Filters (0) (reset filters)
Sort by: Date published | Number of comments | Appreciation | Title Ascending | Title Descending | Most popular
Results per page : Page 1 of 10 (46 Result(s))
  • < Prev
  • ...
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next >
  • To keep up to date with all the technologies in SQL Server, the DBA or developer who wants to stay ahead is faced with the struggle of constant learning. With every new release, it seems that at least one entirely new application platform appears, alongside innumerable additions to, and improvement of, existing features. How do you keep up while avoiding information overload, unnecessary detours and dead-ends?

    The SQL Server Stairways is our solution to this problem. Designed to smooth out even the steepest learning curve, each Stairway is a SQL tutorial series focused on a single topic and is arranged into no more than a dozen easily-navigable tutorials that we call 'steps'. Each step is the length of a typical magazine tutorial, and emphasizes practical, hands-on learning, with just enough background theory to help you understand the topic at a deeper level.

    Using straightforward language and avoiding jargon and marketing babble, each Stairway tutorial series is designed to take you from zero knowledge of a particular SQL Server topic, to a level of practical understanding that will allow you to start using that feature in a production environment. The learning gradient is steady and manageable, but also brisk. You won't be wasting time.

    Our team of Stairway Editors, including Kalen Delaney and Brad McGehee, have selected technical topics that all SQL Server DBAs and developers can benefit from mastering, and have persuaded leading experts in those fields to author them.

  • Allow regions to be self-sufficient in pre-sales of Hybrid IT solution and services including using content for RFI/Bids and doing demo's.
    Topics covered:

    • What is FCSM and its context within MetaArc and Hybrid IT
    • FCSM high-level architecture and individual component insight
    • Who to pitch FCSM to
    • Brief insight to FCSM Support model and Price Model
    • On-boarding portal and other presales content walk through
    • GD Services around Hybrid IT components
    • Hands-on demo experience and training
    • Case Scenario exercise
    • FCSM Regional Engagement model
    • Demo

     Target Audience:  Sales and pre-sales (Consulting)

  • Topics covered:

    • MetaArc Overview
    • K5 in Digital Business Context
    • Starting to use K5 with Demo
    • Designing your environment - Best practices
    • Using the K5 API with Demo
    • Load Balancing
    • Using Templates and stacks for service automation
    • K5 Services Monitoring
    • K5 Database as a Service
    • Email Delivery Service
    • Content Delivery Network
    • K5 Cost and Usage management
    • K5 reference materials, resources and communities

    Target Audience: Sales and pre-sales (Consulting)

  • MetaArc - Elevator Pitch
    Intro to MetaArc - Hybrid IT + K5
    What is Hybrid IT
    Positioning Hybrid IT
    What is K5
    Positioning K5 laaS
    Positioning K5 PaaS
    Positioning Multi-Cloud Management
    Intro to IoT

  • Learn more about our Fujitsu Cloud Services K5.
    You must login with the G05 domain name instead of the default CORP
    eg. G05\\xxxxxx

  • Learn about our MetaArc digital enablement platform which combines key technologies like IoT, Big Data, Mobility, AI with cloud solutions, tools, professional and managed services and partnerships.
    You must login with the G05 domain name instead of the default CORP
    eg. G05\\xxxxxx

  • This session helped us discover how Fujitsu's new Cloud Service K5 aligns with our Managed Hybrid IT services to help customers exploit the enormous potential of digital business and maximize the value of existing core systems.



    Recording


    Presentation


    You must log in with your G05\\username credentials (instead of Corp\\username)

  • 1) Etat de l'art

    • Le monde du big data

    D'où le big data vient-il ? Combien pèse-t-il dans le monde, en Europe,
    en France ? Comment l'État et les entreprises l'appréhendent-ils ?
    Quelles perspectives ? Qu'est-ce qu'une approche data centric ?
    • Big data et analyse prédictive
    • Comment la veille se remet en question face au big data
    • Big data et intelligence artificielle
    • Quelle normalisation pour le big data ?
    • Développement et perspectives de l'open data en France
    • Petit panorama d'initiatives open data
    • Droit : qu'est-ce qu'une donnée ?
    • Droit : enjeux des données personnelles

     2) Méthode
    • Mise en place de stratégies big data dans les entreprises
    • Les meilleures pratiques big data
    • Comment ouvrir ses données

     3) Outils
    • Les projets de learning centers
    • Le marché du big data et ses acteurs
    • Panorama des acteurs du big data et de la datavisualisation (fiches)

    4) Retours d'Expérience
    •  L'Argus de la presse, BlaBlacar, M6...

  • Presentation material from IDUG 2013 North America sessions.
    This  material covers one of the three streams presented during the event. The other two streams are:
    - DB2 z/OS (i.e. mainframe)
    - DB2 on both platforms
    *** Use WITHIN Fujitsu only please, do not share externally ***
    (permission granted by IDUG)

  • Presentation material from IDUG 2013 North America sessions.
    This  material covers one of the three streams presented during the event. The other two streams are:
    - DB2 on both platforms
    - DB2 for LUW (Linux, Unix & Windows)
    *** Use WITHIN Fujitsu only please, do not share externally ***
    (permission granted by IDUG)

  • Presentation material from IDUG 2013 North America sessions.
    This  material covers one of the three streams presented during the event. The other two streams are:
    - DB2 z/OS (i.e. mainframe)
    - DB2 for LUW (Linux, Unix & Windows)
     *** Use WITHIN Fujitsu only please, do not share externally ***
    (permission granted by IDUG)

  • The most perfect system can fail if the change is not managed.
    Throughout the earlier phases of solution delivery, Macroscope reminds us of things that can pave the way for a successful implementation. In the implementation phase, all those preparations are brought to conclusion. In addition to the mechanics of conversion, installation and set-up, we see a strong emphasis on the organizational change - communication, training, work redesign, etc.
    This event familiarizes learners with the implementation phase and its deliverables and also reinforces the need to prepare for implementation throughout the solution delivery process.

  • In this course students will learn essential programming skills and techniques that are required to develop Windows Store apps. This includes a combination of both design and development skills, as well as ensuring that students are comfortable using and making the most of the Visual Studio and Expression Blend tools.

  • PEERNET Reports is an embeddable Java reporting, labeling, and bar code solution. This presentation provide an introduction to two pivotal components of Peernet Reports 3.0 used in enterprise java development.
    Peernet Reports Designers allows report designers to visually construct report or label by accessing any JDBC or ODBC data source.
    PEERNET Reports Runtime Engine features an embedded Java execution environment with a runtime object model for the development of custom Java code with full access to Java 2 classes, or any of your own classes, for the development of dynamic reports and labels that change based on individual business requirement.

  • The fun way to learn about Agile/Scrum, prepare for Scrum Master certification / Agile certification (CSM, CSPO, PSM, or PMI-ACP), and debunk popular misconceptions.
    There are six videos addressing
    Introduction to Scrum
    Backlog Refinement Meeting
    Sprint Planning Meeting
    Daily Scrum Meeting
    Sprint Review Meeting
    Sprint Retrospective Meeting
    Each has quizes to stress learning.

    Also links to other content to understand Agile & Scrum.

  • Presentation material form IDUG 2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! ***

  • Presentation material form IDUG 2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG  2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • CSA Tools
    Security Guide
    GRC (Governance, Risk management and Compliance)
    Cloud Control Matrix
    CAI Questionnaire (Consensus Assessment Initiative)
    Cloud Audit
    Cloud Trust Protocol

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! ***

  • English overview is coming.

  • Inspired from a book by Mary and Tom Poppendieck, this presentation is an adaptation of the Lean Approach based on the Toyota Production System in the IT domain.
    Once the 7 Lean Software Development principles are revisited, 24 imaged viewpoints will provide a different approach to dealing with possible problems encountered in the field of IT.

  • See the Microsoft solution to manage your Private Cloud Infrastructure.

  • In this session we'll take the concepts introduced in Part 1 and go even deeper. We'll provide a technical overview of the new application model and end-user application catalog that delivers this flexible working environment. Learn how best to design and deploy an optimized Configuration Manager 2012 infrastructure as well as some best practices and tools for migrating from SCCM 2007.

  • Are you ready for Microsoft System Center 2012 Configuration Manager? We are excited about our most important release ever for client administrators. Configuration Manager 2012 is user-centric, manages heterogeneous devices and introduces a new way to deploy applications; these capabilities will help you enable the Consumerization of IT, reduce costs, and drive agility for your organization. But there is more...a NEW interface, improved setting management, role-based administration, and infrastructure reduction. Get up to speed on all the key new capabilities of Configuration Manager 2012. We'll also provide a quick overview of Windows Intune, for those looking for a cloud based management for their unmanaged PCs.

  • End users are bringing consumer devices into the organization! iPhones, iPads, Tablets and Smartphones are now part of the corporate environment. New desktop technologies such as VDI, Tablets, Consumerization, among other pressures, are causing many IT environments to consider re-architecting their desktop infrastructure. Learn how to separate myths from facts, learn how to develop a strategy focused on meeting your users desktop requirements based on roles / personas, rather than implying that one technology fits all, and discover Microsoft and partner solutions that enable a Flexible Workstyle.

  • Learn how to make the magic from the keynote come to life for your organization. Get an overview of the key improvements in System Center 2012, the design principles for 2012, how those features will benefit your organization, and finally how you can implement within your organization to achieve business value.

  • 1st presentation in a complete set of 8.
    Cloud computing and the delivery of true IT as a Service is one of the most profound industry shifts in decades. Join Jeff Woolsey, Principle Program Manager, Microsoft's Management and Security Division, as he shares Microsoft's vision for cloud computing and shows how System Center 2012, as part of the Microsoft private cloud, will enable you to deliver the promise of cloud computing in your organization today.

  • This docuement is designed to help Fujitsu sales, marketing employees and any interested consultant to :
    1. Answer the basic questions that exist today in most bids around our sustainability performance, credentials and CSR program.
    2. Provide a comprehensive overview of our Global Sustainability Capability including Products, Data Centers, Smart Solutions, Consulting and other services.
    3. Understand at a high level the market issues at play in the GBG regions, to address multiregional bids with relevant local understanding
    4. Provide links to relevant case studies and further information
    5. Outline our overall story and sustainability messaging.

  • A thought leadership presentation on the basic concepts of modeling including the history, definition and taxonomy of the Unified Modeling Language (UML).

    Use Cases are discussed as well as a high level explanation of the main concepts associated with the architectural level process analysis technique.

    This is not a presentation on use case diagramming.

  • Electric Utilities are significant users of Geographic Information Technology spending billions of dollars every year worldwide to plan, design, operate and manage their infrastructure with GIS.
    This document describes the GIS related trends in Canada which can be applied or compared to Utilities and GIS around the globe.

  • This content was submitted by André Thouin.

    How to get a Portal ID to access Salesforce training videos.
    Also, how to register for a Certification exam - via Certification center or Online.

  • Fujitsu can draw on its innovative and comprehensive hardware, software and services portfolio to develop personalized solutions for every customer. This is precisely where our strength lies: Fujitsu does not provide off-the-rack IT environments; instead we always find new and ambitious solutions, and together with our customers, develop tailored strategies.

  • This content was submitted by Subramani Sivarathnam.

    This will be an overview of MDM, as well as lesson learned / case study.

    The following items will be covered:

    • What is Master Data Management (MDM)?
    • Hubs in the market
    • Customer Data Hub
    • Product Data Hub
    • Hub and Spoke system architecture and its types
    • Integration strategy and methods
    • Data Mapping, Governance
    • Data flow and Security
    • Project cycle
    • Best practice

  • This content was submitted by Latish Mallam.

    This presentation provides overview of Landed Cost Management.

    Oracle Landed Cost Management gives organizations financial visibility into their extended supply chains.

    The following items are covered:

    - Managing Landed cost
    - Cost as Service
    - Integration with other oracle applications
    - Key Benefits

  • This content was submitted by Ivar Alexander.

    Thought Leadership Presentation:
    This session will cover the latest Automated Process Discovery (APD) technology available from Fujitsu.

    This latest release includes process discovery technology, and adds new management aspects by providing ongoing monitoring and governance of the processes in place.

    The presentation will cover a high level view of the capabilities and architecture of the solution.

  • This content was suggested by Sempai Team.

    This report addresses the fundamental factors that influence the innovation behaviour of businesses in Canada. Innovation is of great economic importance because it is, directly and indirectly, the key driver of labour productivity growth (increased output per hour worked) and the main source of national prosperity.
    The panel has therefore approached innovation as an economic process rather than as a primarily science and engineering activity. The theme is the link between business strategy and innovation activity. The focus is on the long run, spanning several turns of the economic cycle. The fi ndings therefore remain relevant despite the current shock to the global economy. As requested by the government, the report is primarily a diagnosis, not a policy prescription, though it provides a body of facts and informed opinion that is of policy relevance.

  • This content was submitted by André Thouin.

    This Power Point presentation contains the latest wins from the New York office that pertain to Salesforce in various industries but mostly, the financial services sector. It is available to help turn our RFP's into winning proposals.

  • This content was submitted by André Thouin

    Recording of a live demo with Salesforce Foundation partner roundCorner. roundCorner demonstrates how their product roundCampus is being utilized at top-tier universities for corporate relations, advancement, recruiting and career services. Presented by Dan Lammot, Founding Partner of roundCorner.

  • This content was recommended by Pierre Hamel.

    This high-quality asset provides Fujitsu opinion on the future of technology, as well as the societal impact of these evolving capabilities. It is designed to help our customer-facing teams engage in high-value conversations on the key forces shaping the industry and how Fujitsu is responding.

    Mobile technologies, cloud services, business use of social media and explosive data growth are driving major change in 2012 and beyond. Technology Perspectives breaks these down into twelve distinct business and technology trends and considers how they are shaping the future. The trends support and reinforce Fujitsu's vision and strategy, and complementary Fujitsu innovations are highlighted throughout. The new content has been created by David Smith and David Gentle from our Innovation and Technology team and will be enhanced and updated on a regular basis, in collaboration with the regional CTO community and Fujitsu Japan.

  • This content was submitted by Chris Hammond-Thrasher.

    Alternate title: Why I Have Tape Covering My Webcam.

    For years security professionals have been telling us not to follow links or open attachments from untrusted sources, not to click "Ignore" on your browser's security pop-ups, and not to insert untrusted thumb drives into your USB ports. Do you want to see what can happen with your own eyes? This prensentation will show you how to download, install, configure, and use the basic features of Dave Kennedy's open source hacker tool, the Social Engineering Toolkit.

  • This content was submitted by Jean-Yann Riviere.

    As cloud computing begins to mature, managing the opportunities and security challenges becomes crucial to business development.
    Cloud Security Alliance guidance in its third edition seeks to establish a stable, secure baseline for cloud operations.

    Cloud Security Alliance is :
    Global, not-for-profit organization
    Over 23,000 individual members, 100 corporate members, 50 chapters

    Corporate members : Google, Ebay, AT&T, CA, HP, Hitachi, Microsoft, PGP, Novell, RSA, Symantec, Thales etc...

  • This hacker tooltalk from the Fujitsu Edmonton Security Lab explores the Kismet open source Wi-Fi analysis tool. Learn how to set up a low cost Wi-Fi hacker lab, sniff unencrypted Wi-Fi packets without detection, and even crack WEP keys with Kismet.

  • The SSL / TLS protocol is arguably the most important encryption protocol in use today - protecting everything from our Facebook session to our online banking transactions. This brief presentation from the Fujitsu Edmonton Security lab explores why the SSL protocol is designed the way it is, provides some advise for users and developers, and finishes with a lesson in security architecture using card magic.