More news webcasts
Lower the cost and effort of compliance and take a proactive approach to protecting your many data sources.
With the looming April 8th 2014 end-of-support date for Windows XP, IT departments are working to wrap up the move to Windows 7 and Windows 8. Register today to secure your place in this timely exploration of ways to solve application-related migration challenges. Please forward this message to your peers as well. Jefferson Raley, Portfolio Director, EUC Strategic Consulting Practice, Dell Jefferson Raley has been helping customers with technology services for over 18 years. His tenure at Dell includes integrating customer requirements with manufacturing, managing End User Computing consulting services, and developing new software and technology to drive service efficiency. Jefferson currently manages a team developing innovative new services to help customers manage their End User Computing environments. close this window Philip Dakas, Director, Global Application Services, Dell Philip Dakas, Director, Global Application Services, Over 10 years of experience delivering technology solutions to support business processes in parallel with establishing global operations. Extensive experience in the Windows XP/7 application management space, currently leading a team of 250+ resources globally to deliver high volume, cost effective application projects to customers.
Dell™ KACE™ Management Appliances provide one of the largest patch repositories available, including patches for Windows and Mac operating systems, as well as for a wide range of applications. KACE saves organizations time and money by providing comprehensive and reliable patching, without the time, complexity and cost of traditional solutions.
Join systems management experts form Dell KACE in this live webinar for a quick look at the state of the service desk, and explore new requirements and tradeoffs in choosing and using a service desk solution. Then you’ll learn practical ways to ensure an effective service desk in 2013 and beyond.
Join us for an in-depth look at how your organization can use Windows Server 2012 to achieve business goals.
The webcast will be facilitated by hands-on migration experts with one goal – to help you know exactly what to do for an orderly transition by next April – and how to go about it. They have been on-site with companies of all sizes, at all stages of migration – they will answer your questions live.
Register for this webcast now to learn how you can close a dangerous security loophole and add a fortified level of security against advanced persistent threats.
Register for this webinar to better understand how IT organizations are adopting, deploying, and managing the demand for big data analytics.
Join Kevin Whartenby of HP and Jason Mical of AccessData as they review new technological advancements that make holistic rapid detection and response a reality. Whartenby and Mical will discuss how organizations and more advanced service providers are filling detection, analysis and remediation gaps by integrating critical analysis capabilities, implementing a “virtual war room” environment to enable real-time collaboration, and leveraging bi-directional integration between an integrated rapid detection and response platform and SIEM solutions, such as ArcSight ESM.
Cloud Client Computing can create the BYOD flexibility users desire while providing the security and manageability required by the organization. Come learn how Cloud Client Computing solutions can help you with your end user computing strategy.
In this Webinar, Snapfish will also discuss their recommendation engine – powered by HP Vertica – that leverages the power of real-time analytics to deliver laser-targeted product recommendations based on how new site visitors and past customers have interacted with the Snapfish.com Web site.
OpenStack is a set of applications with many different deployment options. This webinar provides compelling insights and learnings from real life OpenStack deployments.
Join this free, insight-packed webinar to find out how you, too, can transform your company’s day-to-day business processes quickly, cost-effectively and without taking on a “boil the ocean” project.
Attend this webinar to learn how a purpose-built system for customer analytics is valuable when handling today’s big data challenges as you work to acquire, grow and retain customers.
Join us for a fact-based comparison that will illustrate how to meet Big Data Challenges with simplicity and speed to lower cost and optimize performance.
Attend to explore how COBOL has evolved to become a multiplatform language, and learn a way to make it more accessible for Big Data sourcing and integration with other environments.
Don’t miss out on an opportunity to gain a competitive edge through simplified business intelligence, big data analytics, and database management.
oin this presentation to discover how Pega can be leveraged to provide full insurance capability within your Salesforce.com environment. Register Now!
Attend to learn how IBM Cloud & Smarter Infrastructure solutions drive a unified service management approach across heterogeneous environments while enabling the foundation for the enterprise app store.
Almost every Cobol application can be enhanced to provide more capability. Attend this webinar to find out how you can make best use of Cobol in your environment.
Join IDC analyst Al Gillen as he explains the concept of a 3rd platform, and reviews the market trends that have brought us to the threshold of the next generation of computing.
Register for this webinar to learn ways to keep your company safe from both types of these insider threats.
The greatest potential for improvement comes from better understanding of our true information needs and in bringing more order to workplaces where disconnected processes and unstructured information have been the norm. This webinar will help you focus on gathering the right information and on the best processes to deliver it.
Register for this webinar to learn how to put data to work. Find out why the big buzz around big data is justified as Best-in-Class companies enjoy the benefits of behavior-based segmentation and targeting along with real-time offer management.
Join us for a series of short roundtable discussions to explore the opportunities, challenges and best practices of cross-platform HTML5 development. Hear directly from industry analysts, the W3C, Intel, and other experts. Go
Free Research and Reports
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
- Operating in the Cloud with Confidence
- HP Datacenter Care: Enterprise-Wide Support For Business-Critical IT
- The BYOD Opportunity: Say "Yes" to Device Diversity and Enable New Ways to Drive Productivity
Dark Reading Digital Magazine
Quick Wins For Strengthening SMB Security
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Cross-site scripting (XSS) vulnerability in the Spacewalk service in SUSE Manager 1.2 for SUSE Linux Enterprise (SLE) 11 SP1 allows remote attackers to inject arbitrary web script or HTML via an image name.
zypp-refresh-wrapper in SUSE Zypper before 1.3.20 and 1.6.x before 1.6.166 allows local users to create files in arbitrary directories, or possibly have unspecified other impact, via a pathname in the ZYPP_LOCKFILE_ROOT environment variable.
LanItems.ycp in save_y2logs in yast2-network before 2.24.4 in SUSE YaST writes cleartext Wi-Fi credentials to the y2log log file, which allows context-dependent attackers to obtain sensitive information by reading the (1) WIRELESS_WPA_PASSWORD or (2) WIRELESS_CLIENT_KEY_PASSWORD field.
Race condition in sap_suse_cluster_connector before 1.0.0-0.8.1 in SUSE Linux Enterprise for SAP Applications 11 SP2 allows local users to have an unspecified impact via vectors related to a tmp/ directory.
yast2-add-on-creator in SUSE inst-source-utils 2008.11.26 before 2008.11.26-0.9.1 and 2012.9.13 before 2012.9.13-0.8.1 allows local users to gain privileges via a crafted (1) file name or (2) directory name.