Feeds

What the hell is an optimum working environment?

'Bitch of a survey' transformed into second glorious webcast

  • alert
  • submit to reddit

High performance access to file storage

Last week we heralded a beautiful webcast arising from a "bitch of a survey" we ran at the start of the month and which many of you completed. Thanks for that.

Now it's time to bang the drum for the second and final webcast inspired by that monstrous survey. This one is called Delivering information across the Enterprise.

So here's the drill - and sign-up, all on one useful page:

What is it: A Free, live, interactive Regcast you can join from your PC

When is it: 9th December 2008, 2.30pm (GMT)

Join The Register and industry experts as we try to get to the bottom of Information Delivery across the enterprise.

Reg broadcaster Tim Phillips hosts the event, which features industry experts and independent analysts from Freeform Dynamics.

What will you learn

We will spend one hour exploring the glut of information and communication related technologies and seek to understand the challenges, pitfalls and success factors required to create the optimum working environment for business users. So tune in for insights on how business users can make timely decisions, collaborate effectively with their colleagues, and deliver efficient reporting on their activities.

Here are the topics we will discuss, inspired by a poll of the Reg Tech Panel:

  • What we mean by an "Optimum Working Environment" for business users
  • What is the true value of business intelligence tools, collaboration systems, unified communications and other productivity enhancers in this context?
  • What does the role of IT become in terms of how it defines, architects and delivers software that can enable optimum business user productivity?
  • Practical considerations and advice for achieving the best results in terms of both quick wins and long term gains

How you can get involved

Those of you joining us live can grill the speakers and get responses to your pressing questions.

Registration takes a couple of minutes, max, and it's free. Let's get this party started.

Reserve your place now!

All fields are required
Name
Email
Job Title
Company Name
Industry Sector
Employees
Phone
Address
Your involvement in IT spending

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.