Hi [[ session.user.profile.firstName ]]
Sort by:
    • Introducing Fibre Channel NVMe
      Introducing Fibre Channel NVMe Craig Carlson, FCIA Board of Directors, Cavium, J Metz, FCIA Board of Directors, Cisco Recorded: Feb 16 2017 7:00 pm UTC 58 mins
    • NVMe is one of the most interesting new developments to happen to storage in the past several years, and NVMe over Fabrics extends these capabilities over a Storage Area Network. Given that 80% of all existing Flash storage solutions deployed are interconnected with Fibre Channel (FC), many questions have arisen about what it is, how it works, and why someone might want to consider using Fibre Channel for NVMe-based solutions.

      In this technical webinar, we’re going to be addressing some of these fundamental questions:

      - How does Fibre Channel and NVMe work together?
      - How is NVMe over Fabrics different from “traditional” Fibre Channel?
      - What changes do I have to make to my Fibre Channel environment in order to get NVMe over Fabrics to work?
      - What would an NVMe over Fibre Channel (FC-NVMe) architecture look like?
      - What advantages would I get using Fibre Channel in an NVMe solution?

      Check out this live webinar to learn more about this exciting new technology from the people who are developing it.

      Read more >
    • 2017 Predictions on Data Security Trends for the Banking Industry
      2017 Predictions on Data Security Trends for the Banking Industry Lynne Courts VP of Global Marketing, Seclore Upcoming: Feb 22 2017 5:00 pm UTC 60 mins
    • 2016 was a wild ride, with cybersecurity and warfare dominating the headlines. The new EU General Data Protection Act (GDPR) impacts many financial services organizations globally and may be an indication of what’s ahead for North America.

      On top of that, we have the growing use of innovative, and often unsanctioned, collaboration technologies such as Enterprise File Sharing Services, further accelerating the flow of information outside of the organization’s perimeter.

      It is safe to say that ensuring the security of information is an even higher concern than ever before and that the current Information Security infrastructure isn’t making the grade.

      Join us for this webcast in the field of data-centric security will discuss the top seven security trends that will impact banks and financial institutions in 2017.

      Join this presentation to learn the top security trends that will impact banks and financial institutions in 2017, including:

      · Impacts of anticipated cybersecurity legislation and new global regulations on protecting data.

      · What’s missing the Information Security arsenal?

      · How to embrace collaboration and other technology innovations with less risk.

      · Is the shift to data-centric security the answer?

      Read more >
    • How to make money off of Facebook Messenger
      How to make money off of Facebook Messenger Stewart Rogers, Dir. of Marketing Technology, VentureBeat Upcoming: Feb 23 2017 6:00 pm UTC 60 mins
    • With over 1 billion monthly active users, Facebook Messenger is beginning to change the world for companies looking for ways to connect with, engage, and retain an unprecedented number of customers. And we’re guessing that’s probably you.

      It’s all because of Messenger’s developer tools, which have leapt on the promise of bots for customer service and native payments without ever leaving the platform--and have thoroughly delivered on it. Users stay cozily inside the Messenger platform to play games, search, shop, pay, and more, meaning they’re fully engaged with your brand in multiple ways in a single brand context.

      Facebook’s long-term plan: make Messenger the center of users’ lives. Your short-term plan: start positioning yourself to take advantage of this revolution in messenger tech innovation. Register for this free VB Live event now and learn how you can monetize Messenger.

      In this webinar, you’ll:

      Understand the broader digital wallet strategy to connect with customers through chatbots
      Get valuable tips to spin chatbots into gold
      Learn the biggest mistake organizations are making with payments through Messenger

      Speakers:

      * Stewart Rogers, Director of Marketing Technology, VentureBeat
      * Wendy Schuchart, Moderator, VentureBeat

      Read more >
    • Deliver Real Value with Open Source Business Optimization Technology
      Deliver Real Value with Open Source Business Optimization Technology Geoffrey De Smet, founder and project lead, OptaPlanner Recorded: Feb 16 2017 8:00 pm UTC 63 mins
    • The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.

      Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.

      Watch this webcast with the OptaPlanner to:
      - Work through some actual examples and use cases whose solutions demonstrate business benefits.
      - Leave equipped with tools and resources to start solving your own business planning problems.
      - Discover how digital transformation and open source are changing the face of business and IT operations

      Read more >
    • Comparison of ETL v  Streaming Ingestion,Data Wrangling in Machine/Deep Learning
      Comparison of ETL v Streaming Ingestion,Data Wrangling in Machine/Deep Learning Kai Waehner, Technology Evangelist, TIBCO Recorded: Feb 15 2017 11:00 am UTC 45 mins
    • A key task to create appropriate analytic models in machine learning or deep learning is the integration and preparation of data sets from various sources like files, databases, big data storages, sensors or social networks. This step can take up to 50% of the whole project.

      This session compares different alternative techniques to prepare data, including extract-transform-load (ETL) batch processing, streaming analytics ingestion, and data wrangling within visual analytics. Various options and their trade-offs are shown in live demos using different advanced analytics technologies and open source frameworks such as R, Python, Apache Spark, Talend or KNIME. The session also discusses how this is related to visual analytics, and best practices for how the data scientist and business user should work together to build good analytic models.

      Key takeaways for the audience:
      - Learn various option for preparing data sets to build analytic models
      - Understand the pros and cons and the targeted persona for each option
      - See different technologies and open source frameworks for data preparation
      - Understand the relation to visual analytics and streaming analytics, and how these concepts are actually leveraged to build the analytic model after data preparation

      Read more >
    • Long-term Data Retention: Challenges, Standards and Best Practices
      Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 6:00 pm UTC 61 mins
    • The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

      While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
      •Key challenges of long-term data retention
      •How the SIRF format works and its key elements
      •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
      •Availability of Open SIRF

      SNIA experts that developed the SIRF standard will be on hand to answer your questions.

      Read more >
    • The Data Warehouse in the Age of Digital Transformation
      The Data Warehouse in the Age of Digital Transformation Neil Raden, Principal Analyst, Hired Brains Research Upcoming: Feb 22 2017 7:00 pm UTC 60 mins
    • In the past years of Big Data and digital transformation “euphoria”, Hadoop and Spark received most of the attention as platforms for large-scale data management and analytics. Data warehouses based on relational database technology, for a variety of reasons, came under scrutiny as perhaps no longer needed.

      However, if there is anything users have learned recently it’s that the mission of data warehouses is as vital as ever. Cost and operational deficiencies can be overcome with a combination of cloud computing and open source software, and by leveraging the same economics of traditional big data projects - scale-up and scale-out at commodity pricing.

      In this webinar, Neil Raden from Hired Brains Research makes the case that an evolved data warehouse implementation continues to play a vital role in the enterprise, providing unique business value that actually aids digital transformation. Attendees will learn:

      - How the role of the data warehouse has evolved over time
      - Why Hadoop and Spark are not replacements for the data warehouse
      - How the data warehouse supports digital transformation initiatives
      - Real-life examples of data warehousing in digital transformation scenarios
      - Advice and best practices for evolving your own data warehouse practice

      Read more >
    • Sensible Daten überall absichern, schützen und überwachen
      Sensible Daten überall absichern, schützen und überwachen Thomas Hemker, Lars Kroll Upcoming: Feb 23 2017 2:00 pm UTC 60 mins
    • Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

      Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

      Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

      •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

      •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

      •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.

      Read more >
    • How to Gate, Watch and Guard your Sensitive Data Everywhere
      How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Upcoming: Feb 23 2017 11:00 am UTC 60 mins
    • The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

      So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

      We will explain how Symantec technology addresses this approach and how you will benefit from:

      •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

      •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

      •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.

      Read more >
    • How to build an investment process
      How to build an investment process Derek Bradley, Panacea Adviser & Geoff Mills, RSMR Recorded: Feb 16 2017 1:00 pm UTC 36 mins
    • Panacea Adviser has teamed up with BrightTalk and Rayner Spencer Mills Research for a free webcast to support and educate Financial Advisers.

      There are numerous benefits of building a structured investment process, including:

      •More time spent with clients
      •A consistent and repeatable approach
      •Cost efficiency
      •Reduced regulatory risk
      •A more successful business

      The ‘How to build an investment process’ webcast will provide you with some ideas on how to add some rigor to your Centralised Investment Process in order to get the most out of your business. We will clarify some of the FCA guidance within this area and demonstrate real, practical solutions to deal with it.

      The webcast will run through the research and due diligence that is expected of you and provide examples of how to do it, so you are well prepared and resourced to do a good job. It will also cover off an investment matrix and investment committee oversight.

      This thorough, best-practice session will be of real value to you and your firm and not one to be missed!

      Read more >
    • Rise of the Zombie Army - A Study of Botnets
      Rise of the Zombie Army - A Study of Botnets Ronan Lavelle, General Manager EMEA, Zenedge Upcoming: Feb 22 2017 1:00 pm UTC 45 mins
    • From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating mass devastation on an international scale.

      We are of course talking about the rise of Botnets.

      Come join us for an interactive presentation with chief zombie-wrangler, Ronan Lavelle, on the insidious rise of this threat looking at recent attacks, the link in growth to insecure IoT devices and just what we can do to combat them.

      This webinar is perfect for cyber professionals those who want to:

      - stop data loss by defending against botnets
      - better respond to incidents and remediate
      - reduce attack surfaces and counter threats

      Read more >
    • Ransonware: Don't Believe The Hype of Vendors - APAC
      Ransonware: Don't Believe The Hype of Vendors - APAC Matthew Hathaway Recorded: Feb 15 2017 2:00 am UTC 57 mins
    • A number of Rapid7's customers have been evaluating the risks posed by the swift rise of ransomware as an attack vector. As of today, there is no known method for recovering lost data without cooperating with the criminals responsible for the ransomware. Of course, backing up valuable data before an attack is critical in order to recover from this kind of attack.

      Join Matthew Hathaway, Senior Managers of Solution Marketing to cover:

      - Snake oil sales techniques around ransomware
      - Best ways to protect your organization from this threat
      - Disaster recovery processes to have in place
      - And more!

      Read more >
    • [Video Interview] RSA 2017 - John Elliott
      [Video Interview] RSA 2017 - John Elliott Josh Downs, Community Manager, BrightTALK & John Elliott Upcoming: Feb 22 2017 2:00 pm UTC 45 mins
    • BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

      Topics up for discussion will include:

      - The new political climate and it's effect on Cyber Security and global cyber warfare

      - The supposed Russian hack on the 2016 US election

      - GDPR and what companies need to be doing to prepare for 2018

      - Equal opportunities in the information security industry

      - The rise of AI & Machine learning and how it'll influence the cyber world

      - IoT and how to keep connected devices all safe and secure

      - Incident response and steps to take if you've been breached!

      - The 2017 threatscape and what you shoud be concentrating on

      All this and much more - join us for the broadcast.

      Read more >
    • Henderson Global Technology Update
      Henderson Global Technology Update Alison Porter Upcoming: Feb 21 2017 2:00 pm UTC 60 mins
    • The Henderson Global Technology Team believes the long-term story for technology relative to other equities is still very much intact. Technology continues to be a disruptive force – taking share from other sectors of the economy. However, technology equities will face some headwinds in the short term from a stronger dollar and increasing protectionism. While changes in political policy and the economic backdrop are difficult to predict, the technology team believe that by focusing on powerful secular themes such as cloud infrastructure and artificial intelligence and on companies with solid barriers to entry and reasonable valuations, the technology funds will continue to be well positioned to deliver attractive long-term returns.

      Read more >