Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // Apr 2015

    Spam, Phish and Other Things Good to Eat

    In this webcast, the presenter will demo and release the source code for FeelingPhishy, a PHP tool the presenter created after getting several complaints from people in the industry that existing open source spam campaign solutions were too difficult to setup, had incomplete instructions or didn't work effectively.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Compliance Vs. Security - How to Build a Secure Compliance Program

    In this webcast, the presenter will overview of the issues with achieving and maintaining regulatory compliance, overview of 2014 data breaches and the common failure points, client case studies of PCI DSS and HIPAA security problems and recommendations on meeting regulatory compliance and maintaining a secure environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Applied Detection and Analysis Using Flow Data

    While network flow data isn't a new concept, it is easily one of the most powerful data types the users can have in their arsenal as a network defender. It is incredibly low overhead, easy to setup and maintain, and provides tremendously flexible capabilities for Network Security Monitoring (NSM) detection...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Five Practical Things You Aren't Doing to Secure Your Information, But Could Be

    In this webcast, the presenter will present five things that each audience member could be doing, right now, to protect the information assets of the organization they work for. Not user education. Not theoretical policies. Not magic hand waving.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Privacy Notions for Data Publishing and Analysis

    Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research, developing innovative technologies and services, intelligence and counterterrorism operations...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Apr 2015

    Hadoop Security: Seven Ways to Kill an Elephant

    Many companies are getting Hadoopy often with little or no consideration of security because big data is on their list of cool projects. Infosec is in this game but big data is moving at a pace faster than the controls are being considered.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Crypto in the Cloud

    Although cloud services become more and more popular, security concerns of the customers prevent a stronger adoption. Customers are mainly afraid of data leakage and loss of data. In this webcast, several cryptographic mechanisms are explained that may help to protect the user against these aforementioned risks.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Defining an Abstract Architecture for Managing Unstructured Data Using MongoDB - Use Case of VDrive

    Knowledge access and knowledge sharing is essential in contemporary classrooms. Building an university-level digital storage is important for empowering knowledge access. It is a way to improve efficient knowledge distribution and collaboration among students. Considering the importance of the knowledge sharing, it is important that its foundation is solid, efficient...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Don't Get Caught on Cloud 9

    Cloud solutions require that public and private entities release physical control over their systems and data. This webcast will provide attendees with a presentation of how to plan and secure data running on cloud solutions to avoid service and data risks while maintaining control at improved performance and cost.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Who Has My Data and How Did They Get It?

    The need for increased visibility and controls over who has access to application data and unstructured data is becoming increasingly important to prevent breaches. And when there is a breach, how do the users expedite decisions to resolve the breach? Data breaches underwent explosive growth in 2013: 740 million records...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

    In this webcast, the presenter will discuss Crypsis, a system that allows execution of MapReduce-style data analysis jobs directly on encrypted data. Crypsis transforms data analysis scripts written in Pig Latin so that they can be executed on encrypted data.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Learning From InfoSec Maturity: A Textual Analysis

    The Building Security In Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This webcast explores the firm characteristics and approaches to information risk of the participating BSIMM-V firms, primarily...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // Jan 2015

    The Automobile as Massive Data Gathering Source and the Consequences for Individual Privacy

    In this webcast, the presenter will report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users) positions are on this data gathering. In a summary,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    NetApp Virtual Insight ASEAN

    Navigate into The New IT Landscape Join us for this LIVE event! Tuesday, 27 January at 10am Singapore Time Insight is about innovation. This virtual event is devoted to the technology-curious storage and data management professional, including system engineers, professional services consultants, channel partners, and...

    Provided By NetApp

  • Webcasts // Dec 2014

    Oracle Data Redaction Is Broken

    The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be redacted or masked to prevent it being exposed to attackers. On paper this sounds like a great idea but in practice, Oracle's implementation is vulnerable to multiple attacks...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Stolen Data Markets an Economic and Organizational Assessment

    The substantial loss of customer data and resulting fraud have seemingly become more common, including the announcement of the target and Neiman Marcus compromises in 2013. As a result, the social and technical sciences are increasingly examining the market for data resale which is driven in part by these data...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Data Transforming Your Sewage Into Signatures

    What happens when the users collect a bunch of good data, under good pretences only to realize that the findings that they were expecting are completely wrong? Before they quit infosec and retreat to a farm, allow the presenter to tell them about how the presenter's data transformed data sewage...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Babar-Ians at the Gate: Data Protection at Massive Scale

    In this webcast, the presenter will explain how best to handle the looming big data risk in any environment. Better predictions and more intelligent decisions are expected from biggest data sets, yet do the users really trust systems they secure the least? And do they really know why "Learning" machines...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Stay Out of the Kitchen a DLP Security Bake-Off

    Despite a plethora of data security and protection standards and certifications, companies and their systems are still leaking information like a sieve. Data Loss Prevention (DLP) solutions have often been touted as the \"Silver bullet\" that will keep corporations from becoming the next headline.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring

    In this webcast, the presenter will describe the different techniques available for data analysis and machine learning for information security, and discuss their strengths and caveats. The ghost of marketing past will also show how similar the unfulfilled promises of deterministic and exploratory analysis were, and how to avoid making...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Provided By ObserveIT

  • Webcasts // Oct 2014

    Adopting a Risk-Based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data

    Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, perimeter and infrastructure-based security programs no longer serve the dynamic security needs of organizations. A risk-based threat model can enable the user to regain control of their critical data regardless of where it resides, and empower their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    On-demand Webcast: Centrify and Dropbox for secure collaboration

    Dropbox for Business lets organizations better access and control company data, with admin features that make it easy to deploy, provision, and manage effectively. Centrify offers an easy-to-deploy cloud service that delivers the industry's most comprehensive solution for Active Directory-based single sign-on, access control, and mobile device management for thousands...

    Provided By Centrify

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Oct 2014

    Blended Web and Database Attacks: Real-Time, In-Memory Platforms

    It is well known there is a race going on in the "Big data" arena (take a drink for even thinking about the "Internet of things"). One of the stronger competitors in the "Big data" market is real-time, in-memory platforms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data

    Measuring the effectiveness of any security activity is widely discussed - security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Provided By EMC

  • Webcasts // Jan 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // Nov 2009

    Managing a Large JBoss Infrastructure With JBoss Operations Network: Travelers Insurance

    In this webcast the will learn how Travelers Insurance successfully manages a large JBoss infrastructure with JBoss Operations Network. The webinar will also cover highlights from the latest JBoss Operations Network 2.3 release. Senior Technologist from Travelers Insurance will present how the company is at the forefront of technology innovation...

    Provided By Red Hat

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jan 2011

    A.C. Milan WINS more games with Microsoft

    A. C. Milan the most decorated soccer team in the world. A key part of its success is the Milan Lab which helps improve player performance based on analysis of their performance data it collects. Milan Lab uses Microsoft software to collect and analyze that data. Microsoft has become an...

    Provided By Microsoft

  • Webcasts // Jan 2011

    Secrets of a Successful Cloud Data Protection Strategy

    More and more businesses of all types and sizes are now considering the cloud for an ever-increasing number of IT applications and services. Although most business and IT decision makers already understand the benefits in terms of savings and scalability, many are still uncertain exactly where the cloud fits in...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    Are Your PCs and Laptops Recovery and Discovery Ready? (With Laura DuBois of IDC)

    Find out why corporations are quickly adopting a centralized PC Backup and Protection strategy to mitigate their risks from data loss and to gain visibility and accessibility to critical data across the network. IDC Program Vice President Laura DuBois will examine the critical reasons why corporate PC data loss should...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    Webcast: Cost Control through Print Output Management

    Businesses of all types and sizes are increasingly challenged by the rising need for greater control of their printing and imaging devices. Of course, print and copy continue to be among the leading areas of opportunity to reduce waste and unnecessary costs but much of that can be lessened with...

    Provided By Canon

  • Webcasts // Jan 2010

    Trapped By Consumption

    Try to leave your house without spending money. It is virtually impossible, because we live in the age of consumption. In fact, while you watch this video, you are also consuming. In this ultracompetitive environment, brands are no longer just logos. They have become a company's primary value proposition, says...

    Provided By IESE School Of Business

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Meeting The Sustainability Challenge: HCL Technologies

    Corporate India is just as committed as Europe and the United States to sustainability, asserts Vineet Nayar, CEO of HCL Technologies Ltd. "Indian businessmen are global businessmen - they are not isolated in India," he says. "And the entire economy is global so you just can't say the economy is...

    Provided By INSEAD

  • Webcasts // Jan 2011

    Sustainability: A Business Opportunity

    By the year 2040, only 15 per cent of the world's population will be living in what are now called developed countries. It's therefore essential for today's business planners to start focusing on the rest of the planet. Fortunately a strategy centered on emerging markets can be both financially profitable...

    Provided By INSEAD

  • Webcasts // Dec 2010

    Why Mainstreaming Corporate Social Responsibility Still Makes Good Business Sense

    With the economy still experiencing a slowdown, one might expect interest in corporate social responsibility to wane, or perhaps even die a natural death. Not so, according to Craig Smith, INSEAD Chaired Professor of Ethics and Social Responsibility. He believes that corporate responsibility has never been more prominent on the...

    Provided By INSEAD

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • Webcasts // Dec 2010

    Collaboration at Work

    Please join Michelle Newell from Oracle to discuss collaboration at work. Oracle offers you the opportunity to enable collaboration at work in order to increase the user experience and to drive productivity across the enterprise, all within one secure environment. Please view this video to learn more about how Oracle...

    Provided By Oracle

  • Webcasts // Jan 2011

    Business Continuity Guaranteed - How to Enable Your Employees to Take the Virtual Road to Work

    Emergencies happen - and the reality is that many organizations and employees will not be prepared when one occurs. So it's essential that organizations set up a business continuity strategy that makes technology resources immediately available to employees in unexpected circumstances. View this BNET Webcast to learn the best...

    Provided By Citrix Online

  • Webcasts // Jun 2009

    Which Financial Reporting Solution Is Right for You?

    Through this webcast one will learn the pros and cons to three of the most popular reporting tools for Dynamics. The presenter of this webcast will compare and contrast SQL Reporting Services (SRS), Management Reporter, and FRx.

    Provided By ePartners

  • Webcasts // Aug 2010

    Social Innovation; Fleet Forum

    In the wake of criticism regarding the response to high-profile disasters, humanitarian organizations began to focus increasingly on improving response delivery through improved logistics. Fleet management was an integral part of this process. As Luk Van Wassenhove, Academic Director of INSEAD Social Innovation Centre, points out, "Without (vehicle) fleets, humanitarian...

    Provided By INSEAD

  • Webcasts // Apr 2010

    Disaster Planning: Leveraging Your IT Infrastructure for Workforce Continuity

    Through this webcast one will learn how organizations best address workforce continuity and disaster recovery through virtualization by connecting a dispersed workforce to the data, business applications, and collaboration technology they need when disruptions occur. This webinar will explore strategies for creating a mix of remote access, alternative workspace, and...

    Provided By Citrix Systems

  • Webcasts // Oct 2010

    Building Secure Private Clouds with VMware vCloud Director

    VMware vCloud Director gives you the ability to build secure private clouds that dramatically increase datacenter efficiency and business agility. Coupled with VMware vSpheretm, the best platform for cloud infrastructures, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware vCloud Director: Technical Overview

    VMware vCloud Director is a software solution that enables enterprises to build secure, multi-tenant private clouds by pooling infrastructure resources into virtual datacenters and exposing them to users through Web-based portals and programmatic interfaces as fully automated, catalog-based services. Attend this webcast to learn about: ? The architecture...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered.

    The enterprise-class public cloud is real. But how do you ensure you're leveraging the VMware technology you know and trust? Learn how VMware vCloud? and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers...

    Provided By VMware

  • Webcasts // Dec 2010

    Mathematics, Common Sense, And Good Luck: My Life And Careers

    Don't expect to glean any market tips or trading secrets from the author, who steadfastly refuses to disclose the method behind his remarkable record in investing. Instead, listen to this mathematician, hedge fund manager and philanthropist sum up a remarkably varied and rich career, and offer some "Guiding principles" distilled...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Negotiating The Gulf Disaster

    The Gulf Oil spill hurt many individuals and businesses, and there is broad agreement that they deserve compensation. But working out the nuances of damage payment is no simple matter, as the presenter describes in conversation with an MIT Museum audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • Webcasts // Jan 2011

    The Register Webcast - Thinking about moving to service delivery?

    Thinking about moving to service delivery? Published: 1 Jan 2011 For years, most organizations have been managing the components of IT, with a primary focus on the performance and availability of specific assets. Those who think deeply on such things, however, reckon it's all changing. In the future, it's...

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • Webcasts // Oct 2010

    Podcast: The Promise of Content-Aware Identity and Access Management

    The Promise of Content-Aware Identity and Access Management Published: 13 Oct 2010 This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy. Please view to learn more.

    Provided By CA

  • Webcasts // Mar 2011

    In today's uncertain economy, mid-sized organizations are pressured to do more with less?to cut costs and reduce risks, to increase revenues and productivity, and to get more value from information technology.

    With heterogeneous environments, rigid systems, proprietary applications or technology and siloed information across the enterprise, deployment of new applications and services can be time consuming. IBM WebSphere provides the solutions for any size company to to cut costs and reduce risks, to increase revenues and productivity, and to get more...

    Provided By IBM

  • Webcasts // Mar 2011

    Video: Enabling Smarter Collaboration: Web Portals and Mashups

    Web portals have long been a way to connect to the applications, colleagues and data employees need to get things done. With the introduction of social networking features, collaborative tools, and mashup technology, portals are now a powerful tool to improve productivity, quickly satisfy customers, and use information to work...

    Provided By IBM

  • Webcasts // Jun 2009

    Grand Challenges And Engineering Systems: Inspiring And Educating The Next Generation

    It's a good thing for a world increasingly beset by mammoth challenges that universities are responding with new engineering systems programs. These initiatives, as one of the presenter attests, are swiftly proliferating in the U.S. and abroad to equip students to address such complex issues as health care, sustainable energy,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Oracle Systems Strategy with John Fowler Webcast

    Hear John Fowler, Executive Vice President, Systems, provide an update on the strategy and roadmap for Oracle's Sun servers, storage and complete systems including Oracle Solaris. The webcast features how Oracle systems are optimized to run Oracle software, with systems built on open standards that work with your existing infrastructure...

    Provided By Oracle

  • Webcasts // Apr 2010

    From Relief To Reconstruction ? Practical And Policy Challenge

    As the United Nations and worldwide NGOs face the challenges of providing basic services to the survivors of the January 2010 Haitian earthquake, the author scrutinizes what will ultimately be "Crucial to the outcome, in the Haitian context, of a successful recovery and rehabilitation by the Haitian people and for...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Planning The Response: Establishing The Impacts And Identifying The Parties At Risk

    The Deepwater Horizon disaster spread through not just a vast coastal ecosystem, but into diverse human communities lining the Gulf, many entirely dependent on the sea for their livelihoods. These three panelists describe their involvement in quite disparate response projects, which began shortly after the oil began gushing, and in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    What Dell Virtualization Solutions Can Do for Your Business

    What's your greatest motivation for considering virtualization? Chances are, it's the cost savings. Yes, virtualization will save you money, but it will also do so much more. Watch this short, informational video to discover all the benefits Dell Virtualization Solutions has to offer, including making IT more agile, improving quality...

    Provided By VMware

  • Webcasts // Apr 2011

    Elevator Pitch: NPower Peg

    Can one Imagine going for a walk or a run and generating enough power to do things like charging the cell phone? The elevator pitcher says his product is a back-up battery designed to harvest the energy created by basic, human movement. Let's find out if the panelists get a...

    Provided By American Express Company

  • Webcasts // Sep 2010

    Crowds and Clouds: Data, Sheep, and Collaboration in the Works of Aaron Koblin

    Where others see just data points and fodder for bar graphs, presenter visualizes dynamic systems where information assumes forms both abstract and familiar. In this talk, presenter shares recent projects that meld statistical science and art to convey a really big picture, while often inviting the viewer to partake in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    B2B Data Transformation Accelerator

    See how easy it is to specify a mapping by examining schemas and input samples, dragging and dropping between source and target, using predefined functions to build expressions, and testing specifications using real data.

    Provided By Informatica

  • Webcasts // Apr 2011

    B2B Data Exchange and B2B Data Transformation Demo

    Find out how Informatica's B2B products?Data Transformation and Data Exchange?enable multi-enterprise data to be leveraged to support these strategic business objectives.

    Provided By Informatica

  • Webcasts // Feb 2011

    American Business: Betrothed To Business

    The advantages of working with your significant other can be quite obvious, but there are some clear drawbacks as well. Would you feel comfortable managing your better half? How would you handle taking work home with you? Meet a husband and wife business team who've been able to successfully navigate...

    Provided By American Express Company