Wiley is pleased to present an AGU Author Webinar.
If you’re looking to publish with the American Geophysical Union, this webinar will help you on your way. Over the course of 60 minutes, AGU editorial experts will cover:
•The benefits of publishing with the AGU
•A roadmap to successful AGU journal submission
•Navigating the AGU peer review process
•AGU’s guide to publication ethics
•Plus your chance to ask questions
Register today to hear from:
Mary-Elena Carr, Editor, Global Biogeochemical Cycles
Brooks Hanson, Director of Publications, American Geophysical Union
Robert Pincus, Editor in Chief, Journal of Advances in Modeling Earth Systems
Alan Robock, Editor, Reviews of Geophysics
Na het bijwonen van dit webinar weet u hoe u een mobiele IT-omgeving kunt implementeren die door het dynamisch aanpassen van de security instellingen overal voldoet aan de geldende regelgeving. Medewerkers zijn op deze manier altijd en overal productief en in staat de juiste dienstverlening te verlenen. Zo kunnen medewerkers van een financiele instelling niet alleen op iedere werkplek binnen kantoor, maar ook bij klanten thuis volgens het beleid van hun organisatie werken. Medewerkers in een ziekenhuis zijn in staat om op hun eigen werkplek, als ook bij de patient aan het bed in hun eigen vertrouwde omgeving te werken, zonder dat de privacy van gegevens in gevaar komt. En ook thuiswerken kan op deze manier mogelijk worden gemaakt binnen ieder bedrijf dat waarde hecht aan flexibel werken voor hun medewerkers, zonder de beveiliging uit het oog te verliezen.
Factor investing has been successfully applied to equity markets. It can also work in the corporate bond market and can generate substantial premiums.
Pension funds, insurance companies and sovereign wealth funds increasingly apply factor investing to equities in their portfolios. And now they would also like to apply this concept to credits. “These investors believe that factor investing can give long-term outperformance in equities and have started to wonder why they should stop there,” says portfolio manager and researcher Patrick Houweling of Robeco Global Multi-Factor Credits.
The concept of factor investing in credits is similar to equities, explains Houweling. “It is a disciplined way of constructing portfolios where we apply rules to identify which companies or bonds score well on specific metrics. All decisions are based on research: both academic and our own proprietary research.”
Медленное выделение ресурсов для VDI? Проблема решена. Шквал пользовательских загрузок, высокая задержка и проблемы с развертыванием? От этих трудностей вы тоже избавитесь. Переход с физических рабочих мест на виртуальные повысит удобство и эффективность работы пользователей. Виртуализация серверов? Отсутствие сбоев позволит обеспечить соответствие соглашениям об уровне обслуживания для приложений с высокими требованиями к вводу-выводу, например баз данных. Больше никаких неполадок СХД и сбоев кэширования. Вместо этого вы получите максимальную производительность операций ввода-вывода, широкие возможности интеграции со средствами виртуализации, высокую доступность и самую эффективную в отрасли полезную емкость.
Featuring Ben Person, Manager, ServiceNow Delivery, Dell Services, this video provides an overview of how the combined capabilities of Dell IT service management and ServiceNow helps you easily align IT with your business objectives. Learn how Dell Services can help ensure seamless service, proactive and responsive interaction and quality delivery.
Featuring Paola Arbour, Vice President, Services IT, Dell Services, this video provides an insight into the Service Integration and Management (SIAM) function. It helps understand how you can benefit from the flexibility and innovation of multisourcing and standard services, while delivering integrated services to the business.
How good are your current test cases? How much coverage do they provide, and how do you know? And do your testers have the data they need, when they need it?
In this webcast, we will discuss ways to:
•create the optimum set of test cases, by importing requirements and existing tests from HP ALM, turning them into crystal clear requirements using visual flow charts and related tools
•find or synthetically create the right test data, linking them with expected results and directly to each test cases
•automate test execution where tests are automatically updated each time the requirements change, so you can eliminate testing bottlenecks.
Learn how you can optimize your HP ALM investment - with the smallest test cases for maximum coverage, and with the right test data - to get you on your way to a faster, better delivery of high quality applications to market.
Data preparation is occasionally referred to as data plumbing, suggesting that it is dirty grunge work that is an unglamorous necessity. We will see how this point of view misses entirely the discovery potential, value, and “thrill of the chase” that data preparation can offer. Data prep includes the all important first step in any analytics project: “Know Thy Data” (which is one of the fundamental principles of data science). We discuss data profiling, data transformations and normalization, feature selection and engineering, and more data prep approaches that empower you to begin learning from your data right out of the “starting gate” on your analytics project. Learning from Data (i.e., data science) doesn’t begin after data prep, but right from the start.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
Ever wondered what deep learning is, or how its techniques are being applied to natural language processing?
Curious about what dog training and natural language processing have in common?
If the answer is yes to either of these questions, you’ll want to watch this on-demand webinar and learn more about the work SAS and North Carolina State University are doing in this important arena.
Meet the Speakers
Dr. James C. Lester is a Distinguished Professor of Computer Science and Director of the Center for Educational Informatics at NC State University. His research in artificial intelligence ranges from intelligent tutoring systems and affective computing to computational models of narrative and natural language processing. He is a member of the Academy of Outstanding Teachers at NC State University and a Fellow of the Association for the Advancement of Artificial Intelligence (AAAI).
Dr. James A. Cox is the Director of Text Analytics at SAS. He has been the development manager for SAS® Text Miner ever since its inception 12 years ago. Before that, he was one of the initial developers for SAS® Enterprise Miner™. Cox holds a PhD in cognitive psychology and computer science from UNC-Chapel Hill and has published a number of scholarly papers in the areas of psycholinguistics, categorization and variable selection.
We are pleased to introduce Aperture, a unique approach to securing sanctioned SaaS applications.
Join us for a webinar where you’ll learn how Aperture’s detailed analysis and analytics on SaaS usage prevents data risk and compliance violations — and is helping companies, like yours, gain better control of their SaaS applications.
Aperture also delivers:
●True visibility into SaaS usage
●Granular control of SaaS access
●Data exposure control
●Threat protection extension
●Minimal impact to users and networks
Migration to 802.11ac is about using optimal design techniques and network validation that achieve maximum performance and ROI. Join Devin in this live webinar to get best practices for the migration of your enterprise Wi-Fi network as he focuses on the following:
•Details about channels widths that you didn’t know that you needed to know
•The entire process of design, deployment, validation and remediation – in context
•A detailed understanding of co-channel interference (CCI) and its effects on enterprise Wi-Fi networks
Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
Join the Informatica Cloud product team on Oct 8th, 2015 to find out what's new in the Fall Release of the Informatica Cloud and explore all the key capabilities.
During the webinar, you will also have the opportunity to see the new Informatica Cloud platform in action and ask any questions that you may have.
The Fall 2015 release of the Informatica Cloud is packed with many rich functionalities, including:
•Automated discovery and parsing of log files to enable cloud analytics on your machine generated data
•Enhanced Cloud Mapping Designer with new interactive configuration tool and fixed-width file support
•Highly scalable Cloud Runtime Environment for cloud to cloud integrations
•Informatica Cloud Platform Rest API improvements with fine-grained permission for objects and create or update a connection capability using parameters
•New enhancements to the Informatica Cloud Real Time in the areas of Service Connector, Process Designer & Guides
•Robust Subset Engine for Data Masking transformations with the ability to support complex data models and automatic data chunking for Salesforce to allow horizontal partitioning on large data sets
•Improved connector capabilities for Amazon S3, NetSuite, Salesforce and SAP. New integrations for Microsoft Azure, Box, Concur and others.
In this session, we’ll be joined by representatives from Hewlett-Packard (HP), IKEA, and Owens Corning to discuss their organizations’ commitment to renewable and clean energy technologies. They’ll discuss how these technologies are helping them to improve their overall energy and sustainability programs, and how they achieved internal buy-in to pursue these alternative energy programs. Join us on Oct 8 at 2pm EDT.
Since 1999, Oracle has included a Java Virtual Machine (JVM) within the database. That makes it old enough to drive and well past time to get a real job. In today’s data-obsessed world, that job is fortifying Oracle’s database with a healthy dose of analytics to give your database the power to handle the data challenges of the 21st century.
There are numerous advantages to adopting a 100% Java code base for in-database analytics. Security is doubly enhanced by performing all analytics in the database. The code is highly portable as the identical java classes that run in the database will run on any client with any operating system. Plus the modern paradigm of taking the algorithms to the data is elegantly achieved with minimal effort.
Until now, a single Java solution with all these qualities wasn’t available. By using JMSL Numerical Libraries, you get a suite of algorithms with routines for predictive analytics, data mining, regression, forecasting, and data cleaning. JMSL is scalable and can be used in Hadoop MapReduce applications. Now, JMSL Numerical Libraries makes Java in the database more than useful -- it makes it unbeatable.
This webinar walks through the argument of why embedded analytics is better and provides examples using an Oracle database and JMSL. And if you’re not convinced, tell us so in the live, interactive Q&A!
In this webinar with CenturyLink, discover 5 steps to take today to move toward a secure, fast and flexible hybrid cloud environment. Best practices and use cases are discussed, along with tips and critical questions you should ask your provider before getting started. We will also offer insight around things to avoid and share common, real-world issues that IT managers face when starting their hybrid cloud journey.
This webinar is the third in NetApp’s Hybrid Cloud Exchange Webinar series. Follow this series to discover industry-leading insights, partnerships, and resources to help you embrace the hybrid cloud on your terms.
Join us on October 9th to learn how you can reduce costs and boost productivity with an enterprise-grade communications platform integrated into your favorite business apps like Salesforce, Zendesk, Office 365, and others.
This live demo will show you how easy it is for team members to initiate PSTN calls and SMS, host meetings and video conferences, view screen pops with relevant information, and more, without having to click from one tool to another --from anywhere, any time.
Our Sales Engineer will walk you through how it works and answer your questions. You’ll see:
•How to place calls with one click from within your business apps
•How to view customer profile and communications history
•How to add and manage users
Businesses today operate across more geographic boundaries than ever before and as data travels globally, a company's compliance, risk, and data governance obligations become exponentially more complex. Data moving across public and private clouds also increases breach risk, and compliance regulators can stop projects in their tracks - sometimes with drastic consequences to the business.
How is information stored and managed in the cloud? A question every company should be asking when dealing with the privacy and security of information stored in the cloud. Join our panel of AvePoint experts, led by Dana Simberkoff, Chief Compliance and Risk Officer, to discuss data sovereignty and privacy in the cloud. With many factors to be taken into consideration, our panel offers tips and advice to help understand the existing or upcoming data protection laws in the EU and ways technology can keep your data safe in the cloud.
Matt Hudson, Head of the Business Cycle Equity team, will give an update on the fund.
The fund aims to deliver consistent outperformance through the cycle by avoiding a permanent style bias or market-capitalisation bias. In essence, Matt and the team assess where we are in the business cycle and, importantly, what that means for the earnings prospects of individual companies. The process of doing this determines the composition of the portfolio.
With the increase in cloud computing and easy-to-use file sharing systems in the workplace, it's become increasingly difficult for IT departments to keep track and maintain a secure environment. When staff needs to access or share data quickly, they no longer need to rely on IT to provide the tools to do so. Why would they go through the red tape of IT procurement, provisioning, testing, and security when they can find a solution themselves in a matter of seconds?
Join John Peluso, Senior Vice President of Product Strategy at AvePoint, as he presents how organisations have decided to call a truce and provide self-service provisioning and management. In this webcast, he will discuss:
- The dangers of having silos of information that IT and the business are unaware of – disconnected from the centralized servers and storage of the data center or even approved cloud services
- How all of this information may be absent from aggregated capacity, secured content, usage, and other reporting at higher levels, which can complicate business decisions.
- What an organisation can do to proactively manage any rogue IT by providing self-service to end users
What can the student of GCSE past tell you about GCSE papers yet to come?
Andrew Taylor, Head of Maths at AQA, and Craig Barton, Maths Advanced Skills Teacher, TES Secondary Maths Adviser and creator of mrbartonmaths.com will show you how last year’s Year 11’s performed when they sat question papers designed for the new Maths GCSE.
Andrew will dive into the data and what it can tell you, while Craig will share the lessons learned from reviewing all the students’ answers and how he’s planning to apply them to his preparation and lessons.
Join Peter Harrison, Keith Wade and host, James Cardew, on Tuesday 13 October 2015 for ‘Schroders Live’. The debate will shine a spotlight on key macro-economic and topical issues.
Presenters: Peter Harrison, Head of Investment, Keith Wade, Schroders Chief Economist & Host James Cardew, Schroders Global Head of Marketing
Comprenez ce qui s’est passé et rétablissez l’activité rapidement
Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également
Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167
Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
In questa sessione di un'ora, coordinata da un Solution Architect, risponderemo alle vostre domande di natura tecnica riguardanti l'utilizzo dei prodotti AWS. In particolare, i primi 30 minuti saranno dedicati al topic "Analisi di Big Data (EMR, Redshift, Kinesis)" e i successivi 30 a domande di qualsiasi tipo.
Découvrez les défis d’une implémentation de micro-services totalement découplés et voyez comment la solution CA Service Virtualization peut relever les défis des développements parallèles et tests automatisés des micro-services.
Marin Software is happy to partner with Yahoo to bring you a webinar on the power of native advertising.
Native ads package advertising content in a format that blends in naturally with editorial content on websites across desktop, tablet, and mobile devices. According to the Association of National Advertisers, 63% of advertisers planned to increase their budgets for native advertising in 2015, expanding spend to $10.7 billion, an impressive 150% increase over 2013. There’s no better time than now to take advantage of native advertising’s ability to connect and attract the attention of your target audience.
Join this 1 hour webinar and Q&A to learn:
- Why native ads are instrumental and highly effective at building brand awareness among consumers
- Tips and tricks to get up and running on Yahoo Gemini & native advertising more quickly
- Strategies for capitalizing on the crossover into mobile to incorporate native into your advertising mix
- How to boost brand awareness and increase brand impact by leveraging native ads
- Best practices for creating content that adds value to the lives of the people who view it
The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.
In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).
After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
Entienda qué ha ocurrido y cómo restablecer sus operaciones rápidamente
En este último capítulo hablaremos sobre cómo la tecnología para las amenazas avanzadas puede también solucionar y eliminar de forma efectiva el malware de sus sistemas. Pero sabemos que no quiere simplemente reanudar sus operaciones, sino que también prefiere estar mejor preparado de cara al futuro. Por ello también describiremos un enfoque concreto para ayudarle a conseguirlo.
En los dos primeros webcasts hemos comentado por qué una vulneración puede ser inevitable y cómo puede detectar rápidamente una amenaza avanzada.
The world’s leading firms have recognized that data, along with human capital, is the most valuable asset they have today. The need for IT to digitize the business and provide actionable data to forecast market movements, improve customer experience, make flash offers, response to network errors, is paramount to sustainability. However, existing systems were not designed to address the data needs of today’s enterprises. The conclusion - organisations are turning to Apache Hadoop to become Data-Driven. Join this webinar to learn:
The importance of becoming Data-Driven
How-to build a Modern Data Architecture with Open Enterprise Hadoop
How-to use Hadoop to build a real-time infrastructure
Check-list for success
Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
Che benefici puoi ottenere con le appliance NetBackup di Veritas?
Scoprilo partecipando al nostro Webcast del 7 ottobre.
Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.
He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.
Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.