• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

EVENTS

Conferences

GOTO Chicago 2018 Software Developer Conference

GOTO CHICAGO 2018 SOFTWARE DEVELOPER CONFERENCE

April 25-26, 2018
GOTO Chicago 2018 brings together software innovators and thought leaders highlighting the technologies, methodologies and skills you need to build systems of the future. The conference program is created for developers by developers with the curated program covering the full stack of software devel...

JAX 2018

JAX 2018

April 23-27, 2018
JAX is a conference for cutting edge Java- and Web-Development, Software-Architecture and innovative Infrastructures. Renowned experts share their professional experiences in Sessions and Power Workshops. JAX is especially focusing on JAVA Core- and Enterprise-Technologies, Spring-Ecosystem, JavaScr...

2018 International Conference on Information Science and System

2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM

April 27-29, 2018
2018 International Conference on Information Science and System (ICISS 2018) will be held in Jeju Island, South Korea during April 27-29, 2018. It is sponsored by International Association of Computer Science and Information Technology with an objective to serve as a platform for scientists, researc...

WESTERN CANADA INFORMATION SECURITY CONFERENCE

WESTERN CANADA INFORMATION SECURITY CONFERENCE

May 01-01, 2018
Now in its sixteenth year, the Western Canada Information Security Conference brings together Information Security and IT Audit and Control professionals from across western Canada to expand their Information Security knowledge and skills and to encourage and foster the free exchange of information,...

ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI)

ACM/IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI)

April 17-18, 2018
Sponsored
The ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI) is a premier venue on IoT. In 2018, IoTDI will be held for the third time and topics span the entire ecosystem revolving around IoT, such as cloud and edge computing, data analytics, sensor networks, mobile...

CMSWire`s Digital Experience (DX) Summit 2016

CMSWIRE`S DIGITAL EXPERIENCE (DX) SUMMIT 2016

November 14-16, 2016
Sponsored
CMSWire’s Digital Customer Experience (DX) Summit 2016 conference brings together the world’s foremost digital customer experience (DX) and marketing technology (MarTech) leaders and practitioners who are defining the next generation of digital experiences and creating the organizations and teams th...

The 13th International Conference on  Future Information Technology

THE 13TH INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY

April 22-23, 2018
Future technology information technology would stand for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud...

RSA Conference 2018

RSA CONFERENCE 2018

April 16-20, 2018
RSA Conference’s mission is to connect you with the people and insights that will empower you to stay ahead of cyber threats. We do this through our events in the US, the EMEA region and the Asia-Pacific region and through our digital outreach. However you access our community, RSA Conference ...

 

Webinars

APR 26, 2018 | 11:00 PM
THE STATE OF CLOUD SECURITY: KEEPING PACE AT SCALE
To meet the demands of lines of business, forward leaning IT, and to better support partners, customers and a mobile workforce, a new wave of cloud application projects are underway. According to the recent Oracle and KPMG Cloud Threat Report, 87% of organizations have a cloud-first orient...
APR 26, 2018 | 1:00 pm
GETTING STARTED WITH IBM CLOUD VIDEO
Looking to quickly understand how to stream high quality videos live and on-demand, or scale up your video projects? Need a crash course on using the IBM Cloud Video platform with Watson AI capabilities? This demo will provide a general overview of the platform and its capabilities: Creati...
APR 26, 2018 | 9:00 AM
INTEGRATED CYBER THREAT INTELLIGENCE, THREAT HUNTING & RESPONSE WITH IBM I2, QRADAR AND RESILIENT
This webinar will examine the role of cyber threat intelligence (CTI) in the next generation SOC and how IBM fits in to the threat hunting and incident response processes of the SOC. Topics covered include:Data ingestion and analysis from structured data sources.
APR 30, 2018 | 9:30 AM
OPTIMIZE YOUR CLOUD INFRASTRUCTURE WITH OPEN NETWORKING AND AUTOMATION
Traditional networks built on legacy infrastructure limit business innovation, are hard to scale and are expensive to manage. At an increasingly rapid rate, network architects and cloud operators are looking for ways to build a fast, automated cloud environment. They need a cloud infrastru...
MAY 03, 2018 | 9:00 AM
SELECTING AND SECURING YOUR ENTERPRISE ANDROID DEVICES
With some basic Android knowledge, you will be able to pick devices which meet enterprise user requirements and your security guidelines. Once you have picked the right devices, let the pros of IBM MaaS360 and Google help you effectively embrace all things Android in the enterprise. Join t...
MAY 03, 2018 | 11:00 AM
THE ROAD TO GDPR COMPLIANCE: TIPS FROM THE CLOUD SECURITY ALLIANCE AND DOME9
General Data Protection Regulation (GDPR) is coming into effect on May 25, 2018. The requirements of GDPR are substantial and the penalties for non-compliance are severe. The new regulation will require companies across the globe to rethink how they store and handle customer data.

IDS FOR SECURITY ANALYSTS: HOW TO GET ACTIONABLE INSIGHTS FROM YOUR IDS
The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output and t...
3 COST-SAVING STRATEGIES FOR SQL DEPLOYMENTS THAT YOU DIDN'T KNOW ABOUT
Join Michael McCracken, HOSTING Director of Professional services and Dave Bermingham, Microsoft cloud and Data Center MVP, to examine the TCO of high availability and disaster recovery protection for SQL Server deployments with surprising results. They will cover:How to save thousands of ...
DUDE, WHERE'S MY DATA? - INSIDE THE INTEL SECURITY DATA EXFILTRATION STUDY
It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insi...
DON’T GET CAUGHT WITH AN OUT OF SUPPORT MS SQL SERVER
This means that if you are still running SQL Server 2005 after April 12, 2016, you will no longer receive security updates. Now is the time to upgrade to SQL Server 2014 and Azure SQL Database to achieve breakthrough performance, maintain security and compliance, and optimize your data pla...
WHAT VULNERABILITY ASSESSMENT TOOLS MISS
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How c...
AGILE TEST AUTOMATION – TRUTH, OXYMORON OR LIE?
It can be confusing for everyone in an agile team to understand when or what to test, when there isn’t a test phase or any formal documented requirements. Whatever your agile methodology, projects require a change in the way QA and development work together. The use of technology and...
DEFUSE THE USER ACCEPTANCE TESTING TICKING TIME BOMB
Software applications built, purchased or consumed in the cloud all have one thing in common, they need to be tested before going live and had at least one round of User Acceptance Testing. That means a combination of business analysts and subject matter experts must put their day-to-day w...

RESOURCES

Staying on top of the latest technology has always been a challenge for businesses. But it’s never been more difficult than it is today. And the rate of change is accelerating. In 2016 alone, ne...

This is the best 4K video processing tool for Mac users that can convert 4K video, compress large-size video to a smaller size, download online video, record and edit video in few clicks. Leveraging I...

To meet the challenges of the global market and reduce costs, data center operators need to adopt a holistic, agile and business-oriented approach to data center management. They need an accurate, rea...

It is impossible to efficiently manage and ensure return on data center investments without accurate and timely data. Continuous, real-time asset tracking, management, and environmental monitoring mus...

The challenge is that companies vary hugely in scale, scope and direction. Many are doing things not even imagined two decades ago, yet all of them rely on the ability to connect, manage and distribut...

The heart of a successful data center has several requirements; including, high performance, high availability for immediate access to mission-critical assets, and scalability and manageability to han...

Are complicated software and instrumentation needed to measure and allocate energy costs and carbon to IT users? Or can we get by with simple, low cost methods for energy cost and carbon allocation? H...

What You Will Learn: Understand and optimize end-to-end processes in your data center Translate IT processes and business needs into a technical design Apply...

To stay competitive in today's rapidly changing business world, companies must update the way they view the value of their investments in data center physical infrastructure (DCPI). No longer are simp...