• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

EVENTS

Conferences

Zenith Live 2018 - Zscaler Cloud Summit

ZENITH LIVE 2018 - ZSCALER CLOUD SUMMIT

June 25-27, 2018
Zenith Live 2018, the Zscaler Cloud Summit, is the inaugural conference for Zscaler customers, prospects and partners. The three-day conference will bring together cloud technology visionaries, business leaders, network and security experts, and practitioners in a symposium focused on the possibilit...

OWASP AppSec Europe

OWASP APPSEC EUROPE

July 02-06, 2018
Welcome to OWASP Annual AppSec EU Security Conference, the premier application security conference for European developers and security experts. AppSec EU provides attendees with insight into leading speakers for application security and cyber security, training sessions on various applications, net...

IEEE CLOUD 2018

IEEE CLOUD 2018

July 02-07, 2018
The IEEE International Conference on Cloud Computing (CLOUD) has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of cloud computing, identify emerging research topics, and define the fut...

The 3rd IoT Global Innovation Forum

THE 3RD IOT GLOBAL INNOVATION FORUM

July 10-11, 2018
The 3rd IoT Global Innovation Forum, July 10-11, 2018 at the World Trade Center in Portland, Oregon features two days of focused networking and information sharing at the IoT cutting edge. This third edition brings together leading innovators, business executives and industry professionals to examin...

ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI)

ACM/IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI)

April 17-18, 2018
Sponsored
The ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI) is a premier venue on IoT. In 2018, IoTDI will be held for the third time and topics span the entire ecosystem revolving around IoT, such as cloud and edge computing, data analytics, sensor networks, mobile...

CMSWire`s Digital Experience (DX) Summit 2016

CMSWIRE`S DIGITAL EXPERIENCE (DX) SUMMIT 2016

November 14-16, 2016
Sponsored
CMSWire’s Digital Customer Experience (DX) Summit 2016 conference brings together the world’s foremost digital customer experience (DX) and marketing technology (MarTech) leaders and practitioners who are defining the next generation of digital experiences and creating the organizations and teams th...

BSides Asheville

BSIDES ASHEVILLE

June 22-23, 2018
BSides Asheville (BSides AVL) was started in 2014 by several information security professionals living in the Blue Ridge Mountains of Western North Carolina. BSides AVL is a 100% volunteer-run information security conference that is held annually in Asheville, North Carolina. Presentations at this l...

Open Source Summit

OPEN SOURCE SUMMIT

June 20-22, 2018
Open Source Summit Japan is the leading conference for technologists and open source industry leaders to collaborate and share information, learn about the latest in open source technologies and find out how to gain a competitive advantage by using innovative open solutions. It is an extraordinary o...

 

Webinars

JUN 25, 2018 | 10:00 PM
DEEP DIVE ON USER-CENTRIC APM, BIG DATA AND AI
Most application performance management (APM) vendors shy away from big data, believing that it’s too much data to gather, store, and process. As a result, they rely on incomplete data sets and fill in the gaps with algorithms. This legacy approach slows troubleshooting, especially i...
JUN 26, 2018 | 2:00 p.m.
THE MOST COMPREHENSIVE ENDPOINT PROTECTION: INTERCEPT X
With 75% of malware unique to a single organization [SophosLabs] you need to detect never-seen-before threats now. Join us to discover how Sophos Intercept X leverages multiple advanced techniques, including deep learning, anti-ransomware and anti-exploit technology, to stop both known and...
JUL 03, 2018 | 7:00 AM
CLOUD STRATEGIES DONE RIGHT
Join Cloudability co-founder, J.R. Storment, and Edrans co-founder, Martin Bianco, as they offer best practices proven out by hundreds of customers that have helped them achieve efficiency and agility on the cloud while simultaneously building a culture of cost optimization across their or...
JUL 09, 2018 | 10:00 AM
SOFTWARE DEFINED PERIMETER - IN DEPTH USE CASES
This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases. In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.
JUL 10, 2018 | 01:00 pm
NUMERICAL PROGRAMMING: UNDERSTANDING PYTHON, NUMPY & MATPLOTLIB
Numerical Programming helps solving engineering and data science problems effectively. The numerical programming based applications are used throughout science for effective numerical analysis and some of the application areas include scientific research. Programming blended with algorithm...
JUL 10, 2018 | 8:30 AM
THE 5 BIGGEST DATA MYTHS IN TELCO: EXPOSED
More than any business, telecommunications firms have long been dealing with huge, diverse sets of data. Big Data. Data that is unstructured, unwieldy and disorganised, making it difficult to analyse and costly to manage. Your landscape is fiercely competitive and you instinctively know it...

IDS FOR SECURITY ANALYSTS: HOW TO GET ACTIONABLE INSIGHTS FROM YOUR IDS
The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output and t...
3 COST-SAVING STRATEGIES FOR SQL DEPLOYMENTS THAT YOU DIDN'T KNOW ABOUT
Join Michael McCracken, HOSTING Director of Professional services and Dave Bermingham, Microsoft cloud and Data Center MVP, to examine the TCO of high availability and disaster recovery protection for SQL Server deployments with surprising results. They will cover:How to save thousands of ...
DUDE, WHERE'S MY DATA? - INSIDE THE INTEL SECURITY DATA EXFILTRATION STUDY
It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insi...
DON’T GET CAUGHT WITH AN OUT OF SUPPORT MS SQL SERVER
This means that if you are still running SQL Server 2005 after April 12, 2016, you will no longer receive security updates. Now is the time to upgrade to SQL Server 2014 and Azure SQL Database to achieve breakthrough performance, maintain security and compliance, and optimize your data pla...
WHAT VULNERABILITY ASSESSMENT TOOLS MISS
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How c...
AGILE TEST AUTOMATION – TRUTH, OXYMORON OR LIE?
It can be confusing for everyone in an agile team to understand when or what to test, when there isn’t a test phase or any formal documented requirements. Whatever your agile methodology, projects require a change in the way QA and development work together. The use of technology and...
DEFUSE THE USER ACCEPTANCE TESTING TICKING TIME BOMB
Software applications built, purchased or consumed in the cloud all have one thing in common, they need to be tested before going live and had at least one round of User Acceptance Testing. That means a combination of business analysts and subject matter experts must put their day-to-day w...

RESOURCES

Staying on top of the latest technology has always been a challenge for businesses. But it’s never been more difficult than it is today. And the rate of change is accelerating. In 2016 alone, ne...

This is the best 4K video processing tool for Mac users that can convert 4K video, compress large-size video to a smaller size, download online video, record and edit video in few clicks. Leveraging I...

To meet the challenges of the global market and reduce costs, data center operators need to adopt a holistic, agile and business-oriented approach to data center management. They need an accurate, rea...

It is impossible to efficiently manage and ensure return on data center investments without accurate and timely data. Continuous, real-time asset tracking, management, and environmental monitoring mus...

This paper presents a detailed quantitative efficiency comparison between the most efficient DC and AC power distribution methods, including an analysis of the effects of power distribution efficiency...

The challenge is that companies vary hugely in scale, scope and direction. Many are doing things not even imagined two decades ago, yet all of them rely on the ability to connect, manage and distribut...

The heart of a successful data center has several requirements; including, high performance, high availability for immediate access to mission-critical assets, and scalability and manageability to han...

Are complicated software and instrumentation needed to measure and allocate energy costs and carbon to IT users? Or can we get by with simple, low cost methods for energy cost and carbon allocation? H...

Data center power and cooling infrastructure waste more than 60,000,000 megawatt-hours per year of electricity. This white paper describes the principles of a new, commercially available data center a...