Project Management

Manage risk, take control of ERP, and grow your business with expert advice on the latest methodologies.

  • Transforming William Hill's IT Operations with CA

    Webcasts // Nov 2015 // provided by CA Technologies

    In a perfect world infrastructure wouldn’t fail, because systems are built to last, and customers' demands are predictable. However we don’t live in a perfect world and things break. For betting agency, William Hill, its Australian operations were facing an uphill battle with a limited messy IT operation that ...

    Watch Now
  • Virtual Presence: How to Inspire + Motivate in a Virtual Environment

    Webcasts // Nov 2015 // provided by Citrix Online

    In a virtual environment there are two critical parts to move people to action: emotional engagement +a clear call to action. Learn how to spur your audience to action by using stories and powerful language followed by a clear, compelling request. This webinar will focus on: The difference ...

    Watch Now
  • Russian Cyber Threat Groups - Could they compromise your Twitter Handle?

    Webcasts // Nov 2015 // provided by FireEye

    Cyber threat groups frequently design innovative ways to cover their tracks. In early 2015, a new malware emerged, which the analysts are calling HAMMERTOSS, from an advanced persistent threat (APT) group. The Russian attacker group that FireEye knows as APT29, employs HAMMERTOSS to compromise its targets. Using a variety of ...

    Watch Now
  • New Insights for Driving Cloud Strategy

    Webcasts // Apr 2015 // provided by Hewlett-Packard (HP)

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how ...

    Watch Now
  • Watch ObserveIT webinar on monitoring privileged users now!

    Webcasts // Oct 2014 // provided by ObserveIT

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Watch Now
  • Live Webcast: From Silence to Brilliance: How to Kick Off a Compelling Presentation

    Webcasts // Oct 2014 // provided by Citrix Online

    Join us for this LIVE event! Tuesday, November, 11 2014 11 AM (PST) / 2 PM (EST) Grab attention from the get-go. Lights! Camera! Crickets? Don't let the deafening silence of a disengaged audience derail your presentation. Join this webinar with Stanford Graduate School of Business educator and coach ...

    Watch Now
  • ZDNet APAC webinar: Business Intelligence on the move

    Webcasts // Sep 2014 // provided by ZDNet

    Join us for this LIVE event! Monday, 29 September at 3pm Australian Eastern Standard Time Business Intelligence used to be the domain of the experts, with small crews of data analysts controlling the flow of business insights. But a great democratisation is unfolding and not only is Business Intelligence being ...

    Watch Now
  • On-demand Webcast: Mastering the Virtual Sales Pitch

    Webcasts // Sep 2014 // provided by Citrix Online

    Making an online presentation has its unique challenges — but there are also countless opportunities for today’s savvy sales professional. Join Tim Wackel as he shares ideas on how to grow your sales (without growing your frequent flyer account). Attend this on-demand webinar to learn how to: Plan and ...

    Watch Now
  • A New Approach to Endpoint Data Protection

    Webcasts // Jul 2014 // provided by Druva Software

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the ...

    Watch Now
  • Top 5 Things Every C# Developer Should Know

    Webcasts // Jul 2014 // provided by Coverity

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?