Software continues to transform the world in remarkable ways and developers are at the center of it. Tune in for this special encore Best of Microsoft Build presentation. We have taken the best rated content, announcements and solutions from our Microsoft Build 2017 Conference, and consolidated them into a one hour webinar.
Key Announcements from Microsoft Build 2017
Key Content from Microsoft Build 2017
Top Rated Demo
Ensuring you’re prepared for the next series of challenges
Docker Containers and Kubernetes are taking the industry by storm, promising new levels of efficiency for both application developers and operations teams. Even organizations not engaged in a wholesale re-architecture of their application environments can benefit from desirable properties of containers like packaging, portability and service isolation.
While the benefits are real, many organizations face choppy waters as they evolve from initial public or private cloud deployments to production. While Kubernetes is impressive at abstracting resources and managing containers, new services still need to interact with existing applications, and challenges abound related to multi-tenancy, resource scarcity and ensuring that business priorities are met.
Join us for an informative and insightful look at containers in the enterprise, and learn about new technologies and strategies that can help ensure a smooth and trouble free evolution as you chart your course from pilot to production. Whether you’re advanced in your use of containers or just getting started, there are important insights to be gained.
•451 Group’s latest research and analysis
•The “state of containers” and their adoption in IT
•Benefit from case studies and lessons learned by early adopters
•Considerations when deploying applications to production
•Techniques to maximize utilization and optimize expenditures
•Strategies for supporting mixed container and non-container workloads
Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.
While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.
In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.
In the webcast we will review:
-The top threats facing financial institutions
-Explore the most common techniques employed in financial attacks
-Provide case studies of the most high-profile financial attacks of the past 12 months
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
It's time to take control of your Ad Network! Ad campaign optimization has become essential for premium publishers to thrive in today's competitive market but it doesn't have to tap all your budget and technical resources.
Join Dennis Mulcahy, VP of Cxense and special guest David Rowley, Senior Director of Ad Strategy at Advance Digital to hear how Advance Digital creates compelling ad inventory at premium prices. Access premium inventory, maximize performance and grow your digital revenue in 2017!
As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
How do you assign and deploy secrets to containers while keeping them secure?
How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
How do update, rotate and revoke secrets without interrupting the containers that use them?
How do you leverage existing secrets stores (KMSs) and extend their use to containers?
Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
· Learn some of the “do's and don'ts” of securing secrets
· Learn the cardinal security requirements of secrets management
· Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
Data, data everywhere…but where is the insight to drink? This could be the new battle cry for today’s CMO. Regardless of industry or region—whether it’s a B2B or B2C company—all CMOs are facing the evolution of data and its twin: digital. From what digital transformation means to an organization to the challenges we each face as our customer demands even higher levels of personalization, CMOs today are talking about where and how digital and data converge and what that collision means for the bottom line.
Join Liz Miller, Senior Vice President of Marketing for the CMO Council, as she gets to know Maria Winans, CMO of IBM Watson Customer Engagement. The discussion will span from insights into how Winans is facing the digital revolution to the trends she believes will shape marketing and engagement in the months and years ahead. The one-hour, interactive conversation will also take questions from the live audience, giving participants a unique opportunity to pick the brain of a true peer.
A graduate of University of North Carolina at Chapel Hill, Winans has spent more than two decades at IBM and has been at the forefront of both data and digital’s evolution. A true global business leader, Winans has served in leadership roles at IBM across Business Analytics, Collaboration Solutions, Mobile, Industry Solutions and PC Company, as well as serving as a Marketing Strategist for IBM Latin America.
When it works, the cloud runs itself, but too often humans get involved and mess things up. Users can spin up and forget about instances, or create password policies that are insecure or make typos that can cause downtime. It is important to be alerted to such events but there’s only so much one administrator can do. This is where automation comes in. The ability for your infrastructure to “self-heal” makes it possible to run a large cloud infrastructure at scale.
Join us Wednesday, June 28 at 2pm EST for Leveraging Automation for Self-Healing Clouds. During this interactive webcast, CloudCheckr Product Marketing Manager Todd Bernhard will present attendees with an overview of CloudCheckr’s Automation capabilities, including:
- 450 automated Best Practice Checks to detect anomalies and security problems
- “Fix Now” functionality for Best Practice Checks
- Auto-Fix functionality to eliminate steps and delays
How do you decide what’s most important to test in your development projects? Risk-based testing provides a straightforward way to decide how and what to prioritize in your tests. In this informative session, Experis introduces you to the concepts of Risk-Based Testing, leaving you with methods and tools to improve your testing processes.
In this training we answer these questions while teaching participants how to measure and rank risks, using a simple yet comprehensive method:
•What is Risk-Based Testing?
•What forms does it take?
•When should it be used?
•What are the key elements of risk?
Who should attend:
•QA practitioners interested in efficient testing
•Business analysts who create requirements
•Technical architects and developers who design and implement solutions to requirements
•Project managers interested in effective development and test methods
From sequencer to archive, the genomics data lifecycle can be characterized by brief periods of intense parallel computation, followed by an eternity of relative data at rest. Ever since the mapping of the first human genome, single-tier scale-out NAS and parallel file systems have been the predominant types of storage used in genomics because they were best at providing both high performance when needed — and capacity forever. But they are expensive because that single-tier provides both high performance and capacity all the time, even though high performance is only briefly needed during the genomics data lifecycle. This webcast will demonstrate how HGST innovations in flash and object storage can target and optimize the two genomics lifecycle regimes, delivering extreme performance for computation with flash on the IBM Spectrum Scale parallel file system — and cost effectively keeping genomics data protected and accessible over increasingly longer retention periods with HGST ActiveScale object storage, with the ability to transparently migrate data between flash and object tiers.
Enterprise customers and service providers have been researching ways to find a modern day storage solution so they can move away from the traditional monolithic infrastructure environments. Customers have been looking for ways to remove silos, reduce OPEX/CAPEX, create operational efficiency – all with large scale-out capabilities and cloud agilities without sacrificing performance.
This webinar is to share how customers can achieve these goals with a truly software-defined storage solution. Companies have transformed seamlessly from traditional storage environments to flexible, cloud-like agile environments.
Hear from Steadfast, a service provider leader, who enables their customer base to focus on their company priorities to grow the business instead of spending the unnecessary time to maintain and manage their traditional storage infrastructure.
In this session, you will hear about:
- The modern day storage-as-a-service infrastructure with high-performance, extreme scale-out flexibility and cloud agility
- How to eliminate manual data migration
- Fully automating the storage infrastructure
- Steadfast’s IT transformation
Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. This webcast* will discuss how SaaS automation technology has revolutionized eDiscovery for solo and small firms today.
+ How Automation and the Cloud is Affecting All Industries, including eDiscovery
+ Drivers for the eDiscovery Automation Revolution
+ The Impact of Automation and the Cloud on the Lawyer Job Market
+ The Evolution of eDiscovery Technology
+ Whip Me, Beat Me, Call Me EDna: Two Challenges, Seven Years Apart
+ Key Components of a SaaS eDiscovery Automation Solution
+ Cost Alternatives for SaaS eDiscovery Automation Solutions
+ Can Automation Really Disrupt the eDiscovery Industry?
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.
The cloud has brought both risk and reward to MSPs. In today’s hybrid cloud world, MSPs must deliver consumption-based, private and public cloud offerings to their clients. This includes offering primary storage, offsite backup and DR that is high-performance, scalable and secure. Outsourcing primary storage along with backup and DR enables an MSP’s customers to reduce their on-premises footprint software licenses, connectivity and the problems that come with it. It also sets up the MSP to offer hybrid services like DR as a Service and the new opportunity of copy data management - stop making copies.
Our security experts walk through dynamic peer group analysis in CounterBreach 2.0. Tune in to see how to use machine learning to define dynamic peer groups, detect suspicious file access behavior, and dynamically manage access permissions.
Join this webinar to learn how to deploy a scalable and elastic architecture for Big Data analytics.
Hadoop and related technologies for Big Data analytics can deliver tremendous business value, and at a lower cost than traditional data management approaches. But early adopters have encountered challenges and learned lessons over the past few years.
In this webinar, we’ll discuss:
-The five worst practices in early Hadoop deployments and how to avoid them
-Best practices for the right architecture to meet the needs of the business
-The case study and Big Data journey for a large global financial services organization
-How to ensure highly scalable and elastic Big Data infrastructure
Discover the most common mistakes for Hadoop deployments – and learn how to deliver an elastic Big Data solution.
Email-based communications are a fundamental cornerstone for effective business. That’s why email is a popular vector for sabotage across your network and a launch pad for malware – including ransomware and zero-day threats.
This webcast discusses the current threat landscape and customer pain points, and examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
Cyber threats have changed dramatically in the last year.
Last week, Symantec released patches for several critical SMG vulnerabilities that enabled attackers to (1) compromise the email gateway and (2) fully bypass gateway inspection and deliver malware via email.
Short term, have you patched the vulnerability?
Long term, have you evaluated email security solutions that handle all threats, with and without malware?
Join this webinar for an overview of how modern email protection should dynamically analyze and identify malware. Learn:
• What’s happening in the threat landscape—new vectors, new criminal techniques
• How our solution can help you strengthen your defense, detecting and blocking email threats and enabling rapid, automated response
• How Advanced Email Security compares to your current solution
Learn how to align emerging channel technology with proven channel best practices to support program growth, partner engagement and ROI. Channel experts Maria Chien, Service Director, Channel Marketing Strategies for SiriusDecisions, and Laz Gonzalez, Chief Strategy Officer at Zift Solutions, detail:
• The top 5 priorities for channel marketing leaders
• Aligning channel marketing efforts with corporate goals
• Best practices for demand creation, partner enablement and functional development
• How to solve integration challenges undermining channel program success
Learn how to apply TITUS classification metadata via integration with Symantec DLP FlexResponse. This video shows automatic classification as well as administrator-applied classification within Symantec DLP.
State-of-the-art remote workstation experiences are now possible on any device, using infrastructure as a service (IaaS) hosted on the Intel® Xeon® processor E3 v5 family with Intel® Iris™ Pro graphics. Intel’s on-chip graphics technology powers a broad range of workstation-class applications for engineers, designers, and architects. Simple access is now available to companies of all types and sizes, on a trial basis and beyond. Leverage the capabilities of remote workstations with support provided by IMSCAD, a global consultant in graphics virtualization technology.
As enterprises continue adopting Microsoft® Office 365™, there is continued focus on safely and reliably enabling it. Join this webinar to learn how you can leverage Palo Alto Networks Next-Generation Security Platform to transform your security stack and achieve the following goals:
1.Enhanced network traffic visibility and context.
2.Address security concerns around dynamic nature of O365 changing IPs, ports, and URLs.
3.Allow granular control within an application including controlling enterprise vs consumer access.
We will discuss how you can use Palo Alto Networks App-ID in combination with application signatures and URL filtering to achieve all of the above-mentioned objectives.
Whether you are a sole inventor, or managing a patent portfolio for a global enterprise, patents are a significant investment that can help to protect your most valuable assets and enable them to be commercialized now, and in the future. However, costs involved with protecting your assets, and maintaining them can quickly add up over time.
Dylan O. Adams, Senior Patent Attorney and Amazon Bestselling Author of "Patents Demystified, joins PatSnap once again for an informative and interactive Q&A-led webinar to share some best practices on keeping your patent costs down.
Some topics covered in this session include:
- Cost of provisional patent & non-provisional patent applications
- Cost of responding to office actions
- How to minimizing your attorney costs
- Issuance and maintenance fees
- Litigation and enforcement costs
- International filing costs
This webinar is essential viewing for anyone looking to slash their intellectual; property bill, and put their IP budget to better use.
Immunotherapy is changing the cancer care paradigm: for a small but significant group of patients, cancer has become a chronic disease and immunotherapy biomarkers like PD-L1 play an important role. In this presentation, Professor Kerr will provide a summary of the immunotherapy treatment landscape, address what makes immunotherapy biomarkers unique compared to biomarkers like HER-2 and ALK, describe the function (physiologic and as a biomarker) of PD-L1 and other biomarkers relevant to the PD-1/PD-L1 pathway. He will also address the role of emerging immunotherapy biomarkers that are independent of the PD-1/PD-L1 pathway.
Join this dynamic panel as we discuss findings from a recent Forbes survey of over 500 global financial services executives. We’ll address the areas of customer experience, regulatory compliance and overall data challenges faced by banks.
Topics will include:
•Extending a bridge from legacy technologies to modern FinTech systems.
•Building flexible, adaptable solutions that bring speed and accuracy to regulatory compliance.
•Leveraging “mandated” investments in compliance to create new business opportunities throughout your enterprise.
•Blending banks’ vast amounts of customer data with newer, unstructured data streams to completely redefine the customer experience.
•Implementing an overall platform approach to data management that eliminates silos, while protecting existing infrastructure investments.
•Understanding systems that enable you to build new repeatable architectures that scale.
There will be an opportunity for Q&A with our experienced panelists:
‒Nirvana Farhadi, Global Head, Financial Services RegTech, Risk and Regulatory Compliance Affairs, Hitachi Data Systems
‒Daniel Knight, Chief Technology Officer, Financial Services, Americas, Hitachi Data Systems
‒Suranjan Som, Vice President, Financial Services, Hitachi Consulting
‒Moderator: Paul Lewis, Chief Technology Officer, Americas, Hitachi Data Systems
The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.
Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.
During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:
•The local and global government data privacy regulations (Australia and Europe)
•Gauging the true cost of a data breach and how to reduce the scope of risk
•Understanding privacy by design throughout business
•Strategies for simplifying operations for regulation and internal audits
•Determining current industry compliance, which may be applicable to the APA and GDPR
How enterprises are choosing and using digitization initiatives for business gain.
Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.
Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.
Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:
•Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.
•Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.
•Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
China’s economic transition is well under way. Few investors continue to fear a hard landing, but the size of the country’s debt is a cause for concern. Register to the webinar and discover which investment opportunities as well as which challenges in Chinese fixed income and equity markets this new economy is creating.
Dell EMC Integrated Data Protection Appliance (IDPA) converges storage, protection software, search and analytics in a single, easy-to-deploy solution. IDPA provides up to 10X faster time to protect than traditional build your own data protection deployment alternatives and 20% faster performance than the closest competitor as well as industry-leading deduplication for data residing both on premise and in the cloud.
Join our live session to learn more how this new pre-integrated protection storage and software provides comprehensive, data protection and faster time to value for modern enterprises.
Carlos Hardenberg, lead manager of the £2bn Templeton Emerging Markets Investment Trust (TEMIT), will provide an update on emerging markets and how the portfolio is positioned to take advantage of opportunities the team has identified.
Discover the evolution of the software delivery chain at ICBC. Hear how ICBC automates its core banking application deployment from demand management to operational rollout, using HPE Software solutions. Moving toward risk control architecture to improve compliance with local regulation, software security, and quality.
The Chief Executive of the Intellectual Property Office of Singapore joins us for this exclusive webinar.
Singapore's IP regime has been consistently ranked as one of the best in the world. More than 5400 multinational companies choose to set up their Asia-Pacific headquarters in Singapore, using Singapore as a gateway to ASEAN and beyond.
Home to a growing consumer market of 600 million people, ASEAN is a highly attractive destination for investors. Increasingly, digital technologies are changing how business is done by blurring the lines at the borders, creating a truly global marketplace. With a greater focus on innovation to drive profitability, how can companies take advantage of the economic opportunities in ASEAN and globally?
In this webinar, you will discover how the Intellectual Property Office of Singapore (IPOS) is helping businesses accelerate growth with the following solutions:
- Continuing IP education to keep abreast of continuing changes in the IP realm.
- Technology foresighting and a strong IP strategy to help build and sustain a competitive edge in your business.
- Patent acceleration initiatives that will facilitate the protection of your technology globally.
- IP financing and valuation.
- SGD 1 billion Makara Innovation Fund that supports the global expansion of IP-driven companies, from Singapore and through Singapore.
Integration has always been a strong point of Openbravo software and we know it is a key requirement of our larger retail clients with complex IT environments, often based on legacy technologies. In this webinar we will explain how the modular architecture of Openbravo’s technology platform makes it easy to integrate with third-party IT systems, including Tier-1 corporate ERP systems. We will describe the model designed to support various ERP systems and integration scenarios and how it can help to significantly reduce the implementation time and ensure protection of existing ERP investments.
Every financial services organisation has a unique take on the world. But most struggle to be heard. Linstock Communications will share 10 Pearls of Wisdom on thought leadership marketing, helping organisations discover and give voice to ideas that change people's perspective on issues that matter. The webinar will explore: the naked truth about thought leadership, how you can build thought leadership into your communications strategy and ten key elements every thought leadership marketing campaign should contain.
Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best orgaizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.
Join IBM Resilient’s Chris Neely, Director of Technical Sales, EMEA to explore the latest incident response methodology and technology. Can automation really save the day? From instant escalation, to automatic enrichment, to guided mitigation, Chris will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
Is your company looking to align employees with business goals and success, and fuel a culture of recognition and innovation to drive business outcomes? Join Erik Finch, Sr. Director of Field Operations, Achievers, and Ramón Edilio Vargas, Director Global Employee Recognition, Scotiabank as they discuss using recognition to build engagement and results.
In this webinar, we will:
•Demonstrate the powerful link between recognition and engagement
•Share valuable insight into how recognition can be used to align employees with the corporate values and business goals that impact your bottom-line results
•Talk you through case studies that show how to implement effective engagement programmes
•Give you the opportunity to ask your questions to our experts and client advocates
Who should attend?
•Managers looking for ideas on how to improve employee engagement and performance;
•Executives who want to learn more about the top driver of employee engagement, employee recognition, and how to implement or improve a company-wide recognition programme
•IT professionals looking for answers on how to maximise current technology and add engagement to the mix
If you are looking for ideas on how to improve employee engagement and performance or want to learn more about the top driver of employee engagement, employee recognition, and how to implement or improve a company-wide recognition programme, then this webinar shouldn’t be missed.
Industry experts predict that all successful businesses will soon become 100% digital. The biggest challenge is the “how”. The HR world is rapidly changing; global candidates are becoming more tech-savvy and rely on mobile-enabled interactions. Now more than ever, HR teams are looking to attract and retain the right talent, increase employee satisfaction, and enrich the overall recruiting and onboarding experience.
Here’s the time to make 2017 a year of digitization and transformation. The plan: revamp all of your current HR processes and swap paper for an eSignature solution for everything ranging from offer letters, new hire approvals, candidate NDAs, and contractor agreements.
Watch this on-demand webinar to learn about the 7 important ways that HR teams can make meaningful progress in their digital transformation. You will also learn:
• Top HR pains in the workplace
• How other companies achieved success in digital transformation
• How leveraging an eSignature solution can help you save time and money
• Teja Vora, Director of Commercial Marketing, DocuSign
• Derek Temper, Human Resources Director at Dent Wizard
The march towards autonomous vehicles continues to accelerate. While expert opinion differs on the specific timing and use cases that will emerge first, few deny that self-driving cars are in our future.
As we all can appreciate, “teaching” a vehicle to drive under the full range of conditions it will encounter (i.e. road conditions, weather conditions, behavior of other vehicles) is a daunting proposition. If merely the thought of this makes you nervous, you’re not alone – according to the American Automobile Association (AAA), 75 percent of consumers are not yet ready to embrace self-driving cars. However, that is the very challenge facing automakers – teaching vehicles to unfailingly assess and respond to any combination of operational conditions “on-the-fly” through discrete rules (algorithms) governing a vehicle’s behavior.
Join Hortonworks and NorCom at the upcoming webinar as we discuss:
•Evolution of the autonomous driving
•Traditional data management approaches and main challenges associated with them
•How NorCom and Hortonworks can address those challenges and accelerate the pace of autonomous development
You feel trapped by your legacy IT and communications systems. You know you’re not using your company’s data properly, none of your systems work together or talk to each other. But you’re not sure what to do next. What’s holding you back? Is cloud the answer? Do you have the right skills in place to really understand what the cloud can offer you and your business? Is your job on the line if you don’t embrace the cloud? Is your job on the line if you do?
Join CIF and our exec panel to debate the issues and learn from practical experience shared of gaining control using cloud collaboration right across the business, from operations, marketing, support, sales and HR.
Frank Bennett Deputy Chair CIF / Moderator
Simon Dear CEO Tangent International
Gary Pryor Partner & Acquisitions Director, 8x8
Dr Lucy Green CEO Larato
Hans Vrensen and Shan Shan Qi from AEW's research team will be discussing the outlook for the European real estate market and building on the optimal portfolio methodology introduced in the previous webcast.
•As political uncertainty fades and the economic recovery continues, investors can meet an increasingly challenging investment market by considering a broader range of markets
•Despite a potential for interest rate increases down the line, relative value remains strong in many non-gateway markets with better than expected liquidity and risk-return profiles
•Most attractive markets are highlighted by applying our optimal portfolio and four criteria scoring approach now to 100 markets segments – a doubling of our universe
We believe 2017 will be the year where growth cycles reconnect and become more synchronized.
Almost halfway through the year, we have seen some surprises in global markets and economies. Political risk in Europe – what seemed to be the biggest threat to global growth – has largely been defanged. But political risk in the US and Latin America is gaining strength.
Join Markus Schomer, CFA, Chief Global Economist, as he explores the key drivers of his midyear economic outlook:
•The global growth triangle and how it’s driving a regime change in markets
•Developed versus emerging market implications
•What investors should expect
Euroclear y el Depósito Central de Valores (DCV-Chile), explicarán las actuales condiciones de operación del link que mantienen vigente, con especial foco en lo relativo a las operaciones sobre bonos soberanos chilenos, en consideración a los cambios regulatorios ocurridos en Chile.
On Thursday, 29 June, Kaspersky Lab is teaming up with Comae Technologies to present an emergency webinar for businesses to help them understand and defend against the Petya/ExPetr ransomware. The malware has affected companies in a range of industry sectors across the world, with Ukraine, Russia and number of Western European countries most affected.
Juan Andres Guerrero-Saade, senior security researcher in Kaspersky Lab’s Global Research and Analysis Team, will be joined by Matt Suiche from Comae Technologies to present the very latest information on the ransomware’s attack vectors, the infection process and how it spreads through company networks. They will provide mitigation guidance and explain the actions organizations need to take to secure their computers and networks against this threat.
What is this Blockchain thing? What can you do with it? Where do you go from here? How do you get into the cryptocurrency investing boom?
David Siegel, Blockchain and Decentralization expert, is a web pioneer, author, and serial entrepreneur. He is the world’s first web designer, started one of the world’s first web-design agencies, has written five books about technology and business, and is now leading Twenty Thirty, an open community of blockchain innovators.
Tune in to this session where David will answer all of your Blockchain-related questions from the most basic to complex. This session includes what's happening in the cryptocurrency and token revolution, what to watch out for, and how to get in on it.
Carrier Ethernet es el combustible para la economía digital global y la base sobre la cual se construye nuevos servicios dinámicos, seguros y orquestados para el mundo hiper_conectado. Pero la falta de estandarización para interconectar proveedores y operadores de servicios Ethernet es un obstáculo para el crecimiento y la eficiencia del mercado. Actualmente, la mayoría de las interconexiones Ethernet son interconexiones de red a red (NNI) no estándar y personalizadas, lo que impide escalar el mercado. Más de una docena de proveedores de servicios y proveedores de tecnología miembros del MEF han participado en el proyecto MEF para crear Puntos de Interconexión Ethernet (Ethernet Interconnect Points o EIP) aprovechando los estándares existentes para interconexión CE. La primera fase del proyecto EIP involucró la creación de una Directriz de Implementación de Punto de Interconexión Ethernet que recomienda cómo usar las Interfaces Estándar de Red a Red (ENNIs) de forma eficaz. Esta guía inicial se enfoca en la configuración de servicios de acceso Ethernet (E-Access) de una manera simple, y las nuevas directrices avanzarán en complejidad con en el tiempo. Las directrices ayudarán a la industria a escalar rápidamente y reducir complejidad.
Este webinar explorará dónde se dirige el mercado, las expectativas técnicas, los obstáculos operacionales que pueden surgir y la necesidad de que los operadores gestionen eficazmente la transición a medida que el mercado avanza hacia la estandarización. Este seminario apunta a aquellos proveedores de servicios que compran servicios de Ethernet mayoristas de operadorese interconectan sus redes para crear servicios CE minoristas de extremo a extremo pasando por múltiples redes. También se compartirá informaciones que pueden ser importantes para la toma de decisiones mientras desarrolla su estrategia de cómo sacar total provecho de interconexiones Ethernet estandarizadas.
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.
Attendees will learn:
- What are the obstacles getting in the way of achieving digital transformation?
- Strategies to end the misalignment of business and IT on digital initiatives
- A roadmap to closing the IT delivery gap