choices based on facts and data, not opinions. It helps management prioritize actions and distinguish the best route amid alternative courses of action. Securing information and assets is not a silo within the security or IT business unit.
The benefits are many, but ORM, once implemented, facilitates reducing operational and compliance costs and provides a detection system that will help reduce future exposure to risk. Ultimately it means a more resilient organization.
Some industries are under more regulatory pressure than others, but the federal government is now also pushing forward risk-based frameworks. Organizations dubbed as “Critical Infrastructure” will need to ensure they have the controls and processes in place to meet requirements outlined by risk-based frameworks such as the NIST Cybersecurity Framework.
Attendees will learn:
- How risk based security is defined and harmonized internationally
- What ORM look like in real life business models
- The importance of the combination of People, Process and Technology in reducing risk
- How Operational Risk Management fosters Operational Resilience
Join the webinar to discuss five key steps to achieve marketing operational excellence, including planning, production, execution, measurement, and optimization.