Michael Bettan, Guillaume Dubuc, Michael O’RourkeRecorded: Mar 12 201960 mins
Robotic Process Automation (RPA) technology creates digital factories to automate and integrate any repetitive administrative tasks. RPA reduces labor-intensive processes by imitating human effort to complete tasks, thereby boosting the capabilities of companies that perform high-volume transactional processes. Operating non-invasively on the surface (UI layer) without compromising the underlying IT infrastructure, RPA bridges the technology gap between fragmented, semi-structured legacy systems. The RPA solution is based on industry leading products Operations Orchestration (OO) and Unified Functional Testing (UFT). During this session, you will learn more about this RPA solution with a live demonstration.
At this session we will cover the What and Why of RPA, as well as, hear how some customers are already benefiting:
•Save time and money and learn how growth in adoption of RPA technology by organizations is allowing for greater speed and scalability while at the same time reducing risk
•Overcome manual limitations and gain efficiencies; RPA helps IT eliminate human errors introduced by workarounds and manual data entry, all while completing tasks in record time
Sarah Ware, Jay BatsonRecorded: Feb 28 201958 mins
Brought to you by the Vivit Application Performance Management Special Interest Group (SIG).
After merging monitoring teams for consolidation and cost reduction opportunities, a larger retailer was faced with the challenge of merging the tools into one unified platform. We had two APM instances, both underutilized, that were good candidates to start with. The environments consisted of BSM 9.26 w/Oracle database and APM 9.40 w/SQL server.
This webinar will walk through the deployment plan, problems, and successes we had along the way.
•BSM9.2x to APM Comparison
•Deciding on a Migration Path
•Path of least resistance and down time
•Moving things over
•Shutting down decomd instance
•Things you should know
•Q and A session
Keith Hudgins, Docker; Alex McDonald, NetAppRecorded: Feb 26 201938 mins
Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.
This live webcast will cover:
•Container storage types and Container Frameworks
•An overview of the various storage APIs for the container landscape
•How to identify the most important projects to follow in the container world
•The Container Storage Interface spec and Kubernetes 1.13
•How to get involved in the container community
After you watch the webcast, check out the Q&A blog at http://bit.ly/2GPkFET
Jeffrey Deverter, Cloud Strategist, CloudreachRecorded: Feb 21 201957 mins
Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.
Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
Ulf Mattsson, Head of Innovation, TokenExRecorded: Feb 21 201962 mins
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about Data Protection solutions for enterprise.
Learn about the new trends in Data Masking, Tokenization and Encryption.
Learn about new Standards for masking from ISO and NIST.
Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
Nikolai Avteniev - Software Engineer, LinkedInRecorded: Feb 21 201956 mins
The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.
However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.
In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
Aaron Weaver, Application Security Architect, OWASP and DefectDojoRecorded: Feb 20 201944 mins
How fast can you build out a new security microservices? Building a security pipeline that scales with your development and operations team is achievable by creating security microservices that can be programmed in a variety of languages, cloud agnostic and infinitely scale.
In this talk, Aaron will walk through the process of building a security automation pipeline starting with building containers in the first iteration and then moving to OpenFaaS to create simple Serverless functions. Building security automation into your program is essential in building out a scalable security services.
Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlueRecorded: Feb 20 201956 mins
Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.
As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.
This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.