Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Red Hat Middleware goes mobile
    Red Hat Middleware goes mobile Red Hat Recorded: Feb 18 2018 9 mins
    With Red Hat it's easy to create mobile apps for the enterprise that integrate with back-office processes and systems! In this video we demonstrate a mobile app for insurance claims processing, built with Red Hat Mobile Application Platform and Red Hat JBoss BPM Suite.

    Learn more: www.redhat.com/en/technologies/mobile
  • Achieve the benefits of DevOps, containers, and the cloud for your Java apps
    Achieve the benefits of DevOps, containers, and the cloud for your Java apps Red Hat Recorded: Feb 18 2018 5 mins
    Everyone is trying to achieve high quality, fast deployment, and easy maintenance for their applications. Learn to get these benefits for your Java apps with DevOps-enabling technologies, containers, cloud platforms, and central management tools.

    Learn more: www.redhat.com/accelerate
  • Aviva Asia Modernizes its Business with Red Hat JBoss Middleware
    Aviva Asia Modernizes its Business with Red Hat JBoss Middleware Red Hat Recorded: Feb 18 2018 4 mins
    When insurer Aviva Group acquired Friends Provident International, it needed to replace aging proprietary systems that were expensive to maintain, and whose licenses were soon to expire. It chose a new solution based around Red Hat JBoss Middleware, which has reduced costs and improved response time for end users. Red Hat Consulting provided expert help, enabling Aviva to hit a tight six-month deadline.

    Learn more: https://www.redhat.com/en/success-stories
  • Building Mobile Apps on OpenShift Container Platform using Red Hat
    Building Mobile Apps on OpenShift Container Platform using Red Hat Red Hat Recorded: Feb 18 2018 16 mins
    This video provides a walkthrough of the Red Hat Mobile Application Platform running on OpenShift Container Platform, demonstrating how mobile applications can be built quickly and deployed to OpenShift. Red Hat Mobile Application Platform enables developers build enterprise-grade mobile apps that can run on devices but connect securely to enterprise applications and systems in the datacenter.
  • Pillar Wallet: The cryptowallet that will become your personal digital assistant
    Pillar Wallet: The cryptowallet that will become your personal digital assistant David Siegel & Pillar team Recorded: Feb 16 2018 64 mins
    Pillar Project will give a demo of their wallet as a work in progress. The Pillar wallet will be a simple, easy-to-use wallet that will let you store and work with cryptocurrencies and tokens. It will then transform into a combination of eBay and your personal digital assistant. The nonprofit foundation is committed to continuous delivery of wallets and features. This is our chance to show our community how it's going by giving our first real demo of a working wallet.
  • 3 New Use Cases for vRealize Operations
    3 New Use Cases for vRealize Operations Kyle Wassink & Rachel Foresta, Solutions Architects with Blue Medora Recorded: Feb 16 2018 54 mins
    If you own vRealize, but have yet to use it for full-stack dashboarding, rapid root cause analysis or hybrid cloud performance tuning, you're missing out. Watch experts from Blue Medora walk you through: How to unify on-and off-premises operations data within vRealize; Ways to create custom dashboards that give you a 360 view of your entire environment; and tips for using dashboards to pinpoint root causes up to 60% faster
  • Vuolearning eLearning platform demo
    Vuolearning eLearning platform demo Stephen Sutton Recorded: Feb 16 2018 63 mins
    In this webinar VuoLearning will introduce how you can transform your learning content from Powerpoints into interactive eLearning products. Come and check out the opportunity. eLearning course generation has never been easier!

    Speaker: Stephen Sutton

    Stephen Sutton is an experienced Customer Trainer with a demonstrated history of working in the telecommunications industry. He is a strong human resources professional skilled in Service Delivery, 3G, Training Presentations, Requirements Analysis, and ITIL.
  • Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä
    Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä Eetu Niemi Recorded: Feb 16 2018 48 mins
    Digitalisaatio ja tietosuojavaatimuksiin (esim. GDPR) vastaaminen ei onnistu ilman hyvin toimivaa käyttäjä- ja pääsynhallintaa (Identity and Access Management, IAM). Se on kuitenkin laaja kokonaisuus, joka vieläpä liittyy organisaatioissa ”kaikkeen”. Siksi käyttäjä- ja pääsynhallinnan kehittäminen on tehtävä harkitusti ja vaatii kokonaisnäkemyksen kehitettävästä IAM-ratkaisusta.

    Tässä webinaarissa opit

    · mistä käyttäjä- ja pääsynhallinnassa on kysymys

    · mitkä ovat käyttäjä- ja pääsynhallinnan hyödyt

    · mistä komponenteista käyttäjä- ja pääsynhallintaratkaisu käytännössä koostuu

    · miten käyttäjä- ja pääsynhallinnan kehittämisessä kannattaa edetä

    Puhuja: Eetu Niemi

    Eetu on arkkitehtuurin monitoimimies, joka on tehnyt erityisen paljon töitä käyttäjä- ja pääsynhallinnan sekä kokonaisarkkitehtuurin parissa. Käyttäjä- ja pääsynhallinnan ratkaisuja hän on suunnitellut ja toteuttanut useilla toimialoilla. Hänellä on kokemusta niin arkkitehtuurisuunnittelusta ja määrittelystä kuin myös teknisestä suunnittelusta ja tuotteiden konfiguroinnista. Eetu toimii arkkitehtuurin sekä käyttäjä- ja pääsynhallinnan konsulttina Coalassa.
  • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
    Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
    Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

    Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

    About the Speaker:
    Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
    Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
  • Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity
    Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity Rob Anderson, Director of Product Marketing, NetFoundry Recorded: Feb 15 2018 16 mins
    Join Rob Anderson, Director of Product Marketing at NetFoundry, as he reviews how hybrid device, site, and cloud networking will evolve to meet digital transformation needs.

    Learn how to make your networks as agile as the applications they need to support in your data center.

    About the presenter:
    Rob is Director of Marketing at NetFoundry. NetFoundry believes in enabling edge innovation. NetFoundry frees individuals, apps, groups, and businesses from traditional network, telco, and hardware constraints, enabling applications and business policies to control underlying networks, with security, compliance, reliability, & performance.

    Prior to NetFoundry, Rob's roles included Director of Global Marketing & Product Management at Modern Systems, along with various management and product development roles in the telecommunications industry. Rob graduated from Clemson University in 2003, holds a Project Management Professional (PMP) certification from the Project Management Institute, and a New Product Development Professional (NPDP) certification from the Product Development and Management Association.
  • The Road to Simplicity: Converging Primary and Secondary Storage
    The Road to Simplicity: Converging Primary and Secondary Storage Jacob Cherian, VP of Product Strategy, Reduxio, Mike Grandinetti, CMO, Reduxio, Keith Worthington, IT Manager, LineMaster, Recorded: Feb 15 2018 45 mins
    In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.

    IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.

    Join this session to learn about:

    - The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
    - The current challenges of copy data management and how to address them
    - A dive into a TCO study depicting the savings achieved through this architectural change
    - Why snapshots are obsolete and you to achieve near-instant data recovery
    - A look into additional use cases of copy data for DevOps team

    The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.

    Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
  • How API Adoption Boosts Profits
    How API Adoption Boosts Profits Marshall Van Alstyne, MIT fellow & Boston University professor; David Berlind, Editor-in-Chief of ProgrammableWeb Recorded: Feb 15 2018 60 mins
    The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.

    In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.

    Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:

    - Why enterprises need APIs and API strategy models
    - The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
    - About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
  • The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned
    The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: Feb 15 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Hyperledger: Market, Technology & Community Update
    Hyperledger: Market, Technology & Community Update Cloud Standards Customer Council Recorded: Feb 15 2018 54 mins
    Speakers:
    Dan O’Prey, Chair of Hyperledger Marketing Committee and CMO at Digital Asset
    Tracy Kuhrt, Community Architect, Hyperledger

    Hyperledger is an umbrella open source project started in December 2015 by the Linux Foundation to support the collaborative development of blockchain-based distributed ledgers across industries. A blockchain is a continuously growing list of records, called blocks, that are linked and secured using cryptography. Transactions between two parties are recorded efficiently and in a verifiable and permanent way.

    In this webinar, Dan O’Prey and Tracy Kuhrt will present an update on the blockchain market, industry trends, and new Hyperledger projects. They will discuss the technical items delivered over the last 6 months and focus areas for Hyperledger in 2018.
  • Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center
    Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center David Powell, GM of Service Provider Business, LogicMonitor Recorded: Feb 15 2018 37 mins
    Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:

    - The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
    - Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
    - Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
    - Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.

    How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
  • Accounting for the Endpoint in Your GDPR Strategy
    Accounting for the Endpoint in Your GDPR Strategy Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42 Recorded: Feb 15 2018 45 mins
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • Big data scaling with syslog-ng
    Big data scaling with syslog-ng Istvan Molnar, Peter Soproni Recorded: Feb 15 2018 54 mins
    Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
  • In Memory Parallel Processing for Big Data Scenarios
    In Memory Parallel Processing for Big Data Scenarios Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Recorded: Feb 15 2018 48 mins
    Denodo Platform offers one of the most sought after data fabric capabilities through data discovery, preparation, curation and integration across the broadest range of data sources. As data volume and variety grows exponentially, Denodo Platform 7.0 will offer in-memory massive parallel processing (MPP) capability for the most advanced query optimization in the market.

    Attend this session to learn:
    * How Denodo Platform 7.0’s native built-in integration with MPP systems will provide query acceleration and MPP caching
    * How to successfully approach highly complex big data scenarios, leveraging inexpensive MPP solutions
    * With the MPP capability in place, how data driven insights can be generated in real-time with Denodo Platform

    Agenda:
    * Challenges with traditional architectures
    Denodo Platform MPP capabilities and applications
    * Product demonstration
    * Q&A
  • 5 Habits of High-Velocity Teams Using Kubernetes
    5 Habits of High-Velocity Teams Using Kubernetes William Denniss, Product Manager, Google Cloud and Dan Garfield, Full-Stack Engineer, Codefresh Recorded: Feb 15 2018 63 mins
    Connecting all the pieces to make zero downtime continuous delivery happen at scale is a challenge. Join this webcast to see real teams bring all the components together to make high-velocity deployment to Kubernetes scale. Get a hands-on view of the critical steps that go into making container management a scalable process that not only allows teams to delivery faster but with more confidence in the final result.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • How to Implement Trusted Platforms and EcoSystems
    How to Implement Trusted Platforms and EcoSystems Phil Tricca, Intel, and Lee Wilson, OnBoard Security Recorded: Feb 15 2018 56 mins
    Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, and Philip Tricca, Intel Corporation, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

    Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

    Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security's TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security's post-quantum cryptography (NTRU and pqNTRUsign).

    Prior to joining OnBoard Security, Lee had a 35 year career with IBM. He currently chairs the Trusted Software Stack and Virtualized Platform Work Groups for Trusted Computing Group. Lee earned his BSEE work at Northwestern University and his MSEE work at Syracuse University and has been awarded TCG’s Key Contributor Award.

    Tricca is a software architect and engineer working in Intel’s platform security division. His career began with a 7-year stint in a U.S. Air Force research lab working with open source Linux security technology including mandatory access control systems like SELinux and measured boot using the TPM 1.2 devices. Most recently Philip has found his way to Intel where his current responsibilities include transforming Intel’s open source implementation of the TPM2 Software Stack (TSS2) from proof of concept to a vibrant and sustainable OSS project.
  • Discover the SIEMple Life with a Managed SOC
    Discover the SIEMple Life with a Managed SOC Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: Feb 15 2018 59 mins
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • LIVE demo - Safely Enable SaaS Applications with Aperture
    LIVE demo - Safely Enable SaaS Applications with Aperture Omar Amarin, Systems Engineer Feb 19 2018 2:00 pm UTC 45 mins
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • WIZZLE ICO WEBINAR
    WIZZLE ICO WEBINAR Mark Noorlander Feb 19 2018 2:00 pm UTC 75 mins
    Live webinar with Mark Noorlander, WIZZLE CEO.
    He will explain:
    - What WIZZLE is and what it stands for
    - How to join the WIZZLE ICO and why you should consider it
    - All the answers to our most frequently asked questions
    - And live Q&A
  • Insights from Veteran Cryptocurrency Traders
    Insights from Veteran Cryptocurrency Traders Travin Keith, Managing Director at Agavon, and Administrator at BitcoinMarkets Feb 19 2018 5:00 pm UTC 60 mins
    After entering the cryptocurrency space and learning the bare basics of trading, many users remain lost on how to get better and what mistakes they are making.

    In this BrightTALK webinar, Travin Keith, Managing Director at Agavon and Administrator at BitcoinMarkets, leads a panel discussion with veteran traders with years in the crypto space as well as experience in stocks and foreign exchange about the common mistakes new traders make as well as tips on what to do to get better.

    Various trading scenarios will also be brought up and panelists will explain what they would do and why they would do it.
  • Using the Pure Portal to make research more visible: Tomsk Polytechnic U, Russia
    Using the Pure Portal to make research more visible: Tomsk Polytechnic U, Russia Dr. Yulia Falkovich, Tomsk Polytechnic University Research Intelligence and Publications Department, Head Feb 20 2018 6:30 am UTC 45 mins
    The global scientific community benefits from having a diverse range of perspectives. As such, Russia is working to make its research more visible. In the same way, science in Russia benefits from a diverse range of global collaborators. The willingness of Russian universities to expand these collaborations and foster the excellence of Russian research is supported by the Russian Ministry of Education and Science. Tomsk Polytechnic University (TPU) is among such universities.

    The aim of this webinar to showcase how TPU uses Pure to make university’s research more globally visible and what the impact of the TPU Portal has been.

    In this session, Dr. Falkovich will cover:
    1)Why TPU research management counts on PURE as it’s research information management system
    2)How has international visibility for TPU research improved since the TPU Pure Portal was launched in September 2015 The statistics of Portal visibility as well as case studies of collaborations started with the help of Pure.

    This webinar will be helpful for the universities of Western Europe and the BRICS countries (Brazil, Russia, India, China and South Africa) that have the same challenges and a similar economic and historical background.
  • Need to judge your product? Use HPTLC to get insights into sample composition
    Need to judge your product? Use HPTLC to get insights into sample composition Melanie Broszat, PhD CAMAG, Muttenz, Switzerland & Michaela Oberle Merck KGaA, Darmstadt, Germany Feb 20 2018 8:00 am UTC 75 mins
    Thin-Layer Chromatography has been a well-known method for analysis of botanicals and other complex samples since the end of the 1930s. Today’s modern thin-layer chromatography combines the advantage of analytical robustness and high sample throughput with the possibility to use all kind of specific detection methods, e.g. classical UV/Vis/Fluorescence detection, mass spectrometry or effect-directed analysis. This method increases the amount of information for a fast and efficient screening for new compounds and the identification of raw materials especially for samples with a high matrix load such as herbal drugs, cosmetic and food samples.
    HPTLC, the most advanced form of Thin-Layer Chromatography, is a powerful yet simple and cost effective tool for testing identity, purity, and strength (content) of botanicals as well as excluding adulteration during quality control. With the publication of general chapters by the United States Pharmacopoeia (USP ) and European Pharmacopoeia (Ph.Eur. 2.8.25) HPTLC has officially come into existence as a highly standardized and therefore reproducible analytical technique. The use of high performance plates, suitable instrument and software, a standardized methodology, and validated methods ensures reliable results that are fully compliant with current Good Manufacturing Practice (cGMP). HPTLC fingerprints allow convenient visual comparison of multiple samples even if those originate from different plates (and different laboratories worldwide). Reference images (HPTLC fingerprints of botanical reference materials or other references) can be used to qualify data and pass/fail samples based on similarity or difference.
    We will give you an overview about the versatility of HPTLC, applicable to many of your analytical tasks. Don’t miss the chance to extend your knowledge!
  • Jupiter Asset Management: James Clunie - February 2018
    Jupiter Asset Management: James Clunie - February 2018 James Clunie Feb 20 2018 8:30 am UTC 60 mins
    James Clunie, Head of Strategy, Absolute Return, provides his latest global update.

    James joined Jupiter in 2013.

    Before joining Jupiter, James worked at Scottish Widows Investment Partnership as an Investment Director of equities, and managed a long/short equity fund and UK long-only funds.

    James was a senior lecturer in finance at the University of Edinburgh between 2003 and 2007, prior to which he worked as Head of Global Equities at Aberdeen Asset Management and Director and Head of Asset Allocation at Murray Johnstone International.

    James gained a degree and PhD from Edinburgh University and is a CFA® charterholder.
  • Comment protéger vos données contre les attaques de type Ransomware ?
    Comment protéger vos données contre les attaques de type Ransomware ? Mourad DELHOUM System Engineer Dell EMC DPS, couvrant l’Afrique du Nord et l’Afrique de l’ouest Feb 20 2018 9:30 am UTC 60 mins
    Découvrez comment protéger les ressources les plus précieuses de votre entreprise, vos données, avec les solutions de protection des données Dell EMC. Confortablement installé dans votre bureau ou à la maison, rejoignez vos collègues et experts pour participer à ce webinaire sur la protection des données et découvrir comment Dell EMC, Numéro 1 dans ce domaine, vous aide à protéger vos données contre les attaques de type Ransomware et construire votre dernière ligne de défense.
  • How to recognise malicious DNS with free network monitoring tools
    How to recognise malicious DNS with free network monitoring tools Randy Franklin Smith | UWS, Rob McGovern | LogRhythm, Erika Noerenberg | LogRhythm Feb 20 2018 10:00 am UTC 90 mins
    DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that you might even forget it exists—until it is used against you.

    Hackers are using DNS to find command and control (C2) servers, control compromised systems, and exfiltrate your data.

    In this webinar, a group of security experts from LogRhythm and Ultimate Windows Security team up to show you how to spot threatening DNS activity with LogRhythm NetMon Freemium.

    You’ll learn about the malicious use of DNS and how to detect:

    - Domain-generation-algorithm (DGA) queries
    - C2 data tunneled through DNS
    - Data exfiltration via tunneled DNS

    Register now to learn how to stop hackers from exploiting DNS to infiltrate your network.
  • What is your Land Value, Thessaloniki? A Real (estate) Data Visualization Story
    What is your Land Value, Thessaloniki? A Real (estate) Data Visualization Story Charalampos Xanthopoulakis, Data Visualizations Architect Feb 20 2018 11:00 am UTC 45 mins
    Selling your house in the financial crisis-stricken Greece is up to this day a great ordeal. When faced with such a challenge, I was baffled by the sparsity of conclusive data on land value at my birthplace city, Thessaloniki. Embarking on a personal mission and collecting and processing more than 10K online housing ads together with open data, I managed to render an insightful interactive visualization of the actual real estate values on borough and city block level that was published through the Greek media. Join me on this thought process journey to find out how to

    o Gather vast online data with simple scripting

    o Combine your data with open data into meaningful structures

    o Create interactive data visualizations that have an actual impact @ infographeo.com

    This will be an interactive session, so please feel free to bring your thoughts and questions to share during the session.
  • Go Green: Create Paperless Processes with DocuSign
    Go Green: Create Paperless Processes with DocuSign Emily Shed, Account Executive, DocuSign Feb 20 2018 11:00 am UTC 30 mins
    Do you know how much paper is costing your business? If you’ve tried DocuSign's Paperless Savings Calculator, you’ll know that using eSignatures can save you more than £27 per document.

    What you may not know, is that they can help you to eliminate re-work and manage compliance. The speed and convenience of eSignatures also mean greater productivity for employees and faster turnaround on documents. In fact, DocuSign customers experience an average reduction in turnaround time of 13.5 days. A paperless office saves, and with DocuSign, making the switch is simple.

    Watch this webinar to:

    - See how much money, time and natural resources your business can save with eSignatures
    - Discover how going paperless can increase customer satisfaction and improve your competitive edge
    - Hear digital customer success stories and best practices
  • 3 Tips for Selling to the Senior level Execs
    3 Tips for Selling to the Senior level Execs Tim Robertson Feb 20 2018 11:00 am UTC 60 mins
    Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
  • Remind me WHAT This GDPR Thing is all About Again?
    Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Feb 20 2018 11:00 am UTC 45 mins
    Are you Prepared, Blissfully Unaware or in Full Panic Mode?

    It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

    This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
  • 2018 Phishing Trends: New year. New threats. Same dark intentions.
    2018 Phishing Trends: New year. New threats. Same dark intentions. Adrian Davis, Managing Director (ISC)² EMEA, Mollie Holleman, Senior Intelligence Specialist, Phishme Feb 20 2018 12:00 pm UTC 60 mins
    Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.

    Some of the trends we’ll discuss:
    •The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
    •The emergence of new ransomware families
    •The abuse of legitimate functions built into business-critical software platforms to deliver malware
    •The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
    •New ways cyber-criminals are obtaining cryptocurrency

    Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
  • How to 5 x your Sales Pipeline with LinkedIn in 2018
    How to 5 x your Sales Pipeline with LinkedIn in 2018 Rod Sloane Feb 20 2018 1:00 pm UTC 45 mins
    Rod Sloane shares the best practices to leverage your profile and content to achieve success in 2018 on Linkedin.
  • Kaspersky Lab workshop: where next for businesses facing complex threats?
    Kaspersky Lab workshop: where next for businesses facing complex threats? Kaspersky Lab and guests Feb 20 2018 1:35 pm UTC 120 mins
    Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.

    David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.

    An expert panel, including Thom Langford, CISO, Publicis Groupe; Gareth Wharton, cyber CEO, Hiscox Insurance; Mike Buck, Head of Delivery, BJSS; Adam Maskatiya, General Manager UK and Ireland, Kaspersky Lab; and Dan Raywood, Contributing Editor, Infosecurity Magazine will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.

    Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.
  • A Look at IoT in Europe in 2018: Accelerating Data Driven Innovation
    A Look at IoT in Europe in 2018: Accelerating Data Driven Innovation Marta Munoz, Andrea Siviero Feb 20 2018 2:00 pm UTC 60 mins
    The impact of IoT in current societies and organizations is now very much a reality as more and more examples of IoT ecosystems emerge and implementations take place across different industries.
    After the initial hype and an explosion of a myriad of use cases across industries, IoT is now experiencing a new maturity phase with early adopters now focusing on cross-sector integration and a deeper data value exploitation. Only when IoT is able to generate real data monetization, will it reach its ultimate goal and unlock its full potential. Understanding and anticipating IoT market trends will be key for fast-moving companies eager to truly make IoT work for their organization!
    This complimentary webcast will explore the main European IoT trends across technology areas and industries, highlighting market opportunities, key themes for 2018 and European successful real-life examples. This also leveraging the recent IDC EMEA IoT Survey results, that provides a fresh look at the European IoT end-users perception.
  • European Sustainable Investment Policy: Series 2/3 GREEN BANKING INCENTIVES
    European Sustainable Investment Policy: Series 2/3 GREEN BANKING INCENTIVES Responsible Investor Feb 20 2018 2:00 pm UTC 60 mins
    European Sustainable Investment Policy

    • The EU High-Level Expert Group on Sustainable Finance (HLEG)
    • The European Commission’s policy objectives

    Responsible Investor is proud to present a series of three webinars focused on European sustainable investment policy in the context of the High-Level Expert Group on Sustainable Finance (HLEG) and the stated objectives of EU Vice-President Valdis Dombrovskis.

    This is a crucial time for EU policy on ESG. But how will it affect you… and your clients?

    With Europe looking at investment mandates, sustainability definitions and green financing incentives, ‘the HLEG-effect’ will be far-reaching.

    The series will feature senior figures from the EU, leading market participants and expert analysts.

    European Sustainable Investment Policy: Series 2/3 GREEN BANKING INCENTIVES

    The most controversial idea that has been floated is for banks to get lower capital charges if they invest in green projects and companies. This throws up a lot of questions, not least the role of securitisation and the broader implications for responsible investment.

    Speakers:
    Raymond Frenken, Head of Communications & CSR, European Banking Federation
    Sini Matikainen, Policy Analyst at the Grantham Research Institute, London School of Economics
    Alberto Postigo, Senior Credit Officer, Moody’s Investor Service
    Marie Louise Andersen, Policy Advisor, the European Mortgage Federation-European Covered Bond Council

    Moderator: Sophie Robinson-Tillett, Deputy Editor, Responsible Investor
  • Need to judge your product? Use HPTLC to get insights into sample composition-S2
    Need to judge your product? Use HPTLC to get insights into sample composition-S2 Melanie Broszat, PhD CAMAG, Muttenz, Switzerland & Michaela Oberle Merck KGaA, Darmstadt, Germany Feb 20 2018 3:00 pm UTC 75 mins
    Thin-Layer Chromatography has been a well-known method for analysis of botanicals and other complex samples since the end of the 1930s. Today’s modern thin-layer chromatography combines the advantage of analytical robustness and high sample throughput with the possibility to use all kind of specific detection methods, e.g. classical UV/Vis/Fluorescence detection, mass spectrometry or effect-directed analysis. This method increases the amount of information for a fast and efficient screening for new compounds and the identification of raw materials especially for samples with a high matrix load such as herbal drugs, cosmetic and food samples.
    HPTLC, the most advanced form of Thin-Layer Chromatography, is a powerful yet simple and cost effective tool for testing identity, purity, and strength (content) of botanicals as well as excluding adulteration during quality control. With the publication of general chapters by the United States Pharmacopoeia (USP ) and European Pharmacopoeia (Ph.Eur. 2.8.25) HPTLC has officially come into existence as a highly standardized and therefore reproducible analytical technique. The use of high performance plates, suitable instrument and software, a standardized methodology, and validated methods ensures reliable results that are fully compliant with current Good Manufacturing Practice (cGMP). HPTLC fingerprints allow convenient visual comparison of multiple samples even if those originate from different plates (and different laboratories worldwide). Reference images (HPTLC fingerprints of botanical reference materials or other references) can be used to qualify data and pass/fail samples based on similarity or difference.
    We will give you an overview about the versatility of HPTLC, applicable to many of your analytical tasks. Don’t miss the chance to extend your knowledge!
  • 5G Networks: How to Prepare & What it Means for the Mobile Network Industry
    5G Networks: How to Prepare & What it Means for the Mobile Network Industry Ahmed Banafa, Lindsay Notwell, Upkar Dhaliwal & Mansoor Hanif Feb 20 2018 3:00 pm UTC 60 mins
    The advent of 5G mobile network technology is upon us, and implementation is quickly approaching.

    For mobile network providers, vendors and enterprises, achieving a 5G version will require new technology innovations for scalability, efficiency and security. For consumers, it means a whole new wave of digital customer experience.

    These next-generation networks will no doubt be in high demand for improving latency and bandwidth, but with more people connected than ever before, what are the potential security implications or concerns for both the enterprise and the consumer?

    Join this expert panel moderated by Ahmed Banafa, Faculty member at SJSU & IoT Expert. He will be joined by expert panelists Lindsay Notwell, VP of 5G Strategy, Cradlepoint, Upkar Dhaliwal, System Architect, Future Wireless Technologies, and Mansoor Hanif, Director of Converged Networks and Innovation, BT.
  • Transformation from Legacy to Software Defined Networking
    Transformation from Legacy to Software Defined Networking Henrik Johansson, VP SDN & Data Center, PacketFront Software Feb 20 2018 3:00 pm UTC 45 mins
    "Every service provider today has investment heavily in physical networking equipment. All their customers are all connected over the legacy network in one way or another. In order to maximize the ROI, there must be a simple and quick way to orchestrate new services using new network functions virtualizations (NFV) technology on top of the old network.

    This live demonstration will showcase how this can be done, using the service orchestration, automation and activation capabilities of PacketFront Software’s BECS platform integrated towards an open source platform consisting of OPNFV, OpenDaylight and OpenStack."
  • Tomorrow’s platform today: The integration of everything
    Tomorrow’s platform today: The integration of everything Danesh Hussain Zaki, Lead Architect, Wipro Limited; Gourisankar Mukherjee, Practice Manager, Wipro Limited Feb 20 2018 3:30 pm UTC 60 mins
    A smart, hybrid and elastic platform for integration of everything, from businesses and applications to Cloud and Things. Such a platform will be built on a Cloud-first , API-first and Microservices based architecture to ensure digital readiness.
  • You've Got Your GDPR Policy, Now What?
    You've Got Your GDPR Policy, Now What? Tom Mighell, Esq., VP of Delivery Services, Contoural Feb 20 2018 4:00 pm UTC 60 mins
    In many ways, having your Data Protection Policy in place is not necessarily the last mile, but the first. In order to be fully GDPR-compliant, you need to understand where all of your information is, where your privacy data lives and how it’s being secured.

    Join Tom Mighell, VP of Delivery Services at Contoural as he discusses the roadmap you need to follow to achieve full compliance before the May 25th deadline.

    Topics will include:
    • Strategies to execute your policy
    • How to train everyone in your organization to be aware of privacy requirements
    • Appointing a Data Protection Officer to manage your privacy program for your organization
    • Steps your organization needs to take now to be ready