Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Podcasts // Aug 2010

    Information About Microsoft's August 2010 OOB Security Bulletin Release

    This podcast speaks about Microsoft's newly releasing Out-of-Band Security bulletin which addresses security vulnerability in all supported editions of Windows and is currently being exploited in malware attacks.

    Provided By Microsoft

  • Podcasts // Jul 2010

    How Do I: Configure Report Security in SSRS?

    This podcast, the speaker tells about how configure SSRS report security using both default and custom roles This demo shows how to: grant a user access to a report & folder, grant group access to a report & folder, create a custom role in SSRS, configure users to utilize the...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Enable Transparent Data Encryption?

    In this podcast the speaker tells about how to use the transparent data encryption (TDE) feature of SQL Server 2008 Enterprise Edition. In addition to showing how to create the keys and certificates necessary to enable TDE, Scott encrypts the Adventure Works sample database.

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    Using the Microsoft Security Intelligence Report v8 in an Evolving Threat Landscape

    In this podcast, Frank provides a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input from over 500 million computers worldwide.

    Provided By Microsoft

  • Podcasts // Jul 2010

    Information About Microsoft July Security Bulletins

    This podcast gives a brief overview of the technical details of the July security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Jun 2010

    HP Strengthens Security Across Physical and Virtual Environments

    In this podcast, the speaker reveals that HP today announced new high-performance security solutions designed to prevent network breaches in a Converged Infrastructure by delivering comprehensive data protection across both physical and virtual environments.

    Provided By DABCC.com

  • Podcasts // Jun 2010

    Technical Introduction to System Center Data Protection Manager 2010

    It's here; Microsoft System Center Data Protection Manager (DPM) 2010 delivers unified data protection of Microsoft application, virtualization, and file servers and client workstations running Windows operating systems. This podcast highlights the new features in DPM 2010, including Microsoft SQL Server database auto-protection and self-restore, Microsoft Exchange 2010 database availability...

    Provided By Microsoft

  • Podcasts // Jun 2010

    Windows 7 Security Talk (Part 3 of 3): Data Protection & Security Guidance

    In this third podcast in the Windows 7 Security Talk series, speaker explain how the Windows 7 operating system helps protect sensitive corporate data, and they describe how to use Active Directory and Group Policy objects (GPOs) to secure the desktop environment.

    Provided By Microsoft

  • Podcasts // Jun 2010

    Security Talk: File Fuzzing for Fun and Profit

    Fuzzing is the most commonly used method for finding security flaws in software, but fuzzing can also be used by development teams to find and fix security holes before deployment. File fuzzing is a simple concept that is too often overlooked as a way to better secure applications that receive...

    Provided By Microsoft

  • Podcasts // Jun 2010

    Information About Microsoft June Security Bulletins

    This podcast will give a brief overview of the technical details of the June security bulletins. Speaker intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Jun 2010

    Windows Azure Security: A Peek Under the Hood

    Windows Azure uses a large, homogeneous, shared-hardware computing base to host a diverse collection of customer applications that are exposed to users from the Internet. And it's all built on top of Windows. How could that possibly be secure? In this installment of the Security Talk podcast series, Charlie Kaufman...

    Provided By Microsoft

  • Podcasts // May 2010

    Security Talk: Overview of the Microsoft Security Intelligence Report Volume 8

    In this podcast, speakers discuss the findings from the eighth volume of the Microsoft Security Intelligence Report - the most globally comprehensive report to date from Microsoft, covering 213 total countries and regions with deep dives into 26 countries and regions. This report has the most up-to-date information on the...

    Provided By Microsoft

  • Podcasts // May 2010

    IT Best Practices: How to Prioritize Your Projects to Reduce IT Costs

    This podcast talks about IT Best Practices: How to Prioritize the Projects to Reduce IT Costs, and learn how to immediately reduce costs and drive business value. Microsoft has identified 31 best practices to reduce IT costs. Many of these best practices are related to three data center management principles:...

    Provided By Microsoft

  • Podcasts // May 2010

    Windows 7 Security Talk (Part 2 of 3): Networking Security and Application Control

    In this second podcast in the Windows 7 Security Talk series, speakers cover the networking components of the Windows 7 operating system, including DirectAccess, Network Access Protection, and how to deploy Windows 7 in a secure manner with the utilization of AppLocker.

    Provided By Microsoft

  • Podcasts // May 2010

    Cloud Computing and Security: Can't We All Just Get Along?

    In this podcast, the speaker will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications. Security is considered the primary barrier to cloud computing adoption. Therefore, focusing attention toward minimizing security risks offers the potential for increasing cloud computing...

    Provided By O'Reilly

  • Podcasts // May 2010

    Security Talk: Using Standards-Based Internet Explorer Features to Protect Apps

    If one is building mash ups and other Web applications, what does one need to know to make sure that one is building secure applications that don't expose security vulnerabilities? What does one needs to consider when building the applications and using features from HTML5, HTML4.01, and other important features...

    Provided By Microsoft

  • Podcasts // May 2010

    Information About Microsoft May Security Bulletins

    This podcast gives a brief overview of the technical details of the May security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // May 2010

    Spear Phishing: A Smarter and More Dangerous Social Web

    In this podcast, the speaker explores a future-looking forecast about targeted attacks on identity, email, and data on the internet. What happens when every ad doesn't feel like spam because of increased information sharing and improving analytics? Spear phishing is the next-generation of e-mail phishing - except citizens, companies, and...

    Provided By O'Reilly

  • Podcasts // May 2010

    Project Server 2010 - Backup and Restore

    In this podcast, speakers explain the process for performing backup and restore in Project Server 2010. The supported scenarios they cover include mirroring (with and without witness), restore over existing farm, and restore into a new farm. They explain the tools in Central Admin, command line, PowerShell, and Microsoft SQL...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Security Talk: Security Best Practices for Design and Deployment on Windows Azure

    Developing secure applications and services in the cloud requires knowledge of the threat landscape specific to the cloud provider. The key understands threat mitigations implemented by the cloud architecture versus those that are the responsibility of the developer. This podcast will help to learn about the threats that are specific...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By O'Reilly

  • Podcasts // Apr 2010

    Eight Ways Internet Explorer Helps Protect Your Users While Online

    Windows Internet Explorer 8 provides many features that help protect one from online threats. Do people know what the top eight protection features in Internet Explorer 8 are and how these features operate differently on different operating systems? In this podcast, speaker take an in-depth look at the top eight...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Message Scan

    This podcast shows how to configure Microsoft Forefront Security for Exchange Server to scan messages that are in the store and as they are accessed. In this podcast the speaker explains how to configure file filters, content filters and email notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Remove Files

    This podcast shows how to use Forefront Server Security for Exchange server to scan the existing messages within an Exchange mailbox store for specific files and then remove them. In this podcast he shows how to configure a manual scan job to search for files of a particular type, generate...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 3

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In this, podcast of aseries of 3, the speaker explains how to configure alerting using the management console and discuses the use of filters to...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 1

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In the first podcast in this series, the speaker explains how to install the console and then create a package to deploy Forefront Security for...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Incoming E-mail Scan

    This podcast explains how to configure Microsoft Forefront Security for Exchange Server to scan incoming and outgoing emails. In this podcast the speaker explains how to configure file and keyword filters as well as configuring notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Quarantined E-mails

    This podcast explains how to manage emails and files that have been quarantined by Microsoft Forefront Security for Exchange Server. In this podcast the speaker shows how to configure the security mode for messages delivered from quarantine, how to export the incident and the quarantine log files, how to redeliver...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Information Protection Using Exchange 2010 and Active Directory Rights Management Services

    Exchange 2010 and Active Directory Right Management services integrate in order to provide Information Rights Management (IRM) in Exchange. IRM is used to protect messages at multiple levels, including in-transit mail as well as stored mail and voicemail, among others. In this podcast speaker speaks about the prerequisites for enabling...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Information About Microsoft April Security Bulletins

    This podcast gives a brief overview of the technical details of the April security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Apr 2010

    Microsoft Security Intelligence Report v7 in an Evolving Threat Landscape

    In this podcast the speaker discusses the Microsoft Security Intelligence Report (SIRv7). This podcast provides a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input from over 450 million computers worldwide. Speaker also addresses action-focused...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Windows 7 and Small Business Server Demo Series: (Part 5 of 7) How-To Improve Security

    This podcast is the fifth part of Windows 7 and Small Business Server Demo Series which speakes about the security improvements in Windows Small Business Server 2008 and Windows 7 Professional, including BitLocker, new BitLocker to Go, Encrypting File System, and a 125-day trial of Forefront Security for Exchange.

    Provided By Microsoft

  • Podcasts // Apr 2010

    Security Talk: Azure Federated Identity Security Using ADFS 2.0

    In this podcast, speakers explain how to create an Azure application using Active Directory Federation Services (ADFS) 2.0 Security Token Service (STS), previously known as Geneva Server, for back-end authentication. They also cover the following topics: The benefits of developing Azure applications using ADFS 2.0 STS Federated Identity, the development...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Information About Microsoft's March 2010 Out-of-Band Security Bulletin Release

    This podcast speaks about Microsoft's newly released an Out-of-Band Security bulletin to address attacks against customers of Internet Explorer.

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Regulatory and Standards Management in Compliance Mapper

    Application architecture and governance of laws and regulations for compliance and security are converging like never before. Since a single audit finding or open vulnerability can kill an application launch or drive costs up through remediation, it is critical to have a source of truth that is in line with...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Agile Security - Develop Code Rapidly and Securely With SDL-Agile

    Some security experts would have one believed that it is impossible to implement secure development practices using Agile development methodologies. Admittedly, the use of Agile does pose some challenges to traditional Security Development Lifecycle (SDL) processes. However, securing Agile projects is not impossible. SDL and Agile can be made to...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Delivering and Implementing a Secure Cloud Infrastructure

    This podcast helps to gain a good understanding of how Microsoft delivers a secure cloud computing infrastructure by implementing a special framework of processes and technologies. Before opening up the second half to discussion, some of the specific topics covered in the first half include:Physical securityNetwork securityData securityIdentity and access...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Protecting Your Data From the Application to the Database

    Securing a database is a difficult task and most efforts typically focus on locking down the server while still allowing authorized connections to occur. Application developers need to be security conscious also, not only because applications can be a target of attack, but also because applications can facilitate the further...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Harmonizing Security Compliance and the SDL

    As a result of new initiatives and requirements like the Payment Card Industry Data Security Standard (PCI-DSS), many organizations are building comprehensive application security programs for the first time. The proven success of the Microsoft Security Development Lifecycle (SDL) makes it a great model to follow, but it is important...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Data Governance for Privacy, Confidentiality, and Compliance: People and Process (Part 2 of 4)

    Maintaining the privacy and confidentiality of data and meeting the requirements of a growing list of related compliance obligations are top concerns for government organizations and enterprises alike. Data governance addresses many aspects of data management, including information privacy, security, and compliance. In this Security podcast, speakers examine the core...

    Provided By Microsoft

  • Podcasts // Jan 2014

    Enhance Security and Compliance Across Your SAP Infrastructure

    Compliance and security management principal for Novell, describes the certified and integrated technologies that Novell and SAP deliver to help the users' mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.

    Provided By Novell

  • Podcasts // Jan 2014

    Attaining Enterprise Wide Compliance with an SAP Certified Solution

    The SAP-certified Novell Compliance Management Platform extension for SAP environments provides a real-time, holistic view of all provisioning, access and security events across both SAP and enterprise IT infrastructure. Get added value from the users' SAP investments while enhancing organizational efficiency, compliance and security.

    Provided By Novell

  • Podcasts // Jan 2014

    Novell Compliance Management Platform: Integrated Identity, Access and Security Management

    The compliance management platform combines identity, access and security management technologies. This combination automates the process of granting users access to resources, while providing a real-time, holistic view of all network events enterprise wide.

    Provided By Novell

  • Podcasts // Jan 2014

    Files Matter Turn Challenges into Opportunities - Novell File Management Suite

    Data growth is making file management more and more difficult, but the users' can turn file challenges into opportunities to help their business grow. In this podcast, learn how Novell file management suite helps solve their issues and enables a truly mobile workforce.

    Provided By Novell

  • Podcasts // Jan 2014

    Managing Unstructured File Space using Novell File Management Suite

    In this podcast, learn how to describe to a customer how to manage unstructured file space - on a whiteboard, a napkin, or the back of an envelope using simple diagrams.

    Provided By Novell

  • Podcasts // Jan 2014

    Novell Storage Manager: Cross Empire Data Migration

    Server platform migrations can be costly and negatively affect user productivity. What's needed is way to migrate file and folder structures while protecting the integrity of security rights and other metadata.

    Provided By Novell

  • Podcasts // Sep 2009

    Cloud Security & Privacy

    In this podcast, the speakers explain about cloud computing's SPI delivery model, and its impact on various aspects of enterprise information security (e.g., infrastructure, data, identity and access management, security management), privacy, and compliance. Also explain the Security-as-a-Service (SaaS) and the impact of cloud computing on corporate IT.

    Provided By O'Reilly

  • Podcasts // May 2008

    The Top Five Log Analysis Mistakes

    In this podcast, the speaker will explains how to avoid the log analysis mistakes and how to get the most value out of various log files, generated by systems, applications and security devices.

    Provided By O'Reilly

  • Podcasts // May 2009

    iPhone Hacking - Intermediate & Advanced

    In this podcast, the speakers focus on the iPhone Hacks, involving hardware and software development. They targeted towards people who want to do more hardware and advanced hacks involving software development.

    Provided By O'Reilly

  • Podcasts // Jan 2010

    Cloud Security Deep Dive

    In this podcast, the speakers explore a deep dive into cloud security issues and focus on three specific aspects: data security; identity management in the cloud and governance in the cloud (in the context of managing a cloud service provider with respect to security obligations).

    Provided By O'Reilly

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By O'Reilly

  • Podcasts // May 2010

    Spear Phishing: A Smarter and More Dangerous Social Web

    In this podcast, the speaker explores a future-looking forecast about targeted attacks on identity, email, and data on the internet. What happens when every ad doesn't feel like spam because of increased information sharing and improving analytics? Spear phishing is the next-generation of e-mail phishing - except citizens, companies, and...

    Provided By O'Reilly

  • Podcasts // May 2010

    Cloud Computing and Security: Can't We All Just Get Along?

    In this podcast, the speaker will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications. Security is considered the primary barrier to cloud computing adoption. Therefore, focusing attention toward minimizing security risks offers the potential for increasing cloud computing...

    Provided By O'Reilly

  • Podcasts // Jan 2014

    Attacking CAPTCHAs for Fun and Profit

    CAPTCHAs are a potent mechanism to prevent web applications against automated form submissions. To analyze the strength of CAPTHA deployments on the internet, a research spanning hundreds of high traffic websites and several CAPTCHA service providers was conducted.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Million Browser Botnet

    Online advertising networks can be a web hacker's best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow the users' to broadly distribute arbitrary JavaScript - even malicious JavaScript. The users' are supposed to use this feature to show ads, to track users,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    HTML5/JS Security

    In this podcast, the speaker explores the vulnerabilities behind JavaScript, including: a new class of vulnerabilities unique only to JavaScript, vulnerabilities in 3rd-party platforms which are exploited through JavaScript code and HTML5 which is considered the NG-Javascript. In turn, HTML5 introduces a new set of vulnerabilities

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Running At 99% Surviging An Application DoS

    Application-level Denial-of-Service (DoS) attacks are a threat to nearly everyone hosting content on the internet. DoS attacks are simple to launch, but can be difficult to defend against. Modern websites are a diverse set of moving parts, and a malicious actor only needs to find the point at which any...

    Provided By SecurityTube.net

  • Podcasts // Oct 2013

    Simple, turn-key cloud orchestration

    Citrix CloudPlatform is a proven, turn-key cloud orchestration solution that makes it easy to build, manage and deliver highly scalable private, public and hybrid clouds. Enterprises and service providers can quickly and efficiently launch brand new production clouds at scale using their existing infrastructure. Watch video now!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Mature and proven cloud orchestration

    Citrix CloudPlatform is a mature and proven cloud orchestration platform, trusted to power the world’s leading public and private clouds, run mission critical application workloads and recognized as a market leader by industry experts. Watch video and learn more!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Jun 2012

    What is a ClickAppStore?

    Are you looking to empower the people in your organization working outside of the office to do a great job and make sure that the customers get the best service in the industry? ClickSoftware's mobility solution gives you the freedom of seamless mobility to drive your enterprise forward. ClickMobile is...

    Provided By ClickSoftware

  • Podcasts // Nov 2010

    Protect Yourself From Fraud

    Are the user vulnerable to potential identity theft? What's the risk? In this Webcast the presenter explains about various types of fraud (email, credit card, ATM, mail, check, and computer) plus steps one can take to protect their identity from criminals intent on stealing their money.

    Provided By BECU

  • Podcasts // Jun 2012

    It's the Putting Right That Counts

    In this Podcast, the speaker discusses about Flame malware. Flame malware involves mathematical breakthroughs, MPAA does not appose returning legitimate Mega-upload files to users. The speaker also discusses about flame malware disadvantages of Flame malware.

    Provided By RawVoice

  • Podcasts // Jan 2012

    Innovate 2012: Transform Your IT Processes With Collaborative Development and Operations

    Are you missing windows of opportunity for adopting new and innovative business solutions? Does a lack of collaboration and poor visibility across one IT organizations keep they from achieving their business objectives? The Collaborative Development and Operations track details best practices for aligning development and operations, including: collaboration and communication...

    Provided By IBM

  • Podcasts // Jan 2012

    5 Best Practices to Develop 5 Star Mobile Applications, Part 1

    In this podcast, the speakers will discuss the best practices and comprehensive set of capabilities for enterprise mobile application development and lifecycle management using an agile methodology. This tightly integrated solution - which leverages their open standards-based mobile application platform and ALM capabilities - delivers capabilities targeted at key mobile...

    Provided By IBM

  • Podcasts // Jul 2012

    Achieve the Five 9s of High Availability

    Achieve the Five 9's of Oracle Database High Availability If you think it sounds impossible to ensure just 6.05 seconds of downtime per week, you've got to check out this on-demand webcast. In it, a top expert on Oracle database replication reveals cool techniques that keep systems up and...

    Provided By Dell Software

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Podcasts // Oct 2012

    Oracle and Cloudera working together on Big Data

    Recent years have seen growing interest in various approaches to clouds and server virtualisation. So far, most cloud use cases focus on application servers. Yet, there are many reasons user organisations also need a "database cloud" for database management systems, data driven applications such as business intelligence and data warehousing...

    Provided By Oracle

  • Podcasts // Jan 2012

    SIEM Is Dead

    In this podcast, the speaker going discusses about the SIEM where organizations have relied on point products such as log management and SIEM to monitor event-based information. But, that method could miss critical data, creating gaps that could lead to loss of customer and business data.

    Provided By CompuCom Systems

  • Podcasts // Jan 2013

    Enabling the Mobile Workforce with BI

    See how to get the targeted, interactive and personalized information you need to make informed decisions while you are away from the office.

    Provided By IBM

  • Podcasts // Oct 2012

    Social Clienteling - Nurturing VIP Connections In-store and Beyond

    Join us to learn how leading retailers are re-imagining the guest and associate experience to better serve their best customers through the use of Social Clienteling, a 21st century approach to an age-old process.

    Provided By Salesforce.com

  • Podcasts // Mar 2013

    Time Tracking Product Preview

    With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.

    Provided By Workday

  • Podcasts // Feb 2013

    Big Data, Analytics and Expert Integrated Systems

    On February 20th at 1:00 pm Eastern time, Redmonk analyst James Governor will lead a video chat with a variety of panelists to discuss big data, analytics and expert integrated systems. This video chat - sponsored by IBM PureSystems - continues a video series on the subject of "Opinionated Infrastructure."

    Provided By IBM

  • Podcasts // Oct 2011

    Railscasts #250: Authentication From Scratch

    In this podcast, the speaker going to explain about authentication from scratch. Password authentication is not too complicated to make from scratch, it will also help to get a better understanding of how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2012

    OnDemand: Faster VMs Guaranteed – No Hardware Required

    Learn how optimizing I/O at the source on virtual machines provides up to 50% or more application performance at a fraction of the cost of hardware. By eliminating unnecessary I/O traffic at the guest level, there is far less traffic pushed into the server, network, and storage. This OnDemand...

    Provided By Condusiv Technologies

  • Podcasts // May 2012

    Railscasts #352: Securing an API

    There are many approaches to locking down an API. In this podcast, the speaker will start off with HTTP Basic authentication then move on to generating a unique token which can be passed through a URL parameter or HTTP header.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2012

    Railscasts #358: Brakeman

    In this podcast, the speaker will explain about the Brakeman. The Brakeman is an opensource vulnerability scanner gem which will scan the Ruby code of a Rails application and alert the user to common security vulnerabilities.

    Provided By Oleksiy Kovyrin