SlideShare a Scribd company logo
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Not	Your	
Father’s	UC
How	your	enterprise	can survive	
(and	thrive!)	in	the	new	age	of	
multi-vendor,	hybrid	collaboration	
Aug	22nd	at	12pm	ET	|	11am	CT
Ira	M.	Weinstein
Senior	Analyst	
&	Partner
Ivan	Montoya
Vice	President,	Marketing	
&	Business	Development
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Housekeeping
• Mute	your	microphone
• Use	the	Question	area	to	submit	your	
questions	to	the	panelists
• Polling	questions	for	engagement
• Slides	and	recording	will	be	made	available	
after	event
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Polling	Question
How	many	UC&C	systems	does	
your	enterprise	use	today?
A. Only	one
B. 2	– 4
C. 5 – 7
D. 8 – 10
E. I’ve	lost	count
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Taming the Multi-Vendor
Enterprise
The reality of unified communications today …
Ira M. Weinstein
Senior Analyst & Partner
iweinstein@wainhouse.com
Twitter: @iweinstein
• Independent	Research	and	Analyst	Firm
• Founded	in	1999
Exclusively	Focused
• Conferencing	and	Collaboration
• AV	and	Rich	Media	Technologies
• Unified	Communications
Key	Services
• Research	Reports |	Market	Size,	Forecast,	Trends,	Research	Notes	…
• Strategic	Advisory	Services	|	UC&C	Planning,	Product	&	Business	Positioning	…
• End-user	Services |	Needs	&	Situational	Assessments,	RFI/Ps	…
• Professional	Speaking	|	Industry	Insights,	Educational	Briefings	…
About Wainhouse Research
WR	provides	our	clients	with	the	
information	they	need	to	make	
informed	decisions	about	
conferencing	and	collaboration.
© 2017 Wainhouse Research, LLC
The Source of Our Insight …
Supporting
Enterprise
End-Users
Hands-On
Testing
Industry
Briefings
Personal
Experience
© 2017 Wainhouse Research, LLC
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Cloud of Confusion re: Unified Communications
© 2017 Wainhouse Research, LLC
“So	many	companies	are	
trying	to	sell	me	on	UC	---
but	what	is	it	really?”
“Is	UC	a	product?”
“Is	UC	a	service?”
“Is	UC	a	software
application?
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
UC is a Mindset --- Not a Solution !
© 2017 Wainhouse Research, LLC
8
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
And UC is Multi-Modal
© 2017 Wainhouse Research, LLC
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
But most importantly, UC requires …
© 2017 Wainhouse Research, LLC
• Simplicity
• Convenience
• Consistency
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Unfortunately UC Often Means Complexity
© 2017 Wainhouse Research, LLC
• More	users
• From	more	locations
• And	different	networks
• Using	more	devices
• And	different	tools
• For	more	hours	a	day
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Single Vendor Approach (Pros)
© 2017 Wainhouse Research, LLC 1
2
Key	Benefits	…
• Simplified	workflow
• Streamlined	management
• One	throat	to	choke
(or	vendor	to	hug)
Single Vendor Approach (Cons)
© 2017 Wainhouse Research, LLC
Key	Concerns	…
• Limited	by	vendor	capabilities
• Vendor	risk	/	exposure
• Must	eliminate	other	tools
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Single Vendor Approach (Reality)
© 2017 Wainhouse Research, LLC
Make excuses … and define strict policies
“
Great	concept	– but	very
hard	to	achieve	…
Example – Real WR Advisory Client …
© 2017 Wainhouse Research, LLC
Make excuses … and define strict policies
“
Technology Vendors	/ Providers # of	Vendors
Audio	Conferencing
Intercall, AT&T,	Avaya	(PBX),	
Polycom	(on	CPE	video	bridge) 5
Content	Sharing
Skype	for	Business,	WebEx,
Polycom (during	video	calls) 3
Video	Conferencing
Skype	for	Business,	WebEx,	Polycom,	Zoom,	
plus a	smaller	player	for	immersive	
telepresence	calls
5
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
How Can You Manage Such An Environment?
© 2017 Wainhouse Research, LLC
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
How Can You Manage What You Can’t Track?
© 2017 Wainhouse Research, LLC
“No matter how
hard we try, we
just can’t get
there - not
today.”
“For us,
multi-vendor
is an
unfortunate
reality.”
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
So What Do Most Enterprises Do?
© 2017 Wainhouse Research, LLC
Make	excuses	…	and	accept	what	they	don’t	know
How Do We Help Resolve the Situation?
© 2017 Wainhouse Research, LLC
A	Typical	Company
Can	be	monitored	
today
Is	monitored	
today
Could	be	upgraded	to	
be	monitored
How Do We Help Resolve the Situation?
© 2017 Wainhouse Research, LLC
A	Typical	Company
Can	be	monitored	
today
Is monitored
today
Could	be	upgraded	to	
be	monitored
How Do We Help Resolve the Situation?
© 2017 Wainhouse Research, LLC
A	Typical	Company
Can	be	monitored	
today
Is	monitored	
today
Could be upgraded
to be monitored
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
How do we get perspective ???
© 2017 Wainhouse Research, LLC
THANK YOU
Ira M. Weinstein
Sr. Analyst & Partner
Wainhouse Research
iweinstein@wainhouse.com
THANK YOU
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Polling	Results
How	many	UC&C	systems	does	
your	enterprise	use	today?
A. Only	one
B. 2	– 4
C. 5 – 7
D. 8 – 10
E. I’ve	lost	count
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Not	Your	
Father’s	UC
How	your	enterprise	can survive	
(and	thrive!)	in	the	new	age	of	
multi-vendor,	hybrid	collaboration	
Aug	22nd	at	12pm	ET	|	11am	CT
Ira	M.	Weinstein
Senior	Analyst	
&	Partner
Ivan	Montoya
Vice	President,	Marketing	
&	Business	Development
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Increase	AdoptionImprove	User	Experience Optimize	Resources
1,500	+	Enterprise	Customers		•		1M+	Endpoints	Connected		•		2B+	Minutes	Monitored
We	monitor	your	entire	UC&C	environment	
and	provide	you	the	operational	and	business	insights	to:
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
We	Are	Honored	To	Serve	Great	Customers
Financial	&	
Government
Technology
Healthcare	&	
Education
Other
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
This	is	not	
your	father’s	
UC&C
113B
of	web	conferencing	
minutes	annually
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Source:	Wainhouse	Research
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Enterprise	UC&C	is	heating	up
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Enterprise	UC&C	is	mission	critical
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
UC&C	Environments	Are	Complex
Call
Meet
Message
Share
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Managing	and	scaling	Enterprise	UC&C	is	hard!
Fragmented	
monitoring/analytics
1000s	of	points	
of	failure	and	attack
Large	complex
UC&C	environment	
Difficult	to	track	and	
improve	efficiency
Millions	of	minutes	lost	productivity
20-30%	of	UC&C	spend	is	underutilized
Conference	rooms	=	major	frustration
You	can’t	manage	what	you	can’t	monitor	and	measure
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Western	Union
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Goals
Migrate	to	Skype	and	enable	UC&C	for	10K+	
employees
Reduce	travel	costs
Improve	user	and	team	productivity
UC&C	environment
Call Meet
Message Share
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Challenges
Only	executives	had	access	to	UC&C	(white	
glove,	limited	rooms)
Audio	and	video	environments	not	integrated
Skype	interoperability	problems
Capacity	planning	challenges
UC&C	environment
Call Meet
Message Share
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Actions	taken
Deployed	Vyopta	to	monitor	UC&C	environment	to:	
Identify	capacity	bottlenecks
Track	meeting	quality	performance
Diagnose	and	fix	issues
Planning	for	5x	increase	in	UC&C	enabled	
conference	rooms
UC&C	environment
Call Meet
Message Share
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Used	UC&C	Insights	
to	Improve	Collaboration Adoption	of	UC&C	tools10x
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Vyopta	Solution:	Single	Platform	to	Optimize	UC&C
Call Meet Message Share
Comprehensive	UC&C	Optimization	Platform
Insights/benchmarks	from	community	of	thousands	enterprises	UC&C	customers	and	professionals	
Fast	to	deploy/multi-vendor	&	modal/	all	types	of	UC	deployments:	on-premise/cloud/historical	+	real	time	data
Adoption	&	Capacity Quality	&	Troubleshooting
Business	Insights
Call	&	meeting	quality	KPIs
Real-time	monitoring	&	alerts
Troubleshooting	tools
Asset	management	&	utilization
Custom	business	reporting
Room	reporting
Efficiency	improvement
Usage	&	adoption
Capacity	utilization	&	planning
Operational	Insights
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Final	thoughts
End	user	usage	of	integrated	UC&C	
rising	and	will	only	accelerate
You	need	to	monitor/measure
Multi-vendor,	hybrid	
environments	are	here	to	stay
You	can	escape	from	multi-tool	
and	spreadsheet	hell	
You	can	turn	UC&C	into	a	competitive	advantage
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Thank	you
Ivan	Montoya
VP,	Business	Development	and	Marketing
Vyopta	Incorporated
Ivan.montoya@vyopta.com
Twitter	@Ivnmon2
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Complimentary	UC	assessment	
of	your	environment
©	2017	Vyopta	Incorporated.	All	rights	reserved.	Confidential.
Q	&	A
Not	Your	
Father’s	UC
How	your	enterprise	can survive	
(and	thrive!)	in	the	new	age	of	
multi-vendor,	hybrid	collaboration	
Aug	22nd	at	12pm	ET	|	11am	CT
Ira	M.	Weinstein
Senior	Analyst	
&	Partner
Ivan	Montoya
Vice	President,	Marketing	
&	Business	Development

More Related Content

Similar to How your enterprise can survive (and thrive!) in the new age of multi-vendor, hybrid collaboration.

Security as Code
Security as CodeSecurity as Code
Security as Code
Deborah Schalm
 
Security as Code
Security as CodeSecurity as Code
Security as Code
DevOps.com
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC
 
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
Chris Goward
 
How do customers see adoption value?
How do customers see adoption value?How do customers see adoption value?
How do customers see adoption value?
Sei Mani
 
Caldwell_Reimagine the Way work Gets Done-DWX17.pptx
Caldwell_Reimagine the Way work Gets Done-DWX17.pptxCaldwell_Reimagine the Way work Gets Done-DWX17.pptx
Caldwell_Reimagine the Way work Gets Done-DWX17.pptx
Michelle Caldwell, PSM, SSGB
 
How Addressable Video Content Delivery Will Change the Game for Advertisers
How Addressable Video Content Delivery Will Change the Game for AdvertisersHow Addressable Video Content Delivery Will Change the Game for Advertisers
How Addressable Video Content Delivery Will Change the Game for Advertisers
Merkle
 
Client Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementClient Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and Engagement
Global Creative Group, Inc
 
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi KennellyHow to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
Inman News
 
Wildix Convention 2016
Wildix Convention 2016Wildix Convention 2016
Wildix Convention 2016
Wildix
 
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of QualityThe DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
TechWell
 
ONE Corporate Brochure
ONE Corporate BrochureONE Corporate Brochure
ONE Corporate Brochure
oneuk
 
Create an Unprecedented – and Brand Compliant – Customer Experience
Create an Unprecedented – and Brand Compliant – Customer ExperienceCreate an Unprecedented – and Brand Compliant – Customer Experience
Create an Unprecedented – and Brand Compliant – Customer Experience
Aprimo
 
Denodo DataFest 2017: Company Leadership from Data Leadership
Denodo DataFest 2017: Company Leadership from Data LeadershipDenodo DataFest 2017: Company Leadership from Data Leadership
Denodo DataFest 2017: Company Leadership from Data Leadership
Denodo
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017
Splunk
 
Visiple Partner Presentation
Visiple Partner PresentationVisiple Partner Presentation
Visiple Partner Presentation
Evan Andriopoulos
 
Exponential e-unified-communications-presentations
Exponential e-unified-communications-presentationsExponential e-unified-communications-presentations
Exponential e-unified-communications-presentations
Exponential_e
 
Unified Communications - Collaborative services that deliver greater busines...
Unified Communications  - Collaborative services that deliver greater busines...Unified Communications  - Collaborative services that deliver greater busines...
Unified Communications - Collaborative services that deliver greater busines...
Exponential_e
 
Transforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EYTransforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EY
Natalya Copeland
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Blancco
 

Similar to How your enterprise can survive (and thrive!) in the new age of multi-vendor, hybrid collaboration. (20)

Security as Code
Security as CodeSecurity as Code
Security as Code
 
Security as Code
Security as CodeSecurity as Code
Security as Code
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
[Webinar] Groomed for Success: Dollar Shave Club Wins with Experimentation
 
How do customers see adoption value?
How do customers see adoption value?How do customers see adoption value?
How do customers see adoption value?
 
Caldwell_Reimagine the Way work Gets Done-DWX17.pptx
Caldwell_Reimagine the Way work Gets Done-DWX17.pptxCaldwell_Reimagine the Way work Gets Done-DWX17.pptx
Caldwell_Reimagine the Way work Gets Done-DWX17.pptx
 
How Addressable Video Content Delivery Will Change the Game for Advertisers
How Addressable Video Content Delivery Will Change the Game for AdvertisersHow Addressable Video Content Delivery Will Change the Game for Advertisers
How Addressable Video Content Delivery Will Change the Game for Advertisers
 
Client Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and EngagementClient Portal: Your Path to Business Freedom and Engagement
Client Portal: Your Path to Business Freedom and Engagement
 
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi KennellyHow to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
How to Think About Your Technology Roadmap for 2017 - Kristi Kennelly
 
Wildix Convention 2016
Wildix Convention 2016Wildix Convention 2016
Wildix Convention 2016
 
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of QualityThe DevOps Challenge: Now Is the Time to Be a Champion of Quality
The DevOps Challenge: Now Is the Time to Be a Champion of Quality
 
ONE Corporate Brochure
ONE Corporate BrochureONE Corporate Brochure
ONE Corporate Brochure
 
Create an Unprecedented – and Brand Compliant – Customer Experience
Create an Unprecedented – and Brand Compliant – Customer ExperienceCreate an Unprecedented – and Brand Compliant – Customer Experience
Create an Unprecedented – and Brand Compliant – Customer Experience
 
Denodo DataFest 2017: Company Leadership from Data Leadership
Denodo DataFest 2017: Company Leadership from Data LeadershipDenodo DataFest 2017: Company Leadership from Data Leadership
Denodo DataFest 2017: Company Leadership from Data Leadership
 
Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017
 
Visiple Partner Presentation
Visiple Partner PresentationVisiple Partner Presentation
Visiple Partner Presentation
 
Exponential e-unified-communications-presentations
Exponential e-unified-communications-presentationsExponential e-unified-communications-presentations
Exponential e-unified-communications-presentations
 
Unified Communications - Collaborative services that deliver greater busines...
Unified Communications  - Collaborative services that deliver greater busines...Unified Communications  - Collaborative services that deliver greater busines...
Unified Communications - Collaborative services that deliver greater busines...
 
Transforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EYTransforming the Global HR Contact Center at EY
Transforming the Global HR Contact Center at EY
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
 

More from Vyopta Incorporated

The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
The Science Behind the Success of Abbie's Global, Cisco Unified Communication...The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
Vyopta Incorporated
 
Why vyopta
Why vyoptaWhy vyopta
Overcoming Enterprise Unified Communications Challenges
Overcoming Enterprise Unified Communications ChallengesOvercoming Enterprise Unified Communications Challenges
Overcoming Enterprise Unified Communications Challenges
Vyopta Incorporated
 
8 Insights About Video Conferencing
8 Insights About Video Conferencing8 Insights About Video Conferencing
8 Insights About Video Conferencing
Vyopta Incorporated
 
Double Video Conferencing Usage Webinar Slides
Double Video Conferencing Usage Webinar SlidesDouble Video Conferencing Usage Webinar Slides
Double Video Conferencing Usage Webinar Slides
Vyopta Incorporated
 
Latam v analytics_data_sheet
Latam v analytics_data_sheetLatam v analytics_data_sheet
Latam v analytics_data_sheet
Vyopta Incorporated
 
vAnalytics Data Sheet
vAnalytics Data SheetvAnalytics Data Sheet
vAnalytics Data Sheet
Vyopta Incorporated
 

More from Vyopta Incorporated (7)

The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
The Science Behind the Success of Abbie's Global, Cisco Unified Communication...The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
The Science Behind the Success of Abbie's Global, Cisco Unified Communication...
 
Why vyopta
Why vyoptaWhy vyopta
Why vyopta
 
Overcoming Enterprise Unified Communications Challenges
Overcoming Enterprise Unified Communications ChallengesOvercoming Enterprise Unified Communications Challenges
Overcoming Enterprise Unified Communications Challenges
 
8 Insights About Video Conferencing
8 Insights About Video Conferencing8 Insights About Video Conferencing
8 Insights About Video Conferencing
 
Double Video Conferencing Usage Webinar Slides
Double Video Conferencing Usage Webinar SlidesDouble Video Conferencing Usage Webinar Slides
Double Video Conferencing Usage Webinar Slides
 
Latam v analytics_data_sheet
Latam v analytics_data_sheetLatam v analytics_data_sheet
Latam v analytics_data_sheet
 
vAnalytics Data Sheet
vAnalytics Data SheetvAnalytics Data Sheet
vAnalytics Data Sheet
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 

How your enterprise can survive (and thrive!) in the new age of multi-vendor, hybrid collaboration.