Cloud Computing WebinarsVIEW ALL WEBINARS
EDT: 11:00 a.m. | PDT: 8:00 a.m. | BST: 16:00 Edge computing is gaining attention and traction quickly. The edge is positioned as a topological design for delivering Internet of Things (IoT), a decentralized alternative to the cloud, or as a high level topology construct for saving money and reducing latency. In this webinar, we define edge computing and discuss its benefits and criticality for IoT. We review how the edge fosters new thinking about application architectures, network design and how edge is the fulfilling complement to centralized hyperscale cloud.
EDT: 11:00 a.m. | PDT: 8:00 a.m. | BST: 16:00 Cloud computing is now an integral part of IT. Yet, even after more than 10 years, confusion around cloud remains rampant. Cloud initially was disruptive primarily to IT itself. Now in its second decade, it's enabling seismic disruptions, across areas including digital business, artificial intelligence (AI) and internet of things (IoT). In this cloud webinar, we explore the current state of cloud computing and cloud providers, cloud's role as necessary but insufficient catalyst for disruption, and the best practices that will turn the cloud to your advantage.
Data and analytics leaders are often caught in a conundrum on how to balance cost optimization and the advent of new technologies to renovate infrastructure. This webinar guides you through the most innovative pricing trends, licensing models and vendor negotiation best practices. Learn to optimize costs across the most popular and essential data and analytics disciplines and technologies.
This webinar provides eight steps to use when planning negotiations with major and emerging vendors. These steps enable you to ask the right questions that reveal the right detail so you can analyze proposals from a cost-optimization and risk-mitigation standpoint. In this webinar, we focus on engaging the right IT and business stakeholders as part of the negotiation plan and strategy to optimize these deals and balance cost, value and risk.
Multi-factor authentication (MFA) helps defend against account takeover attacks, the most common type of cyber attack. A new crop of cloud-based MFA services provides support for strong authentication for a variety of scenarios. In this webinar, we discuss cloud-based MFA that can balance trust, user experience and cost. We also review commonly supported MFA use cases, multi-factor authentication methods, and adaptive access functionality that is increasingly demanded by security-conscious organizations.
It has been more than a decade since cloud computing emerged. Digital business is accelerating cloud adoption, with some infrastructure and operations (I&O) organizations being at the periphery of this adoption. In this webinar, learn where cloud computing is complementary or competing with I&O and how your organization should evolve to accommodate and thrive in this environment.
EDT: 10:00 a.m. | PDT: 7:00 a.m. | BST: 15:00 Most midsize enterprises do not have the size and volume to achieve desired contract terms with their providers. However, that does not mean that no negotiation levers exist to achieve better results. The appropriate individuals in these organizations need to identify these levers or opportunities and create leverage where there is none. In this webinar, we provide actionable advice as well as a Q&A session to answer your questions with regards to this topic.
Addressing software as a service (SaaS) change management is ranked among the top five SaaS challenges for technical professionals. Current software change management strategies are unsuitable for SaaS solutions as changes are typically rapid and inconsistent. New change management strategies need to be formed specifically for a SaaS portfolio and take into account that the majority of changes will be pushed and controlled by the SaaS provider, not IT. This webinar will discuss the Gartner agile and risk-oriented approach that enables IT to perform SaaS change management focusing only on the upcoming changes that may disrupt the business and impact enterprise users.