.NET Multimedia
-
The Complexities of APACs Threat Landscape - Part 1
Sponsored by: Rapid7In the first of a two-part series, join an expert panel as they discuss the challenging and evolving threat landscape in the Asia Pacific region. The panel shares their views as to how Asia Pacific fares up against other global regions in cyber awareness, and the heightened discussions in government policy to combat threat actors.
-
On-Demand Webcast | From Ransomware Defense to Cyber Resilience: Addressing Threats Head-On
Sponsored by: CohesityRansomware is evolving, with cybercriminals going after both your IT production and backup data. If you're going to survive and thrive in a data landscape littered with cybersecurity threats, your cybersecurity strategy will need a significant boost. Watch this webcast to hear thought leading CISOs and CIOs.
-
Couchbase Cluster demo with Red Hat OpenShift and Twitter
Sponsored by: Red Hat and CouchbaseIn this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.
-
RUCKCast #74: RWG - The New Dog On The Block
Sponsored by: Ruckus WirelessFor enterprises and service providers, having powerful network services is the key to attracting and retaining more customers. To do that, you need a purpose-built network that offers complete connectivity, robust security and efficient management. Today, there is a new solution that can provide all of that. Listen to this podcast to learn more.
-
RUCKCast #73: The Evolution that is RUCKUS One
Sponsored by: Ruckus WirelessFor an introduction to a new AI-driven cloud platform, tune into this episode of Ruckus Networks’ podcast, RUCKCast.
-
Integrate.io Video
Sponsored by: Integrate.ioWhen it comes to marketing platforms, Salesforce has been an industry leader for years. However, your platform experience is only as good as the customer data you feed into it. But with the right integration platform, you can use a bidirectional low-code interface to ensure there are no gaps in your databases. Watch this video to learn more.
-
The Warehouse as a Marketing Engine: The Composable CDP
Sponsored by: HightouchTune into this webinar featuring Tajas Manohar, Founder + Co-CEO at Hightouch andGuy Tsror, Data Scientist at Wealthsimple, as they discuss how to use the data warehouse as a marketing engine.You will learn:What makes a composable CDPHow Wealthsimple uses customer dataBenefits of Wealthsimple’s composable approach
-
Backup and DR for Databases on OpenShift with Gaurav Rishi & Michael Courcy
Sponsored by: Red Hat & VeeamThis webcast takes a deep dive into backup and disaster recovery for databases on OpenShift, and specifically how Kasten by Veeam can assist in those efforts. Tune in to learn how you can leverage the solution to enhance backup and restore, disaster recovery, and application mobility for your IT environment.
-
RUCKCast #68: Choose Your Own CloudPath
Sponsored by: Ruckus WirelessTo learn about augmenting your organization’s network access security, tune into this episode of Ruckus Networks’ podcast, RUCKCast.
-
Google Cloud Video
Sponsored by: Google CloudLearn in this short video how Google Cloud can help your organization with a suite of tools and services designed help developers quickly build applications on AI-optimized infrastructure.
-
Digital Execution at the Speed of Innovation with Cloud-Native Low-Code
Sponsored by: SiemensWhile it’s reported that 68% of manufacturers have started their digital transformation and smart factory initiative or will start in the next year, only 30% have achieved success or are seeing business value. But why is this? Tune into this webinar to learn more.
-
Siemens Global Webinar
Sponsored by: SiemensDue to the variability of today’s manufacturing processes, it has become critical for companies to integrate specific solutions into their manufacturing execution systems. So, how can this best be done? Access this webinar to learn more.
-
How Scheffler Group Democratizes App Development with a Low-Code Platform
Sponsored by: SiemensWithin the automotive industry as elsewhere, organizations need to be able to adapt and modernize in order to stay competitive against rapidly evolving competition. This webcast explores how the Scheffler Group democratizes app development with a low-code platform. Tune into the full webcast to learn more about the development benefits of low code.
-
Low Code Personalization with Opcenter Mendix
Sponsored by: SiemensLow code implementations allow users a level of customizability that previously required software engineers to unlock. This video showcases Low Code Personalization for Opcenter Execution Foundation with Mendix, a combination of 2 existing Siemens solutions designed to give customers the ability to customize their UI. Watch now to learn more.
-
Reimagining Smart Manufacturing With Low-code Platform
Sponsored by: SiemensTo learn about the state of smart manufacturing, and to find out how to empower your organization’s smart manufacturing initiative, view this webcast.
-
Empowering Supply Chain Collaboration in an Unpredictable Marketplace
Sponsored by: SiemensTo discover how a manufacturer empowered supply chain collaboration, check out this webcast featuring insights from experts at Mendix and CNH Industrial.
-
Modern & Secure App Transformation with Red Hat OpenShift & Kasten K10
Sponsored by: Red Hat & VeeamAs more businesses utilize containerized apps, they also need to deliver the same enterprise-level SLAs and compliance requirements as legacy applications. Tune into this webcast to learn the importance of cloud-native principles in containerized app protection and why complete cluster disaster recovery is vital to maintain app availability.
-
Discussing our first annual cyber extortion report
Sponsored by: Orange CyberdefenseCyber extortion (Cy-X) is a form of cyberattack in which the security of a digital asset is compromised and exploited in a threat in order to extort payment. This webcast presents the research and findings of the first addition of Orange Cyberdefense’s Cy-Xplorer Cyber Extortion Report. Tune in now to learn more.
-
SAP Video
Sponsored by: SAPHow can your organization become an intelligent, sustainable enterprise? In this webinar, you’ll gain an understanding of how SAP Signavio can help you stay ahead of the competition by quickly realigning your business and innovating faster. Tune in to learn how you can maximize the efficiency of your business processes.
-
RUCKCast #72: Why RRM Is Better In The Cloud
Sponsored by: Ruckus WirelessFor an introduction to radio resource management (RRM) in the cloud, check out this episode of the Ruckus Networks’ podcast, RUCKCast.
-
Softchoice Video 1
Sponsored by: SoftchoiceTune in to this short video for everything you need to know about Enterprise Lifecycle Management, and how it can help your organization reclaim budget and get the best the value of your software entitlements and subscriptions.
-
Softchoice Video 4
Sponsored by: SoftchoiceDiscover in this short video why most IT teams are ready to get to zero-tolerance for wasted cloud spend, and how they just need a little help from the right coach.
-
Converged Defense Webinar
Sponsored by: ClarotyTraditional IT monitoring solutions weren’t designed to catch the types of threats that target IoT environments. In this webcast, Claroty Principal Product Manager, Gary Kneeland, talks through the state of converged IoT and OT cybersecurity, as well as how you can bolster your security with the MITRE ATT&CK framework. Tune in to learn more.
-
Detect Risks & Validate Security Controls - Webinar Series Part 3
Sponsored by: MandiantCollecting and analyzing threat intel is a common task for security teams. However, many teams struggle to use this data effectively due to information overload, data relevancy, and more. Now, there is a solution that helps you understand what threats are most critical to your organization by leveraging AI. Watch this video to see more.
-
Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1
Sponsored by: MandiantOrganizations of all sizes must test and measure the effectiveness of their cybersecurity for compliance reasons, security operations, and more. However, exactly when and how to do it can be confusing for some, which is why this video explains the best practice methodologies to accomplish that task. Watch this video to learn more.