Join us for an hour and leave with tactical advice that will have an ongoing impact on your top initiatives.
Find Webinars

You are viewing: Upcoming Webinars

Results 1 - 10 of 44
1 2 3 4 5 | Next

  • Best Practices for Managing Public Cloud Services
  • 02 Jun 2015
  • Many organizations find it more difficult to manage public cloud services than they originally expected and often they lack the skills and expertise necessary to do it property. Management becomes increasingly complex if using multiple cloud providers. Vendors are approaching cloud management in different ways, making it difficult to compare and select solutions.
  • How the Internet of Things Will Change Cybersecurity Forever
  • 02 Jun 2015
  • We are now in the age of digital business, where the Internet of Things (IoT) and cloud computing provide expanded options for organizations to deliver value. But digital business depends on a digital infrastructure, and a digital infrastructure must be secure to avoid risk. IoT must not only save money and provide more options-- it must do so securely and safely to be truly effective.
  • The Cyberthreat Landscape
  • 03 Jun 2015
  • Targeted attacks, "Monday morning malware" and DDoS attacks are just some of today's enterprise challenges. BYOD and mobility trends add to the risk, as we seek to protect personal devices that are rarely on the corporate network. This webinar analyzes the evolving threat landscape and new security solutions to help you defend your enterprise and manage risks.
  • Significantly Reducing I&O Costs: The Next Round
  • 04 Jun 2015
  • Are you still under pressure to reduce I&O costs but feel you have exhausted the opportunities? Our analysis indicates that it is highly likely that you can reduce your I&O expenses by another 25% or more during the next three to five years.
  • Mobile Apps Are Different: Best Practices in Mobile Development
  • 09 Jun 2015
  • Mobile apps are much more focused and targeted than desktop apps, and they have to accomplish tasks quickly. The proliferation of mobile devices will only accelerate, especially with the addition of wearable technology. All of these factors make mobile apps very different than traditional desktop apps, and development and operations teams need to be prepared to change the way they approach app dev to address mobile. Learn best practices that you should employ to ensure successful mobile app development.
  • The Unified Communications Market: Transformation to the Cloud
  • 09 Jun 2015
  • The unified communications as a service (UCaaS) market is experiencing rapid adoption. UCaaS offerings now possess rich mobility, conferencing and API capabilities that are as good as those available with traditional premises-based equipment. The market is highly competitive, and the estimated 250 UCaaS vendors across the globe are beginning to consolidate.
  • Decommissioning: The Emerging Role of the Application Undertaker
  • 10 Jun 2015
  • Businesses and IT organizations have spent the past 40 years relentlessly acquiring applications, honing their project management skills to focus on delivery of ever greater value to the business. The net effect of that effort is that application portfolios are bloated with aging applications, many of which need to be replaced in the next few years. Unfortunately, too often the "replacement" project successfully implements the new application but fails to eliminate the old application from the portfolio. CIOs and application leaders need to rethink the process of decommissioning applications, and they will need to instantiate a new role to lead the decommissioning activity - the application undertaker.
  • Effective Communication for PPM Leaders
  • 10 Jun 2015
  • Many organizations are struggling with change, leaving programs and projects disconnected from the people. This webinar presents effective techniques that will arm you with the ability to engage and motivate your employees.
  • The Top 10 Cloud Myths
  • 11 Jun 2015
  • Cloud computing is uniquely susceptible to the perils of myths due to the nature, confusion and hype surrounding it. Even with a mostly agreed on formal definition, multiple perspectives and agendas, the subject continues to mystify. The incessant hype results in confusion that permeates IT (and beyond) today. Whether they revolve around security concerns or cost savings, cloud myths primarily serve to impede innovation and distract us from real progress towards digital business. We highlight some of the most dangerous and misleading cloud myths and how to move beyond them.
  • Shrinking Big Data
  • 11 Jun 2015
  • Big data has been a burning issue for more than four years. As IT professionals begin to master the techniques for harnessing this disruption, it is becoming more apparent that business is budgeting for information infusion and information management - one more way that "every budget is an IT budget."
1 2 3 4 5 | Next