Cloud Analytics Consortium presents: Analytics in the Cloud: Ready for Primetime
Join a group of knowledgeable and respected industry thought leaders as they discuss their views about how organizations can best prepare for success with DW/BI solutions in the cloud. Highly reputed independent analyst Howard Dresner who brings 30+ years of IT and BI experience will participate on the panel to provide valuable insights on the future of cloud-based DW/BI solutions. Howard will be joined by senior executives from best-in-class technology organizations including Informatica, MicroStrategy, Netezza, ParAccel and Teradata.
Join us to learn:
* Why more companies are using cloud-based DW/BI solutions now, more than ever before
* About industry solutions for concerns around security, performance, and reliability
* How to evaluate whether a cloud DW/BI solution is right for you
* Cloud adoption or migration strategies for any size business
RecordedDec 6 201251 mins
Your place is confirmed, we'll send you email reminders
Heather Kreger, Gopal Indurkhya, Manav Gupta, Christine Ouyang from the Cloud Standards Customer Council
Using analytics reveals patterns, trends and associations in data that help an organization understand the behavior of the people and systems that drive its operation. Big data technology increases the amount and variety of data that can be processed by analytics, providing a foundation for visualizations and insights that can significantly improve business operations.
In this webinar, the Cloud Standards Customer Council will discuss how to support big data and analytics capabilities using cloud computing. The speakers will walk through a cloud reference architecture and cover the various considerations and best practices for building big data and analytics solutions in the cloud.
Past infrastructures provided compute, storage and network enabling static enterprise deployments which changed every few years. This talk will analyze the consequences of a world where production SAP and Spark clusters including data can be provisioned in minutes with the push of a button.
What does it mean for the IT architecture of an enterprise? How to stay in control in a super agile world?
Financial data is both the most intimate and most powerful data we have about ourselves. Financial data should not kept in a silo but openly available to third parties, -- this is required for true innovation. However, security and data protection are crucial. Banks and third party providers have to work together to provide the infrastructure required to innovate.
Join this webinar where we will discuss:
-The power of APIs -- how to integrate banking data and financial sources quickly and easily
-What developers need to know about banking APIs and how to foster new services in the FinTech space
-PSD2 Post-Brexit -- what now?
-Will traditional banks be replaced by FinTech banks one day?
-Which is the biggest challenge: market education, technical issues, or regulation?
The basics of data cleaning are remarkably simple, yet few take the time to get organized from the start.
If you want to get the most out of your data, you're going to need to treat it with respect, and by getting prepared and following a few simple rules your data cleaning processes can be simple, fast and effective.
The Practical Data Cleaning webinar is a thorough introduction to the basics of data cleaning and takes you through:
• Data Collection
• Data Cleaning
• Data Classification
• Data Integrity
• Working Smarter, Not Harder
James Cotton │ iWay Solution Director EMEA - Information Builders
See Data Preparation in action in this 45 minute webinar. We’ll take you from initial data profiling of a typical low quality excel data set through the cleansing, standardizing, matching and merging of data to ensure correctness. Watch how we take reusable components and deploy these as web services to ensure correct data for all systems by incorporating centralized Data Quality rules.
Harmeen Birk, Director; Hristiyan Nedkov, Business Analyst, Tableau
The world of commercial banking moves swiftly. B2B clients have complex needs and offer great opportunity for banks who can move fast, resolve queries quickly and provide a premium service. If relationship managers aren’t anticipating and responding to their client’s every need then business can easily be taken elsewhere. However, with hundreds of clients to manage at once, it is often impossible to keep them all happy.
For one of the largest commercial banks in the UK, Tableau provided the perfect solution to create client dashboards to help relationship managers, product partners, and service and operational staff to all easily access and take action on client feedback, review product opportunities and keep up to date with client industry news.
The Environment Agency works to create better places for people and wildlife, and support sustainable development within England. We’re responsible for:
· regulating major industry and waste
· treatment of contaminated land
· water quality and resources
· inland river, estuary and harbour navigations
· conservation and ecology
· managing the risk of flooding from main rivers, reservoirs, estuaries and the sea.
Good Data governance is especially important for the Environment Agency and we have millions of people depending on our data and information. The talk will show how
we undertake data governance and measure our performance; and how this supports our transition to an Open Data organisation
Data in the real-world is almost always dirty, incomplete, scattered or inconsistent. For data scientists, 'janitor work' is a key hurdle to data insights.
Whether you use big data for analytics or data science, with increasing variety and velocity of big data, the data pre-processing step can be the most time-consuming step in your data pipeline.
Featuring engineering concepts and practical examples in Python and R, this webinar will focus on technical considerations and data engineering techniques to optimise data preparation to get the most value from your big data pipeline.
Ina Yulo (BrightTALK), Steve Tigar (Money Dashboard), Dan Scholey (Moneyhub)
Data visualisation is a discipline that uses graphs and charts to easily communicate large chunks of data into easily digestible formats.
When it comes to personal finance, data visualization has been used to create useful dashboards where users can keep track of their spending, income, and budgeting.
Join this session where we will discuss:
-Why is data visualization so useful when it comes to personal finance?
-What are the best data viz tools/apps for personal finance?
-What are customers missing from banks that personal finance fintechs are able to provide?
-What are the best practice tips for using dashboards and apps to improve personal finance?
-What are some common mistakes people make when managing their personal finances?
-What are some common misconceptions of data visualization?
Ronald van Loon, Director Business Development, Adversitement
Many companies nowadays run their business through multiple channels. So to get insight into customer behavior they may perceive a need to focus on creating an omni-channel view. Obviously this is primarily on data collection, but using the data for visualization and analytics is that important.
It will facilitate use of BI tools by stakeholders to get the right insights. But are all tools suitable for all people, what are best practices and how to organize your teams to get best results?
In this webinar, Ronald van Loon will:
• Elaborate on the challenges
• Show how a new approach contributes to meeting them
• Discuss several case studies and their results
What’s the truth about using predictive analytics – the possibilities and reality; and dare you use it? Do you have the technical ability to implement it, and the tools to do something in response to the predictions?
In this webinar we’ll look at the full spectrum of technology and benefits, then tear it down into something we can actually use now, that’s not scary and delivers measurable value to you and your customers.
Gartner predicts that “analytics will be pervasive … for decisions and actions across the business.” Sounds like analytics nirvana with instant access for any analysis you want to do, in other words self-service BI. Is this dream or reality?
Join this webinar to find out how clouds like AWS or Azure are moving the industry close to this nirvana today through simple assembly of cloud services combined with the appropriate consumption model of these services.
We will demonstrate how easy it is to provision your high end SAP HANA Database right next to your BI Analytics tier.
Maybe we are closer to this nirvana than you think?
The “Old” world of BI, with its IT centric solutions, OLAP based reporting, and limited ad-hoc querying, has a lot of shortcomings that inhibit self-service BI. Yet, with increasing data complexity has come a new age of BI that is focused on taking strides to provide faster, more data driven and integrated solutions to try and empower the business user.
Join Ani Manian, Head of Product Strategy at Sisense, as he explains the old and new trends in data analytics, and how you can make sure you benefit from a more business-centric world. You’ll learn how to set up meaningful KPI’s, model data according to specific business needs, and work interactively with business users to prototype relevant reports.
Ina Yulo, Tom Berthon (Senior Product Owner, Growth team), Kathryn Birch (Customer Success Manager), BrightTALK
Data is everywhere, but unfortunately, most business users don't have the time to sort through a bunch of stats. They just want to see the bigger picture--so why not give it to them?
Self-service analytics has enabled business users to access and interpret data without needing any statistics background. When coupled with data visualization techniques, we've seen that not only are business users more encouraged to make more data-driven decisions, but they are also able to do this without needing help from their BI or IT teams.
Join this session where we will discuss:
-How to encourage people from all different teams to embrace self-service analytics
-Why data visualization plays a huge role in the success of a data-driven culture
-Top things to take note of when creating dashboards that can easily communicate and add value
-How to teach users to get the most from their data and generate actionable insights
HPE Service Anywhere is a comprehensive, Big Data SaaS service desk based on industry best practices and built on a modern, scalable platform.
August 2016 brings a new, feature-packed HPE Service Anywhere release. This webinar will present the release highlights and the benefits they will bring to your service desk.
New mobile application that enables employees to self-solve issues and request services
ChatOps-style integration with Slack and Hubot for collaboration and fast incident resolution
On-call schedules for automatic routing of tickets to on-duty agents
Project and portfolio management and asset management enhancements
Security and performance features
Join this webinar where we will cover some of the features and ideas for ensuring data accuracy, which is vital for business users. We will also discuss the forthcoming EU privacy regulations and how to make sure your setup is ready for this shift (GDPR comes into force in 2018).
Finally, we will present some ideas on whether to use a ready off-the-shelf solution or invest in creating your own. Its seems that the whole build vs rent discussion has reached the tipping point this year and there may be some surprising answers.
Michael Pott, Scott Knox, Greg W. Morrison, Sree Subramaniam, HPE
Join us in this webinar to discuss latest HPE Service Manager and ITSM Automation Suite innovations and learn about what is coming with the next releases. Topics we will look at include:
New service portal for HPE Service Manager based on HPE Propel technology for a superior user experience
End user chat using virtual agent and Big Data technologies for improved customer satisfaction
Native email integration leveraging Big Data analytics to decrease ticket handling times further
New innovations to leverage Chat for IT Operations Management use cases such as the major incident process
Shreyas Shah, Principal Data center Architect, Xilinx
In the cloud computing era, data growth is exponential. Every day billions of photos are shared and large amount of new data created in multiple formats. Within this cloud of data, the relevant data with real monetary value is small. To extract the valuable data, big data analytics frame works like SparK is used. This can run on top of a variety of file systems and data bases. To accelerate the SparK by 10-1000x, customers are creating solutions like log file accelerators, storage layer accelerators, MLLIB (One of the SparK library) accelerators, and SQL accelerators etc.
FPGAs (Field Programmable Gate Arrays) are the ideal fit for these type of accelerators where the workloads are constantly changing. For example, they can accelerate different algorithms on different data based on end users and the time of the day, but keep the same hardware.
This webinar will describe the role of FPGAs in SparK accelerators and give SparK accelerator use cases.
A Case Study presented by Kurt Jackson, Platform Lead, Autodesk
Companies such as Autodesk are fast replacing the once-true- and-tried physical data warehouses with logical data warehouses/ data lakes. Why? Because they are able to accomplish the same results in 1/6 th of the time and with 1/4 th of the resources.
In this webinar, Autodesk’s Platform Lead, Kurt Jackson,, will describe how they designed a modern fast data architecture as a single unified logical data warehouse/ data lake using data virtualization and contemporary big data analytics like Spark.
Logical data warehouse / data lake is a virtual abstraction layer over the physical data warehouse, big data repositories, cloud, and other enterprise applications. It unifies both structured and unstructured data in real-time to power analytical and operational use cases.
Attend and Learn:
-Why logical data warehouse/ data lakes are the bedrock of modern data architecture
-How you can build a logical data warehouse using data virtualization
-How to create a single, unified enterprise-wide access and governance point for any data used within the company
Andy Kirk, Data Visualization specialist and Editor, VisualisingData.com
In this talk Andy Kirk will shine a light on some of the most discussed and debated aspects of data visualisation design. The aim of the talk is to expose some of the myths about data visualisation and reinforce some of the truths in order to offer practitioners, professionals and part-time enthusiasts alike greater clarity about this increasingly popular discipline.
Viewers will come away with a greater understanding of the rights and the wrongs in data visualisation as well as an awareness of the aspects of this activity that must remain tagged with the elusive notion of ‘it depends’. Along the way Andy will exhibit some of the best examples and techniques from across the field.
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Join CounterTack and Paladion Networks for a live webinar as we walk through the attack that shook banks across the globe. We'll hear from the incident response team at Paladion who supported the investigation, and will discuss:
· How the criminals gained access to the SWIFT servers
· The timeline of events that took place
· A fatal mistake that led investigators to the discovery
· Takeaways organizations can learn from to prevent similar attacks
Oggi l’Application Economy richiede un approccio Agile anche nel controllo quotidiano delle infrastrutture IT e nel controllo delle sue performance.
Gli ambienti IT tendono sempre di più ad essere eterogenei con la presenza di sistemi legacy e cloud sia in forma privata che pubblica (hybrid cloud). Allo stesso tempo agli operation manager viene chiesto di essere proattivi e sempre più veloci nel tenere sotto controllo lo stato dei servizi di business erogati.
Un approccio ai tool di monitoraggio a “silos” non risponde a questi requisiti e rischia di mantenere alti i tempi di risoluzione delle criticità e dei problemi (MTTR alti).
CA Unified Infrastructure Monitoring (UIM) consente di avere una visibilità a 360 gradi sulle applicazioni, servizi e infrastruttura (fino al mainframe) in modo moderno e ottimale unificando i vari tools di monitoraggio dipartimentali, offrendo un controllo puntuale sia sui sistemi più tradizionali che sulle nuove tecnologie cloud e micro-service.
Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
•The current state of phishing
•The success and failure of technology systems and how human systems can protect the last mile
•How conditioning – not training - activates employees to identify and report phishing attacks
•The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response
Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.
Presenter: Jim Hansen, Chief Operating Officer, PhishMe
Jim has over twenty-two years’ experience in sales, operations and
executive management in the information security industry,
including co-founding and serving as COO of Mandiant. He has also
held numerous executive and management positions in both sales
and consulting organizations, and regularly speaks and publishes
articles on information security topics.
Controlling and protecting smartphones and tablets and the applications they run is an important part of the extended endpoint protection environment. Endpoint security is vital, and you need to treat your mobile endpoints with the same urgency as your Windows and server endpoints.
Join Zimperium’s latest webinar featuring Ovum’s Andrew Kellett. Andrew and John will discuss the importance of adding mobile devices to your endpoint security procedures and how to detect attacks via mobile OSs, applications, malware and Wi-Fi networks.
- Mobile Devices are a Viable Vector of Attack
- Ovum Research: Endpoint Security & Mobile Security Requirements Differ
- Enabling mobile devices as threat detection sensors
DevOps is an immensely popular topic. And there is frequent debate over whether practicing DevOps makes your applications more secure or less secure. So we conducted a blind study to research the state of Secure DevOps. We will share our findings such as:
What tools and processes are mature DevOps shops using?
How mature is the average DevOps shop?
How is application security thought of in DevOps methodology?
Common misunderstandings around application security and the resulting risk.
See how we incorporated these findings to help you integrate application security into an Agile or DevOps methodology. You need not compromise.
This presentation will explore not just who is my marketing video audience, but how are they viewing the video? David, Mark, and Mark will discuss the different approaches required for mobile video from the storytelling and the aesthetic/technical perspective.
We'll breakdown these important questions: Can you be sure that your audience will have the audio turned on? Why does direct address to camera work so well for mobile? What’s the ideal length for a mobile video? Could a slick, commercial style video actually be less successful than a playful more personal story?
Addressing these ideas through the concepts of mobile aesthetics, user authenticity, personalization, humor, narrative, and serialization, David, Mark, and Mark explain how to optimize your video marketing for the vast mobile audience.
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.
In between scrum meetings, user stories and ever shortening sprints, have you penciled in load testing? How do you detect performance degradation and shorten time spent finding and fixing problems in production? Join us and learn how StormRunner can help you deliver high quality projects faster and make load testing a natural fit into your agile development. Your admission also secures you a live demo of the product.