Technologies never remain in silos; they intermingle with one another to form innovative scenarios that may potentially disrupt existing business models and applications. For example, technologies such as Smart Haptics, 5G Networks, Surgical Robots, Artificial Intelligence and XaaS could combine to generate an innovative business scenario, “Haptic-enabled Remote Robotic Surgeries,” that may possibly disrupt the healthcare industry. For business executives and R&D organizations, these scenarios usher in innovation for their strategic business planning and help them stay ahead in the market. The webinar also discusses some of the key initiatives enabling the convergence of emerging technologies.Read more >
In an inter-connected world where technology has no boundaries, two or more emerging technologies across industries may converge in various scenarios, leading to unexplored applications or business models. For example, technologies like next-generation stem cells, additive manufacturing and nano-coatings may converge to give rise to "personalized cosmeceuticals," which are cosmetics customized based on phenotype and genotype of the user. Unexplored business models like these may become the next disruptive billion-dollar idea for investors, corporate executives and R&D professionals. The webinar will discuss key trends that drive these convergence scenarios and potential market challenges that should be noted while considering these opportunities.Read more >
Whether you are in the beginning stages of implementing a vendor risk management (VRM) program, or you have a robust program, there are always scenarios that can blindside your organization. Compounding this uncertainty is the dynamic environment of cyber risk. Yet, there are tools and techniques organizations can leverage in order to reduce uncertainty about the security of their third parties and vendors.
Join Matt Cherian, Director of Products at BitSight as he discusses how to grapple with common vendor risk scenarios. In this webinar, viewers will learn:
- How to gain full visibility into the security of your critical third parties to avoid being caught off guard
- How to understand and communicate potential threats occurring on the networks of your third parties
- What to do when an infection- or breach occurs
Exercising and testing is a key part of the business continuity management lifecycle. A well-planned, well-run scenario-based exercise can help us to validate assumptions, identify gaps in our plans, exercise key players and develop our business continuity capability. In this webinar Andy Osborne, who has prepared and facilitated dozens of scenario-based exercises for his clients, shares his experience and provides some practical hints and tips for making your scenario-based exercises successful.Read more >
Building middleware applications is challenging because of the multi-tier nature of the application; discipline, communication and transparency across all the teams are required to be successful.
Depending on what is most important to your organization, specific application lifecycle patterns might be most suitable.
Join us on this TechByte session, where we will provide an overview of the most common DevOps scenarios we come across, as well as highlight characteristics and benefits of each of these lifecycle patterns.
On Tuesday, May 22, 2012, the Growth Team MembershipTM will present a case-based best practice on how the corporate strategy function at Merck & Co., Inc. used scenario planning to explore long-term risks and opportunities.
Featured Thought Leader Douglas Black, General Manager for the Innovative Ventures Unit at Merck, will share key lessons learned and participate in a Q&A session.
The webcast shows how Merck:
• Gathered internal insights and external expertise to establish plausible scenarios for the future of healthcare
• Challenged assumptions about how the critical issues faced today will evolve over the coming years through exploring several scenarios
• Considered investment implications in the context of each scenario
• Integrated scenario-based conclusions with Merck’s strategy planning
The global economic weakness hinted at by the oil price caused anxiety for investors in late 2014 – growth is slowing in China, which is impacting on its neighbours; the eurozone remains weak; and Japan is still struggling. This is now affecting countries with stronger growth such as the US and UK – there is a tension between the ‘Goldilocks’ scenario (where growth is neither too hot to need interest rate increases nor too cold) and a deflationary spiral that will destroy growth.
Register now to join Julian Chillingworth, CIO of Rathbone Unit Trust Management, in our opening webcast on Tuesday 21 January at 11am, as he discusses where our growth opportunities lie, and the key issues that will shape our investment strategy.
Put your questions to Julian in advance or during the call using the ‘questions’ tab at the top of the video screen. A recording will be available 'on demand' after the call if you unable to join us at 11am.
SAP HANA usage scenarios in the real-world – SAP Business Warehouse Powered by SAP HANA, SAP Business Suite powered by SAP HANA, Native applications on SAP HANA, SAP HANA in the cloudRead more >
In order to meet the compute infrastructure requirements for the broad range of service consumers, a common framework is required around which infrastructure as a service can be defined, provisioned, monitored and managed. A common set of principles, metrics and architectural frameworks can be defined, resulting in consistent capabilities, service levels and service attributes across multiple providers, while still allowing the individual providers to innovate and differentiate. In this session ODCA representatives will outline the framework and some usage scenarios.Read more >
One of the most powerful tools attackers use today is PowerShell.
Join (ISC)² EMEA's Managing Director Adrian Davis and Jason Garman, Principal Software Architect at Carbon Black, who will explain 3 ways attackers use PowerShell in order to perform actions on objectives, dump credentials, and move laterally through target networks. This webinar will also cover methods and a live demo to show how the risk of PowerShell-leveraged attacks can be mitigated through prevention and detection. Attendees will learn the basics of PowerShell, how attackers leverage tools like PowerShell to “live off the land”, and receive real-world tips on how to identify potentially malicious PowerShell activity on their networks.
You can be a lean startup in an Enterprise! Through collaboration between development, test and operations, an innovative idea can be quickly delivered for customer feedback and reaction. Let’s find out how a team working within a large Enterprise can, in fact, be nimble and creative in getting innovations to market.Read more >
Developing multi-tier applications introduces numerous challenges to teams and organizations; orchestrating work across teams that work and behave very differently, understanding cross-team dependencies so as to minimize risks, ensuring everyone’s backlogs are aligned to the same priorities, keeping teams focused on customer needs/feedback …. to highlight just a few.
Join us on this TechByte session where we will share with you what we’ve seen customers do to handle these challenges.
Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production?
Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality.
Over 1,000 new customers per day are successfully leveraging the Microsoft Azure cloud platform as part of their IT platform! Attend this session to quickly learn where Windows Azure can fit into your IT and cloud strategy. In this session, we'll review the Top 6 Cloud Scenarios where other organizations have experienced immediate results with Microsoft Azure - even if they're currently leveraging other cloud providers. By the end of this session, you’ll be prepared with the information needed for planning a productive jumpstart into the clouds with Microsoft Azure.Read more >
No one wants to end up as the next headline from a cyber security attack. But application security can be hard to do and takes time. Perhaps you failed an audit or swallowed the risk of vulnerabilities to get a new business app online. You need to CYA (cover your apps) fast!
Learn how runtime application self-protection can protect you in minutes when your applications:
• are too complex, too fragile, or ill supported to risk changing the code to remove security vulnerabilities
• have thousands of vulnerabilities – or that have never been tested – but are in production
• rely on code that is off-the-shelf, third party, or in the cloud - don’t be at the vendor’s mercy.
Learn how to identify and defend software vulnerabilities while the app is still being used. Quickly implement compensating controls to breeze past that next audit.
Fast Start Video Series; Basic Consumer Scenario in CSARead more >
Fast Start Video Series; Advanced Consumer Scenario in CSARead more >
Transition towards smart capital expenditure (CAPEX) and innovative operational expenditure (OPEX) are imminent in the oil and gas industry, especially with highly unstable barrel prices. Frost & Sullivan's “2015 E&P CAPEX Outlook Model” estimates global E&P spending in 2015 to decline to $659.8 billion, down from an estimated $723.3 billion in 2014, if the price of crude oil remains around $60 per barrel.
Attend this briefing to:
- Learn about the 2015 top predictions for the oil and gas industry
- Understand the impact that oil price fluctuations will have on the future
- Discover how innovative solution providers are driving the adoption of - Totally Integrated Digital Oilfields (TIDO) to aid end-users overcome key industry challenges
The Mexican Total Telecommunications Services Markets earned revenues of $30.8 billion in 2013 and estimates this to reach $37.,2 billion in 2019., This is mainly driven by the positive economic outlook;, intensifying competition;, investments by competitors to offer triple-, quadruple-, and quintuple-play bundles;, and investments to implement and expand thi3rd- generation (3G), long-term evolution (LTE), GigaEthernet, fiber to the home (FTTH), and other networks.
By attending this Analyst Briefing you will learn:
-What segments offer the best growth opportunities?
-What are the growth drivers?
-What segments are already mature?
-Where is the competitive pressure larger?
No one wants to be the next cyber casualty. Collectively, organizations spend an enormous amount of resources deploying and managing security solutions to block malware, protect data, and keep critical business services operating.
Yet most organizations remain inadequately protected against evolving and dangerous cyber threats. In this session, we will learn to recognize common network attack scenarios and mitigate the combination of misconfigurations, vulnerabilities, access policy violations and other security gaps that can be exploited by sophisticated attackers.
High-profile breaches at Epsilon, Sony, and other enterprise and government networks have dominated the news lately, raising awareness of the need to design effective security strategies against sophisticated attacks and advanced persistent threats (APTs). Many companies struggle with where to begin to develop an effective plan of cyber defense.
During this session we will walk the audience through several attack scenarios using a visual attack explorer tool, highlighting the combination of security gaps that are often used and how to prevent them. Network modeling, vulnerability analysis, access path analysis, and attack simulation will all be introduced and we will show how these analytical tools can be used to quickly and automatically find exposed areas of a network.
The session will center on reviewing real-world attack techniques used in recent attacks and data breaches. We will then talk about how to recognize security gaps, compare attack scenarios and define remediation alternatives. Attendees will learn how to prevent assaults on their network infrastructure from occurring by taking proactive measures and using an automated and sustained approach to risk and vulnerability management.