Software

TechRepublic covers the latest trends in software development and implementation.

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Attacks on UEFI Security, Inspired by Darth Venamis's Misery and Speed Racer

    On modern Intel based computers there exist two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Finding the Weak Crypto Needle in a Byte Haystack

    Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Reproducible Builds - Moving Beyond Single Points of Failure for Software Distribution

    Software build reproducibility is the ability to use independent build machines to compile bit-identical binaries from program source code. In this webcast, the presenters will discuss the motivation for and the technical details behind software build reproducibility. They will describe the technical mechanisms used by the Tor project to produce.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Android Hacker Protection Level 0

    Have no fear, after drinking all the cheap wine two Android hackers has attacked all the protectors currently available for everyone's enjoyment! Whether the user have never reversed Android before or are a hardened veteran there will be something for the user, along with all the glorious PoC tools and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abuse of Blind Automation in Security Tools

    It is impossibly overwhelming for security personnel to manually analyze all of the data that comes to them in a meaningful way. Intelligent scripting and automation is key. This webcast aims to be a humorous reminder of why the word \"Intelligent\" really matters; the user's security devices might start doing...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Some Vulnerabilities are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild

    The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. For example, the count and severity of vulnerabilities in source code, as well as the corresponding attack surface, are commonly used as measures of a software product's security....

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Test Driven Security Testing

    As more and more businesses are moving to rapid application development frameworks, and methodologies. The presenter find that testing within these constructs to become more difficult due to shorter cycles, incomplete applications, limited staff and resources. How do they test within these frameworks leveraging existing people, and infrastructure to provide...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Model Bedfellows

    The penetration test finds a bug in the code that was coded four months ago and could have been prevented a year ago during requirements gathering. The vendor says they will fix it shortly after the software launches - if a change order is issued and they're paid for their...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Automatically Detecting Vulnerable Websites Before They Turn Malicious

    Significant recent research advances have made it possible to design systems that can automatically determine with high accuracy the maliciousness of a target website. While highly useful, such systems are reactive by nature. In this webcast, the presenter will take a complementary approach, and attempt to design, implement, and evaluate...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread

    Many developers today are turning to well established third-party libraries to speed the development process and realize quality improvements over creating an in-house proprietary font parsing or image rendering library from the ground up. Efficiency comes at a cost though: a single application may have as many as 100 different...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Hacking the Wireless World with Software Defined Radio-2.0

    Wireless systems, and their radio signals, are everywhere: consumer, corporate, government, amateur - widely deployed and often vulnerable. If the users have ever wondered what sort of information is buzzing around them, in this webcast, the presenter will introduce how the user can dominate the RF spectrum by 'Blindly' analyzing...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

    Bot herders deploy Command and Control (C&C) panels for commanding and collecting exfiltrated data from the infected hosts on the Internet. To protect C&C panels, bot herders deploy several built-in (software-centric) protection mechanisms to restrict direct access to these C&C panels.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Time Trial - Racing Towards Practical Remote Timing Attacks

    Attacks on software become increasingly sophisticated over time and while the community has a good understanding of many classes of vulnerabilities that are commonly exploited, the practical relevance of side-channel attacks is much less understood. One common side-channel vulnerability that is present in many web applications today are timing side-channels...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    So You Want to Murder a Software Patent

    Software patents are a huge source of controversy and discussion in the tech world. This semi-hilarious legal story will cover the experience of the case, the details, and how the entire process went down. Hopefully some combination of entertainment, education and insight will ensue.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    CISO Perspectives: Aligning Secure Software Application Development with Business Interests

    Software security is first, and foremost, a business problem. Attackers have learned that nearly all web applications can be exploited via application-level vulnerabilities. Using any one of a long list of common entry points, an attacker can make the software misbehave in a variety of ways, including granting access to...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    BSIMM: A Decade of Software Security

    Now, at the end of a decade of great progress in software security, the way of measuring software security initiatives called the BSIMM. BSIMM is helping transform the field from an art into a measurable science. In this webcast, the presenter will provide an entertaining review of the software security...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    C+11 Metaprogramming Technics Applied to Software Obduscation

    Obfuscation is the transformation of source or binary code into a form that is difficult to understand, but without affecting the functionality of the code. Goals of obfuscation are multiple: hide a secret or logic, make code harder to reverse engineer, protect intellectual property, prevent tampering, etc.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • Webcasts // Aug 2014

    The Open Crypto Audit Project: Our Story

    Join the presenters for the story of the origins and history of the Open Crypto Audit Project (OCAP). OCAP is a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt. Their charter is to provide technical assistance to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2014

    Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

    Graphical User Interfaces (GUIs) contain a number of common visual elements or widgets such as labels, text fields, buttons, and lists. GUIs typically provide the ability to set attributes on these widgets to control their visibility, enabled status, and whether they are writable. While these attributes are extremely useful to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Jul 2014

    5 Tips From Intuit For Implementing Static Code Analysis

    Poor software quality has become one of the most expensive topics in human history with costs exceeding $500 billion per year worldwide. However, 97% of software defects can be removed through code review, static analysis and unit testing. Learn how the implementation of static analysis at Intuit led to reduced...

    Sponsored By Coverity

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • Webcasts // Feb 2006

    TechNet Webcast: Using InfoPath With Lotus Notes and Lotus Domino (Level 200)

    Using Microsoft Office InfoPath, information workers can collect, present, edit, and publish data. XML is at the heart of InfoPath and gives it versatility. What some of them may not know is that many of the features of InfoPath enable it to work with IBM Lotus Notes and IBM Lotus...

    Provided By Microsoft

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Jun 2011

    Blocks + Computing = A New Kind of Interface

    The startup Sifteo, based in San Francisco, will bring to market handheld, computerized cubes that can sense each other and run a variety of interactive programs. Recently, Technology Review got a chance to review the blocks ahead of their launch. By adding computing power to blocks, the founders hope they...

    Provided By MIT

  • Webcasts // May 2011

    Sony Sets Its Sights on Augmented Reality

    Sony has demonstrated a new augmented reality system called Smart AR that can be built into the company's future gaming devices. Augmented reality involves mapping virtual objects onto a view of the real world, usually as seen through the screen of a smart phone. The technology has so far been...

    Provided By MIT

  • Webcasts // May 2011

    Making 3-D Models From Your Photos

    The design software company Autodesk will release free software next week that could turn those snapshots into one's own personal replica from a 3-D printer. Called Photofly, the software extracts a detailed 3-D model from a collection of overlapping photos.

    Provided By MIT

  • Webcasts // Jun 2009

    The State of System i (AS/400) Security 2009

    The presenter will review a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Aug 2011

    How Palo Alto Networks Achieved Next-Gen Customer Support by Integrating their IVR and CRM Solution

    Presented by Matthew Stauble, Sr. Director, Global Customer Support at Palo Alto Networks, this Webinar outlines the steps involved in transforming its customer support from a random, manual call answering process to a completely automated system for their inbound calls. Hear how this fast-growing network security company moved to a...

    Provided By ANGEL

  • Webcasts // Feb 2011

    EchoSign Webinar: Close More Deals with eSignatures: March 9, 11am PT (1pm CT / 2pm ET)

    See how E-signatures can be your secret weapon in closing deals faster and improving sales performance. Attend this webinar for a live product demo and learn: How to make any document a signable contract by adding fields for initials, signatures or free form content on the fly How...

    Provided By EchoSign

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Jan 2014

    Cloud Webinar: Creating Outstanding Customer Experiences

    How do you ensure great customer service? Adaptable demand management? Quickest delivery times? Best customer experience? Sign up for our upcoming webinar now to find out how Made.com, Gondola Group (owners of Pizza Express, Zizzi, Ask), and fancy dress manufacturer and retailer, Smiffy’s tackle these questions with the support of...

    Provided By Adapt

  • Webcasts // Apr 2010

    Microsoft Career Webcast: Meet women at Microsoft showcasing 3 Services roles they excel at and love to do

    Meet up to 12 different women from Microsoft Services and learn how they are helping our customers succeed. We are holding four webcasts to accommodate four different time zones on the three roles below. We hope you will join the one that works best for you. The Consultant: Meet...

    Provided By Microsoft Corporation

  • Webcasts // Sep 2009

    Live Event: Helpdesks without Boundaries: How Today's IT Teams Support Worldwide Users

    Since the Internet opened up the IT world, there's been an exponential increase in the types of users that internal IT needs to support. Yesterday's well-defined, everyone-behind-the-firewall organization has given way to organizations that know no boundaries, and include employees, virtual employees, contractors, customers, partners, vendors, and regulators. For...

    Provided By LogMeIn

  • Webcasts // Sep 2009

    Live Webinar: Helpdesks without Boundaries: How Today's IT Teams Support Worldwide Users

    Since the Internet opened up the IT world, there's been an exponential increase in the types of users that internal IT needs to support. Yesterday's well-defined, everyone-behind-the-firewall organization has given way to organizations that know no boundaries, and include employees, virtual employees, contractors, customers, partners, vendors, and regulators. For...

    Provided By LogMeIn

  • Webcasts // Jan 2010

    Application Virtualization: Easy Application Distribution at Last?

    Application Virtualization is a breakthrough technology that eliminates a number of issues that inherently make application deployment so complex. Are the days of the Windows Installer-based deployments numbered? Microsoft has already removed Windows Installer as a logo requirement for Windows 7. How will these changes affect administrators focused on application...

    Provided By KACE

  • Webcasts // Jan 2010

    Robust, Scalable Systems Management without the Overhead of Software-only Solutions

    Effective systems management is a tough job, especially for larger organizations. With thousands of PCs and servers to manage, the demands of a growing, diverse and often far-flung user base means dedicating a large team and significant time to implementing and administering a systems management solution. Hear from Francois Chevalier,...

    Provided By KACE

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Provided By Veeam Software

  • Webcasts // Mar 2009

    Protect Your Applications from SQL Performance Problems

    Poor performance of the SQL ends up extremely disruptive to a business by casing the application to run very slow, and the only way one can over come this issue is to optimize both dynamic and static SQL problems before they could reach the production stage. In this webcast the...

    Provided By Neon

  • Webcasts // Sep 2011

    Develop & Test for Massive Scalability with Travelport

    In this webinar, learn firsthand how to: Proactively architect and test for scalability and performance as early as possible Manage collaboration within a globally-distributed development organization with numerous 3rd-party contractors with a common performance system and common data Avoid wasting time chasing dead-ends and focusing in on the true...

    Provided By dynaTrace software

  • Webcasts // Jan 2010

    Responding to Today's Demands with a Dynamic Infrastructure

    Listen to this webcast to hear IBM executives and clients discuss a host of new offerings that deliver and support a dynamic infrastructure. Register and receive a complimentary e-kit.

    Provided By IBM Corp.

  • Webcasts // Nov 2010

    Keeping Customers Happy in a Highly Competitive Environment

    Keeping your customers happy is a critical success factor for any business. However, effective customer retention strategies can be difficult to quantify. In this real world case study, learn how National Motor Club faces this challenge every day. Follow their analysis of customer retention, from basic data on customer, attributes,...

    Provided By Tableau Software

  • Webcasts // Dec 2009

    XD Platform Webinar

    With ever-increasing object sizes, network connectivity challenges, device types and user expectations, businesses are looking for advanced CDN technology. Technology that helps deliver content more intelligently and consistently, provide richer user experiences, and monetizes their valuable online content. Discover the genius behind the Limelight Networks XD Platform, how it takes...

    Provided By LimeLight

  • Webcasts // Oct 2010

    Managing People You Can't See

    Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.

    Provided By Citrix Online

  • Webcasts // Apr 2011

    7 Deadly Sins of Online Training (and How to Avoid Them)

    Join Roger Courville, Webinar expert and author of The Virtual Presenter's Handbook, for a Webinar on how to plan, design and present like an online training pro.

    Provided By Citrix Online

  • Webcasts // Apr 2010

    Tools of Engagement: Presenting and Training in a World of Social Media

    Watch this on-demand webinar with social media expert Tom Bunzel and discover how you can employ the new Internet tools to strengthen your e-learning and presentation initiatives.

    Provided By Citrix Online

  • Webcasts // Mar 2010

    The Business Impact of a Workshifting Culture: Corporate America and the Mobile Workforce

    Watch this on-demand webinar with Justin Levy, General Manager of New Marketing Labs and 15-year workshifting veteran. Levy will discuss the evolution of corporate culture and how your company can prepare for an increasingly distributed workforce.

    Provided By Citrix Online

  • Webcasts // Mar 2010

    Up Your EQ (Engagement Quotient!) with 10 Practical Presentation Skills

    Research shows that trainers who can turn passive participants into active participants significantly improve learner retention rates. View this informative one-hour Webinar archive to learn how to accelerate your success with engaging learners in a live webinar. You will learn: How to avoid the worst-ever webinar mistakes...

    Provided By Citrix Online

  • Webcasts // Apr 2010

    Honing Your Webinar Presentation Skills: The Latest in Professional Development

    Presenting has always been a critical business skill. But with Webinars there's an added twist - you can't see your audience members, and they can't see you. So how do you get and keep their attention? During this Webinar Roger Courville, Webinar expert, researcher and author of the new...

    Provided By Citrix Online

  • Webcasts // Feb 2010

    "Dialing In" Has Changed Forever

    Virtually every business needs audio conferencing and it's a great low-cost tool for connecting your team. But the options available today are overwhelming and complicated features, non-intuitive controls, and low audio quality is common. So how do you select a solution that provides just the opposite? In this webinar,...

    Provided By Citrix Online

  • Webcasts // Mar 2010

    How Web Controls Are Changing Audio Conferencing

    While the advent of the Web changed the way we do just about everything, audio conferencing kept a steady low profile. Until now. The next generation of audio conferencing adds Web-based capabilities to the traditional infrastructure, making it easy to manage users and get real-time usage and billing reports;...

    Provided By Citrix Online