dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Featured Events >>>

Modernizing Authentication — What It Takes to Transform Secure Access

December 14, 2017

Despite their best efforts, identity has become the most consequential attack vector to the modern enterprise. Organizations are essentially outmatched by increasing identity risks.

read more >>>

Sponsored by RSA

How Real-World Numbers Make the Case for SSDs in the Data Center

December 5, 2017

Don't guesstimate the benefits of modernization with SSDs — know them. Support your decisions with accurate, consistent numbers focused on your applications and your workloads. Using public, standardized performance test data helps ensure comparisons are repeatable and verifiable.

read more >>>

Sponsored by Micron

Re-Thinking HR: What Every CIO Needs to Know About Tomorrow's Workforce

November 20, 2017

In this new era where market share can be eroded overnight by a start-up with an innovative business model, speed and agility are critical. CIOs need to empower HR teams to find new hires faster and with greater precision to keep up with the unrelenting pressure to deliver results.

read more >>>

Sponsored by IBM

No-Size-Fits-All! An Application-Down Approach for Your Cloud Transformation

November 15, 2017

In order to take advantage of a cloud strategy, IT organizations need to know if their applications are capable of running securely in the cloud, or that the business value provided by an application is worth the investment to move it to the cloud.

read more >>>

Sponsored by Microland

Innovate and Thrive: How to Compete in the API Economy

November 7, 2017

APIs are more than the technical conduits for sharing data. They provide the flexibility and access necessary to enable rapid innovation. Rapid innovation requires an API management solution that can help unlock additional value from your key services and provide access to new data types and corresponding insights.

read more >>>

Sponsored by IBM

Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications

November 9, 2017

Digital transformation is more than just hype. It's a detailed outline of business and operational plans to integrate, prioritize, and fully utilize the available digital technologies. While this transformation can result in significant cost savings and productivity benefits, adequate security is often not prioritized.

read more >>>

Sponsored by Onapsis

Danske Bank Improves Customer Service with AI-Infused IT Services Delivery

October 23, 2017

IT as a Service (ITaaS), infused with AI and advanced automation, can help you better run IT with 89% fewer critical incidents, so you can deliver better customer service. Watch this on-demand webinar to discover how Danske Bank is doing just that.

read more >>>

Sponsored by IBM

Take Advantage of Cloud Backup to Kick-Start Your Disaster Recovery

September 27, 2017

As organizations' storage needs grow and they expand geographies, they often find they do not have a comprehensive plan to rapidly recover from a natural disaster, cyber attack, or equipment failure. To make matters worse, companies that rely on traditional backup and recovery solutions are simply not able to keep up with the increasing data needs of today's enterprise.

read more >>>

Sponsored by Druva

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017

September 21, 2017

Continuous integration and continuous deployment (CI/CD) allow DevOps teams to be more efficient. When starting from a production environment, the use of Microsoft SQL Server 2017 in Docker containers and Kubernetes clusters can facilitate a DevOps CI/CD pipeline. Using SQL Server tools also allows you to easily integrate core DevOps application lifecycle management practices to database development.

read more >>>

Sponsored by Microsoft

Designing a Proactive Approach to Information Security with Cyber Threat Hunting

September 20, 2017

Sponsored by IBM

read more >>>

Today's cyber threats are more sophisticated, agile and easily capable of getting past any network security measures. Your organization must evolve to keep pace, replacing its traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt threats from hostile nation-states, competitors, criminals, and more.

Next-Generation Applications Require the Power and Performance of Next-Generation Workstations

September 18, 2017

As your business embraces the latest technologies to help serve its customers, speed time to market, or explore new revenue streams, the technology your employees rely on needs to keep pace. Powerful applications that propel artificial intelligence, machine learning, virtual reality, and more require outfitting your team with high-performance workstations built to match.

read more >>>

Sponsored By Dell & Intel

How to Choose the Right Cybersecurity Solution

September 19, 2017

Lately it seems that everywhere you turn, there's another cybersecurity breach – and hackers and thieves are never satisfied with the status quo, continuing to refine their tactics or create new methods of attack. So how do you protect your business now, but also plan for your future security needs? How can you guard against this ever-changing threat landscape?

read more >>>

Sponsored by Kaspersky

How Automation and Preventative Resolution are Transforming Workplace Productivity

August 29, 2017

If your organization provides service desk support or allocates significant resources to endpoint management — this is one hour you should spend with our experts as they demonstrate how these technologies deliver preventative support, improved productivity and user satisfaction.

read more >>>

Sponsored by Pomeroy

Sponsors >>>

Topics >>>