Attend this webinar to hear the latest insights from Millward Brown’s Global AdReaction Study: Making Sense of the Multiscreen World. Learn about how consumers across Africa, Middle-East and Asia-Pacific are using their screens and what your brand should consider to reach your target audience. Multiscreening behaviors will be explored in detail, highlighting surprising differences across the region and unearthing marketing opportunities for forward-thinking brands wishing to embrace new behaviors and exploit new channels.
Dynamic forces such as cloud, mobile and social media are forcing IT leaders to change their approach to security. This raises an important question: how should you manage identity and access effectively while juggling business objectives of speed, cost effectiveness and positive customer experience?
With identity as the new perimeter, single sign-on can be the foundation of both managing risk and reaping the benefits of these new business strategies.
Please join Ken Ang, Security Solution Strategist for CA Technologies, to learn more about management of user identities throughout their lifecycle and access rights across multiple platforms, with a single, scalable and reliable solutions.
As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
In this session we'll cover:
The primary attack vectors you need to consider
Immediate actions you can take to limit the exposure of your XP assets
Warning signs to watch out for that could signal an attack
How to closely monitor your vulnerable assets with AlienVault USM
Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts. Updated every two hours, this robust security intelligence feed searches through hundreds of thousands of known malicious IPv4, IPv6, and DNS names and assigns a threat score of 1 to 100. Rated based on the analysis of the source, category, or threat, this score helps block traffic that poses a potential security risk. ING has had amazing success with HP TippingPoint RepDV:
- 2 million connections blocked in 15 months
- 75% decrease in total malware related incidents
- 0 false positives
ING will cover how deploying HP TippingPoint security intelligence helped simplify their network security strategy while increasing reliability and effectiveness.
A modern Hadoop-based data platform is a combination of multiple source projects brought together, tested, and integrated to create an enterprise-grade platform. In this session, we will review the Hadoop projects required in a Windows Hadoop platform and drill down into Hadoop integration and implementation with Windows, Microsoft Azure, and SQL Server.
In this 1-hour webcast, Cray customer Mississippi State University will share best practices in maximizing datacenter energy efficiency and explain why they chose the Cray® CS300-LC™ cluster solution based on Intel® Xeon® processors and Xeon Phi™ coprocessors. Topics will include architecture and facility considerations such as site selection, risk factors and issues impacting TCO. Attendees will learn about key benefits of the CS300-LC’s innovative design—which uses warm water heat exchangers instead of chillers to efficiently cool the system and maximize performance—as well as remote monitoring and cooling system management.
A Q&A session will be held following speaker presentations. Sign up today and join the conversation!
Join the webcast to learn about:
1. Key factors to consider when choosing a cluster architecture with liquid cooling
2. Achieving significant power savings, reliability and performance scalability with managed cooling control.
3. Optimizing power efficiency and system performance using Intel® Xeon® processors and Xeon Phi™ coprocessors
Cray is a global supercomputing leader with a comprehensive portfolio of compute, storage and Big Data analytics solutions. Cray’s expertise enables fast application results and real-time discovery in technical and scientific computing.
About Mississippi State University
The High Performance Computing Collaboratory at Mississippi State University is a coalition dedicated to advancing computational science and engineering using high performance computing. Mississippi State consistently ranks among the nation's fastest academic computing sites on the TOP500 list.
MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!
In this webinar, you will learn:
-What are the initial use cases that dictate MDM
-How to determine if you should use the same MDM instance or a different one when expanding your use case
-When to use on-premise versus cloud MDM
In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.
Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.
In this webinar, you will learn:
1. The challenges associated with deploying storage for VDI
2. How current solutions attempt to solve these problems
3. How to save money by supporting VDI and other application workloads on the same storage
Patrick and Mike discuss the importance of focusing on the complete security life-cycle: prevention, detection and response. They will also discuss the four essential pillars of incident response and how you can strengthen your security strategy across all endpoints, without getting buried in data.
Impact Sourcing burst onto the scene several years ago as a promising tool for economic development, job creation and to bring technology to a broader swath of the world’s societies. Over the last few years, we have seen several companies and non-profits enter this space, and to various extents provide proof of concept that rural communities in the developing world can provide sourcing services to major corporate and government clients. These firms select and train their employees, and secure work that has traditionally gone to large IT companies to manage call centers, provide online customer support, provide back office functionality and quality assurance testing, to name a few tasks. But while the concept has been proven, we have seen very few of these organizations to scale beyond their initial geographic area. This webinar will address challenges that Impact Sourcing is facing and discuss ideas on creating a scalable model – which can significantly make a social and economic impact.
Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.
A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:
How advanced targeted cyber attacks are different from traditional threats
How Big Data techniques can spot attacks when traditional defenses fall short
What you should be doing now to take advantage of Big Data Security Analytics
A/B testing is a method that allows you to determine changes to a website that will lead to increases in KPIs of interest. In this talk we go through good practices when implementing multiple A/B tests at the same time, methods of dealing with conflicting test results, and deciding for how long to run a test. We'll finish off making a point about the importance of A/B testing, by sharing a story of everything that can go wrong when you don't A/B test.
Les "Masterclass" sont une série de webinaires durant lesquels différents services de la plateforme AWS sont présentés sous un angle technique.
Durant cette session, nous parlerons d'Amazon Elastic Compute Cloud (Amazon EC2), un service utilisé par des centaines de milliers d'utilisateurs d'AWS, et fournissant bien plus que de la capacité de calcul.
Durant cette session nous survolerons rapidement les concepts de base d'Amazon EC2 pour nous concentrer sur des cas pratiques plus avancés, tels que l'automatisation des déploiements, la configuration, le contrôle des coûts, et les bonnes pratiques d'administration.
Thèmes abordés :
• Techniques d'exploitation d'Amazon EC2
• Fonctionnement des "Amazon Machine Images"
• Gestion du trafic réseau entre les instances avec Elastic IPs, Elastic Network Interfaces, Security Groups et Network Access Control Lists
• Métriques d'exploitation avec Amazon CloudWatch
• Principe de fonctionnement et cas d'utilisation des instances Spot
• Pour les développeurs
• Pour les architectes, et les administrateurs systèmes qui ont des connaissances de base sur AWS.
For many IT Service Organisations the selection of their ITSM toolset is one of the most important, and expensive, decisions they can make. Causing huge disruption and extra work as staff are moved from one system to another. The ITSM toolset is like the engine that drives an IT department and its ability to ensure work is prioritised, integrated and moved between support teams. It is utterly critical to the running of an IT department, but if its so important why do so many IT departments only keep a toolset for 3-5 years before moving to another one and starting the process again?
Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant, as he shares his experiences on what happens during an ‘out of the box’ toolset implementation program, along with his advice and guidance on avoiding typical pitfalls that many implementations could easily avoid.
Learn about the critical importance of People, Process and Product working in harmony to make sure that your toolset selection and implementation program delivers real business value quickly.
Learn why ‘Out of the box’ is a dangerous phrase, and there is no such thing in the real world. Peter will be join by Michael Jenkins, a veteran toolset implementer with over 20 such projects behind him as they discuss what happens in an ‘out of the box’ implementation.
They will discuss how to pick a toolset, the value of use cases, what happens on the vendor ‘demo day’ and what sort of actions you can be undertaking prior to the chosen vendor starting their implementation in order to speed up the process and make sure that your most expensive ITSM decision returns real value.
Savvy marketers spend a lot of their time analyzing big data, on the lookout for exciting new insights which can translate into action items and strategic advantage. Unfortunately, “giraffes” in their data – portions of data which dominate the rest of it – often hide important insights and lead to erroneous strategic decision making. In this webinar, we will discuss how to spot giraffes in your data and how to make sure they’re not misleading you.
Openstack has been gaining momentum in the IaaS space for some time now. It is a great example of Open Source collaboration and many contributors (more than 15,000!) coming together to make new technology.
Often, large vendors and the organisations that represent them are seen as incompatible with the Open Source model, particularly in the storage arena. Big Tin is not required.
In this presentation Glyn Bowden will show what SNIA can offer the Open Source community, the importance of standards and where SNIA are already contributing.
Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?
Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
Join this webinar as:
•You will learn the tactics used by attackers today to infiltrate businesses
•You will hear about the leading technologies available to disrupt advanced attacks
•You will walk away with the knowledge to assess your own environment, and optimize your security
Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.
Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
Questo è il primo episodio di una serie di webinar che illustreranno le diverse modalità in cui AWS viene utilizzato dai team di sviluppo agili. Tutti gli episodi faranno riferimento a una startup impegnata nell'apertura di una nuova area di business, illustrando i vantaggi offerti dall'utilizzo di AWS. La startup puo' essere una nuova realtà o un centro di innovazione all'interno di una azienda esistente, ad esempio per seguire il lancio di un nuovo prodotto.
In questo episodio vengono descritti i principali vantaggi di AWS per le startup e i team IT agili, soffermandosi su come il team abbia sviluppato rapidamente un prototipo funzionante utilizzando i diversi servizi offerti dalla piattaforma.
This webinar analyses the FCA’s first year from a broker’s perspective and reveals 5 key insights to keep you ahead of the game in 2014.
We will discuss:
· Remuneration: structuring of individual broker remuneration
· Distribution Relationships: risks posed by Coverholders and Appointed Representatives
· Sales: FCA Market Reviews including the sale of additional coverages
· Fines: Lessons learnt from the past 12 months
· Client Money: Are you compliant?
Many customers who want to deliver application releases quicker, find bugs earlier and eliminate testing infrastructure turn to Capgemini’s Test Environment Management (TEM) services, which leverages CA LISA® Service Virtualization. The TEM methodology incorporates automated regression testing and virtual test environments; enabling greater coverage of non-function tests. The resulting test environment expedites delivery of new application features to business users, reduces costs and ensures higher quality production systems.
Join CA Technologies & Capgemini on April 16, 2014 at 10:00 am ET to learn how these capabilities are delivered by Capgemini, the functionality of the CA Technologies tools that make it possible, and a customer’s experience with the Capgemini TEM - CA Technologies solution.
Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.
What You Will Learn
Why packet filtering and IPS aren’t the only performance metrics that matter
The performance impact of running multiple security services
How to select in-line security products that meet today’s multi-function security needs
Feedback and survey research is about asking the right questions of the right people at the right time. If we can master these three things then the likelihood of delivering action- oriented information to your “clients” (whether internal, like senior management, or external) increases significantly. However, impediments to good survey design are on every corner.
Join this webinar to learn more about:
** The Importance of Collecting Feedback
** The Worst Survey Crime
** How to Right the Wrongs