BrightTALK webinars and videos

Webinars and videos

  • In a world where every page is page one, how do you know what your content is doing—or not doing—for your business and your customers? Where do you begin to assess content quality and effectiveness when your site’s users aren’t following your site map?

    In this webinar, hosted by Scott Abel, The Content Wrangler, content inventory and audit expert Paula Land introduces the content inventory and audit—two critical steps in gathering information about your current content and analyzing it against your goals in order to make informed, strategic decisions. She’ll talk about how to get started with a content inventory, how to identify audit criteria and assess content against it, and how to use the insights gained in a content analysis.

    Prize Drawing

    All registrants will be entered into a prize drawing. Ten lucky attendees will receive a free copy of "The Language of Content Strategy" by Scott Abel, Rahel Anne Bailie and 50 other content strategy professionals (including our presenter, Paula Land). And, each registrant will receive a special post-webinar offer to try out the Content Analysis Tool from Content Insight.

    About Paula Land

    Paula Land is the founder and principal consultant at Strategic Content, a Seattle-based content strategy agency and co-founder and CEO of Content Insight, developer of the Content Analysis Tool (CAT). Paula is also the author of The Content Inventory and Audit Handbook (Summer 2014, XML Press).

    Our Sponsor

    This webinar is sponsored by Author-it, the enterprise authoring platform. Learn more about Author-it Cloud on the web at: www.author-it.com

    The Recording

    The Content Wrangler webinars are recorded. A link to the recording will be made available to all who register for this event.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • This webinar will provide you with two complementary perspectives on Business Relationship Management that will help you achieve true romance rather than ending up in unrequited love!
    Based on recent and ongoing interest in Business Relationship Management, there can be no doubt that BRM is a hot topic. Organizations realize that a better relationship between business and IT will result in more business value from the IT provider’s products and services.
    But how do you achieve this from a provider’s perspective? What kind of knowledge, skills, behaviors and processes do you need? And because the relationship is by definition with the business, what do you expect from your partners on ‘the other side of the fence’? How can you help them to fulfil their side of the bargain?
    After listening to Aleksandr and Mark share their two perspectives, there’ll be ample opportunity for you to join in and contribute to the dialogue - you are most welcome!
  • This 40 minute webinar will focus on the practical laboratory techniques needed to create and validate genetically modified cell lines using CRISPR. A Sigma-Aldrich® technology expert will discuss guidelines and techniques utilized when performing genome editing experiments.
    Topics will include:
    •Transfection of CRISPR reagent into a cell line
    •How to validate the activity level of CRISPR
    •Clonal isolation
    •How to screen clonal populations based on desired modification
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • The development of new therapeutic agents is set to revolutionise treatment of hepatitis C. These new therapies represent a real transformation in care; offering fewer, milder side effects, a shorter treatment duration and dramatically improved success rates. However, they are expensive and there is a possibility that the virus could become resistant if adherence is sub-optimal. This raises fresh questions around medical funding and the types of support patients will need in order to get the best results from their treatments.

    For this 22 April webinar we bring together a panel of experts in hepatitis C to discuss this important topic, including a healthcare funder, a pharma medical director and an adherence researcher. They will discuss the most important issues and examine the opportunities these new treatments present patients and the wider healthcare community.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • This 40 minute webinar will focus on the practical laboratory techniques needed to create and validate genetically modified cell lines using CRISPR. A Sigma-Aldrich® technology expert will discuss guidelines and techniques utilized when performing genome editing experiments.
    Topics will include:
    •Transfection of CRISPR reagent into a cell line
    •How to validate the activity level of CRISPR
    •Clonal isolation
    •How to screen clonal populations based on desired modification
  • This briefing will assess potential for growth in regions such as US, Canada, the Middle East and Africa for nondestructive test (NDT) inspection services with an overview of key regional trends, and policies as well as competitive dynamics.

    Why you should attend:

    • Identify growth markets for the NDT industry
    • Learn about challenges these markets face in order to attain penetration
    • Understand potential opportunities for growth in these markets
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a global marketing organization. Without the ability to store, share, and monitor your campaigns and content on a common platform, marketers struggle with communicating across the silos of their company. The potential result of this disconnect can range from wasted content to inconsistent messaging.

    Join this webinar with Fathom, a top digital marketing agency, to learn how their marketing team works together with Box to save time, keep branding consistent, and increase efficiency.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • 1) Accelerated, error-free builds
    Agile development creates more frequent builds. A CD platform that optimizes and parallelizes large builds across hundreds, or even thousands of cores is good. A solution that automatically detects dependencies to eliminate broken builds is even better.
    2) Faster feedback
    You shouldn’t have to wait until builds or tests are 100% complete before receiving feedback. A CD platform that allows real-time drill-down into warnings and errors as they occur give helps eliminate wasted time and CPU cycles.
    3) Bulletproof and painless processes
    CD isn’t continuous if jobs in flight are lost when a CI server goes own; or when it takes days for QA machines to be provisioned; or when deployments fail because of differences between QA and production. A CD platform should automate and normalize the build, test and deploy process across ANY environment (public, private or hybrid) with 1-click simplicity.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.