1 to 10 of 10
Sort by

Library Entry
Webcast – Migrating from IBM Integration Bus to an App Connect Enterprise Agile Integration Architecture

IBM Hybrid Integration ID team Published on May 28, 2020 Update – The webcast is now available on demand, click here to register and gain access and the slides can be downloaded here Friday May 29, 2020 from 11:00 AM to 11:30 AM (ET) Duration...

Blog Entry
Reminder: BAW Webinar on Tuesday, July 28

Here's a quick reminder: don't miss your chance to see the some of the latest features in Version of IBM Business Automation Workflow. Register now for " Three ways to i ncrease speed, agility and resilience in your operations with process automation . " The webinar will be live on...

Lori Brown's profile image

Library Entry
Holistic Integration Overview Webinar

Published on November 12, 2018 / Updated on November 30, 2018 Integration is the backbone of today’s digital economy and integration middleware is the software layer connecting different applications, data sources, services, devices and businesses both internal and external. The...

Library Entry
Top trends driving the need for data transformation and the cloud (Webinar)

Data today is scattered across multiple applications, both on-premises and in multiple clouds. Managing the master data that fuels your critical business processes has long been a time-and labor-intensive effort. But now, you can take a modern approach to master data management (MDM) for faster...

Library Entry
Fighting Loyalty Fraud in the Age of Cybercrime and Digital Trust

This Webinar took place on Thursday, January 17th, 2018. It was the monthly Virtual Meeting of the Loyalty Fraud Prevention Association to discuss best practices for loyalty fraud prevention & security. This month featured a presentation from Shaked Vax, Worldwide Technical Sales Leader at...

Library Entry
Passwords: Here Today, Gone Tomorrow?

Passwords are a pain. We all aim to protect both our customers and brand, however, passwords are weak, hard to remember and easy to hack. As organizations try to strengthen password policy requirements, legitimate customers fail and abandon into more costly channels like the call center. This...