0 items Sign Up Sign In

Zubair Alexander

Best Practices for Securing Active Directory

Most, if not all, of you have probably heard about the 10 Immutable Laws of Security. Unfortunately, a lot of organizations don't take security very seriously. They don't believe anything bad can happen to them, until it does. Securing servers in general is important, whether they are file and print servers or database servers, but securing Active Directory Domain Controllers is even more important. Why? Because Active Directory Domain Controllers allow you to centrally manage and secure your Windows network. You can decide who has access to certain resources, how long should the access be granted, and from which computer can the user access the resources.

Phil Edholm

Choosing Between Cisco Jabber and Microsoft Lync: A quantitative Analysis Methodology for Organizational Decision

For many organizations, the decision about whether to deploy the Lync client that comes with their enterprise Microsoft licenses or the Free Jabber collaboration client that comes as an extension of their Cisco VoIP and video systems is a real challenge. With two strong political camps often backing each option and the complexity of deciding, many organizations are at a stand-still in making a Unified Communications (UC) decision. And even when a decision is recommended, it is often challenged as subjective and biased.

Alan Ramias

Metrics and Process Management

This workshop is designed to provide participants with a practical and time-tested methodology and toolset for creating and implementing a successful process measurement and management system. Starting with a review of the many things that can go wrong in creating metrics, dashboards and the other popular artifacts of the measurement industry, I share hard-earned knowledge of how to design metrics that measure what they’re supposed to, link process performance to organizational goals, and provide useful information for guiding executive decision-making, troubleshooting and continuous improvement.

David Frankel

UML Profiling as a Framework for Domain-Specific Modeling Languages

Domain-specific languages have the power to capture and replicate the architectural knowledge of your best technical people, so that knowledge is consistently applied in production systems. UML Profiling is a potent means for creating domain-specific graphical modeling languages. Over ten years ago the architects of the Unified Modeling Language® (UML) understood that UML would have to be customized and extended for any serious industrial use. We thus incorporated customization and extension mechanisms into UML's fundamental architecture, enabling the creation of UML Profiles.

Alan Ramias

6-Hour Virtual Seminar on Process Modeling

This webinar is designed to present practitioners with the tools and techniques for documenting business processes, with ample opportunity to practice through case studies and application. Participants will be provided with a framework to establish a common understanding of the components of a process and the variables that impact process performance. This course will present:

Janne J. Korhonen

Doing IT Better : The Agile Approach

Gone are the days of business-as-usual tranquility. As today's competitive advantage may be a disadvantage as soon as tomorrow, long-run superior performance calls for non-stop innovation of new value. An agile enterprise must continually change and must even be able to reinvent its core essence in the face of major business discontinuities. There is hardly any business change in which information technology (IT) does not play a role. In contrast, change is increasingly IT-driven. In addition to cost efficiency and reliability of operations, the role of IT as the enabler of organizational agility and innovation is increasing in importance.

John Ripma

The Best Strategy to Manage IT Outsourcing Vendors

This webinar will discuss techniques that firms which outsource their IT environments can utilize to maximize their relationships with IT outsourcing vendors. From a strategic point of view, this webinar will examine the internal organizational changes that may be required when an IT domain is handed over to a third party.

Richard Machanoff

IT Governance - What Policies, Plans and Procedures Should be Implemented for a Well-Managed IT Department

Policies, Plans and Procedures are at the core of a well-run IT department. They define how the IT department functions and what systems support those functions. These Policies, Plans, and Procedures describe what is to be done, who is responsible for making it happen and how the actions are executed and recorded. Generally Policies, Plans, and Procedures follow a hierarchical scheme with Policies at the top level which describe Plans. Plans describe what procedures are used to implement the Plan. Procedures detail the actions to be completed. Procedures may also require guides and work instructions to provide additional detail for procedure implementation.

Kevin Aguanno

What's that Smell? Early Warnings of Agile Project Issues

Join noted author and agile project management expert Kevin Aguanno as he explains the misconceptions and the underlying truths about faster software delivery using agile methods and uncovers the preconditions to achieving speed. Along the way he will discuss the more easily achievable benefits of agile and how speed comes with higher levels of agile maturity.

Melvin Greer

The Big Deal with Big Data and Predictive Analytics

While I fully expect each enterprise to add its own flavor to the mix, here's one way to get the big data and predictive analytics conversation started: Big data is a collection of data from traditional and digital sources inside and outside your company that represents a source for ongoing discovery and analysis.

Karl Hakkarainen

Thriving in a BYOD world

A former manager used to say, "Bad news given early enough is just news." Detailed planning, by itself, isn't going to be enough to let an organization thrive in a BYOD environment. BYOD confounded traditional management and IT infrastructures because it democratized technology. It made the users powerful and raised the expectations that they would be increasingly in charge of their computing environments and, by extension, the ways that they got their work done.

Dave Kinchlea

ECM vs EIM vs RM

Enterprise Content Management, Enterprise Information Management and Records Management are three distinct views of the same general problem, that of dealing with the ever increasing amount of data within the organization. Both the volume of content and the types of content are increasing, no longer the sole domain of the back office working with Word and Excel files, important data to your organization exists in many different formats and produced by both front office and back office employees.

Denny Cherry

Optimizing SQL Server Performance in a Virtual Environment

In this session we'll look over some of the things which you should be looking at within your virtual environment to ensure that you are getting the performance out of it that you should be. This will include how to look for CPU performance issues at the host level. We will also be discussing the Memory Balloon drivers and what they actually do, and how you should be configuring them, and why. We'll discuss some of the memory sharing technologies which are built into vSphere and Hyper-V and how they relate to SQL Server. Then we will finish up with some storage configuration options to look at.

Denny Cherry

SQL Server Clustering

In this session we will cover the basics and delve into the advanced techniques which can be used to cluster Windows servers using the Windows Cluster Service, what sort of protection this provides you, and how to properly set up your clusters for a rock solid environment which will last you for many years to come. We will start with planning our cluster configuration, selecting our software, and walk through the process of clustering two servers together into an active passive cluster. We will cover the differences between a standalone machine and clusters with regard to licensing and multiple instance configurations.

Richard Machanoff

Using SharePoint as a Technology Platform for 21 CFR part 11 - A Case Study

A startup biotech company, with plans to eventually conduct Phase III clinical trials, realized that an attempt to maintain paper records for a phase III trial would be overwhelming. Just keeping up with the paper records for their first Phase I and Phase II trials was daunting. The company’s executives estimated that it would take 5 years to mature the corporate quality program, IT infrastructure and Information Systems to reach the goal of using electronic records and electronic signatures that complied with the 21 CFR part 11 regulation for FDA submissions. With phase III trials planned within 3 years, they needed a strategy to comply with part 11 guidelines in a much shorter timeframe. Employing SharePoint as a compliance framework, they were able to meet their schedule.

Hamilton Hayes

Establishing the Foundations of Data Governance Using Data and Process Design Standards and Management Practices

Based on industry experience, a data management life cycle will be used to show the data governance requirements for each phase of the life cycle. This will include the requirements that are be met, the resources required to support the life cycle and the data governance information to be collected and analyzed for each step.

Martin Holzke

Auditing Information Security - Evaluating the Effectiveness of Your Information Security Program

Without the ability to assess its effectiveness, the best information security program becomes a mere token effort. The purpose of information security auditing is to review whether your information security program achieves the objectives you have set yourself as an organization. Auditing is not about policing or assigning blame, but instead all about identifying weaknesses and opportunities as part of a process of continual improvement.

John Polgreen

Using TOGAF® and ArchiMate® Artifacts to Model Enterprise Ar

This webinar will discuss modeling of enterprise architectures using TOGAF 9 artifacts and ArchiMate viewpoints. Until recently modeling at the enterprise architecture level required depending either on open languages designed for solution level modeling (e.g UML, BPMN) or on the proprietary models offered by EA tools. This has changed with the introduction of the Open Group's TOGAF® artifacts and with their ArchiMate® viewpoints.

D. Paul D'Andrea

Automating Vendor Risk Management

During the webinar, you will learn the how to introduce ever higher levels of automation into your vendor risk management program, gaining quick wins and rewarding executive sponsors with tangible results.

Raymond Moberly

Lossless Data Compression Methods and Compression Performance Metrics

The webinar covers the foundations of data compression in the context of the broader subject of information theory. The learner will gain valuable insight into how lossless compression works and why the techniques are robust and trustworthy. In the historical perspective, data compression concepts have arrived in a timely manner to aid the expanding data storage and wireless communication needs of the modern era. The measure of information is defined probabilistically, it is formally defined as entropy, a term that Claude Shannon borrowed from quantum mechanics.

Randy Somermeyer

Integrated Lean Process Methodology Framework

The Integrated Lean Methodology goes back to the origins of process design and incorporates Lean Concepts, not all the Lean tool, but the concepts. This methodology has proven successful for basic process analysis for operational improvement, process redesign in conjunction of a system design and deployment (Lean ERP) and very effective in front of Agile projects, for obtaining common processes across multiple locations. Keep it simple, go fast, and produce results. There are subsequent models on scoping, AS Is mapping, process analysis, To Be and Transition planning. A 2-day on-site training explores all aspects of the methodology and participants work in groups on a real process issue during the exercises.

Gina Abudi

Practical Tips for Identifying and Managing Project Risks

Every project, regardless of its size and complexity, has risks associated with it. Some of those risks are known as they occur on every project in the organization, others are unknown and need to be identified. As a project manager, or a member of the project team, you need to understand those risks in order to ensure a success project. Risks should be identified at the start of the project, and reviewed throughout the project. Getting buy-in from the executive level and key stakeholders on potential risks and how they will be identified and managed is essential to managing those risks effectively. Often organizations don't want to admit risks might occur, or believe that they do not need to be planned for unless they occur.

Zubair Alexander

SharePoint Best Practices

It is easy to use SharePoint but if you don’t follow certain guidelines and best practices you can end up wasting valuable time and resources. This Webinar will teach you the recommended way to work with SharePoint. You will benefit from over a dozen years of SharePoint experience of a Microsoft MVP and consultant to ensure your sites, lists and libraries are properly configured and secured.

Richard Machanoff

How to Create a Roadmap to SharePoint Success

After a brief introduction to the multi-functional web technology base of SharePoint, the seminar will delve into major reasons why SharePoint implementations fail including technology issues, politics, and not having a clear picture of what SharePoint is to look like for your company, to name a few.

Michael Heydt

Developing for Google Glass with Xamarin, C# and the Glass Development Kit

This webinar will explain how to design and implement applications for Google Glass using the Glass Development Kit (GDK) with Xamarin.Android and C#. The GDK is an Android SDK add-on that contains APIs for android specific capabilities. Xamarin.Android is a toolset that allows .NET code in C# to run on Android devices and which provides the power of the C# language and .NET framework while not limiting any device capabilities and significantly greater productivity than native development for Glass.

Jason Bloomberg

Agile Architecture Challenges & Best Practices

For simple projects, developers can often work together to hammer out the design of their application as part of the routine within every sprint. When applications are more complicated, typically because they involve multiple distributed components, integration with legacy assets, or must run in a Cloud environment, then architecture becomes essential.

Alan Ramias

Choosing an Improvement Methodology

There are so many tools and methods for process improvement, technology design and project management that it's easy to not only get confused but to make major mistakes in designing and managing improvement efforts by adopting a patchwork approach. This session makes the argument for identifying and using a proven, highly structured methodology.

Lowell Fryman

Best Practices for Governance of Enterprise Reference Data Management

Many organizations continue to deal with reference data as an application-level issue. After all, every application requires some reference data. Multiple business units may use similar reference data and may even be purchasing similar data from multiple diverse data service providers at significant cost to the organization.

Kevin Aguanno

Rewarding Team Members without Breaking the Bank

In this economically challenging era, employee rewards might seem extravagant - but building team morale is even more important in tough times! Nevertheless, even the best reward ideas can fall flat if they aren't suitable to the person, the organization, the situation or the magnitude of the accomplishment.

Kevin Aguanno

What's that Smell? Early Warnings of Agile Project Issues

Agile methods break many of the controls we commonly use on our traditional projects. In addition, they use completely different metrics for tracking project progress and health. In an agile environment, how do you know if your project is running well?

Richard Machanoff

How to Create a Roadmap to SharePoint Success

After a brief introduction to the multi-functional web technology base of SharePoint, the seminar will delve into major reasons why SharePoint implementations fail including technology issues, politics, and not having a clear picture of what SharePoint is to look like for your company, to name a few.

John Jeston

How to Start a BPM program - This has Changed Significantly over the Last Several Years and is much better placed to Ensure Success

If an organization has decided that they should be transforming itself towards providing a more efficient and effective service to its customers, while reducing costs, then having a business process focus is essential. They believe that if they start the transformation slowly and incrementally that they will build skills and momentum within an organization.

Back to Top