Please join the dedicated Global Macro Investment Team for an update on their macro views, positioning and recent performance.
Don’t miss this opportunity to put forward your questions, and discover how we distil our view of the world into macro themes that provide a robust framework for investing.
*New phone numbers below for phone line participants:*
If you are dialling in please use the details below with the pin: 9892401#
+44 (0) 20 3059 2627 - Standard International Access
0800 368 0707 - UK Toll Free
1 877 406 7969 - USA Toll Free
Austria Toll Free 0800 005490
Belgium Toll Free 0800 757 24
Denmark Toll Free 8088 1038
Finland Toll Free 0800 9 18146
France Toll Free 0805 101393
Germany Toll Free 0800 664 5033
Hungary Toll Free 06 800 16322
Ireland Toll Free 1 800 932 467
Italy Toll Free 800 969 181
Luxembourg Toll Free 800 2 2908
Netherlands Toll Free 0 800 022 2098
Norway Toll Free 800 19 707
Poland Toll Free 0 0 800 007 660
Portugal Toll Free 800 814 529
Spain Toll Free 800 300401
Sweden Toll Free 020 089 6429
Switzerland Toll Free 0800 002 180
UK Toll Free 0800 368 0737
UK Local +44 (0) 20 3059 2697
USA Local +1 347 532 1806
USA Toll Free 1 877 406 7969
Students may be diligently working on their computers, but what are they actually doing? Our reports provide you a wealth of data about students' progress, and success within Rosetta Stone. Today learn about the different reports you can run, and what all that data means once you run the reports! We'll discuss red flags, positive trends, and what teachers should be looking for (and what you can ignore!)Read more >
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.Read more >
Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.
In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.
This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:
•New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
•Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
•Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
•The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.
Join this keynote panel of security experts and industry veterans as they discuss:
- New on the threatscape
- Cyber attack trends seen in 2018
- Addressing your cyber risk
- How to prepare for 2019
- Security strategy and making the most of your security dollars
- New leaps in technology
- Best practices and recommendations
- Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
- Topher Chung, Director of Security Engineering, OneLogin
Dell EMC IDPA DP4400 : Simply powerful data protectionRead more >
Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development.
But are they taking the right steps to secure those containers?
This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in launching their container security initiatives.
The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.
With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?
Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:
•The current threat landscape and unique security challenges healthcare organizations face
•Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
•How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
This webinar is part of BrightTALK's Ask the Expert Series.
Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.
This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.
Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
This webinar introduces MEGWARE’s certified Intel® Select Solution for Simulation and Modeling, an optimized platform specifically tailored to deliver stellar performance in all kinds of HPC applications. Backed by the power of cutting-edge Intel® Xeon® Scalable processors and supplemental Intel® technologies, MEGWARE offers a carefully pre-configured solution for those workloads including computational fluid dynamics (CFD) and computer-aided engineering (CAE). With more than 28 years of experience in building High-Performance Computing Clusters, MEGWARE has proven to be one of the leading vendors in Europe. Also, MEGWARE puts a strong focus on R&D with various software and hardware products developed in-house. One prominent example is the hot-water direct liquid cooling solution ColdCon® supporting high coolant inlet temperatures of up to 55°C. Hence, the Intel Select Solution for Simulation and Modeling is not only available with standard air-cooling but alternatively TCO-optimized with MEGWARE's extremely efficient ColdCon® technology.Read more >
Coaching is now a key component of many development packages, but do we really understand what it is and how to use it to our advantage?
In this practical session we’ll explore the following questions:
- What is coaching and what isn’t coaching?
- What type of challenges and goals can coaching help with?
- What happens in the coaching process?
- Are you ‘coachable’?
- How do you find a coach and assess whether they are the right fit for you?
Julie Smith is diirector and coach at Pressurevalve Ltd. As well as being a qualified executive coach, she’s also an experienced leader with 15+ years in management positions, 10 of which were in senior posts, including heading national operations and an interim CEO post. This means she understands the complexities, challenges and rewards of leadership. Key success factors in her coaching include helping people develop: skills in viewing situations from different perspectives, self-awareness, decision-making, confidence, self-belief, self-coaching and resilience. As well as coaching, Julie designs and facilitates sessions for leadership programmes in London and New York, runs network groups for leaders and is chair of the Global Taskforce of the American Express Leadership Academy, Alumni Network. If you’d like more information on Julie’s coaching services, plus self-coaching resources, visit: https://www.pressurevalvecoaching.com/free-stuff
Strengthen and differentiate your business by unlocking the value of your most valuable resource: data capital. Join the webinar and learn how Dell EMC and DefendX Software are making it easier for organizations to manage their unstructured data and make it easier to extract value from data.Read more >
People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.Read more >
BI workloads are an increasingly important part of your big data system and typically consist of large queries that analyze huge amounts of data. Because of this, BI users frequently complain about the responsiveness of their applications.
Learn how Pepperdata enables you to tune your big data system and applications to meet SLAs for critical BI workloads.
Bots, artificial intelligence, and messaging — cost-effective, easy-to-implement automation technology —- is gaining a major foothold in customer service organizations, and the impact is palpable. Contact centers are on track to shrink by 50 percent in the next three years as routine tasks are taken over by faster, efficiency-saving bots that can triage requests, boost customer satisfaction, and offer an 8.6 percent increase in profit margin per customer.
These technologies are also making it easy to tap into the gig economy, which is producing a growing supply of tech-savvy labor for companies that also saves costs. For workers, it means flexible arrangements with low barriers to entry, plus more satisfying employment, now that the grunt work has been eliminated by automation.
AI and automation is set to level up the workforce, the economy, and your bottom line. For a closer look at the long-term implications of automation, how to invest in the brave new world of work, and more, don’t miss this VB Live event!
Attend this webinar and learn:
* The workforce implications of customer service bots
* How bots and employees can work side-by-side
* What smart companies are doing to lay the groundwork
* Future of work - what does it look like?
* Abinash Tripathy, Co-founder, Helpshift
* Peter Ryan, Principal Analyst, Ryan Strategic Advisory
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Dilan Yuksel Moderator, VentureBeat
Sponsored by Helpshift
In today’s hyper-competitive software market, companies are ever pressing to deliver products more quickly and efficiently. As a result, it is imperative for organizations to implement a more strategic approach to quality. A strategic approach requires QA teams to gather more comprehensive data on the value of quality tasks in the delivery pipeline. And it often requires a different approach to reporting, and a focus on metrics that help the business measure release readiness and assess overall application quality.
Join us as Adam Satterfield shares the key metrics today’s software QA teams should be collecting, how to tell the story of your data and how to better understand different audiences within your organization to deliver insights that matter. Ryan Yackel will also dive into how some of these insights can be applied in qTest Insights.
In this webinar, you will learn how to gather the metrics for 3 key areas to demonstrate business value, including:
- The cost of a defect
- Efficiency gains from test automation
- Risk identification through coverage metrics
Enterprises are taking advantage of the vast capabilities Cloud Computing offers, rapidly migrating data and applications to Public Cloud, such as Amazon Web Services (AWS). However, great new capabilities also expose organizations to new security risks.
In order to maintain an effective security posture while deploying applications across complex and hybrid network environments, security professionals need holistic visibility and control from a single source.
In this special panel discussion, Prof. Avishai Wool (AlgoSec CTO) and Scott Ward (AWS Principle Solutions Architect) will cover best practices for maintaining corporate security governance as enterprises extend business applications into the cloud.
Join us to learn how to:
• Extend full visibility from the on-premise network into AWS with a single pane of glass view
• Proactively uncover gaps in security and compliance
• Quickly apply on-premise network security policy to AWS
• Automatically optimize security policy change management across the complex network
La gestion de la sécurité et la réponse apportée aux cyber événements constituent des défis majeurs. Une visibilité et une connaissance insuffisantes de ces risques au sein de votre réseau aggravent cette problématique.
Regardez ce webcast pour découvrir comment établir une approche holistique connectée en matière d’orchestration de la sécurité. Apprenez à mettre en place des règles de sécurité et des actions de contrôle plus intelligentes pour bénéficier d’un environnement réseau plus solide, plus sûr et plus conforme. Vous apprendrez comment :
• proposer un accès avec signature unique (SSO) afin de dimensionner et gérer les services de sécurité réseau, terminaux et Cloud
• contrôler l’ensemble des opérations et des services depuis une interface Cloud commune simplifiée
• bénéficier d’une visibilité centralisée et d’une identification en situation de la sécurité réseau
• bénéficier d’une gestion des règles sans erreur
• déployer et dimensionner des pare-feux à distance via le Cloud
Join SSSI members and respected analysts Tom Coughlin and Jim Handy for a look into their new Emerging Memory and Storage Technologies Report. Tom and Jim will examine emerging memory technologies and their interaction with standard memories, how a new memory layer improves computer performance, and the technical advantages and economies of scale that contribute to the enthusiasm for emerging memories. They will provide an outlook on market projections and enabling and driving applications. The webcast is the perfect preparation for the 2019 SNIA Persistent Memory Summit January 24, 2019.Read more >
With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.
As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.
In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.
- Learn about the three forces leading us towards cloud-native first architectures
- Understand how we got here – the milestones marking the maturity of Kong
- Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
- Why you need a solution that can support all of your deployment patterns.
The cloud offers significant benefits for business, including flexibility and efficiency, but cloud migration has its challenges when it comes to security. Juggling multiple virtualized environments, keeping track of disparate security policies and dealing with containerization issues can turn your cloud journey into a nightmare. Join us to find out more about these potential complications – and how you can avoid them.Read more >
Threats Actors Target Vendors to Large Organisations
We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
Descubre de la mano de Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke, AWS Premier Partner con la SAP Completency, cómo y por qué desplegar SAP en la nube de Amazon Web Services utilizando SUSE Linux Enterprise Server for SAP.Read more >
In this webinar we argue that while the environment for retailers in the Middle East has changed in recent years, the attractions for both local and multinational retailers remain largely undiminished.Read more >