Hi [[ session.user.profile.firstName ]]

Application Development

  • Elasticity, Portability, and Intelligence from the Smart Load Balancer
    Elasticity, Portability, and Intelligence from the Smart Load Balancer Ashish Shah Recorded: Jan 18 2018 42 mins
    A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:

    • Learn differences between Smart Load Balancers and Legacy Load Balancers.
    • Understand the value of Smart Load Balancers in traditional and modern use cases.
    • See a live demonstration of Avi Networks’ Smart Load Balancer in action.
  • From Zero to Cloud with Spring and Cloud-Ready Data Technologies
    From Zero to Cloud with Spring and Cloud-Ready Data Technologies John Blum, Pivotal Recorded: Jan 18 2018 60 mins
    Microservices are all the hype and engineering efforts have shifted to refactoring monoliths into smaller, independent and composable services. Of course, this allows individual components of the application/system architecture to be independently scaled, owned and operated. But, what about your data?

    Building highly available, consistent and complex transactional/analytical applications at scale, that continue to perform as demand increases is challenging. Additionally, resigning a once, strongly consistent, ACID-compliant application backed by a DBMS into an eventually consistent architecture is unacceptable for many of the legacy systems still in use today. However, you cannot afford to keep relying on the same monolithic data architectures constituting a single point of failure and continue to supply your demand.

    Learn how existing applications can be modernized for the cloud by employing cloud-ready data management technologies, such as Apache Geode, which was built from the ground up on distributed, horizontally scalable (scale-out), shared-nothing architectural principles. When combined with the power of Spring running on Cloud Foundry, you have a recipe for protecting your existing investment while enabling you to leverage cloud-native design patterns that will move you towards the future.
  • How to Monitor Performance in the Digital Enterprise
    How to Monitor Performance in the Digital Enterprise John Rakowski, Sr. Director of Technology Strategy, AppDynamics Recorded: Jan 18 2018 49 mins
    The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.

    But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.

    In this webinar, attendees will learn:
    - The state of play in regards to monitoring in the enterprise
    - How Application Performance Monitoring (APM) tools improve ITSM processes
    - Key APM capabilities and how they apply to Service Transition and Operation
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Recorded: Jan 18 2018 59 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Recorded: Jan 18 2018 64 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • Quay Enterprise 101: Overview and Demo
    Quay Enterprise 101: Overview and Demo Joseph Schorr, Software Engineer Recorded: Jan 17 2018 43 mins
    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • Don't Lose Control Over Your .com
    Don't Lose Control Over Your .com Jonathan Lewis, VP Product Marketing Recorded: Jan 17 2018 30 mins
    Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.
  • Domain Events & Event Storming Part Four
    Domain Events & Event Storming Part Four Michael Plöd, Principal Consultant, InnoQ Recorded: Jan 17 2018 55 mins
    In the fourth part of our Domain-Driven Design (DDD) webinar series we address Domain Events, a major driver for the evolution of DDD over the last couple of years.

    Domain Events help us to decouple Bounded Contexts by interaction through preferably asynchronous business events. Domain Events can also be used as a persistence model (Event Sourcing). In order to identify suitable Domain Events, Alberto Brandolini invented a new workshop format called, Event Storming.

    This webinar introduces you to the concept of Domain Events and explains how you can leverage the advantages of this approach in your software architectures. We will also address common pitfalls and trade-offs when working with Domain Events and will take a close look at Event Storming and its benefits.
  • Designing a Distributed Application Using DDS QoS
    Designing a Distributed Application Using DDS QoS Larry Johnson, OMG Vice President; Adam Mitz, Principal Software Engineer at Object Computing, Inc. Recorded: Jan 17 2018 59 mins
    DDS Technical Overview Series - Part IV: The OMG Data Distribution Service provides a diverse set of Quality of Service policies. Strategic use of these QoS policies enables intelligent behavior in middleware and allows the application developer to focus on the domain. In this webinar, we examine one application in detail and explore how it uses DDS QoS policies to address several non-functional requirements. We'll also cover the trade-offs involved in different design choices involving DDS QoS and other DDS features. This webinar builds on the Part I and Part II webinars by examining certain QoS policies in more depth and taking a deep dive into a single application as it evolves from simple data transfer to taking full advantage of the Data-Centric Publish/Subscribe model of DDS.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jan 17 2018 71 mins
    Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.

    Each month, we will have a specific theme to help promote awareness and best practices.
  • Ask an Agile Expert
    Ask an Agile Expert Doug Dockery, Resident Agile Expert Recorded: Jan 16 2018 59 mins
    Here’s your opportunity to ask an agile expert.

    Every organization undergoes different pain points during their agile transformation.

    We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join CA's Senior Director of Agile Management, Doug Dockery, agile coach and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, January 16, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • How to Drive Value from IT Transformation
    How to Drive Value from IT Transformation Richard McKinney - US Dept Transportation. David Egts - Red Hat. Harold Tuck, San Diego County Technology Office. Recorded: Jan 16 2018 65 mins
    Pressure to deliver faster, better and more economical services is driving IT modernization across state and local government. But a recent survey from the Center for Digital Government indicates that CIOs are approaching modernization with a growing emphasis on value -- respondents said “budget, cost control and fiscal management” dominate their attention, discussions and strategic planning activities. So how do government leaders approach modernization in an environment where value and fiscal responsibility are paramount?

    This hour-long, panel-style webinar will:
    • Uncover additional CDG survey findings on technology, planning and procurement priorities
    • Offer best practices around modernizing legacy systems, consolidating IT environments, strengthening data and analytics capabilities, adopting cloud services, and improving security and risk management
    • Discuss how commercially supported open source technologies can drive better performance at lower cost
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • The Breadth and Reach of the OpenShift Marketplace
    The Breadth and Reach of the OpenShift Marketplace Brian Gracely Director of Product Strategy, Red Hat Recorded: Jan 16 2018 18 mins
    From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.

    In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
  • Help Wanted! – Addressing the Cybersecurity Skills Shortage
    Help Wanted! – Addressing the Cybersecurity Skills Shortage Gary Beach, Brandon Dunlap, Donald W. Freese, David Shearer, Deidre Diamond Recorded: Jan 15 2018 66 mins
    Panel Moderator: Gary Beach – Author: The U.S. Technology Skills Gap

    Panelist: Brandon Dunlap – Speaker, (ISC)²
    Panelist: Donald W. Freese – Deputy Assistant Director, F.B.I.
    Panelist: David Shearer, CISSP – CEO, (ISC)²
    Panelist: Deidre Diamond – Founder and CEO, CyberSN and #brainbabe
  • Agile Cloud Security
    Agile Cloud Security Paul Oakes, CISSP, ISSAP, CCSP, CSM, CSPO, AWS PSA, Senior Enterprise Security Architect, TD Bank Recorded: Jan 15 2018 61 mins
    How does an established data center-centric organization with high trust and security needs move to the public cloud? How does a waterfall-model-oriented organization make such a move in a timely fashion so as to not be left behind by its competition? What does governance look like for such an organization's use of the public cloud? What can these organizations avoid doing wrong?

    These questions are answered by using the fundamentals of Agile methodologies: prioritization by highest value and risk; technical excellence; and continuous delivery of valuable products as seen through the lense of security principles. Those principles include least privilege, separation of duties, data protection, and visibility to examine and provide solutions for the trust, security and governance needs of cloud-new adopting organizations.
  • Cybersecurity Careers: It’s Not Just Hacking
    Cybersecurity Careers: It’s Not Just Hacking Deidre Diamond Founder and CEO CyberSN and brainbabe.org Recorded: Jan 15 2018 63 mins
    With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.
  • An Automated AppSec Pipeline with Docker and Serverless
    An Automated AppSec Pipeline with Docker and Serverless Matt Tesauro, Senior Technical Project Coordinator, OWASP, Aaron Weaver, Application Security Manager Recorded: Jan 15 2018 43 mins
    In application security, the size of the security team is always the most scarce resource. The best way to optimize the security team is automation. This presentation will provide an overview of key application security automation principles and practices creating an Application Security Pipeline augmented with automation.

    With the rise of docker and serverless patterns, there is a whole new suite of tools available to the pipeline builder. We show you how to get started automating application security tooling and reporting using these new patterns.
  • Secrets of Successful Digital Transformers
    Secrets of Successful Digital Transformers Dormain Drewitz Recorded: Jan 11 2018 54 mins
    Call it Younger Sibling Syndrome: You study the successes and failures of those who came before. You replicate the wins. You limit the failures. You capitalize on the experience of pioneers and trailblazers.

    Digital transformation is no different. Over half of the Fortune 500 is already using Cloud Foundry® as part of their digital transformation strategy. Where have they succeeded? How can you replicate? What will you need?

    Wherever you are on your digital transformation journey, learn from your predecessors. In this talk, Dormain Drewitz distills the experiences of Fortune 500 companies using Cloud Foundry. Attend this session to learn more about the patterns around strategies, processes, and team-level tactics.
  • Prometheus 101: Overview and Demo
    Prometheus 101: Overview and Demo Chris Ricci, Solutions Engineer Recorded: Jan 11 2018 37 mins
    Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.

    In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
  • Vault OCS - Secret to a Secure Jenkins on Tectonic
    Vault OCS - Secret to a Secure Jenkins on Tectonic Praveen Rajagopalan, Solutions Engineer Recorded: Jan 10 2018 20 mins
    Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.

    CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
  • How to Reduce Your AWS Spend
    How to Reduce Your AWS Spend Michael McCracken, Vice President, Advanced Solutions Recorded: Jan 10 2018 43 mins
    During this session, attendees will learn how they can reduce their AWS spend through invoice transparency, architectural optimization and strategic procurement.
  • Best Practices for Container Design and Orchestration
    Best Practices for Container Design and Orchestration Torr Schmey, Red Hat Sr Middleware Solutions Sales Specialist Rob Sedor, Red Hat Sr. Solutions Architect Recorded: Jan 10 2018 61 mins
    Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments.

    During this webcast, you will learn:
    - How to make application deployment and operations at scale simple and reliable
    - How to make it easy to create “cloud-native” applications in the first place
    - Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Jan 23 2018 2:00 pm UTC 60 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Enterpryze Omni One:Integrating Square and SAP Business One for retail
    Enterpryze Omni One:Integrating Square and SAP Business One for retail Morgan Browne, CEO of Enterpryze Jan 23 2018 4:00 pm UTC 60 mins
    Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.

    Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.
  • Monoliths to Microservices: Migrating Legacy Apps
    Monoliths to Microservices: Migrating Legacy Apps James Falkner Technical marketing manager, Red Hat Jan 23 2018 4:00 pm UTC 60 mins
    Enterprises are transitioning from on-premise, monolithic applications to highly dynamic, polyglot environments using microservices and cloud computing. During this transition, organizations are often left wondering what to do with existing investments in legacy platforms and application development frameworks that are running the business of today but are quickly becoming obsolete in the face of the ongoing digital revolution.

    In this webcast, we'll explore how organizations can meet the challenges of modern business using existing applications while at the same time driving new innovation using modern application development technologies like microservices, containers, and hybrid cloud. These techniques can help deliver market innovation faster and with more reliability while minimizing the risk of introducing new technology too quickly.
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy
    The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Eric Avigdor, DIrector of Product Management at Gemalto Jan 23 2018 4:00 pm UTC 60 mins
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • Getting started with Agile – what you need to know
    Getting started with Agile – what you need to know Andy Jordan, Project Management.com and Elizabeth Schulheisz, CA Technologies Jan 23 2018 6:00 pm UTC 60 mins
    No two Agile adoptions are ever the same, but there are a number of common areas that can cause problems. Join industry expert and Projectmanagement.com contributor Andy Jordan as he highlights 7 challenges organizations often face.

    In his usual upbeat style Andy will:
    -Help you plan to prevent the challenges from affecting you
    -Identify the early warning signs that things may be going wrong
    -Give you tools to prevent thing getting worse and help you learn from the experience

    As Agile becomes ever more critical to business success you can’t afford to fall into expensive traps on your Agile journey. Sign up for this webinar today and learn how to give your organization a path to success.
  • Reduce Application Risk with Veracode Greenlight and Developer Sandbox
    Reduce Application Risk with Veracode Greenlight and Developer Sandbox Austin Britt, CA Veracode Solution Architect Jan 24 2018 4:30 pm UTC 30 mins
    During this 20-minute webinar, learn how developers can stay ahead of vulnerabilities that can disrupt the software development lifecycle (SDLC). See how Veracode Greenlight finds security defects and provides contextual remediation advice to help you fix issues in seconds, right within your IDE. Coupled with the use of Veracode’s developer sandbox, teams can scan code without alerting security or affecting an application’s overall compliance with policy.

    As a result you will be able to:
    •Reduce overall costs by 3x when compared to testing during the QA phase
    •Increase the fix rate of flaws using sandbox scans
    •Get your organization on track to move towards a DevOps and continuous release cycle
  • Top 5 Things You Need to Know About DNSSEC
    Top 5 Things You Need to Know About DNSSEC Carl Levine, Technical Evangelist Jan 24 2018 5:00 pm UTC 30 mins
    In today’s world of ever-increasing cybersecurity threats, identity theft, and online crime, leaving DNS unsecured is potentially like having armed guards patrolling your front door, while leaving your back door hanging open. DNS is a critical, but often overlooked, piece of infrastructure on which virtually every online entity relies. We will explore the top five things you need to know about securing your DNS configuration against the very real threats that plague the Internet.

    - The history of DNSSEC
    - How DNSSEC works under the hood
    - Why EDNS(0) is so critical in a DNSSEC world
    - The threats against which DNSSEC can protect you
    - When you need DNSSEC, and when you don’t
  • [Webinar] Balancing DevOps Speed with Quality
    [Webinar] Balancing DevOps Speed with Quality Forrester Research (Chris Condo), Quali (Shashi Kiran) Jan 24 2018 6:00 pm UTC 60 mins
    Balancing DevOps Speed with Quality: Environment Automation to the Rescue
    A Prescriptive Approach to Innovation for the Modern Enterprise
    Organizations in every industry face opportunities and threats caused by digitally empowered customers. Acquiring new customers — or losing existing ones — has never been easier. Companies can't afford to move fast only in some areas; the whole organization must race together toward customer obsession. Application development and delivery (AD&D) professionals must master development and operations (DevOps) and modern application delivery processes across their entire software portfolio to win in the digital marketplace. As software environments become increasingly distributed and complicated, modeling such environments authentically in the Dev/Test stage becomes critical to speed and quality. Giving timely access to such environments early on in the Dev/Test cycle, with self-service can help break silos and increase productivity allowing organizations to scale their software development and shift into higher gear – all with better governance and business insights.

    How do you move fast with increased agility without increasing risk?

    This webinar will share state-of-the-art research from Forrester including trends and best practices, and information from Quali on how to drive this with cloud sandboxes as part of the release cycle with on-demand, self-service environments.
    Enterprise DevOps architects, Release Management professionals, Cloud architects and professionals from ITOps are encouraged to attend.
  • PPM Tool Selection. It Matters.
    PPM Tool Selection. It Matters. Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Jan 24 2018 6:00 pm UTC 60 mins
    In today’s fast paced modern business management environment the need for the right project portfolio management or PPM software solution has never been more important. However, many companies are still not viewing these platforms as part of the strategic infrastructure that drives success, and that’s a big problem. Join industry expert Andy Jordan and CA’s own Jim Tisch as they discuss the issues including:
    •Why decisions must be driven from the top down
    •Why cost alone is an irrelevant and misleading factor in choosing a solution
    •The role IT does – and doesn’t, have in the decision-making process
    •The importance of a partner over a vendor
    •Measuring and managing the return on your PPM investment
    An organization won’t succeed simply because they choose the right tool, but they may well fail if they commit to the wrong one. Don’t miss this thought provoking webinar and give yourself a significant advantage in the battle to deliver consistent success.
  • Container Runtime Security with Sysdig Falco
    Container Runtime Security with Sysdig Falco Michael Ducy, Director of Community and Evangelism, Sysdig Jan 24 2018 6:00 pm UTC 60 mins
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
  • Self-Hosted Kubernetes: How and Why
    Self-Hosted Kubernetes: How and Why Diego Pontoriero, Software Engineer Jan 24 2018 6:00 pm UTC 60 mins
    How Kubernetes is deployed and managed has changed since the first release of the project. From configuration management systems and unit files to deploying Kubernetes using Kubernetes, a lot has changed.

    Self-hosted Kubernetes has many benefits as a deployment option, and this webinar will highlight those benefits, as well as explain the history and nuances of making self-hosted Kubernetes possible.This webinar will describe what self-hosted Kubernetes means, why it exists, how it came into existence, and what you need to know if you're running a self-hosted cluster. Many tools now deploy self-hosted clusters including bootkube and kubeadm, so knowledge of how this works can be very important for anybody running a Kubernetes cluster.

    What are the benefits of self-hosting? How does it work? What do I need to know if I'm administering a self-hosted cluster?

    All those questions and more will be discussed in detail in this webinar. In addition, I will discuss how various projects and products take advantage of the many benefits of self-hosting, such as Tectonic.
  • The developer's bright, hybrid cloud-native, polyglot, poly-architecture future
    The developer's bright, hybrid cloud-native, polyglot, poly-architecture future James Falkner, Technology Evangelist at Red Hat Jan 25 2018 4:00 pm UTC 60 mins
    Today, IT organizations have many options for development technology tools, and the number of choices can be daunting. As modern application requirements become more complex, it’s apparent that one runtime, one framework, or one architectural style is no longer a feasible strategy. Organizations must figure out how to manage the complexity of distributed app development with diverse technologies, a lack of skilled resources, and siloed processes.

    Red Hat OpenShift Application Runtimes
    Join Red Hat to learn about Red Hat’s solution for optimized cloud-native development: Red Hat® OpenShift Application Runtimes. A suite of containerized runtimes that simplifies cloud-native development, Red Hat OpenShift Application Runtimes provides a highly productive and prescriptive developer experience and delivers strategic flexibility without limiting development, testing, deployment, and modernization preferences. The discussion will cover:

    Cloud, containers, DevOps, and the open source Cambrian explosion.
    Migrating existing apps: rehost, replatform, or refactor.
    One size does not fit all: polyglot and developer choice.
    Cloud-native deployment techniques.
    Containerized microservices.
    Future development: Istio service mesh, Kubernetes, and serverless architectures.
  • 20 Docker Security Tools Compared
    20 Docker Security Tools Compared Jorge Salamero Sanz and Knox Anderson Jan 25 2018 6:00 pm UTC 60 mins
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    -How to secure Docker containers and what are the best practices
    -Why you need to both static and dynamic (run-time) scanning for your images
    -What other container security measures and policies are necessary in production

    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • API-Led Modernization. From Monolithic Architectures to Modern Microservices.
    API-Led Modernization. From Monolithic Architectures to Modern Microservices. Scott England-Sullivan, Pricipal Domain Architect, Red Hat. Zohaib Khan, App Mod Practice Lead, Red Hat. Jan 29 2018 4:00 pm UTC 60 mins
    While the CIO's dilemma of optimizing the existing environment while growing new capabilities hasn't
    changed, the playing field has—dramatically. New, speedy ways to develop applications and deliver them, such as with microservices, are now creating chasms where once there were gaps in your digital
    effort. Enter APIs—the answer to how and where to start.

    Modernizing with APIs provides a smooth modernization path for government agencies—from establishing API use, to extending legacy systems with them, to ultimately transitioning to modern
    architectures with them.

    Join this webinar to learn about:
    • The practice of APIs in government agencies.
    • How APIs extend the benefit and ROI of legacy systems.
    • Reference architectural approaches to bridging old and new architectures.
    • Some technologies to help you implement this approach.
  • Five Reasons To Rethink Your APM Strategy
    Five Reasons To Rethink Your APM Strategy Amy Feldman and Peter Waterhouse, CA Technologies Jan 30 2018 4:00 pm UTC 60 mins
    Accelerating your digital transformation will often add new challenges to an already complex IT environment. Cloud, microservices, containers and IoT are just the start, and require flexible, modern approaches that put customer experience first and are built to be future-proof. CA Application Performance Management (CA APM) is engineered to address the challenge of improving performance across these dynamic application environments.

    In this webcast, we will discuss the top five reasons why you should consider CA Application Performance Management to help optimize your customer experience and performance across digital ecosystems.
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 30 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • Secure Network Communications (SNC) for Software Defined Radios (SDR)
    Secure Network Communications (SNC) for Software Defined Radios (SDR) Dr. Jeffrey Smith, Chief Systems Engineer, Multi-Agency Collaboration Environment (MACE), and Larry Johnson, OMG VP Jan 30 2018 4:00 pm UTC 60 mins
    SDRs provide wireless communication components whose trans¬mit and receive characteristics are realized through specialized software running on programmable platforms. The benefit of allowing a single communications platform to be rapidly reconfigured for multiple, highly-diverse communication is to multiplex receive and transmission signals of different encodings on many frequencies (each combination is called a “waveform”). SDRs handle waveforms programmatically are used in fundamentally new ways for multiple domains (e.g. C4ISR, Internet of Things, Robotics, Space, etc.). Sup¬porting several waveforms inside the same device eases bug fixing, enables field re-configurability, allows mul¬tiple data transmission standards to be supported simultaneously, and helps improve the security and integrity of communications. Any communication task can be realized instanta¬neously by uploading/downloading appropriate software that defines the necessary waveforms allowing rapid reconfiguration and upgrades of Over-The-Air Reprogrammable deployed equipment and use of Smart Antennas.

    This webinar’s purpose is to provide background and solicit interest for a revised version of the OMG Software-Based Communications Domain Task Force (SBC/DTF), called the Secure Network Communications (SNC) for Software Defined Radios (SDR) Working Group (WG).

    For information on OMG SBC visit http://www.omg.org/intro/SCAV.pdf.
  • Containers, Microservices, and Monoliths - From Customers' Perspectives
    Containers, Microservices, and Monoliths - From Customers' Perspectives Brian Gracely, Director of Product Strategy, Red Hat. Jan 30 2018 4:00 pm UTC 60 mins
    Containers, microservices, and monoliths - from customers' perspectives.

    How do customers bring together existing and new applications, along with automation and DevOps to achieve software agility and, ultimately, business success?

    In this webcast, you’ll learn from the stories of three of our customers.
  • Five Key Cloud Migration Success Factors
    Five Key Cloud Migration Success Factors Justin Vaughan-Brown, Director, Technology Strategy, AppDynamics Jan 30 2018 5:00 pm UTC 30 mins
    The more you understand the numerous cloud migration considerations, the more likely your enterprise will take advantage of its scalability, agility, and cost reduction benefits.

    Register for this 30-minute webinar to learn how to minimize the risks and set yourself up for success.

    You’ll also learn:

    - Which applications to migrate first
    - How to monitor and minimize the impact on users before, during, and after
    - What training your IT staff needs to effectively build and operate cloud environments
  • Discover a Simplified Approach to Container Runtime Protection
    Discover a Simplified Approach to Container Runtime Protection Bashyam Anant (Sr. Director, Product Management) & Vaidehi Rao (Engineering Manager, Container Security) Jan 30 2018 6:00 pm UTC 45 mins
    Just when you thought you had container security covered, a vulnerability appeared in the Docker container runtime—an insecure opening of the file-descriptor allowing privileged escalation—Now what?

    Yes, container hardening and image scanning are essential for container security, but automating anomaly detection and threat defenses in the container runtime is now essential. Join us on January 30th, for a technical webinar, to learn more about threat to the evolution of the container runtime layer as well as a simplified approach to container runtime protection.

    In this technical webinar you will learn:

    * How container runtime protection complements image, instance, and orchestration security

    * What elements of container security may be monitored

    * How runtime container protection enables true DevSecOps

    * How to deploy container runtime security across multiple public clouds and even on-premise

    * Advantages of combining container security alerts with AWS CloudTrail monitoring
  • Tech AMA: Circuit Breaker Patterns in Microservices Applications
    Tech AMA: Circuit Breaker Patterns in Microservices Applications Chris Stetson, Charles Pretzer, Floyd Smith Jan 30 2018 7:00 pm UTC 60 mins
    This webinar is a chance to learn how the circuit breaker pattern is used in microservices applications. Fundamentally, the circuit breaker pattern in a microservice application is all about managing traffic to the different instances of your services. We utilize active health checks to monitor these instances, to help avoid catastrophic failure.

    Join this webinar to learn:
    - How the circuit breaker pattern works
    - Why the circuit breaker pattern has become popular, especially for microservices apps
    - How the circuit breaker pattern is implemented in Microservices Reference Architecture
    - Why NGINX is particularly well-suited for supporting microservices apps

    Chris Stetson, Chief Architect & Sr. Director, Microservices Engineering
    Charles Pretzer, Technical Architect
    Floyd Smith, Director, Content Marketing
  • Anypoint Platform 101: API-Led Integration Basics with MuleSoft
    Anypoint Platform 101: API-Led Integration Basics with MuleSoft Ahyoung An, Sr. Product Marketing Manager, MuleSoft; Brett Roeder, Principal Client Architect, MuleSoft Jan 30 2018 7:00 pm UTC 45 mins
    Whether you are new to Anypoint Platform or interested in MuleSoft’s latest innovations, watch this webinar to learn how to get started with Anypoint Platform, taking an API-led approach to integration.

    You’ll learn how to:

    - Design APIs quickly and consistently leveraging API fragments
    - Implement APIs, and transform data graphically
    - Auto-generate unit and integrated tests for APIs and integrations
    - Engage internal and external users throughout the lifecycle
    - Deploy, manage and analyze APIs and integrations in a unified management center
  • SaaS-ify and Monetize your Products
    SaaS-ify and Monetize your Products Miles Betro - Orbitera Solutions Architect Jan 30 2018 7:00 pm UTC 60 mins
    Join this webcast with Miles Betro, Solutions Architect at Orbitera, to learn about:

    - Distributing products as easy-to-buy SaaS offerings
    - Profit maximizing strategies for cloud-hosted products
    - Tracking cloud input costs and revenue for margin management
    - Understanding consumption, subscription, and hybrid pricing models

    In addition, we will deliver a live demo of a multi-cloud marketplace working together with cloud billing tools. We will also answer live questions from the webinar audience.
  • Manage the App on Kubernetes
    Manage the App on Kubernetes Brandon Phillips, CTO of CoreOS Jan 30 2018 8:00 pm UTC 60 mins
    Kubernetes has yet to close the developer gap from source code to app running in a production Kubernetes cluster. Many build bespoke tools. How can the Kubernetes community come together to build decomposable solutions that help people define their app, deploy it, and manage its lifecycle over time? Learn about the progress we are making together to elevate the conversation from container orchestration to application lifecycles management.