Survivor or thriver? Addressing PSD2 and Open Banking through API-led connectivity

Survivor_or_thriver
Hear from MuleSoft Banking API specialist Danny Healy and industry veteran Paul Rohan, author of "PSD2 in Plain English", for a unique business and technical insight from the leaders in API-led connectivity.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

3 CHALLENGES FACING CYBERSECURITY PROFESSIONALS REVEALED

Critical Start

Join our industry leading cybersecurity professionals Randy Watkins, Chief Technology Officer, and Jordan Mauriello, Vice President of Managed Services with CRITICALSTART, as they discuss 3 Factors to Consider When Selecting a Managed Detection and Response Service Provider.
Watch Now

Videoify My Sales Pitch: 1-to-1 Video Prospecting Ideas Worth Stealing

Vidyard

We asked two groups of video-selling experts to bring their most creative ideas to videoify real sales pitches submitted to us by real reps. In this webinar, watch as scripts and email templates transformed into engaging video concepts, unleashing the authentic personality and humor of each rep.
Watch Now

Redis Ingenuity Webinar Beyond Caching: AI-Powered Search with Redis

Search capability is ingrained into our daily life. How many arguments these days are settled with the conclusion, “Just Google it”??! We all expect some type of search functionality in every application and website. Meanwhile, advances in computer vision, natural language processing, large language models, and generative AI have made it possible to extract semantic properties from unstructured data in the form of vector embeddings. It can be daunting to query this kind of data, which combines K-Nearest Neighbors algorithms and lexical search, unless you have the right tool for the job. When you fail, performance suffers. Web users typically expect search results under one second.
Watch Now

EVOLVING STRATEGIES IN CYBERATTACKS AND RESPONSE

VIPRE

You’ll come out of this webinar learning: How cyberattacks make their way into environments, The critical role of endpoint protection, Gaps in protection, Tactics to stop attacks in their tracks, If an attack does get through, find out how to respond with proven recovery methods.
Watch Now