PODCAST:
This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.
PODCAST:
How can Governance not be seen as a hindrance - but as an enabler, and provide the freedom to operate without worrying about those issues. This podcast reviews governing development as the next step in development organization transformation.
WEBCAST:
Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.
Posted: 03 Jan 2008 | Premiered: Jan 16, 2008, 12:30 EST (17:30 GMT)
PRODUCT DEMO:
Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
WEBCAST:
In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.
TRIAL SOFTWARE:
NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
WEBCAST:
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
SOFTWARE DOWNLOAD:
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
VIDEO:
This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.