Transform IT with AI Driven Operations and Support

Virtual

This event has passed, but you can view it here For too long, you've been told what your network can't do. We're here to show you what it can do! Join Converge and Juniper to hear how Juniper's industry leading AI can provide you the visibility to your network that Gartner rated #1 (A LEADER) in Wired […]

HPE and Zerto Disaster Recovery Cocktail Event

Virtual

This even has ended, but please reach out to Annie Wallace if you'd like to learn more: [email protected] Event Agenda: Learn how to use HPE Zerto to rapidly recover from ransomware Questions & Answers Enjoy a Bumbu cocktail event! The cocktails we will be tasting are: Apple Cider Mojito Autumn Rum Old Fashioned Bumbu Espresso […]

Drive Down Cost While Improving Insight & Manageability of Your Cloud Consumption Bill

Virtual

This event has passed, but you can view it here.   Join Converge Technology Solutions for a free Cloud Cost Management Seminar! Our Cloud Advisor team will demonstrate how to drive the maximum amount of savings with the minimum amount of effort and commitments for your Cloud Consumption bill. We will also review how to […]

NewComp: New Data Architecture Modernization Bootcamp 2.0

Virtual

Analytics trailblazers – Newcomp Analytics is back! After an overwhelmingly positive response to our first series, we’re excited to be bringing you an updated, even more in-depth Data Architecture Modernization Bootcamp. This time around we’re tackling even more complex topics around cloud, BI, data science and data engineering and simplifying them to guide you on […]

Cognos Workshop – Dashboards

Virtual

This event has ended, but please reach out to Annie Wallace if you'd like to learn more: [email protected] Join us for a live, interactive Cognos Hands-On Workshop on Dashboards. IBM Cognos Analytics provides Dashboards communicate your insights and analyses. Attend this hands-on training to learn how to assemble a view that contains numerous combinations of […]

IBM Guardium Whiskey Tasting

Virtual

Data is at the core of every business, but often simultaneously distributed throughout it and often a primary target. So how should it be protected? A “lifecycle” approach should be created, with data security a key consideration at every phase, of discovery, classification, protection, malicious activity detection, incident response and compliance. Hear what Converge and […]