New Sugar 5.0 Platform Capabilities and Advanced CRM Functionality
By: SugarCRM View more from SugarCRM >>
Download this next:
The future of e-commerce and CRM
By: Oracle Corporation
Type: eGuide
While meshing e-commerce and CRM platforms has been an emerging implementation idea for several years, 2018 will be the year in which businesses make some of those implementation leaps and reap the benefits, according to insiders watching the technology.
In this e-guide, learn about some trends vendors and analysts are predicting for the future of e-commerce and CRM.
Explore key considerations when planning your CRM spend, including:
- Mobile becomes the front door
- The arrival of the subscription economy
- Use behavior analytics to understand e-commerce and CRM
- And more
These are also closely related to: "New Sugar 5.0 Platform Capabilities and Advanced CRM Functionality"
-
6 customer service channels you need to support
By: Oracle Corporation
Type: eGuide
As the number of customer service channels continues to expand, organizations have been challenged to decide which to prioritize. Where should you allocate resources to most effectively engage with current and potential customers?
In this expert e-guide, Scott Sachs (President of the specialized consultancy SJS Solutions) weighs the pros and cons of these 6 main customer service channels:
- Chat/video chat
- Phone
- Social media
- Customer self-service
- Mobile
-
A Hospitality How-To: Consent and Customer Data Management Across a Global Brand
By:
Type: Video
Hear how the Radisson was able to employ sophisticated consent management on their homepage and update multiple versions of their global site in a seamless and simple way by using Tealium, saving them time, money and resources.
Find more content like what you just read:
-
Cache Invalidation: What it is and How to Implement It
By:
Type: Replay
Did you know that removing objects from the cache is just as important as storing objects in the cache? Keeping objects in the cache for too long can result in data inconsistency. Imagine breaking news not ending up on a news websites because the homepage is cached. Luckily Varnish has some built-in invalidation mechanisms to allow applications to forcefully remove objects from the cache. In this webinar we'll talk about: - Purging - Soft purging - Banning - Secondary key
-
APAC: Cache Invalidation: What it is and How to Implement It
By:
Type: Replay
Did you know that removing objects from the cache is just as important as storing objects in the cache? Keeping objects in the cache for too long can result in data inconsistency. Imagine breaking news not ending up on a news websites because the homepage is cached. Luckily Varnish has some built-in invalidation mechanisms to allow applications to forcefully remove objects from the cache. In this webinar we'll talk about: - Purging - Soft purging - Banning - Secondary key
-
Build vs Buy eBook
By: PatientIQ
Type: eBook
Launching an integrated outcomes program requires seamless integration of EHR modules, IT systems, and clinical workflows. This e-book outlines the technical requirements, workflow engine, and population health management capabilities needed to successfully implement an effective outcomes program. Read the full e-book to learn more.
-
A Computer Weekly Buyer's Guide to Containers and Microservices
By: TechTarget ComputerWeekly.com
Type: eBook
In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
-
The 6 Hiring Dashboards Every Talent Acquisition Team Needs
By: GEM
Type: eBook
This e-book offers the starting foundation every talent acquisition team can use to build 6 essential hiring dashboards. Acces the guide to learn how to measure performance, forecast hiring, and quantify your impact, as well as to find the templates and insights you need.
-
Email Marketing’s Missing Link: Purchase Intent Data
By:
Type: Talk
From A/B testing subject lines to leveraging dynamic content modules, many marketers are already adept at innovating their email campaigns to drive better open and click-through rates. True email effectiveness stems from a marketer’s ability to personalize the messaging to a prospect’s specific technology need. And yet, with email volumes at an all-time high, balancing scale with personalization must be a priority for any GTM team in 2023. Purchase intent data is a missing link in many email marketing playbooks. Join BBD Boom’s Adam Lewis and TechTarget’s Colin Mitchell to learn how intent data can improve the performance of your email campaigns. You’ll hear real examples of how tech companies use intent data in their email marketing campaigns to drive better results and build stronger connections with their buyers.
-
Email Marketing’s Missing Link: Purchase Intent Data
By:
Type: Talk
From A/B testing subject lines to leveraging dynamic content modules, many marketers are already adept at innovating their email campaigns to drive better open and click-through rates. True email effectiveness stems from a marketer’s ability to personalize the messaging to a prospect’s specific technology need. And yet, with email volumes at an all-time high, balancing scale with personalization must be a priority for any GTM team in 2023. Purchase intent data is a missing link in many email marketing playbooks. Join BBD Boom’s Adam Lewis and TechTarget’s Colin Mitchell to learn how intent data can improve the performance of your email campaigns. You’ll hear real examples of how tech companies use intent data in their email marketing campaigns to drive better results and build stronger connections with their buyers.
-
CRM Deep-dive
By:
Type: Talk
In this educational session, we will be covering the following topics: - Dashboard Customisation - Entering a File Note - Report Generation - Custom folder generation - Segmentation - Tags - Creating Template (File Notes & Emails) - Email Functionality - Creating Model Portfolios The webinar will run for approximately 45 minutes, with 15 minutes for Q + A. We look forward to having you join us! For improved quality, we recommend adjusting the in-screen settings to 1080p.
-
Alert Management 2.0 with easy onboarding, integrations, and intelligence
By:
Type: Replay
Struggling to manage your digital infrastructure? You need a solution that takes care of the noise while letting you focus on what you do best – solving problems. Explore how Freshservice tackles the challenge in this webinar, the third in the Let's Talk ITOM series. Get a detailed walkthrough of the revamped Alert Management module. Discover the new onboarding flow, the upcoming enhancements in email integrations, and multiple new features that simplify digital operations.
-
Beyond the dashboard: Answer any data question in minutes
By: Alteryx
Type: eBook
What if you could still use dashboards to do the things they were designed to do well, but complement them with technology that could do the things that dashboards don’t do well? Read on to learn how AI can help you surface trends, explore data, and make better decisions — all without needing to create more dashboards.
-
Abnormal Demo Day: Watch How We Block Socially-Engineered Attacks
By:
Type: Talk
Email security has evolved as more organizations migrate to the cloud. Abnormal Security has been at the forefront of this evolution, and we want to give you a behind-the-scenes look at how our platform blocks the full spectrum of email attacks. Join us for our August “Abnormal Demo Day,” a new monthly series that highlights key platform features and capabilities designed to address today’s toughest security challenges. Register for our first live Abnormal Demo Day on August 30 and learn how to: - Simplify email security. Understand what threats secure email gateways (SEGs) struggle to detect and block. - Streamline operations. Get an overview of the dashboard and learn how to prevent email attacks with the highest efficacy. We'll save time at the end for Q&A, so bring your questions! Register today!
-
Application of Data Security in Daily Life
By:
Type: Talk
In this talk, my focus is on the application of data security in our data today's life. Attendees get to learn the security perspective of data and how they can pursue a career in security while continuing their passion for data security. Additionally, we will discuss the different perspectives of data security solutions such as Cloud data security, Web Browser Security, eMail Security, Payments Security, Enterprise Data Protection, Hardware security module, Key management, etc.
-
Data Disruptors: Build augmented analytics with NLQ and the power of a question
By:
Type: Talk
With Lumenore’s “Ask Me” Natural Language Query (NLQ) feature, you can ask your data questions in your own language and get clear answers, whether in a dashboard, a chart, an email, or the response of your choice. This powerful augmented analytics capability puts a lot of demands on the underlying infrastructure. Come learn what it does, how it works, how it can democratize analytics in your business, and why Lumenore uses Vertica to power this cutting-edge capability.
-
Data Disruptors: Build augmented analytics with NLQ &n the power of automation?
By:
Type: Replay
With Lumenore’s “Ask Me” Natural Language Query (NLQ) feature, you can ask your data questions in your own language and get clear answers, whether in a dashboard, a chart, an email, or the response of your choice. This powerful augmented analytics capability puts a lot of demands on the underlying infrastructure. Come learn what it does, how it works, how it can democratize analytics in your business, and why Lumenore uses Vertica to power this cutting-edge capability.
-
Demo - Cymulate Breach and Attack Simulation. Part 2
By:
Type: Talk
Extended BAS modules: WAF, Full Kill-Chain Scenarios, Data Exfiltration, and an overview of custom templates for all modules
-
Optimize your recruiting process with 6 essential hiring dashboards
By: GEM
Type: White Paper
Discover the 6 hiring dashboards every recruiting team needs to centralize data, visualize trends, and optimize the hiring process. Download this white paper to learn how to build the perfect dashboard for your organization.
-
Demo Day: A Closer Look Into The Abnormal Human Behavior AI Platform
By:
Type: Replay
The rise of generative AI technology has brought about considerable shifts in the threat landscape, as cybercriminals are leveraging it to escalate the volume and sophistication of their attacks. This includes crafting near-perfect phishing emails and deploying sneaky tactics that exploit human behavior to log right in. The Abnormal email platform is designed to tackle the full spectrum of today’s attacks across email and the cloud environment. Join our 30-minute session to get a behind-the-scenes look at key features and capabilities as we dive deep into our new approach to email security. Hosted by Abnormal’s Group Technical Marketing Manager, Gabe Rebane, register and learn how to: - Simplify email security. Understand what threat tactics are being used to trick people and attack organizations. - Streamline operations. Get an overview of the dashboard and learn how to prevent email attacks with the highest efficacy. - Activate platform features. Get holistic email protection by utilizing Account Takeover Protection, AI Security Mailbox, Email Productivity, and much more! Come with your security curiosity, ideas, and questions. Register today!
-
Demo Day: A Closer Look Into The Abnormal Human Behavior AI Platform
By:
Type: Replay
The rise of generative AI technology has brought about considerable shifts in the threat landscape, as cybercriminals are leveraging it to escalate the volume and sophistication of their attacks. This includes crafting near-perfect phishing emails and deploying sneaky tactics that exploit human behavior to log right in. The Abnormal email platform is designed to tackle the full spectrum of today’s attacks across email and the cloud environment. Join our 30-minute session to get a behind-the-scenes look at key features and capabilities as we dive deep into our new approach to email security. Hosted by Abnormal’s Group Technical Marketing Manager, Gabe Rebane, register and learn how to: - Simplify email security. Understand what threat tactics are being used to trick people and attack organizations. - Streamline operations. Get an overview of the dashboard and learn how to prevent email attacks with the highest efficacy. - Activate platform features. Get holistic email protection by utilizing Account Takeover Protection, AI Security Mailbox, Email Productivity, and much more! Come with your security curiosity, ideas, and questions. Register today!
-
Demo Day: A Closer Look Into The Abnormal Human Behavior AI Platform
By:
Type: Replay
The rise of generative AI technology has brought about considerable shifts in the threat landscape, as cybercriminals are leveraging it to escalate the volume and sophistication of their attacks. This includes crafting near-perfect phishing emails and deploying sneaky tactics that exploit human behavior to log right in. The Abnormal email platform is designed to tackle the full spectrum of today’s attacks across email and the cloud environment. Join our 30-minute session to get a behind-the-scenes look at key features and capabilities as we dive deep into our new approach to email security. Hosted by Abnormal’s Group Technical Marketing Manager, Gabe Rebane, register and learn how to: - Simplify email security. Understand what threat tactics are being used to trick people and attack organizations. - Streamline operations. Get an overview of the dashboard and learn how to prevent email attacks with the highest efficacy. - Activate platform features. Get holistic email protection by utilizing Account Takeover Protection, AI Security Mailbox, Email Productivity, and much more! Come with your security curiosity, ideas, and questions. Register today!
-
What’s New in the Latest NOM Release?
By:
Type: Talk
Here’s exciting news! The May 2022 releases of Network Operations Management (NOM), Network Node Manager i, and Network Automation are here. Join our team leaders for a discussion of the new capabilities now available to you. Here’s a sneak peek of our updates: NOM Reporting – SaaS • Simplify your transition from Network Performance Server (NPS) to the OPTIC Data Lake with NOM Reporting – SaaS. • See how reporting and dashboarding capabilities–including the powerful Performance Troubleshooting module–deliver faster, more intuitive analysis and reporting using the SaaS-based data lake. • Learn how to easily access NOM data with the cloud-native BI tools you already use or via integrated reporting options. Incident and Performance Troubleshooting • Gain new insights for your performance data in new chart types, such as TopN tables and Pie Charts, and consolidate data with Group by and aggregation options. • Better understand traffic data in Performance Troubleshooting and Incident Troubleshooting workflows. • View network paths using specified nodes or interfaces for source and destination to identify related objects, then troubleshoot and complete the process with automated configuration-change capabilities. Monitoring for change • See how our powerful new workflow-based user interface allows operators to monitor for performance-impacting change from a single dashboard.
-
Beyond the Dashboard
By: Alteryx
Type: eBook
Traditional dashboards are wonderful for high-level overviews and easily digestible information. They’re not great for getting the information you need to make decisions. Read this e-book now to learn how you can automatically generate dashboards that anyone can use to surface hidden insights, outliers, and trends.
-
What is a Hardware Security Module?
By:
Type: Video
A hardware security module is a dedicated crypto processor, designed to protect the crypto key lifecycle, validated for security by third parties (FIPS 140-2, Common Criteria, PCI HSM, FIPS 201). A hardware security module is a trust anchor. A trust anchor that protects the services we use every day. Things like SSL, DNS, banking and websites. Mobile devices. Smart meters. IoT devices. National identity cards. Credit card data and PINs. Mobile payments. Digital documents. Passports. Blockchain. 5G networks And so much more. Hardware security modules typically are hardware-based or cloud-based. HSMs ensure compliance. Simplify audits. Improve performance. Securely generate and store keys. Hardware security modules are trusted by the most security-conscious companies, agencies, banks, and service providers in the world. Thales Hardware Security Modules are the Foundation of Digital Trust. For more information, visit https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms
-
Coder Community Call: What's New with Coder January Edition
By:
Type: Replay
Join us for our first Community Call of 2024. We'll dive into the latest Coder news, showcase live demos and more. Don't miss out! We'll talk about: - Tutorial on using modules from the Coder registry - Overview of slackme module and demo - And much more!
-
Latest updates on pensions dashboards and exploring the end user experience
By:
Type: Talk
In this session with the Pensions Dashboards Programme (PDP), find out more about what users could see and experience when they interact with pensions dashboards, as the wider pensions industry prepares for connection to the dashboards ecosystem starting in April 2025. Join us to hear from the programme's Principal, Chris Curry, who will share the latest advancements and updates on the PDP and the MoneyHelper Pensions Dashboard, helping to keep you informed and ready for pensions dashboards becoming a reality.
-
Using Integrated Security to Overcome Adversaries
By:
Type: Replay
Harness comprehensive cloud and email threat intelligence integrated into a single XDR framework with Mimecast, Netskope and Secureworks to streamline your security operations What You’ll Learn: • Simplified investigations and improved threat hunting, detection, and response confidence through a centralized Taegis platform • Email and cloud-borne threat visibility, threat hunting, dashboarding, and cross-telemetry alerting capabilities • Stop sensitive data from being emailed outside of the organization. • Best-in-class shared intelligence preventing future attacks. • Continuously evaluate risk signals with adaptive user policies for applications, data and coaching Speakers: Joseph Tibbetts, Senior Director, Technology Alliances & API, Mimecast David Willis, Head of Technology Integrations, Technology Alliances, Netskope Ryan Alban Director, Global Presales Strategy & Operations, Secureworks
-
Advance your Power Design with Isolated Current Sensing
By:
Type: Video
Learn the benefits and practical applications of galvanic isolation amplifier current sensors and modulators. This webinar explains the operating principles with key design considerations, recommendations and electrical parameters in power design systems. Broadcom will introduce its isolation amplifiers and modulators.
-
Exploring the Essentials: A Guide to Observability Components and Tools
By:
Type: Video
In this module, Professor Correll discusses Observability Components and Tools. This segment touches on agents and sources, with the general principle being that each source typically associates with one or more dedicated agents. Additionally, the module will explore the significance of logging and monitoring as crucial elements for sustaining peak application performance. The module also addresses topics such as analytics, infrastructure, and concluding with a focus on pipelines and integration. Want to learn more? Download a copy of "Searching Observability Data for Dummies" here: https://cribl.io/resources/searching-observability-data-for-dummies/
-
UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Assessment Modules
By:
Type: Talk
During this webinar, we will walk you through the Assessment Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.
-
UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Assessment Modules
By:
Type: Talk
During this webinar, we will walk you through the Assessment Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.
-
UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Context and Identification
By:
Type: Talk
During this webinar, we will walk you through the Context and Identification Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.
-
Updated Subscription Health Dashboard: Tracking Deployments and Ensuring Best Practices in Qualys
By:
Type: Talk
In today’s rapidly evolving cybersecurity landscape, maintaining the health of your Qualys deployments is more critical than ever. Issues such as duplicate asset entries, potential ghost hosts, and decommissioned devices get in the way. Ensuring clean and reliable asset data is paramount for robust security and compliance. On November 21st , join Colton Pepper and Anthony Williams, VMDR Subject Matter Expert, as we unveil the latest updates to the Qualys Subscription Health Dashboard. This enhanced tool is designed not only to optimize your Vulnerability Management (VM) deployments but also streamlines operations across other Qualys capabilities, including Policy Compliance, File Integrity Monitoring, Endpoint Detection Response, general Cloud Agent tracking, and more! Learn how these updates empower your teams to quickly identify and resolve issues that can hinder data cleanliness and operational efficiency in the Qualys Enterprise TruRisk Platform! Join this live event to gain insights on: 1. The latest advancements in the Subscription Health Dashboard for optimizing your Qualys deployments across multiple modules. 2. How to quickly pinpoint and resolve issues like ghost hosts and duplicate entries to enhance data integrity. 3. Best practices for maintaining clean, reliable, and scalable asset data to ensure robust security and compliance across your Qualys Platform ecosystem. Don’t miss this opportunity to elevate your Qualys deployment-game! Register now!
-
HSMs Decoded: A Complete Guide to Hardware Security Modules and Their Deployment
By:
Type: Talk
Hardware Security Modules (HSMs) are the root of trust for digital applications - get a better understanding of these devices and their deployment strategies. Join this webinar if you want to learn more about the basics of HSMs, the cloud, and how they can become a joint reality! Our speakers Fabian Eidens and Eike Vomberg are looking forward to talking about the use cases of HSMs and answering your questions. Join the session to learn more about: - What are Hardware Security Modules - Use cases for Hardware Security Modules - How HSMs can secure cloud applications - How to deploy HSMs as a service This webinar is for those who want to learn the basics of Hardware Security Modules, as well as HSM enthusiasts who want to learn more about alternative deployment options for HSMs and ways to protect data in the cloud. Discover how you can benefit from the advantages of the cloud, such as flexibility, scalability, and high availability, while still having full control over your cryptographic keys and applications.
-
Automating Remediation, Qualys Patch Management Best Practices
By:
Type: Talk
Join us for our regularly scheduled Qualys Technical Series. With the introduction of Patch Management a few years ago, Qualys customers were presented with the opportunity to not only continuously detect vulnerabilities on their assets, but then to automatically remediate them as well. However, as new features have been added, some customers may not be leveraging these to their full extent, and are still performing manual tasks that could be automated. In this Qualys Technical Series, we'll cover key themes around using Patch Management efficiently, followed by a live demo, including: • The various different entry points for using patch management according to your workflow. • QQL examples to automatically select and apply patches to match policy, over current practices • Fitting Patch Management into existing workflows, including how to build exceptions into these • Examples of useful, actionable dashboards that you can employ for efficiently tracking patch progress • Other applications for the Patch Management module, such as custom scripting and software installation • Addressing 0days when no patch is available We hope you join us!
-
Interactive Document Intelligence With NLP
By:
Type: Talk
Many firms have a large document corpus made up of both digitized and raw images. Now more than ever, financial institutions are turning towards unstructured data sources to capture additional attributes in order to, ultimately, adjust or confirm their analyses and discover new trends and insights. Many organizations rely on individuals to read sections of these documents or search for relevant materials in an ad hoc manner, with no systematic way of categorizing and understanding the information and trends. Join us for this Dataiku session on interactive document intelligence, where we will showcase a modular and reusable pipeline to rapidly and automatically digitize documents, extract text, and consolidate data into a unified and searchable database. We will focus on NLP techniques applied to prepare, categorize, and analyze textual data based on themes of interest (in this project: ESG), with additional theme modules available. Lastly, we will demo a purpose-built dashboard to provide business users with a simple and interactive tool to analyze high-level trends and drill down into aggregated insights.
-
CPD: Diversifying income risk
By:
Type: Talk
The objective of this CPD module is to explore ways of diversifying income risk. By completing, this CPD module, you should be able to: A. Explain the definitions of income risk B. Consider the options for mitigating income risk using bonds C. Consider the options for mitigating income risk using equities
-
CPD: Diversifying income risk
By:
Type: Replay
The objective of this CPD module is to explore ways of diversifying income risk. By completing, this CPD module, you should be able to: A. Explain the definitions of income risk B. Consider the options for mitigating income risk using bonds C. Consider the options for mitigating income risk using equities
-
Simplifying IT Dashboards & Reporting with NinjaOne: Empowering IT Management
By:
Type: Video
Join York at the SDI Dashboards and Reporting Day as he unveils the transformative capabilities of intelligent dashboards. With a focus on enhancing visibility, streamlining helpdesk operations, enabling proactive management, and bolstering cybersecurity, York's session will demonstrate how these dashboards empower IT teams to react swiftly, optimize efficiency, and drive impactful decision-making. Gain insights into the synergy of dashboards and remediation, and discover how this integration can further amplify operational efficiency and problem resolution. Don't miss this opportunity to harness the potential of intelligent dashboards and revolutionize your organization's approach to data-driven insights.
-
Emotet Exposed: Inside the Cybercriminals’ Supply Chain
By:
Type: Video
In this new analysis, we’ll delve deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery mechanism’s malicious components and modules, its execution chains and its software development lifecycle. In this webcast, we will reveal: • Emotet’s infection chain process • Its command-and-control network infrastructure and software development life cycle • How to create Emotet sock puppets for fetching modules and extracting its recently updated configuration • An analysis of two recently updated modules that differ from previous Emotet attacks • Tips and recommendations for mounting a more ironclad defense
-
How to build Kibana Dashboards in a few minutes
By:
Type: Replay
Build beautiful and interactive Kibana Dashboards in just minutes. Learn how to rapidly analyze data using Kibana Lens and then iterate and expand on existing visualizations to build out robust analyses - all with just a mouse. Highlights: - Live demonstration of Kibana and building both charts and dashboards - Quickly and easily create meaningful visualizations in Kibana Lens - Tips and tricks for improving dashboard interactivity - Navigating between dashboards with drill-downs
-
Hidden Context, Adding Information Without Cluttering Your Dashboard
By:
Type: Replay
Sometimes, your dashboard needs a little more explanation for your user. But it doesn’t need to appear on the dashboard all at once. In this latest Data Science Central Webinar, we will uncover a few techniques you can use to add information and update visuals behind the scenes, leaving you with a clean dashboard every time!
-
How to Identify Metrics and KPIs to Measure IT’s Business Value Contribution
By: GoTo
Type: Gartner Research Report
To capture stakeholders’ attention, CIOs should create metrics that reflect company strategy through contextualized dashboards and KPIs. For more data-informed insights into communicating your IT team’s business value, see the full Gartner report.
-
CISO’s Guide to Creating Impactful Dashboards for In-depth Visibility
By:
Type: Talk
Lack of visibility is the biggest challenge security leaders face and will cripple and limit your ability to make informed decisions quickly, putting your enterprise at risk. Dashboards are one way to solve the visibility problem and can simply and streamline. So that begs the question, how do you ensure your security team is always one step ahead? Join our live webinar as we explore: - Why creating a CISO dashboard is a must-have for modern security teams - Key metrics every CISO dashboard must have - Simple steps to build an effective dashboard that works!
-
Pensions Dashboards 101 (CPD accredited)
By:
Type: Talk
The pensions industry is famously guilty of overusing acronyms and industry jargon and dashboards are no exception. From the PDP and CDA, to ISP and APIs, this educational and informative session will look to decode the pensions dashboards universe and leave attendees with a better understanding of how they work and how they will benefit both members and pension providers. Whether you're a financial professional or simply curious about the topic, this webinar will equip you with essential knowledge to navigate the world of pensions dashboards effectively. Join this webinar to: - Fill the gaps in your general knowledge about pensions dashboards - Learn about the pensions dashboards ecosystem in an easy-to-understand, jargon-free language - Find out how pensions dashboards will lay the foundations for future innovation of pensions This session will feature an audience Q&A. Can't attend? Register anyway and we'll send you the recording. Please note that this session is CPD accredited and by joining you will earn an extra point towards your score.
-
Computer Vision at the Edge
By:
Type: Talk
Cameras are everywhere: they're in our cars, homes, places of work, and increasingly in our machines & robotics. AI has brought about rapid change and improvements in deep learning algorithms, so it is less about “what” is seen, but “how” it is seen. Canadian company NexOptic create differentiated, scalable, and highly optimized AI software solutions for imaging. Join Kevin Gordon, VP of AI Technologies, Colin D’Amore, Machine Learning Engineer, and Mary Bennion, Manager of AI Ecosystem at Arm, for an eye-opening webinar on Computer Vision at the Edge. 1. Learn how AI/ML is transforming images and video pixel-by-pixel 2. Every aspect of any image is uniquely perfected and tuned for precise ultra high-quality imaging 3. How to leverage raw data on the edge, with a demo from NexOptic NexOptic Homepage: nexoptic.com Sign Up Link: https://forms.gle/dyMNjPioU5M4DTKF9
-
Replay - Computer Vision at the Edge
By:
Type: Replay
Cameras are everywhere: they're in our cars, homes, places of work, and increasingly in our machines & robotics. AI has brought about rapid change and improvements in deep learning algorithms, so it is less about “what” is seen, but “how” it is seen. Canadian company NexOptic create differentiated, scalable, and highly optimized AI software solutions for imaging. Join Kevin Gordon, VP of AI Technologies, Colin D’Amore, Machine Learning Engineer, and Mary Bennion, Manager of AI Ecosystem at Arm, for an eye-opening webinar on Computer Vision at the Edge. 1. Learn how AI/ML is transforming images and video pixel-by-pixel 2. Every aspect of any image is uniquely perfected and tuned for precise ultra high-quality imaging 3. How to leverage raw data on the edge, with a demo from NexOptic NexOptic Homepage: nexoptic.com Sign Up Link: https://forms.gle/dyMNjPioU5M4DTKF9
-
Quick guide to smart office buildings
By: Panduit
Type: Product Overview
What does a smart office building look like, and how can you create one? Unlock answers in this overview.
-
Streamlining mobile asset management for a mobile-first workforce
By: ServiceNow and Samsung
Type: eBook
Discover how Samsung SDS's Zero Touch Mobility (ZTM) integrated with ServiceNow's Hardware Asset Management can streamline mobile device deployment, management, and security to enable a mobile-first organization. Read the full e-book to uncover transformative solutions.
-
How to build dashboards that drive insight and action in Kibana
By:
Type: Replay
If you build dashboards in Kibana, this webinar is for you. Join product experts as they demonstrate the latest features designed to make your Elasticsearch-driven dashboards more than just informative, but also actionable.
-
How to build dashboards that drive insight and action in Kibana
By:
Type: Replay
If you build dashboards in Kibana, this webinar is for you. Join product experts as they demonstrate the latest features designed to make your Elasticsearch-driven dashboards more than just informative, but also actionable.