Archive for August 15th, 2018

Share

Live Webinar – August 23rd, 2018 12:00 pm – 1:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU free
Provider: Training Magazine Network

They are the two of the most popular buzz phrases in the Learning and Development industry—social learning and gamification.

You’ve likely heard about the benefits of both in terms of learner engagement and retention.

In this webinar Katrina (Marie) Baker goes beyond theory and focuses on what gamification and social learning LMS features can do for your training program.

Join Katrina & Explore How To:

  • Effectively blend social learning into existing courses using an LMS
  • Align gamification initiatives with business objectives so they contribute to your organization’s goals
  • Use learning technology to drive engagement using badges, leaderboards, and rewards

This webinar includes examples of gamification and social learning features found within Adobe Captivate Prime.

Presenter: Katrina (Marie) Baker (LinkedIn profile) Adobe Senior Learning Evangelist, speaks frequently and maintains YouTube channel Learn Tech Collective. She has authored books LMS Success: A Step-by-Step Guide to Learning Management System Administration (2018), The LMS Selection Checklist (2018), and Corporate Training Tips & Tricks: Save Your Money & Prove Your Worth (2017).  Katrina is a former Director of Technology with ASTD and has worked in global training capacities for Fortune 500 retailer Whole Foods Market, and Global 100 law firms Cooley LLP and Latham & Watkins LLP.

Click to register for:
Beyond The Buzz Phrase:
Social Learning & LMS Gamification In Real Life

0 1.0 0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar – August 22nd 2018, 2:00 pm – 3:00 pm EDT
Live Webinar – August 22nd 2018, 7:00 pm – 8:00 pm BST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider:  Global Knowledge UK  (REP 1999)

Cloud and virtualization technologies have spawned a whole ecosystem of applications.

But like any powerful technology, they can be used for bad as well as good.

This session reviews the top 10 most common mistakes made in cloud and virtualization security.

Answer  Common Cloud Security Questions Including:

  • Why do people think clouds are secure?
  • What are the most common threats to cloud instances?
  • What is cloudjacking?
  • What are the top 10 security mistakes people make with cloud and virtualization?
  • What are the recommended solutions and best practices?

Presenter: Dave Buster (LinkedIn profile), B.S. Engineering MBA Security+ CISSP has over 35 years of experience in design & product management of technology solutions. Dave spent 12+ years with Cisco systems in product management & technology planning, rising to the level of Director of Product Management in the Global Government Solutions Group. Later, Dave worked in Smart Grid, storage, and financial industries as a Security Architect. Now with Global Knowledge, Dave manages a worldwide portfolio of cybersecurity courses. Dave is also an amateur radio operator (KK4ELT) & holds a patent on satellite communications architecture.

Click to register for:
What Are Common Mistakes In Cloud Security?

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar August 22nd, 2018, 10:00 am – 11:00 am EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: Gartner Webinars

Multi-factor authentication (MFA) helps defend against account takeover attacks, the most common type of cyber attack.

A new crop of cloud-based MFA services provides support for strong authentication for a variety of scenarios.

In this webinar, Paul Rabinovich (LinkedIn profile, Gartner bio) Gartner Research Director discusses cloud-based MFA that can balance trust, user experience and cost.

Paul also reviews commonly supported MFA use cases, multi-factor authentication methods, and adaptive access functionality that is increasingly demanded by security-conscious organizations.

Discussion Topics:

  • Why MFA and why cloud-based MFA
  • What you should look for when evaluating cloud-based MFA
  • Vendors providing cloud-based MFA services

Click to register for:
Cloud-Based Multi-Factor Authentication
Is Ready For Prime Time

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.

Share

Live Webinar August 21st, 2018, 2:00 pm – 3:00 pm EDT
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider:  StickyMinds/Techwell

Microservices, as the name implies, break up applications into many small pieces. Teaming microservices with DevOps is considered the new path to rapidly bring business value to software applications, and Docker is the primary containerization technology that can make microservices a reality.

Speed has a price, however. Breaking up applications introduces new types of issues that traditional architectures do not need to deal with.

Join this web seminar with Amy Feldman to learn about five ways to tame the container chaos.

Learn:

  1. How analytics can be used to guide design decisions and identify practices that correlate to the higher levels of performance
  2. Where, when, and how to enrich performance monitoring with detailed instrumentation and the value of additional metrics in cloud environments
  3. How to extend support with synthetics to monitor the APIs that are key to driving communication between microservices
  4. How increases in components, dependencies, and communication flows necessitate the need for automatic mapping and maintaining telemetry data
  5. How to apply established configuration management techniques to containers using automation to preserve velocity

Presenter: Amy Feldman is director of CA APM Product Marketing, focusing on expanding thought leadership, sales enablement, and product marketing for CA APM. Previously Amy worked at HP, where she was a solution marketing manager for a cloud platform based on open source technologies such as Cloud Foundry, Docker containers, and OpenStack. In addition to her experience in marketing cutting-edge cloud technologies, Amy brings significant APM expertise to CA. During her career at HP, Amy served in product management, engineering, and technical marketing roles.

Click to register for:
Employing Microservices:
5 Ways To Tame Container Chaos

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.