Hi [[ session.user.profile.firstName ]]

Slashdot Media

  • Date
  • Rating
  • Views
  • DevOps in the Cloud:  Accelerating Time to Business Value (Part 2) DevOps in the Cloud: Accelerating Time to Business Value (Part 2) Eric Minick, Offering Management Lead - Continuous Delivery, IBM Recorded: Dec 7 2016 15 mins
    In an age where there’s an app for everything, reducing the amount of time from ideation to deployment can deliver a real competitive advantage. For many organizations, the adoption of agile methodologies and DevOps practices have changed the way that organizations view IT and development teams, and have yielded measurable results and proven ROI.

    This TechByte series takes a quick dive into three areas of DevOps – an overview of methodologies; testing approaches; and automation of release practices – and delivers actionable advice on how organizations can best turn DevOps into bottom-line value.
  • DevOps in the Cloud:  Accelerating Time to Business Value (Part 1) DevOps in the Cloud: Accelerating Time to Business Value (Part 1) Sanjeev Sharma, CTO, DevOps Adoption, IBM Recorded: Dec 7 2016 22 mins
    In an age where there’s an app for everything, reducing the amount of time from ideation to deployment can deliver a real competitive advantage. For many organizations, the adoption of agile methodologies and DevOps practices have changed the way that organizations view IT and development teams, and have yielded measurable results and proven ROI.

    This TechByte series takes a quick dive into three areas of DevOps – an overview of methodologies; testing approaches; and automation of release practices – and delivers actionable advice on how organizations can best turn DevOps into bottom-line value.
  • Thriving in a Hybrid IT Environment: Turning Data into Insight into Action Thriving in a Hybrid IT Environment: Turning Data into Insight into Action Denny O'Brien, Program Director for IBM Operations Analytics offering management Recorded: Dec 2 2016 17 mins
    Today, consumerization of IT drives user expectations for new apps, richer analytics and support for every device under the sun, IT teams are under increasing pressure to deliver better than “five nines” for virtually every application imaginable, and to do so under a data deluge that shows no signs of abating. And the need is real; The Ponemon Institute estimates the average outage lasts about 90 minutes and costs $450,000!

    Attend this TechBytes series, presented by Slashdot Media and sponsored by IBM to learn how enterprises of all kinds are taking advantage of the latest in middleware tools to increase business agility, accelerate decision-making, and embrace hybrid environments to meet increasing user demand while reducing operating costs overall.  Attendees will learn:

    -How to leverage analytics to increase efficiency while improving reliability
    -Benefits of becoming proactive rather than firefighting application performance issues
    -How to apply cognitive predictive analytics to stop costly IT outages before they start.
    -Where to start when beginning to leverage ITSM in your environment
    -Why Telcos and other companies providing “dial-tone” reliability are utilizing advanced analytics tools in their ITSM portfolio to ensure uptime for even the most dynamic network infrastructure
  • Why Virtualization Just Doesn't Matter - Part 3 Why Virtualization Just Doesn't Matter - Part 3 Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer Recorded: Nov 14 2016 26 mins
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Why Virtualization Just Doesn't Matter - Part 2 Why Virtualization Just Doesn't Matter - Part 2 Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer Recorded: Nov 14 2016 20 mins
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Why Virtualization Just Doesn't Matter - Part 1 Why Virtualization Just Doesn't Matter - Part 1 Prabu Rambadran, Director of Product Marketing & Mike McGhee, Sr. Technical Marketing Engineer Recorded: Nov 14 2016 20 mins
    Chances are you’ve already virtualized many – if not most – of your server workloads to get the most out of every IT hardware dollar. But as more companies adopt hybrid cloud and container based technologies, what role will virtualization play? 

    Is virtualization the new ‘checkbox’ for IT deployments, how does the evolution of virtualization, infrastructure and usage models impact your IT environment?
     
    At this 3 part TechBytes series we will cover
    •What role virtualization will provide in future systems?
    •How virtualization is evolving and what it means to you
    •What you should do now to plan for coming changes and new demands
  • Mobilizing IT:  Delivering Mobile Applications Users Demand Mobilizing IT: Delivering Mobile Applications Users Demand Peggy Ann Salz, CEO, MobileGroove Recorded: Oct 12 2016 16 mins
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobile Security from Platform to Device: What You Need to Know Now Mobile Security from Platform to Device: What You Need to Know Now Scott Steinberg, CEO,TechSavvy Global Recorded: Sep 23 2016 20 mins
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility, Cloud, and the Enterprise: Mobile Application Strategies for Today Mobility, Cloud, and the Enterprise: Mobile Application Strategies for Today Scott Steinberg, CEO,TechSavvy Global Recorded: Sep 23 2016 18 mins
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility vs. Security: Balancing Accessibility & Efficiency against Threats Mobility vs. Security: Balancing Accessibility & Efficiency against Threats James Morrison, Computer Scientist with the Federal Bureau of Investigation Recorded: Apr 14 2016 36 mins
    In today’s application economy, IT and business units are focused on increasing employee effectiveness and driving customer loyalty with a broad range of new ‘mobile-first’ applications.

    Having ‘an app for that’ offers many benefits – consumer-like experiences, increased use of enterprise applications, support for mobile workforce and a global customer base, to name just a few. But with each new mobile app – and mobile user – comes another attack surface and possible source of data loss or regulatory infraction. What now?

    Attend this Slashdot webinar to hear our expert panel discuss the challenges facing IT, developers and DevOps teams today, and what enterprises of all sizes should be doing to ensure their applications and users aren’t at risk. Attendees will hear:

    -How MDM is evolving, and what that means to users and IT
    -Methods of controlling devices that access your network and apps – simply
    -Why provisioning matters, and how to accelerate onboarding and retiring of users and devices
    -How to give users secure corporate access while retaining their existing mobile experience
    -Why content is king – and how to collaborate securely no matter how large the group
    How to give access behind the firewall – without messy configuration settings or VPNs