Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Aug 2012

    Realizing the Promise of Big Data with Hadoop (Forrester, Relay Health)

    Apache Hadoop, an open-source platform, is increasingly gaining adoption within organizations trying to draw insight from all the big data being generated. Hadoop, and a handful of open-source tools that complement it, are promising to make gigantic and diverse datasets easily and economically available for quick analysis. A burgeoning partner...

    Provided By Cloudera

  • Webcasts // Aug 2012

    WEBCAST: File Consolidation: Maximizing storage density and high-availability for your Microsoft Environment

    Explosive data growth is creating unsustainable data management requirements and driving you to rethink your file-serving environment. Attend this Webcast to gain valuable information: Learn how to centralized your storage without the need for a separate storage area network for your virtualized environments Discover the key factors to...

    Provided By HP and IntelĀ®

  • Webcasts // Aug 2012

    WEBINAR: File Consolidation: Maximizing storage density and high-availability for your Microsoft Environment

    Explosive data growth is creating unsustainable data management requirements and driving you to rethink your file-serving environment. Attend this Webcast to gain valuable information: Learn how to centralized your storage without the need for a separate storage area network for your virtualized environments Discover the key factors to...

    Provided By HP and IntelĀ®

  • Webcasts // Aug 2012

    Google I/O 2012 - HTML5 at YouTube: Stories From the Mobile Front

    Is HTML5 ready for production code? This webcast is to look into all the different HTML5 technologies that they use in live code at YouTube. The user will have a collection of tips, tricks, and best practices for HTML5 video, the track tag, getUserMedia, and more. Plus a deep dive...

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Security and Privacy in Android Apps

    Android provides features and APIs that allow development of secure applications, and one should be using them. In this webcast, the presenters start with an overview of Android platform security features, then dig into the ways that one can leverage them to protect the users and avoid introducing vulnerabilities.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    OO Design for Testability

    In this Webcast, the presenter explains about design of code for performance, maintenance, simplicity, extensibility and other goals, but most of them do not think about testability as a design goal, yet verifying the correctness of their code is of great importance. What does it mean to have testable code,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Getting More From the Google+ Platform

    The user have implemented some Google+ platform features and now the user want more. In this webcast learn the how, why, and measurement of increasing engagement on their content wherever it might be. In this webcast, the presenter will do a deep dive on best practices and implementation of the...

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Doing More With Less: Being a Good Android Citizen

    Faster and lighter is better, especially on mobile devices with limited resources. In this webcast learn advanced techniques to optimize for CPU, RAM, and I/O efficiency, and best practices for using JNI and SQLite.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    GTAC 2009 - Fighting Layout Bugs

    So the user have unit tests, integration tests, and maybe even frontend tests, and they know that their web application does what it is supposed to do. But what about layout bugs? How do they ensure, that every page looks like the designers wanted it to look like? In this...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    Best Practices for Microsoft Exchange Post-Migration Operations

    In this webcast, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post Exchange migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration...

    Provided By Dell Software

  • Webcasts // Jul 2012

    The Lazy Programmer's Guide to Secure Computing

    In this webcast, the presenter starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. The presenter also defines the Principle Of Least Authority(POLA), and explain why it is a best practice for secure programming.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    Conquering Costly Compression for Oracle Backups

    Running database backups with Oracle's standard compression feature can require tremendous amounts of time - and deploying Oracle's Advanced Compression solution across the business is expensive. Protecting your Oracle data shouldn't be costly and risky! In this on-demand webcast, see how LiteSpeed Engine for Oracle cuts storage costs, reduces...

    Provided By Dell Software

  • Webcasts // Jul 2012

    Internet Systems Consortium's SIE & Google Protobufs

    ISC SIE (Security Information Exchange) is a trusted, private framework for information sharing in the Internet Security field. Participants can operate real time sensors that upload and/or inject live data to SIE, and other participants can subscribe to this data either in real time, or by query access, or by...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    LISP Part 1: Problem Statement, Architecture and Protocol Description

    In this webcast, the presenter will describe the initial problem statement LISP was created for. LISP is taking the overloaded semantics of the IP address, where a network device's identity address and location address are separated so one can keep one of the addresses fixed and while changing the other.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    UpSizeR: Synthetically Scaling Up a Given Database State

    E-commerce and social networking services must ensure that their systems are scalable. Engineering for rapid growth requires intensive testing with scaled-up datasets. Although, such a larger dataset is synthetically generated, it must be similar to a real dataset if it is to be useful. This webcast presents UpSizeR, a tool...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    2010 Google Faculty Summit: Cloud Computing and Software Security

    Software-as-a-service can provide great benefits, such as ubiquitous, reliable access to data, but cloud computing also raises new challenges and opportunities for computer security. In this webcast, the presenter is briefly outline some of these issues and potential research topics in cloud security, with examples from Google's past and current...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Defeating the Password Anti-Pattern with Open Standards

    Passwords can leak through a variety of channels: users tend to re-use passwords across web sites, get phished, attacked by malware, etc. Most would agree that password-based authentication is not very secure. So why do the people still live in an online world dominated by passwords? In this webcast the...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Jun 2012

    Executive Mobility Solutions Overview

    For executives, work is not a place. It's what they do wherever and whenever business needs to be done, and now they want to do it all from the coolest devices. In this webcast, the presenter explains about how Citrix executive mobility solutions enable executives to increase their productivity, improve...

    Provided By Citrix Systems

  • Webcasts // Jun 2012

    Black Hat Spam SEO

    For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this phenomenon and recently announced that fake antivirus pages now represent 60% of the malware associated with popular search terms and these attacks continue to grow...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    Blinding Curiosity: Supporting User Preferences and Privacy Within Workplace Awareness Applicastions

    Awareness systems are an emerging class of technologies that enhance communication and connections between people in both business and social settings. MyUnity, a prototype awareness platform designed and developed at FXPAL for use in the workplace collects a myriad of data from a variety of sensors and sources, fuses the...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    Douglas Crockford: Principles of Security

    In this webcast, the presenter outlines the basic principles of designing secure software, with a focus on web applications. The presenter starts at the beginning (almost literally - with the invention of language itself) and makes a strong case for designing secure software based on fundamental principles rather than specific...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    6.033: Computer Systems Engineering

    In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2012

    A Geek's Guide to Digital Forensics

    In this webcast, the presenter will provide a technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting. The presenter will also provide a brief background on forensics and important concepts including acquisition and verification techniques.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Crockford on JavaScript - Part 5: The End of All Things

    In this webcast, the presenter will concludes his five-part lecture series on the JavaScript programming language. The presenter going to review about the issues related to security and performance in JavaScript.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Cisco Unified CallManager and IP Phone Security

    In this webcast, the presenter going to focus on CUCM fundamentals & implementation, review of the security by default feature introduced in CUCM 8.x, upgrading CUCM 7.x to 8.x, & the rollback method from CUCM 8.x to 7.x.

    Provided By Cisco Systems

  • Webcasts // Apr 2012

    Mark Kawakami: Finger Tips: Lessons Learned From Building a Touch-Based Experience

    In this webcast, the presenter takes the user through some lessons learned in building touch-based experiences for one of the most popular websites on the internet. The presenter also going to explain about the I-hacker.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Optimize Your Data Center with SPARC and Solaris 11

    More capacity, higher availability, greater security, lower costs - the demands being placed on IT are growing every day. Can your servers and operating systems keep up with these demands? Or do legacy systems add complexity, impede performance and drain resources? Watch our new Webcast to see how Oracle's Solaris...

    Provided By Oracle

  • Webcasts // Apr 2012

    Protect Critical Oracle Data Without Risk - or Destroying the Budget!

    Running database backups with Oracle's standard compression feature can require tremendous amounts of time - and deploying Oracle's Advanced Compression solution across the business is expensive. Protecting your Oracle data shouldn't be costly and risky! In this on-demand webcast, see how LiteSpeed Engine for Oracle cuts storage costs, reduces...

    Provided By Dell Software

  • Webcasts // Mar 2012

    Introduction to VMware vSphere Storage Appliance

    This presentation will be available to audience members until August 23, 2012 at 09:00 AM Pacific Daylight Time. Business continuity is a top concern for small and midsize businesses (SMBs), who rely on their applications to keep their businesses running. VMware vSphere 5, the industry's leading virtualization platform, enables...

    Provided By VMware

  • Webcasts // Mar 2012

    Matt Seeley: Lessons From the Yahoo! Tablet Front Page

    In this webcast, the presenter shares lessons learned from building the tablet version, including an overview of the tablet landscape, best practices to deliver UIs to multiple viewports, and @font-face and @media rule usage across iPad and Galaxy.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Optimizing Android Apps With Google Analytics

    Thousands of apps have taken advantage of Google Analytics' native Android tracking capabilities to improve the adoption and usability of Android Apps. This webcast covers best practices for tracking apps on mobile, TV and other devices. The presenter also shows the user how to gain actionable insights from new tracking...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Taking Android to Work

    More and more people are bringing Android devices into enterprise environments. In this webcast, the presenters will cover general enterprise adoption considerations and related Android features. They will also provide an overview of security issues, managed internal app development, corporate app directories, and an in-depth look at a sample implementation...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Building Android Apps for Google TV

    In this webcast, learn how to create new apps or enhance existing Android apps for Google TV. Session includes an overview of the platform, best practices, demos, and discussion about the fantastic opportunities Google TV creates for developers.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Oracle Storage Strategy Update

    New digital data will double over the next four years, and is expected to increase from 1,200 exabytes in 2010 to 35,000 exabytes in 2020, a growth of 29X. Architecturally, the world has evolved so that applications, data, and storage are separated. The challenge, then, is to align these key...

    Provided By Oracle

  • Webcasts // Mar 2012

    Introduction to VMware vSphere 5

    This presentation will be available to audience members until August 16, 2012 at 09:00 AM Pacific Daylight Time. The foundation of the new VMware Cloud infrastructure Suite is VMware vSphere5, the most trusted, widely deployed virtualization platform in the world. Architected to support the broadest range of virtual and...

    Provided By VMware

  • Webcasts // Mar 2012

    Google I/O 2011: Evading Pirates and Stopping Vampires

    In this webcast, the presenter explains about best practices for using the License Verification Library and In-App Purchases on Android Market. It also explains how to integrate a server-side component for license validation and content delivery, describing the reference implementation that they built using App Engine.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: How to NFC

    Gingerbread brings a comprehensive NFC reader/writer API, and some modest but surprisingly powerful P2P support. In this webcast, the presenter explains about how the users' should care about NFC technology, what kinds of applications are possible right now, and best practices for deployment.

    Provided By Oleksiy Kovyrin

  • Webcasts // Feb 2012

    Avi Rubin: All Your Devices Can Be Hacked

    Could someone hack the pacemaker? In this Webcast, the presenter explains how hackers are compromising cars, smartphones and medical devices, and warns about the dangers of an increasingly hack-able world.

    Provided By TED Conferences

  • Webcasts // Feb 2012

    SEI Technologies Forum: Software, Security, and Resiliency

    In this webcast, the presenter going to explain about the opening remarks at the SEI technologies forum. The presenter will explain how the SEI technologies can help the organizations applied and improved in their software technologies.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Apr 2009

    The Illegal Drug Trade; Obamas Trip To Turkey; And Cuba

    In this webcast, Latin America Initiative Director, one of the presenters and a panel of experts discuss a new report on the illegal drug trade and organized crime in Latin America; Governance Studies Vice President and Director, the other presenter, takes at look at President Obama's meeting with leaders from...

    Provided By Brookings Institution

  • Webcasts // Mar 2009

    Janet Napolitano On Homeland Security; Jim Steinberg On Foreign Policy; Credit Card Gouging

    In this webcast, a U.S. Homeland Security Secretary, one of the presenters, talks homeland security issues along our northern border; Deputy Secretary of State, the other presenter addresses the foreign policy challenges facing the fledgling Obama administration; and the man of the street sounds off on credit card gouging.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    Partisanship On Capitol Hill

    Brookings takes an in-depth look at the polarizing effects of partisanship on Capitol Hill. Senior Fellow assesses the situation and offers some insight into how this way of doing business will affect the midterm elections.

    Provided By Brookings Institution

  • Webcasts // Feb 2010

    Education And President Obamas Budget

    When President Obama's proposed budget was released, education was declared among the "Winners." In this webcast, the presenter says the proposed spending increases will make reform advocates smile, but could leave state legislators cold about the shift from state to federal funding.

    Provided By Brookings Institution

  • Webcasts // Oct 2009

    Closing Schools For H1N1 Flu; Children At Risk Of Abuse; Iran

    Brookings expert says closing schools to keep kids safe from the flu may come with a big price tag for the economy; scholars and a member of Congress debate the efficacy of home visitation for children at risk of abuse and neglect; and the man on the street discusses nuclear...

    Provided By Brookings Institution

  • Webcasts // May 2010

    The Senate Filibuster

    The founding fathers viewed the Senate as a place where heated rhetoric could cool down, but today the upper chamber is just as fiercely partisan as the House. The presenter describes the origins of the filibuster and why the idea of allowing one Senator to block Senate business has its...

    Provided By Brookings Institution

  • Webcasts // Jan 2010

    PLD: How Will Organizations Benefit?

    When leaders in a single domain gain a broader business foundation, valuable contributions follow.

    Provided By President and Fellows of Harvard College

  • Webcasts // Jan 2009

    Five Ways to Reduce Your IT Audit Burden

    Most organizations spend 30-50% more on compliance than they should. The good news is that compliance can be achieved effectively and efficiently and the attendee of this webcast will learn five key methods to streamline the compliance efforts and reduce the IT audit burden.

    Provided By CXO Media

  • Webcasts // Jan 2009

    Protecting PII: How to Work With IT to Manage Risk

    Privacy professionals must make sure their IT organization is employing responsible privacy practices that will ensure the safety of their company's business-critical data or face significant fines. Understand the critical nature of the test data privacy problem and tips on how to work with IT to implement a test data...

    Provided By CXO Media

  • Webcasts // Jan 2009

    Barracuda Spam & Virus Firewall Introduction

    This webcast will give introduction of Barracuda spam & virus firewall.

    Provided By Barracuda Networks

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva

  • Webcasts // Jan 2011

    User Rights Management for Databases

    In this webcast, the presenters say about User Rights Management for Databases (URMD) enables security, database administrators and audit teams to review rights associated with sensitive data and identify excessive or dormant rights based on organizational context and actual usage. In this webcast, will see how URM is used to...

    Provided By Imperva

  • Webcasts // Jan 2011

    Using Cookie Poisoning to Bypass Security Mechanisms

    In this webcast, the presenters say about cookie poisoning attacks. Cookie poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Webcasts // Apr 2014

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Feb 2010

    Made To Stick: Sparking Curiosity

    Dan Heath, co-author of Made to Stick, speaks with Fast Company about how to get one's ideas across through the power of testable credentials.

    Provided By American Express

  • Webcasts // Dec 2009

    It's Raining Clothes

    A designer who makes some stylish clothes out of discarded umbrellas and gives clients new looks all the time, now gets a makeover of her own.

    Provided By American Express

  • Webcasts // Mar 2010

    When Times Are Tough, Focus On Product

    Despite the economy, Diane von Furstenberg, Founder and Chairman of DVF Studio, LP, proclaims "We have been surfing the tsunami beautifully." In this webcast she explains that her approach in difficult economic times was to focus on the product and basic rules of supply and demand.

    Provided By American Express

  • Webcasts // Feb 2010

    American Business: A Rockin#$# Business

    What do you do when you feel like your business has lost its identity? Members of the band "Third Eye Blind" know that situation all too well. After years in the mainstream, they took back control of their brand by going independent.

    Provided By American Express

  • Webcasts // Jun 2010

    Disaster In The Gulf: Small Business Struggles

    The oil spill in the Gulf region is having a disastrous effect on the environment and on the bottom line of thousands of small businesses. Sen. Mary Landrieu of Louisiana, chair of the Senate Small Business Committee, talks about the chances of entrepreneurs being compensated for their losses.

    Provided By American Express

  • Webcasts // Jan 2010

    Want A Great Product? Roll The D.I.C.E.

    Guy Kawasaki, founder of alltop.com, discusses the four qualities that every product should strive for: Deep, Intelligent, Complete, and Elegant. In this webcast he explains how products with these qualities push businesses to the next level.

    Provided By American Express

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Provided By Centrify