Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Calculate Data Confidence How to Calculate Data Confidence Rodney Brown, UBM, David Corrigan, IBM InfoSphere, Nathaniel Rowe, Aberdeen Group Recorded: Sep 18 2014 5:00 pm UTC 64 mins
    • Data confidence is an abstract notion in most organizations. Yet it is critical in order to make your front line workers trust and act upon big data and analytic insight, as even the most game-changing analytics will have no impact if your team doesn't use them, because they don't trust in the data or the insights. Learn about compelling new research that identifies the critical criteria to measure and score confidence levels in customer data to make better business decisions. You will also learn about a new online tool that provides a fast and easy way for attendees to obtain their score.

      View this webinar to learn how to:
      - Calculate data confidence and improve the adoption of big data & analytics
      - Utilize data confidence scores to align resources to new big data & analytics projects
      - Calculate and share data confidence in your big data projects

      Moderator: Rodney Brown, Editor, UBM

      David Corrigan, Director of Product Marketing, IBM InfoSphere;
      Nathaniel Rowe, Research Analyst, Aberdeen Group

      Read more >
    • Build Confidence in Big Data Build Confidence in Big Data Judith Hurwitz, President and CEO, Hurwitz & Associates Recorded: Oct 21 2014 8:00 pm UTC 59 mins
    • Big data won't deliver big benefits to your organization if you don't trust it. Before you can put it to work, you need to find the information you need, understand it and assess its quality, building confidence. Integrating it with other data, consolidating it into a unified view, managing it across its lifecycle, and preserving its privacy and security can help you harness the power of the data for both analytics and ongoing operations.

      Join this webcast to learn how other organizations are doing just that with solutions from IBM InfoSphere. You'll get insights into their strategies as well as the practical steps for getting started with integration and governance for all your data.

      Read more >
    • Where physical & financing meet: increasing confidence in the off-warrant market Where physical & financing meet: increasing confidence in the off-warrant market Ms. Andrea Hotter, Special Correspondent, Metal Bulletin Recorded: Oct 12 2016 1:00 pm UTC 53 mins
    • It has become increasingly important in recent times to improve trust, confidence and transparency in the off-warrant commodities market. This dynamic sector, formed by the interaction of banks, traders, commodity owners and warehouses, expects the assurance that stored inventory actually exists, has proven ownership and is of the expected grade and quality.

      Our panel will discuss the need to develop secure and effective tools to manage, transfer and finance commodities, to help mitigate operational risks and unlock new opportunities across the commodity value chain.

      - Ms. Andrea Hotter, Special Correspondent, Metal Bulletin [Moderator]
      - Mr. Matthew Chamberlain, Head of Business Development, LME
      - Mr. Graham Hawkins, Group General Manager, Henry Bath & Son Ltd.
      - Mr. Charles Bucknall, Group Managing Director, ACE Warehousing and Logistics Co. Ltd.
      - Mr. Mitchel Fowler, Director, Commodities, Societe Generale Corporate and Investment Banking

      Read more >
    • Deploy WebRTC Services with Confidence Deploy WebRTC Services with Confidence Kader Khan, Product Manager, EXFO Recorded: Jul 28 2016 3:00 pm UTC 65 mins
    • Service providers are increasingly becoming involved in the deployment of Web Real-Time Communication (WebRTC) technology to deliver richer forms of unified communication services to more connected users.

      Even though WebRTC opens up many great opportunities to extend existing VoLTE, ViLTE, VoWiFi and RCS services while also creating entirely new services to their customers, service providers need to be careful what they wish for. One of the biggest challenge is preparing networks to address interworking of new and extended services in a well-defined standardized approach.

      This webinar explores how service providers can maximize their goals by deploying standardized WebRTC services with confidence. Insight is provided on architectural requirements surrounding WebRTC implementation–including networks, devices (WebRTC gateway/SBC) and protocols–to deliver uncompromising network and service performance in today’s highly-competitive environment.

      Who Should Attend

      Network architects, designers, lab managers and testers from service providers, large enterprises, and manufacturers, press, and analysts looking to understand how to design, build, test and deploy WebRTC services.

      Read more >
    • Contain your risk: Deploy secure containers with trust and confidence Contain your risk: Deploy secure containers with trust and confidence Brent Baude, Principle Software Engineer, Atomic and Docker Development, Red Hat; Randy Kilmon, VP, Engineering, Black Duck Recorded: Sep 22 2016 3:00 pm UTC 51 mins
    • Organizations are increasingly turning to container environments to meet the demand for faster, more agile software development. But a 2015 study conducted by Forrester Consulting on behalf of Red Hat revealed that 53% of IT operations and development decision makers at global enterprises reported container security concerns as a barrier to adoption.

      The challenges of managing security risk increase in scope and complexity when hundreds or even thousands of different open source software components and licenses are part of your application code base. Since 2014, more than 6,000 new open source security vulnerabilities have been reported, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.

      In this webinar, experts from Red Hat and Black Duck will share the latest insights and recommendations for securing the open source in your containers, including protecting them from vulnerabilities like Heartbleed, Shellshock and Venom. You’ll learn:
      • Why container environments present new application security challenges, including those posed by ever-increasing open source use.
      • How to scan applications running in containers to identify open source in use and map known open source security vulnerabilities.
      • Best practices and methodologies for deploying secure containers with trust and confidence.

      Read more >