Filter by
Filter Help
 

Webinars

Join us for an hour and leave with tactical advice that will have an ongoing impact on your top initiatives.
Find Webinars
 


You are viewing: Upcoming Webinars

Results 1 - 10 of 42
1 2 3 4 5 | Next

  • Public IaaS: Amazon or Microsoft?
  • 17 Sep 2014
  • Public cloud IaaS services continue to be the hottest segment of the cloud market. Almost all customers are evaluating and selecting major IaaS providers such as Amazon Web Services (AWS) and Microsoft Azure. But are the major providers moving toward commoditization or are they still differentiating their services significantly? In this session, Gartner lays out recommended evaluation criteria for such providers and details how AWS and Microsoft Azure stack up against one another.
  • 13 Years of Best Practices From the Eight Building Blocks of CRM
  • 17 Sep 2014
  • This webinar is designed for those new to customer relationship management projects, aimed at CRM project or program managers but also useful for sponsors or those participating in IT or sales, marketing and customer service departments. Understand the eight different perspectives of a CRM project from eight different perspectives: the vision, strategy, customer experience, organizational change, processes, data and information, technology and metrics.
  • Building Cloud Applications: Base to Native, and Everything in Between
  • 17 Sep 2014
  • Cloud applications can deliver significant benefits, but selecting the right architecture, design and technologies for custom cloud applications involves complex tradeoffs. This webinar provides a decision framework for making the right strategic and application-specific choices.
  • User Experience Design: From Web to Mobile to Social
  • 18 Sep 2014
  • Many organizations now realize that a high-quality user experience (UX) can provide competitive business advantage. Enterprises are adopting the technologies and practices pioneered by leading consumer Web properties (e.g., Amazon, Google and Facebook). The challenge is that the Web is evolving toward social and mobile, which means designers must stretch further, to cover these new bases.
  • Program and Portfolio Management: It's All About Value Contribution
  • 18 Sep 2014
  • Digitization, mobile applications and a business environment that require rapid response are significantly changing the environment in which most organizations are conducting projects and programs. While there has always been pressure for "faster, better and cheaper," all three of these terms are taking on new meanings - and classic PMOs located in IT are poorly equipped to deal with them. Where providing visibility and enforcing consistency and controls were rewarded in the past, there will just be a single significant metric in the future - value contributed.
  • The Future of IT Service Support Management
  • 23 Sep 2014
  • Claims of the death of the IT service desk are greatly exaggerated. Although the Nexus of Forces present challenges to traditional IT service desks, it also enables opportunities to modernize the business user experience. The ability to demonstrate value is paramount, and modern IT service support must place more emphasis on proactive business user productivity enablement. This presentation provides an overview of the current state of IT service management challenges and how IT service support organizations are modernizing to meet the needs of the business.
  • How Intelligence-Aware Security Controls Will Shape the Security Market
  • 23 Sep 2014
  • Intelligence-aware security control (IASC) is an emerging concept in security, built on the foundation of big data and intelligent analytics that enables security technologies to reach new bounds. This presentation discusses what IASC actually is, examples of technologies using this today and how IASC is positioned to change the security landscape of tomorrow.
  • Digital Ethics: How Not to Mess Up With Technology
  • 24 Sep 2014
  • Original webinar date of August 20th has been changed to September 24th. From Kant to Confucius, what is "good" and "bad" technology? It will be fun, as we'll discuss in Socratic style. Practical, because of contemporary examples. Provocative, asking you to take a stand, and not just listen. Not for the faint-hearted, this webinar is a must-attend for those who want to push the limits of innovations while avoiding public embarrassment through messing up.
  • The Enemy Within: Monitoring, Detecting and Mitigating the Threat of Insider Attack
  • 24 Sep 2014
  • Authorized users can destroy security through malice or incompetence. Although they may have noble intent, the damage created by employees and contractors can be dramatic. This webinar explores technology and practices that focus on human behavior to predict, detect and prevent insider threats to enterprise performance.
1 2 3 4 5 | Next