dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Upcoming Events >>>

  • Jun 30, 2015

    Register

    Twilio Video on Bluemix: Get Actionable Data from Enhanced Customer Service Experiences

    What if customer feedback automatically drove business decisions? Contextual customer service leads to greater levels of client satisfaction. Rather than sending customers away from a web or mobile app to a phone number, Twilio lets you embed communications directly into the app experience. Customer feedback can be automatically analyzed by leveraging IBM Watson to provide powerful insights. In this Webcast learn how Twilio communications can be an integrated part of your Bluemix app. We’ll walk through a customer service use case with a working example application. You’ll find out how embedded video can provide enhanced customer service and how smarter business decisions can be made via the data tools available on Bluemix.

    Read More >>>

  • Jun 30, 2015

    Register

    Best Practices in Detecting and Preventing Contact Center Fraud for Financial Services Firms

    Mitigating voice-facilitated fraud at contact centers is one of the biggest challenges facing financial institutions today.

    Read More >>>

  • Jul 08, 2015

    Register

    Using Toad for Oracle in an Agile Environment

    With the ever-increasing adoption of agile methodologies, the need for agile database tooling has become even more important. Often, the database development lifecycle has become the bottleneck in an otherwise agile delivery process. With little room for error when downtime can cost millions of dollars, there is a mission-critical need for an agile database deployment process that can reduce risk and deliver consistently reliable results. Check out this eSeminar to learn how to version-control code changes and database objects, automate dev processes, and tie this software into modern build servers.

    Read More >>>

  • Aug 04, 2015

    Register

    Enterprise Search Goes Cognitive

    Most organizations struggle to deliver the information and insights their front-line staff need for top performance. The proliferation of data, disconnected silos, and the difficulty of synthesizing massive amounts of information are major hurdles. Organizations also need to provide the tools to find and use this data in context for fast, well-informed decisions.

    Read More >>>

  • Aug 13, 2015

    Register

    Criteria for a Successful Enterprise Mobile App Deployment: Security, Usability, and Analytics

    Organizations now understand the importance of delivering mobile apps and content to 100% of their potential users, whether BYOD employees, contracted workers, or others in the extended enterprise. But how can you ensure your mobile app deployment is successful for all stakeholders, i.e. IT, the lines of business, and end users?

    Read More >>>

Data Management

Lower RTOs™ with Veeam Explorers for Microsoft SQL Server, Active Directory and Exchange

Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.

Sponsored by Veeam

Storage

SQL Server 2014 High Availability & Disaster Recovery with Pure Storage

Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.

Sponsored by Pure Storage

Security

CyberArk Introduces Privileged Account Security for SSH Keys

Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.

Sponsored by CyberArk