Artificial Intelligence in Learning & Performance is a reality, chatbots being a prime example. IBM Business Partner Assima, has developed new cognitive solutions combining its very own technology With Watson services to accelerate user performance.
Watch Now


The abstract nature of cloud computing implies that the physical location of data is irrelevant within the cloud. Business transactions occur across international borders. Big data created in one location can then be stored, processed, and pulled from other locations. End users with Internet access


How to Escape the “Agility Trap” in Digital Transformation


Join Bizagi and guest speaker, Forrester's John Rymer to explore the research findings from Bizagi’s new independent study into enterprise digital transformation programs.

Hyperconvergence and Managing the Modern Data Center: More Workloads, Less Work


The need for IT to provide always-on, ever-scalable delivery of data and applications brings with it an assumption of an equal amount of additional work as the business grows and needs change. Traditional data center models simply can’t keep up with business demands without heavily taxing IT.

How secure content management helps align information governance and security


This interactive session will look at how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. How can the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts and experiences.

IDS for Security Analysts: How to Get Actionable Insights from your IDS


The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output and the three "P's" - policy, procedure and process. We won't stop there either! You will find out the meaning behind the terms all the cool kids are using like "False Positives" and "Baselining". We'll round it out with more information about how IDS interacts with the rest of your IT applications and infrastructure. If you installed an IDS and are wondering what to do next then signup now!