Webinar: How to Consolidate Multiple Office 365 Tenants

In this webinar by Quadrotech, Microsoft MVP Paul Robichaux and Director of Enterprise Migrations, Mike Weaver, discuss best practice advice for Office 365 tenant to tenant migrations.

Learn broadly about what Quadrotech has to offer, which tenants to migrate when, how to find the right cadence for your project, and understand the true cost of delay if your migration project is put off track.

View Now

Webinar: How to Consolidate Multiple Office 365 Tenants

In this webinar by Quadrotech, Microsoft MVP Paul Robichaux and Director of Enterprise Migrations, Mike Weaver, discuss best practice advice for Office 365 tenant to tenant migrations.

Learn broadly about what Quadrotech has to offer, which tenants to migrate when, how to find the right cadence for your project, and understand the true cost of delay if your migration project is put off track.

View Now

Protecting College HTTP & HTTPS Applications from DDoS Attacks

DDoS attacks against encrypted web and application-based services continue to skirt university and colleges’ traditional volumetric-focused DDoS defenses.

To distinguish real users from malicious bots, institutions of higher learning are implementing a layered defense strategy that provides full attack spectrum protection with minimal exposure of private data for HTTP and HTTPS services.

Watch this on-demand webinar to learn best practices to ensure your users have unfettered access to the applications that are most important to them.

In this webinar, you will learn:

  • HTTP and HTTPS attack techniques
  • How layered DDoS and application security pipelines can achieve DDoS resilience
  • Mitigation strategies that prevent collateral damage against real users
  • Techniques that minimize the expense of decrypting attack traffic

View Now

How to Defend University DNS Services from DDoS Attacks of all Types

Colleges and universities continue to see a rise in cyberattacks and DNS services are one of the top targets. The disruption of DNS services can result in tremendous loss of revenue and business.

Watch this DDoS Defense Insight on-demand webinar to learn how to defend against one of the most common and disruptive types of cyberattacks: DNS DDoS attacks.

In this webinar, you will learn:

  • How DNS works and what makes it vulnerable
  • Which strategies DNS attackers use including the infamous water torture attack
  • What are the strategies for blocking brute force, DNS floods and pseudo random domain attacks
  • How to minimize damage to your legitimate users during an attack

View Now

Migrate Your Oracle APEX Apps from On-Premises to Autonomous Database

Oracle Application Express (APEX) enables citizen and professional developers to build data-driven web and mobile applications, quickly and easily. APEX is preconfigured and fully managed within Oracle Autonomous Database. Simply move your data, APEX applications, and on-premises RESTful services into your new cloud environment.

Watch this tech classroom and learn how to migrate your APEX applications to the cloud with Autonomous Database.

View Now

Automating Information Management

The exponential growth of data is driving efforts to reduce redundant, obsolete, or trivial data, also known as ROT. Nyxeia products simplify ROT reduction, with a single interface that scans documents across the network. Using natural language processing (NLP), text pattern matching, and context matching, Nyxeia analyzes metadata as well as document text to identify duplicates, saving valuable time, money, and tedious manual effort.

View Now

Machine Learning and Natural Language Processing

Governing terabytes or even petabytes of data requires automatic classification. Discover uses artificial intelligence to enhance metadata, create structured information out of unstructured data, and rapidly tag and classify millions of documents automatically, wherever they live. This enables organizations to mitigate risk, enhance efficiency, and lower IT costs.

View Now

The OKR Maturity Model

Aligning Employee Execution with Business Strategy

The OKR Maturity Model will show you what a mature OKR process looks like and act as a guide to help you create this in your organization. This tool is for businesses to assess their current program maturity, in order to plan a path of upward progression. Join OKR experts and Intel alumni Howard Jacob and James Cape and Ally’s Jes Baum in a three-part series on how to develop a mature OKR program.

Each webinar in this 3-part series is geared towards one of the three phases it takes to adopt a fully mature OKR process.

Fill out the form to register for the on-demand webinar series!

View Now