UCB is a patient-centric biopharma leader, focusing on severe diseases in Immunology and the Central Nervous System. The company employs in the region of 9000 employees and operates in approximately 40 countries. UCB achieved revenues of $3.46 billion in 2012.
The main driver to implement Lync in the early part of 2011 was first started by the need for a video conferencing solution. This was further accelerated by the "Smarter Ways" efficiency program – which included effective collaboration within the scope. The Lync conferencing services alone helped UCB realize savings of $1.2M compared to the legacy conferencing solutions that were previously in place. The choice of Lync has also allowed full integration of the Unified Contact Centre systems at UCB.
During this session, UCB will cover their drivers for unified communication, the Lync journey (strategy with scope expansion and timeline), communication & change management activities and finally some KPI's.
ASP.NET vNext is a lean and composable framework for building web and cloud applications. ASP.NET vNext is fully open source and available on GitHub. ASP.NET vNext is currently in preview, and in this talk Fowler and Edwards will put it all into Context. vNext apps can use a cloud-optimized subset of the .NET framework. This subset of the framework is about 11 megabytes in size compared to 200 megabytes for the full framework, and is composed of a collection of NuGet packages. What does that mean for compatibility? When would you choose vNext and when would you not? You don't have to use Visual Studio to develop ASP.NET vNext applications. You can develop and run vNext on platforms that Visual Studio doesn't run on. But Visual Studio provides the best development experience, and we'll cover ASP.NET vNext both inside and outside the IDE.
Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.