Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // Jun 2015

    Live Webcast: Gain More Value and Actionable Insights from Your Data with Powerful Customer Analytics

    Customers are using mobile devices – and multiple channels – to connect with companies, and many organizations scrambling to keep up. Some are gaining a significant advantage by moving mobile analytics and development to the cloud for both content and peripheral services. That's because cloud-enabled software as a service (SaaS)...

    Sponsored By IBM

  • Webcasts // Jun 2015

    Live Webcast: How to put IBM Watson to work for powerful information access and insights

    Most organizations struggle to deliver the information and insights their front-line staff need for top performance. The challenges that must be overcome are the amount of information that needs to be digested; the fact that it is scattered among many different silos and across hybrid cloud infrastructures; and the...

    Sponsored By IBM

  • Webcasts // Jun 2015

    10 Deadly Sins of SQL Server Configuration

    Databases are the backbone of the applications that run the world and store the personal data. Microsoft's SQL server one of the primary database platforms used in enterprise environments today. This webcast will cover 10 common weak SQL server configurations and the practical attacks that help hackers gain unauthorized access...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Cloud IDS: Intrusion Detection for Shared Hosting

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Stick a Pin in Certificate Pinning: How to Inspect Mobile Traffic and Stop Data Exfiltration

    With the rise of encrypted traffic, more and more companies are deploying SSL inspection platforms to decrypt SSL. Unfortunately, these companies quickly discover that they cannot decrypt all traffic, particularly communications to mobile apps that use certificate pinning. What is certificate pinning? It's a method of preventing Man in the...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    The Benefits in Externalizing DMZ-as-a-Service in the Cloud

    Organizations often place critical infrastructure in the DMZ which means that attackers able to enter the DMZ can inflict damage to the network. A more recent approach is to implement a DMZ below the traditional DMZ (adds a security layer). However, when a website is attacked, all DMZ layers frequently...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Applying Big Data Technology to Security Use Case

    The big data technology suite can only be effective when applied correctly. It solves certain problems well, provided the design assumptions are true. This webcast will explain which problems in the security domain are the kinds that Hadoop and big data technologies were designed to solve and what conditions need...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Spam, Phish and Other Things Good to Eat

    In this webcast, the presenter will demo and release the source code for FeelingPhishy, a PHP tool the presenter created after getting several complaints from people in the industry that existing open source spam campaign solutions were too difficult to setup, had incomplete instructions or didn't work effectively.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Compliance Vs. Security - How to Build a Secure Compliance Program

    In this webcast, the presenter will overview of the issues with achieving and maintaining regulatory compliance, overview of 2014 data breaches and the common failure points, client case studies of PCI DSS and HIPAA security problems and recommendations on meeting regulatory compliance and maintaining a secure environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Exploring the Relationship Between Compliance and Risk Management

    In this webcast, the presenter will discuss the correlation between compliance and risk management, explaining how the users cannot have compliance without risk management. The presenter will go into defining compliance and risk management, what makes up a compliance program versus a risk management program and the core goals and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Designing a "Big Data" Platform for Threat Analytics

    So the users have been asked to use "Big data" can make their company more secure. How do they do that? What design considerations should they consider? What are the high level business and technical requirements? Here is a prescriptive guide to the questions and decisions they'll need to make...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Data Breach: If You're Not Prepared, You Can't Be Responsive

    In this webcast, the presenter will provide attendees with lessons learned from recent data breaches and provide an overview of the components of a proactive incident response plan, including: identification of types of events, obligations of vendors, roles and responsibilities, specific notice obligations and post event assessment protocol.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Critical Infrastructure: The Cloud Loves Me, the Cloud Loves Me Not

    Interdependency between public cloud services and critical infrastructure are both hard and soft. Will this cross domain technology flirtation lead to long term relationships or fatal attractions? The presenters examine case studies supporting both scenarios and their complex conundrums if everything is critical, perhaps nothing is critical? How much security...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Private Cloud Security Best Practices

    In this webcast, the presenter will focus on security architecture and controls that are keys to building a secure foundation for private software defined datacenter or cloud infrastructure. The presenter continues to consult on a number of subject matters including strategy, virtualization, messaging, database and infrastructure optimization.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Applied Detection and Analysis Using Flow Data

    While network flow data isn't a new concept, it is easily one of the most powerful data types the users can have in their arsenal as a network defender. It is incredibly low overhead, easy to setup and maintain, and provides tremendously flexible capabilities for Network Security Monitoring (NSM) detection...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Five Practical Things You Aren't Doing to Secure Your Information, But Could Be

    In this webcast, the presenter will present five things that each audience member could be doing, right now, to protect the information assets of the organization they work for. Not user education. Not theoretical policies. Not magic hand waving.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Privacy Notions for Data Publishing and Analysis

    Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research, developing innovative technologies and services, intelligence and counterterrorism operations...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Apr 2015

    Hadoop Security: Seven Ways to Kill an Elephant

    Many companies are getting Hadoopy often with little or no consideration of security because big data is on their list of cool projects. Infosec is in this game but big data is moving at a pace faster than the controls are being considered.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Crypto in the Cloud

    Although cloud services become more and more popular, security concerns of the customers prevent a stronger adoption. Customers are mainly afraid of data leakage and loss of data. In this webcast, several cryptographic mechanisms are explained that may help to protect the user against these aforementioned risks.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Defining an Abstract Architecture for Managing Unstructured Data Using MongoDB - Use Case of VDrive

    Knowledge access and knowledge sharing is essential in contemporary classrooms. Building an university-level digital storage is important for empowering knowledge access. It is a way to improve efficient knowledge distribution and collaboration among students. Considering the importance of the knowledge sharing, it is important that its foundation is solid, efficient...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Scada Deep Inside: Protocols and Security Mechanisms

    In this webcast, the presenter will share the experience in analysis of most popular open and vendor's specific proprietary industrial protocols. For each protocol will be presented packet structure, real examples, in-secure features and possible hacks, at the end of the topic the presenter will share the practical approach, methodology...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Don't Get Caught on Cloud 9

    Cloud solutions require that public and private entities release physical control over their systems and data. This webcast will provide attendees with a presentation of how to plan and secure data running on cloud solutions to avoid service and data risks while maintaining control at improved performance and cost.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Who Has My Data and How Did They Get It?

    The need for increased visibility and controls over who has access to application data and unstructured data is becoming increasingly important to prevent breaches. And when there is a breach, how do the users expedite decisions to resolve the breach? Data breaches underwent explosive growth in 2013: 740 million records...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Communicating Risk to Senior Executives

    How do the users explain to the business that just accepting the risk is not an okay way to mitigate risk? Are they prepared for a breach like the University of Maryland breach and the infamous target breach? The threat landscape has changed from they might be attacked to they...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security Risk Management

    In this webcast, the presenter will cover the topics include: security risk management, risk can be defined as "The possibility of loss or injury", security investments aim to mitigate risk, and are a trade-off, they also involve risk, and cost money, people are often not naturally good at judging risk,...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Backups, Redundancy, and the Cloud

    In this webcast, the presenter will cover the topics include: backups and redundancy confidentiality, integrity, and availability, objectives recover from events, prevent problems, data backups, backups can help mitigate various risks backup plans, Recovery Point Objectives (RPO), Recovery Time Objectives (RTOs), etc.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Build Yourself a Risk Assessment Tool

    In this webcast, the presenter explains the ingredients for a risk assessment tool and how the users go about to build one for their organization. Risk assessment should reflect the overall security knowledge and experience accumulated over the years in the company. This knowledge is company-specific, and applying it should...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SAP Business Objects Attacks - Espionage and Poisoning of Business Intelligence Platforms

    In this webcast, the presenter will explain about the SAP business objects attacks. SAP systems provide business intelligence platforms, which can be a promising target for business espionage. Business executives make their strategic decisions and report on their performance based on the information provided by their business intelligence platforms.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Pragmatic Cloud Security: What Infosec Practitioners Have Been Waiting For

    Applying security standards consistently across environments has typically been a struggle for security practitioners. Maintaining accurate system baselines in dynamic, complex ecosystems is a challenge that makes asset management a seemingly impossible process to control in traditional environments. With the elastic capabilities of cloud services such as AWS, it may...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

    In this webcast, the presenter will discuss Crypsis, a system that allows execution of MapReduce-style data analysis jobs directly on encrypted data. Crypsis transforms data analysis scripts written in Pig Latin so that they can be executed on encrypted data.

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Live Webcast: How to put IBM Watson to work for powerful information access and insights

    Most organizations struggle to deliver the information and insights their front-line staff need for top performance. The challenges that must be overcome are the amount of information that needs to be digested; the fact that it is scattered among many different silos and across hybrid cloud infrastructures; and the...

    Sponsored By IBM

  • Webcasts // Jun 2015

    Live Webcast: Gain More Value and Actionable Insights from Your Data with Powerful Customer Analytics

    Customers are using mobile devices – and multiple channels – to connect with companies, and many organizations scrambling to keep up. Some are gaining a significant advantage by moving mobile analytics and development to the cloud for both content and peripheral services. That's because cloud-enabled software as a service (SaaS)...

    Sponsored By IBM

  • Webcasts // Jan 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // Nov 2009

    Managing a Large JBoss Infrastructure With JBoss Operations Network: Travelers Insurance

    In this webcast the will learn how Travelers Insurance successfully manages a large JBoss infrastructure with JBoss Operations Network. The webinar will also cover highlights from the latest JBoss Operations Network 2.3 release. Senior Technologist from Travelers Insurance will present how the company is at the forefront of technology innovation...

    Provided By Red Hat

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jan 2011

    A.C. Milan WINS more games with Microsoft

    A. C. Milan the most decorated soccer team in the world. A key part of its success is the Milan Lab which helps improve player performance based on analysis of their performance data it collects. Milan Lab uses Microsoft software to collect and analyze that data. Microsoft has become an...

    Provided By Microsoft

  • Webcasts // Jan 2011

    Secrets of a Successful Cloud Data Protection Strategy

    More and more businesses of all types and sizes are now considering the cloud for an ever-increasing number of IT applications and services. Although most business and IT decision makers already understand the benefits in terms of savings and scalability, many are still uncertain exactly where the cloud fits in...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    Are Your PCs and Laptops Recovery and Discovery Ready? (With Laura DuBois of IDC)

    Find out why corporations are quickly adopting a centralized PC Backup and Protection strategy to mitigate their risks from data loss and to gain visibility and accessibility to critical data across the network. IDC Program Vice President Laura DuBois will examine the critical reasons why corporate PC data loss should...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    Webcast: Cost Control through Print Output Management

    Businesses of all types and sizes are increasingly challenged by the rising need for greater control of their printing and imaging devices. Of course, print and copy continue to be among the leading areas of opportunity to reduce waste and unnecessary costs but much of that can be lessened with...

    Provided By Canon

  • Webcasts // Jan 2010

    Trapped By Consumption

    Try to leave your house without spending money. It is virtually impossible, because we live in the age of consumption. In fact, while you watch this video, you are also consuming. In this ultracompetitive environment, brands are no longer just logos. They have become a company's primary value proposition, says...

    Provided By IESE School Of Business

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Meeting The Sustainability Challenge: HCL Technologies

    Corporate India is just as committed as Europe and the United States to sustainability, asserts Vineet Nayar, CEO of HCL Technologies Ltd. "Indian businessmen are global businessmen - they are not isolated in India," he says. "And the entire economy is global so you just can't say the economy is...

    Provided By INSEAD

  • Webcasts // Jan 2011

    Sustainability: A Business Opportunity

    By the year 2040, only 15 per cent of the world's population will be living in what are now called developed countries. It's therefore essential for today's business planners to start focusing on the rest of the planet. Fortunately a strategy centered on emerging markets can be both financially profitable...

    Provided By INSEAD

  • Webcasts // Dec 2010

    Why Mainstreaming Corporate Social Responsibility Still Makes Good Business Sense

    With the economy still experiencing a slowdown, one might expect interest in corporate social responsibility to wane, or perhaps even die a natural death. Not so, according to Craig Smith, INSEAD Chaired Professor of Ethics and Social Responsibility. He believes that corporate responsibility has never been more prominent on the...

    Provided By INSEAD

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • Webcasts // Dec 2010

    Collaboration at Work

    Please join Michelle Newell from Oracle to discuss collaboration at work. Oracle offers you the opportunity to enable collaboration at work in order to increase the user experience and to drive productivity across the enterprise, all within one secure environment. Please view this video to learn more about how Oracle...

    Provided By Oracle

  • Webcasts // Jan 2011

    Business Continuity Guaranteed - How to Enable Your Employees to Take the Virtual Road to Work

    Emergencies happen - and the reality is that many organizations and employees will not be prepared when one occurs. So it's essential that organizations set up a business continuity strategy that makes technology resources immediately available to employees in unexpected circumstances. View this BNET Webcast to learn the best...

    Provided By Citrix Online

  • Webcasts // Aug 2010

    Social Innovation; Fleet Forum

    In the wake of criticism regarding the response to high-profile disasters, humanitarian organizations began to focus increasingly on improving response delivery through improved logistics. Fleet management was an integral part of this process. As Luk Van Wassenhove, Academic Director of INSEAD Social Innovation Centre, points out, "Without (vehicle) fleets, humanitarian...

    Provided By INSEAD

  • Webcasts // Apr 2010

    Disaster Planning: Leveraging Your IT Infrastructure for Workforce Continuity

    Through this webcast one will learn how organizations best address workforce continuity and disaster recovery through virtualization by connecting a dispersed workforce to the data, business applications, and collaboration technology they need when disruptions occur. This webinar will explore strategies for creating a mix of remote access, alternative workspace, and...

    Provided By Citrix Systems

  • Webcasts // Oct 2010

    Building Secure Private Clouds with VMware vCloud Director

    VMware vCloud Director gives you the ability to build secure private clouds that dramatically increase datacenter efficiency and business agility. Coupled with VMware vSpheretm, the best platform for cloud infrastructures, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware vCloud Director: Technical Overview

    VMware vCloud Director is a software solution that enables enterprises to build secure, multi-tenant private clouds by pooling infrastructure resources into virtual datacenters and exposing them to users through Web-based portals and programmatic interfaces as fully automated, catalog-based services. Attend this webcast to learn about: ? The architecture...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered.

    The enterprise-class public cloud is real. But how do you ensure you're leveraging the VMware technology you know and trust? Learn how VMware vCloud? and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers...

    Provided By VMware

  • Webcasts // Dec 2010

    Mathematics, Common Sense, And Good Luck: My Life And Careers

    Don't expect to glean any market tips or trading secrets from the author, who steadfastly refuses to disclose the method behind his remarkable record in investing. Instead, listen to this mathematician, hedge fund manager and philanthropist sum up a remarkably varied and rich career, and offer some "Guiding principles" distilled...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Negotiating The Gulf Disaster

    The Gulf Oil spill hurt many individuals and businesses, and there is broad agreement that they deserve compensation. But working out the nuances of damage payment is no simple matter, as the presenter describes in conversation with an MIT Museum audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • Webcasts // Jan 2011

    The Register Webcast - Thinking about moving to service delivery?

    Thinking about moving to service delivery? Published: 1 Jan 2011 For years, most organizations have been managing the components of IT, with a primary focus on the performance and availability of specific assets. Those who think deeply on such things, however, reckon it's all changing. In the future, it's...

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • Webcasts // Oct 2010

    Podcast: The Promise of Content-Aware Identity and Access Management

    The Promise of Content-Aware Identity and Access Management Published: 13 Oct 2010 This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy. Please view to learn more.

    Provided By CA

  • Webcasts // Mar 2011

    In today's uncertain economy, mid-sized organizations are pressured to do more with less?to cut costs and reduce risks, to increase revenues and productivity, and to get more value from information technology.

    With heterogeneous environments, rigid systems, proprietary applications or technology and siloed information across the enterprise, deployment of new applications and services can be time consuming. IBM WebSphere provides the solutions for any size company to to cut costs and reduce risks, to increase revenues and productivity, and to get more...

    Provided By IBM

  • Webcasts // Mar 2011

    Video: Enabling Smarter Collaboration: Web Portals and Mashups

    Web portals have long been a way to connect to the applications, colleagues and data employees need to get things done. With the introduction of social networking features, collaborative tools, and mashup technology, portals are now a powerful tool to improve productivity, quickly satisfy customers, and use information to work...

    Provided By IBM

  • Webcasts // Feb 2011

    Oracle Systems Strategy with John Fowler Webcast

    Hear John Fowler, Executive Vice President, Systems, provide an update on the strategy and roadmap for Oracle's Sun servers, storage and complete systems including Oracle Solaris. The webcast features how Oracle systems are optimized to run Oracle software, with systems built on open standards that work with your existing infrastructure...

    Provided By Oracle

  • Webcasts // Apr 2010

    From Relief To Reconstruction ? Practical And Policy Challenge

    As the United Nations and worldwide NGOs face the challenges of providing basic services to the survivors of the January 2010 Haitian earthquake, the author scrutinizes what will ultimately be "Crucial to the outcome, in the Haitian context, of a successful recovery and rehabilitation by the Haitian people and for...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Planning The Response: Establishing The Impacts And Identifying The Parties At Risk

    The Deepwater Horizon disaster spread through not just a vast coastal ecosystem, but into diverse human communities lining the Gulf, many entirely dependent on the sea for their livelihoods. These three panelists describe their involvement in quite disparate response projects, which began shortly after the oil began gushing, and in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    What Dell Virtualization Solutions Can Do for Your Business

    What's your greatest motivation for considering virtualization? Chances are, it's the cost savings. Yes, virtualization will save you money, but it will also do so much more. Watch this short, informational video to discover all the benefits Dell Virtualization Solutions has to offer, including making IT more agile, improving quality...

    Provided By VMware

  • Webcasts // Apr 2011

    Elevator Pitch: NPower Peg

    Can one Imagine going for a walk or a run and generating enough power to do things like charging the cell phone? The elevator pitcher says his product is a back-up battery designed to harvest the energy created by basic, human movement. Let's find out if the panelists get a...

    Provided By American Express Company

  • Webcasts // Sep 2010

    Crowds and Clouds: Data, Sheep, and Collaboration in the Works of Aaron Koblin

    Where others see just data points and fodder for bar graphs, presenter visualizes dynamic systems where information assumes forms both abstract and familiar. In this talk, presenter shares recent projects that meld statistical science and art to convey a really big picture, while often inviting the viewer to partake in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    B2B Data Transformation Accelerator

    See how easy it is to specify a mapping by examining schemas and input samples, dragging and dropping between source and target, using predefined functions to build expressions, and testing specifications using real data.

    Provided By Informatica

  • Webcasts // Apr 2011

    B2B Data Exchange and B2B Data Transformation Demo

    Find out how Informatica's B2B products?Data Transformation and Data Exchange?enable multi-enterprise data to be leveraged to support these strategic business objectives.

    Provided By Informatica

  • Webcasts // Feb 2011

    American Business: Betrothed To Business

    The advantages of working with your significant other can be quite obvious, but there are some clear drawbacks as well. Would you feel comfortable managing your better half? How would you handle taking work home with you? Meet a husband and wife business team who've been able to successfully navigate...

    Provided By American Express Company