More global cio webcasts

  • You Can’t Make Me! Using Change Management for Process Improvement Success

  • Business Process Improvement drives productivity improvements, but the very nature of process improvement requires people to change. That reality, along with an ever-increasing volume of change across every industry, makes change management essential to process improvement success. Process management and change management go hand in hand.

  • Building Confidence in Big Data with Information Integration and Governance

  • Join guest speaker, Michele Goetz, Forrester research analyst, as she reviews the latest research findings on Information Integration and Governance in the era of big data and David Corrigan, Director, Product Marketing, InfoSphere for IBM who will discuss how information governance will be making big data and analytics more successful with trusted and protected information.

  • Wireless Security: Beyond the Basics

  • Register for this webinar to join Bill Prout, wireless and network security expert at Sophos, and learn the best practices that can help you go beyond the basics of wireless security to provide advanced security, manageability and accessibility.

  • Mitigating M2M Security Risks in Critical Embedded Systems

  • Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates.

  • How to Move to a Zero Touch Enterprise

  • Join this webinar to learn how, by integrating machine data with enterprise data, you can gain real-time visibility into operations, proactively plan to increase operational efficiency, identify and investigate anomalies, and gain new insight.

  • Putting the Mobile Employee to Work

  • The technology in smartphones and tablets is easier to use and more compelling than ever, so it’s no surprise that end users want access to these same tools in the workplace. Ironically, BYOD often becomes a roadblock to productivity when a device crosses the enterprise threshold.

  • Flash: An Evolution in Primary Storage

  • New flash storage options are fast becoming the go-to tech for solving serious I/O problems. Effective use of these technologies hinges on understanding how they work, their strengths and weaknesses, and most importantly, how to integrate them for maximum benefit without breaking the bank.

  • Improving Operational Risk Management with External Loss Data

  • In this webinar, a panel of operational risk experts discuss how external data elements can assist risk managers and professionals in their operational risk programmes, particularly informing scenarios and assessments and also providing tail events for models.

  • Quick Tips for Managing Mobile Users

  • It can be an IT manager's biggest headache ? managing the growing number of remote users that are on the go and exclusively work from their laptops over wireless networks. And when a system fails to restart, a site visit often times is the only option for recovery. Now, with the powerful combination of Intel's latest vPro technology and Dell KACE Appliances, IT managers can enjoy remote systems management and recovery that is both effective and economical.

  • Get a Hand on Big Data

  • Join us for this one-hour complimentary webinar where you’ll learn from industry experts how to compare and analyze both structured and unstructured data, create a big data strategy and get ahead of incoming data to enable you to plan for future storage needs.

  • Agile and Logical Data Warehousing Best Practices

  • Our thought leaders understand the dynamics in today’s analytics environment and can provide real world insight into a data warehouse strategy that makes the most sense for your organization.

  • Real Time Analytics: A Case Study Webinar

  • Join this case-study oriented webinar to learn how one company used true real-time analytics and the power of a scale-out database to take their business to the next level.

  • Rising to the challenge of RMORSA - leveraging existing capabilities and building new ones

  • Unlike other ERM providers, IBM provides a fully integrated end-to-end ERM framework that is built based on extensive experience of helping two-thirds of the European CRO Forum to address Solvency II which shares common characteristics to the RMORSA. US Insurers have the flexibility to design their own RMORSA solution based on their unique requirements, with the ability to complement any existing infrastructure investments with new "best of breed" capabilities from IBM.

  • Smarter Mobile Security: Securing BYOD

  • Almost every organization will adopt BYOD in some form to accommodate today's knowledge workers — who insist on using their personal smartphones and tablets for work, too. The question facing IT is how to safeguard the security of BYOD-style access to corporate resources, while also meetings users’ expectations for instant-on access to the resources they need to do their jobs.

  • Windows Storage Server 2012 on IBM System x

  • With the introduction of the Microsoft' Windows' Storage Server 2012 offering via the IBM' Reseller Option Kit (ROK) program, clients can now get customized unified storage solutions which precisely match their specific needs. Combined with the IBM System x' servers, powered by the latest Intel' Xeon' processors and pre-installed by an IBM Business Partner, Windows Storage Server delivers enterprise-class storage management technology in an affordable, all-in-one solution. It is a great choice for your business regardless of whether you are a first-time user of network-attached storage (NAS) or you are deploying advanced storage solutions.

  • Smarter Mobile Security: Minding the Gaps

  • Effective mobile security requires a layered approach that coordinates mobile device security, mobile app security and mobile access security. Implementing these three aspects of mobile security as separate "silos" can easily result in gaps that will leave your organization vulnerable to the growing range of mobility threats - especially as your mobility threat surface keeps expanding over time.

  • Putting the Mobile Employee to Work

  • The technology in smartphones and tablets is easier to use and more compelling than ever, so it’s no surprise that end users want access to these same tools in the workplace. Ironically, BYOD often becomes a roadblock to productivity when a device crosses the enterprise threshold.

  • BYOD and Windows 7 Migration are the Questions. Is Desktop as a Service the Answer?

  • This webcast is the perfect opportunity for IT managers to better understand the requirements, use cases, risks and benefits of DaaS to help frame their own decision-making. From the operational to the technical, attendees will develop a clearer understanding how DaaS may make the most business sense for their individual use cases.

  • Desktop and Application Virtualization Best Practices

  • Register for this webinar to gain information about the steps you need to insure your desktop virtualization project meets ROI expectations and is successful.

  • Intelligent Management of WAS Applications: Reduce Cost, Complexity, and Errors

  • Join IBM's Debbie Miller to hear about the IntelligentManagement features that extend the quality of service provided by your middleware environment and configurable operational policies to govern the performance and health of your applications.

  • Agile Mobile Development - faster response time to feedback

  • In this webinar we will review the understanding of agile development applied to mobile app development, and how the right approach can deliver on a fundamental need of mobile, faster response time to user feedback. We will explore the need for continuous build, continuous install, and continuous test as critical aspects of applying agile processes to delivering mobile apps in time and with the quality and capabilities their users demand.

  • Improving Customer Service in the Age of Digital Disruption

  • Join us for this 60-minute webinar to learn more about the rapidly-changing trends in customer needs and demands, and to learn how financial enterprises can meet these requirements while shifting their focus from simply managing channels to providing meaningful customer experiences and on developing relationships. In addition, during this webinar, you'll find out how financial services firms can re-engineer their communications delivery to drive customer engagement, lower operational costs and meet regulatory mandates.

  • Proven Tips for High Volume Sending

  • Issues with messaging deliverability can be dramatically compounded when sending in large volumes. Learn how to overcome these obstacles as we chat with Jill Resnick, a Postmaster who previously worked at Macy's and American Cancer Society, and Mike Hillyer, Global Solutions Consultant from Message Systems. They'll share their best practices on reducing deliverability issues, traffic shaping and other tips!

  • Defending Against DDoS - Lessons Learned from High Profile Attacks on Financial Services Firms

  • Akamai is focused on determining the pattern of the attacks and implementing countermeasures. This webinar will deliver insights gained from successfully defending our customers against a wide variety of large-scale DDoS attacks.

  • Data Center Performance: Optimization Secrets Revealed

  • Register for this webinar that discloses the optimal DCIM strategy that ensures you are tapping the full business value of your data center.