<![CDATA[Gartner - Feeds for free replay webinars]]> <![CDATA[Hybrid Clouds and Hybrid IT: The Next Frontier]]> <![CDATA[Key Trends and Emerging Technologies in Advanced Analytics]]> <![CDATA[Key Growth Drivers in Enterprise Software for 2015 and 2016]]> <![CDATA[Protecting Applications on Mobile Devices]]> <![CDATA[Is Managed Failover the End of Disaster Recovery?]]> <![CDATA[Mobility Applications: Get Your Sourcing Strategy Right or Be Beaten to Market]]> <![CDATA[The Enemy Within: Monitoring, Detecting and Mitigating the Threat of Insider Attack]]> <![CDATA[Digital Ethics: How Not to Mess Up With Technology]]> <![CDATA[How Intelligence-Aware Security Controls Will Shape the Security Market]]> <![CDATA[The Future of IT Service Support Management]]> <![CDATA[Program and Portfolio Management: It's All About Value Contribution]]> <![CDATA[User Experience Design: From Web to Mobile to Social]]> <![CDATA[Building Cloud Applications: Base to Native, and Everything in Between]]> <![CDATA[13 Years of Best Practices From the Eight Building Blocks of CRM]]> <![CDATA[Public IaaS: Amazon or Microsoft?]]> <![CDATA[Digital Business Transformation Services Opportunities and Key Players]]> <![CDATA[Big Data Industry Insights]]> <![CDATA[Exploit Mobility to Drive Business Innovation]]> <![CDATA[Managing Litigation and Regulatory Risks of Big Data]]> <![CDATA[Digital Commerce Is Bigger and Broader Than Just Your E-Commerce Site]]> <![CDATA[The Art of a One-Page Strategy]]> <![CDATA[Top 10 Mobility Management and Mobile Device Management Mistakes to Avoid]]> <![CDATA[The Internet of Things Opportunity and Challenge for Smart Cities]]> <![CDATA[Hybrid Clouds and Hybrid IT: The Next Frontier]]> <![CDATA[Building an Architecture Today for Tomorrow's Applications]]> <![CDATA[Start the Journey to Attracting Supply Chain Talent]]> <![CDATA[Business Intelligence: A Core Business Competency]]> <![CDATA[Five Practical Steps for Securing Data in the Public Cloud]]> <![CDATA[IT in India and China: New Business Opportunities]]> <![CDATA[Detect Data Breaches With User Activity Monitoring]]> <![CDATA[Ten Trends and Technologies to Impact IT Over the Next Five Years]]> <![CDATA[Building a Strategy for Enterprise and Cloud Unified Communications]]> <![CDATA[Integrating Enterprise and Application Architecture: Best Practices]]> <![CDATA[Mobile Trends and Issues From 2014 to 2017]]> <![CDATA[Wearables Enable New Business Via The Internet Of Things]]> <![CDATA[Digital Business Is Redefining the Scope of Manufacturing Operations]]> <![CDATA[The Impact of BYOD]]> <![CDATA[Understanding and Controlling the Risks of Cloud Computing]]> <![CDATA[Business Architecture Fuels Digital Business Strategy]]> <![CDATA[Where Is the Industry Uptake for Digital Business?]]> <![CDATA[How to Deliver Self-Service Business Intelligence]]> <![CDATA[Breaking Through IT Cost Optimization Barriers]]> <![CDATA[Digital Storytelling and Content Marketing]]> <![CDATA[Top Security Trends and Takeaways for 2014]]> <![CDATA[European Channel Trends for Technology Provider Channel Leaders]]> <![CDATA[Getting the Most From SharePoint: On-Premises or Online]]> <![CDATA[Getting to Benefits Realization: What to Do and When to Do It]]> <![CDATA[Use Software-Defined Application Architecture for Digital Business Solutions]]> <![CDATA[Is Your Network Relevant in the Era of the Nexus of Forces?]]> <![CDATA[Web-Scale IT: Bringing the Cloud to the Enterprise]]>