Hi [[ session.user.profile.firstName ]]

Application Development

  • Digital Transformation: How to Deliver Exceptional Customer Service
    Digital Transformation: How to Deliver Exceptional Customer Service Rafael Izquierdo, Executive Vice President - Seguros Universal, Juan Manuel Mogollon, VP LATAM - Bizagi Recorded: Jun 22 2017 28 mins
    The insurance industry is facing increasing competition with the rise of technology and challenger brands. To continuously thrive in this competition, established players need to deliver exceptional service in order to attract and retain customers.

    Register for this webinar to hear how Seguros Universal, an vehicle insurance provider based in the Dominican Republic, defends its market share with exceptional services, and how the company automates claims process to provide comprehensive and robust case management and analytics.

    Rafael Izquierdo, Executive Vice President of Administration, Risk, Legal and Compliance will discuss how the company:

    -Defended its market share with service excellence
    -Delivered faster, more productive and error-free processes
    -Reduced vehicle part returns by 30%

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • Transforming Healthcare using Artificial Intelligence and Micro-Learning
    Transforming Healthcare using Artificial Intelligence and Micro-Learning Morgan Porter, CTO Mentis Neuro & Barbara North, CDO Mentis Neuro Recorded: Jun 22 2017 33 mins
    In healthcare digitalization holds huge potential for improving and saving lives. Mentis Neuro, a leading US based neuro-rehabilitation provider, is pioneering cutting edge Artificial Intelligence (AI) to transform staff efficiency and the patient experience.

    Join Morgan Porter (CTO) and Barbara North (CDO) as they discuss how AI and contextualized micro-learning are:

    -Transforming the patient experience for the digital age
    -Providing real-time training information to staff exactly when they need it
    -Ensuring Mentis Neuro Health meets important healthcare regulations

    Who should attend: Digital Technology leaders, Application Development Leaders, IT and Business Process Professionals
  • Digital Transformation: How to Model Human Behavior in Digitization
    Digital Transformation: How to Model Human Behavior in Digitization Frank Beyer, Former Senior Business Process Management at Kyocera Document Solutions Europe Recorded: Jun 22 2017 27 mins
    Digital transformation is the change associated with the application of digital technology in all aspects of human society. For businesses, it is about creating a competitive edge by digitizing operations for greater efficiency, intelligence and agility.

    One main challenge of digitization is modelling human behavior and cognitive processes into logical expressions that can be digitized and automated. How do we translate complex human behavior and thinking into digital processes?

    Frank Beyer, a business process management expert will share how approvals of various kind and pricing calculations can be automated thereby drawing on his experience with a pilot project at former employer Kyocera , a Japanese multinational electronics and ceramics manufacturer, automates its pricing calculation and approvals.

    Register and hear Frank Beyer and Bizagi discuss:

    •How to model human activities into digital processes
    •How to break the cognitive barrier to embark on RPA
    •The impact and hidden benefits of digitizing human activities


    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals
  • Tectonic 1.6.4
    Tectonic 1.6.4 Rob Szumski Recorded: Jun 22 2017 21 mins
    Tectonic 1.6.4 continues the push to breaking open the cloud market. The features included in this release increase the portability of applications across hybrid cloud environments. CoreOS is providing an enterprise ready Kubernetes solution with automated operations that enable a cloud "as a service" operational model regardless of the underlying infrastructure, whether bare-metal, private IaaS, or public IaaS.

    Rob Szumski, Tectonic product manager at CoreOS, leads this webinar through the changes in the Tectonic 1.6.4 release. He'll go over the features included from Kubernetes 1.6.4 and how Tectonic is including operators for etcd other tools.
  • Tech Talk: Learn How to Use the ExtReact Grid with your React Applications
    Tech Talk: Learn How to Use the ExtReact Grid with your React Applications Mark Brocato, Engineering Director at Sencha Recorded: Jun 22 2017 40 mins
    If you’re developing a data-driven application with React, chances are you’ll use a grid or spreadsheet-like interface at some point to display data for your users. Depending on the context, your users may expect the grid in your application to be capable of:

    - Multi-directional scrolling with a fixed header
    - Clicking on a column header to sort
    - Showing and hiding specific columns
    - Paging, grouping and summarization
    - Editing data in cells
    - Exporting to Excel
    - Drilling down/row expansion

    A grid can be one of the trickiest and most frustrating UI components to build in React because many of the necessary features require both significant React expertise, as well as an ability and willingness to manage myriad low-level details in the DOM. Fortunately the ExtReact grid provides all of these capabilities and more.

    Join us and you will see how easy it is to add the ExtReact grid into your application and explore many of its powerful features. We’ll also explore some of the other data-driven components in ExtReact, including charts, trees, and advanced visualizations such as heat maps and tree maps.
  • Digital Transformation: How to Deliver Scalable Core Banking Solutions
    Digital Transformation: How to Deliver Scalable Core Banking Solutions Alexei Fey, Data Action - CTO/General Manager Technology Recorded: Jun 22 2017 21 mins
    Data Action is a leading software and services provider for the Australian mutual banking industry. The company provides a full suite of banking solutions, from core banking right through to custom digital experiences based on the latest technologies and industry requirements - optimized to align with client needs.

    For Data Action, the ability to deliver flexible and scalable operations to 30 banks is a differentiating advantage. How does the company achieve it?

    Register and hear Alexei Fey, CTO of Data Action, as he discusses:

    •What does lending look like from a customer’s experience
    •How to focus on retaining existing customers
    •How to manage the expectation of digital customers
    •How to deliver ROI quickly

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals
  • Panel: Smart Fog and Transaction Management for Cities and Maritime
    Panel: Smart Fog and Transaction Management for Cities and Maritime Moderator: Katalin Walcott (Intel) Panel: Jeff Fedders (OpenFog), Mark Dixon (IBM), Matthew Bailey (Powering IoT) Recorded: Jun 22 2017 61 mins
    Fog computing represents a tectonic shift for the future of transaction management, distributed supply chain and overall experience. It blurs the lines between the edge and the cloud and puts the focus on the systems which manage and balance the delivery of coherent, end-to-end sessions and associated transaction level agreements. As a result, this new technology is pervasive in several industries.

    Join this panel of experts as they discuss solutions with specific industry use cases from smart fog for Cities, Buildings, Ports, and Maritime.

    Moderator: Katalin Walcott, Work Group Chair Manageability at OpenFog Consortium & Principal Engineer - IoT/Fog Computing Orchestration Architecture at Intel

    Panelists:
    - Jeff Fedders, President at OpenFog Consortium & Chief Strategist, IoTG Strategy and Technology Office at Intel
    - Mark Dixon, Senior Architect for Smarter Cities at IBM
    - Matthew Bailey, President, Powering IoT - Smart City advisor and strategist to governments, technology corporations, and economic development agencies
  • Digital Transformation: Going Paperless and Mobile with Process Automation
    Digital Transformation: Going Paperless and Mobile with Process Automation David Schenke, WL Bank - Application Development Manager Recorded: Jun 22 2017 17 mins
    Going paperless not only helps with the environment but also saves time, money and improves security. WL Bank, a specialist for real estate financing, shares its journey of going paperless for critical decision making process.

    David Schenke, Application Development Manager of WL Bank, will discuss:

    •How process automation improves decision making
    •How mobility empowers stakeholders to be agile and responsive
    •How WL Bank is transforming to a paperless organization

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • Digital Transformation: How to Improve New Customer On-boarding
    Digital Transformation: How to Improve New Customer On-boarding Darren Hart, Alpha Card - CIO Recorded: Jun 22 2017 28 mins
    Organizations all industries face the imperative of driving profitable growth while improving customer services. There is also need to meet increasing regulatory compliance, especially for financial services organizations.

    Register this webinar to hear how Alpha Card, a joint venture between American Express BNP Paribas providing card issuing and acquiring services, creates a consistent cross-brand customer experience, maximizes service productivity, and meets regulatory compliance. Darren Hart, CIO of Alpha Card will discuss how the company:

    •Created a consistent customer experience
    •Reduced customer acquisition cost and remediation
    •Achieved regulatory compliance

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • The Future of Smart Cards: Are Cards Already Dead?
    The Future of Smart Cards: Are Cards Already Dead? Jean-Noël Georges and Nicolas Raffin, Head of Strategic Marketing & Innovation Payment, Oberthur Technologies Recorded: Jun 22 2017 56 mins
    For more than a decade, industry experts have predicted the death of smart cards. However, the embedded SIM (eSIM) has an impact on the telecommunication vertical, and many other verticals continue to benefit from the tremendous advantages of this secured device. Frost & Sullivan forecasts that, in 2017, the market will continue to grow at a 4.7% CAGR globally for all verticals, including telecommunication, banking and payment, government and ID, transportation, and physical and logical access. In a growing market, innovation is key. This is why major players have added innovative functionalities to the existing medium to strengthen security and provide a more exciting user experience.
  • Powering the Industrial Internet of Things
    Powering the Industrial Internet of Things Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Jun 22 2017 61 mins
    Don’t confuse the Internet of Things (IoT) with the Industrial IoT (IIoT), which typically has much more stringent characteristics. That’s because the IIoT usually involves some sort of manufacturing, robotics, or other mission-critical application, where down-time can be measured in dollars, often lots of them. In Day 3 of this three-day class, we’ll look at how to best power your IIoT application, which could include FPGA power and design considerations for high-speed RS-485 data links. The class will use the Intersil PowerCompass tool to help simplify the design. Day 3 sponsored by Intersil
  • Automating for Agility, Control and Consistency in a Multi-Cloud Environment
    Automating for Agility, Control and Consistency in a Multi-Cloud Environment Alex Heneveld - Co-Founder & CTO - Cloudsoft, James Weir - CTO - UShareSoft, William Fellows - Research Vice President - 451 Recorded: Jun 22 2017 59 mins
    William Fellows, 451 Research Vice President will be hosting the webinar with UShareSoft CTO James Weir, as well as Cloudsoft's Co-founder & CTO, Alex Heneveld on the topic of Automating for Agility, Control and Consistency in a Multi-Cloud Environment.

    Wif will present insights into the use of cloud and digital transformation setting the scene for James and Alex to drill down into the role of DevOps in delivering effectively.

    The DevOps culture shift is amplified with tools that give each stakeholder immediate value with the combined power of UForge and Cloudsoft AMP delivering:
    oRepeatable, reliable deployments of any system anywhere
    oQuantify what works. Test in hybrid cloud and multiple locations. Record performance.
    oModels of stacks and blueprints that everyone can understand, share, source control, reproduce, test and audit.
    Find out more about 451 Research, Cloudsoft and UShareSoft.
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • How Does adidas Automate and Integrate Digital Operations?
    How Does adidas Automate and Integrate Digital Operations? Mohammed Ghadban, Business Analyst - Adidas and Gerhard Unger, VP DACH - Bizagi Recorded: Jun 22 2017 23 mins
    Want to know how manufacturing and retail giant adidas tackles IT integration? With 500 sales operations, 400 factories and over 10,000 staff around the world, adidas has a strategic and dedicated team for Global Integration Services – connecting disparate systems and data to save time and effort across the business.

    Join Mohammed Ghadban of Adidas to hear how this team has:

    •Added a layer of agility on top of the systems adidas was already using
    •Integrated process automation with technologies including SAP and SharePoint
    •Adopted the agile development methodology by using an agile digital platform

    Who should attend: Digital Technology leaders, Application Development Leaders, IT and Business Process Professionals
  • How a Digital Business Platform Can Provide a Multi-Channel Customer Experience
    How a Digital Business Platform Can Provide a Multi-Channel Customer Experience Roberto Biondini, Bizagi - Solutions Consultant Recorded: Jun 21 2017 30 mins
    Watch a demonstration of an end-to-end loan application built with Bizagi. The demonstration will show how a modern organization can deliver a customer experience across multiple channels, both from the perspective of the customers and the employees. The demonstration will also cover the process model for this application, designed with Bizagi Modeler and brought to life with Bizagi Studio.

    Register now to see how the Bizagi digital business platform can provide an engaging customer experience by:

    •Empowering end users with personal, contextualized experiences
    •Interacting with cloud applications and social media platforms
    •Wrapping around existing legacy systems.

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • Redefine the Customer Experience to Drive Acquisition and Retention
    Redefine the Customer Experience to Drive Acquisition and Retention Neil Simpson, Innovelocity - Founder Recorded: Jun 21 2017 23 mins
    Putting customers at the center of the business is easier said than done. To be successful, organizations must address underlying factors impacting poor experience, often this stems back to inefficiencies within the operating model which stifles innovation.

    Join Neil Simpson, Founder of Innovelocity and Tom Pope from Bizagi who will address:

    •Investing in the customer experience to increase competitive advantage
    •The challenges and pitfalls of putting the customer first
    •Real world examples of improving the CX in traditional businesses

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals and Architects
  • Balancing Security and Usability for Mobile Apps
    Balancing Security and Usability for Mobile Apps Will LaSala, Director of Services @ VASCO Recorded: Jun 21 2017 41 mins
    Many businesses today are driven to make their mobile apps more convenient and user-friendly, which often comes at the expense of security. Increasingly, cybercriminals exploit this oversight, shifting their focus from PCs to mobile devices and driving up the sophistication and rate of mobile attacks. Mobile malware, jailbroken devices, rogue apps, keylogging, screen capture and other threats are becoming serious disruptors of mobile business.

    As an application publisher, you cannot stop these attacks from happening but you can render them ineffective — while also providing the best possible user experience. Join this webcast from VASCO Data Security and learn how to reduce your mobile apps’ vulnerabilities and maintain a frictionless user experience.

    Topics of discussion will include:

    - The nature and anatomy of mobile attacks
    - The most common mobile app vulnerabilities
    - The key components of holistic mobile app security
    - Using “invisible” security such as behavioral authentication and runtime application self-protection to improve user experience
  • How a Digital Business Platform Can Help You Reach GDPR Compliance
    How a Digital Business Platform Can Help You Reach GDPR Compliance Knut Stegelman, Bizagi - Solutions Consultant Recorded: Jun 21 2017 29 mins
    Watch a demonstration of how Bizagi can help you react to the risk of fatal data breaches and minimize their impact. The demonstration will show how an organization can become compliant protecting consumer data preventing severe financial consequences. The demonstration covers the process model for this application, designed with Bizagi Modeler and brought to life with Bizagi Studio.

    Register now to see how the Bizagi digital business platform can mitigate your risk of non-compliance with practical tips on:

    •How to adopt an approach to build fast and change quickly adapting to legislative changes
    •How to integrate third-party technology using disruptive technology as an enabler to stay competitive and compliant
    •How to drive digital business automation across operations to eliminate errors, protect data and delight customers.

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • How to Prepare for the Enforcement of the EU GDPR in 2018
    How to Prepare for the Enforcement of the EU GDPR in 2018 Holger Sutzke, Bizagi - Financial Services Lead DACH and Martin Stepanek, Business Process Management Consultant Recorded: Jun 21 2017 30 mins
    As any business with customers in the EU should know, the General Data Privacy Regulation (GDPR) will become law and be enforced from May 2018. Time is short, and becoming GDPR compliant means facing the biggest ever changes in privacy rules and finding ways to protect private data or face commercially damaging fines and reputational risk.

    Register now to discuss the major challenges of becoming GDPR compliant and how technology can be the pivotal enabler of change including:

    •How GDPR forces a step change when designing new products and services
    •Which technologies to look for that help protect and react against data breaches thus minimizing consequences
    •A practical GDPR checklist to help you get started

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals and Architects, Compliance & Risk Management Leaders
  • [Webinar] Cyber ranges: Because you don't #wannacry
    [Webinar] Cyber ranges: Because you don't #wannacry Amritam Putatunda,Technical Product,Ixia, Alex Handy,Tech Journalist,THENEWSTACK,Pascal Joly,Tech Partnerships ,Quali Recorded: Jun 21 2017 58 mins
    Despite billions of dollars invested in cyber security measures, companies are still falling behind when it comes to cyber attack prevention. Case in point, The recent malware campaign “WannaCry” that was able to infect more than 300 thousand systems in short duration of time. This is a testimony to the fact that investments in proactive, rather than reactive defense strategy is acutely needed. Current cyber range solutions are often siloed efforts that takes weeks to set up and cover limited scenarios.
    Addressing these problems requires a new approach with on demand self-service environments to train incident response teams in a holistic manner across the entire organization and simulate a comprehensive set of attacks on IT infrastructure.
    In this webinar you will learn how you can use the power of Quali sandboxes and Ixia Breaking Point solution in creation of a Cyber Range training environment to
    -Rapidly provision full-stack, real-world cyber threat environments
    -Generate thousands of unique attacks mixed with a large variety of real life traffic profiles
    -Reports and grades that measures trainees abilities to neutralize attacks while maintaining traffic continuity.
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Chris Ricci, Solutions Engineer Recorded: Jun 21 2017 58 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Security at Speed: Integrating AppSec into the Tools you Already Use
    Security at Speed: Integrating AppSec into the Tools you Already Use Tim Jarrett, Sr. Director, Product Marketing Recorded: Jun 21 2017 56 mins
    Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community.

    Join us for a webinar as we explore ways in which you can use integrations to help you go faster, without sacrificing security. Below are a few ways Veracode can integrate into your Agile and DevOps processes:

    • Integrated Development Environments (IDEs)
    • Build Servers
    • Defect Tracking Systems
    • Governance, Risk and Compliance Solutions
  • How a Digital Business Platform Fosters Efficiency and Innovation.
    How a Digital Business Platform Fosters Efficiency and Innovation. Lisa Lafayette, Bizagi - Solutions Consultant Recorded: Jun 21 2017 25 mins
    Learn how Bizagi builds engagement to gain value by managing resource expectations that can seamlessly provide a connected customer experience. This demonstration covers the process model for this application, designed with Bizagi Modeler and brought to life with Bizagi Studio.

    Register now to see how a Digital Business Platform can help you to gain value quickly by:

    •Accelerating the uptake of new technologies to optimize core capabilities with higher efficiency and lower costs.
    •Enabling collaboration of teams that deliver value and an experience customers care about
    •Fostering a culture of rapid innovation through building fast and changing quickly

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
  • Medical Device Security: An Industry Under Attack and Unprepared to Defend
    Medical Device Security: An Industry Under Attack and Unprepared to Defend Larry Ponemon, Chairman of Ponemon Institute & Mike Ahmadi, Director of Critical Systems Security of Synopsys Recorded: Jun 21 2017 49 mins
    A recent survey commissioned by Synopsys was designed to understand the risks to clinicians and patients due to insecure medical devices. The resulting report identified some expected findings, but others were extremely surprising. For instance, 67% of medical device manufacturers and 56% of healthcare delivery organizations believe an attack on a medical device built or in use by their organization is likely to occur over the next 12 months. Join Larry Ponemon of the Ponemon Institute and Mike Ahmadi of Synopsys as they discuss report highlights. They will also provide insight and predictions regarding the future of security in the medical device and healthcare industries.
  • Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale
    Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale Eric Tran-Le, Global Chief Marketing Officer, Logtrust Recorded: Jun 21 2017 60 mins
    With more than 4.5 million digital devices in the field, delivering billions of data streams for TV and Video On-Demand services, this Fortune Global 500 Telco needed to improve Quality of Experience (QoE) and Quality of Service (QoS) – in real-time. Because every second counts and time-to-insight matters, managing the volume, variety and velocity of data streaming in real-time, and analyzing against historical data needed to be effortless, seamless and lightning fast. Using Logtrust’s Big Data-in-Motion technology, Tran-Le will showcase how the Telco giant analyzes in real-time billions of data for 20 million customers each day, and has reduced call volume, improved QoE/S, and saved millions of dollars a year.

    Key Takeaways:

    • Understanding current IoT data management challenges
    • Overcoming the technology and data scalability wall
    • Analyzing past and present “events of interest” across millions of IoT devices
    • Making sense out of chaos for time-sensitive IoT/Big Data applications for rapid time-to-insight and value

    Eric Tran-le is the Global Chief Marketing Officer at Logtrust, a Big Data-in-Motion as-a-Service solution provider for fast data, big data analytics. He has more than 20+ years’ experience in both product management and operational system engineering for managing private and native cloud applications at scale. Tran-Le is leading real-time threat hunting, security and IoT analytics initiatives at Logtrust. Formerly, Tran-Le was VP Oracle Management Cloud Services, VP Enterprise Cloud Management, and VP Product Management at Oracle, as well as Network Business Unit Manager at Microsoft.
  • Compliance-as-a-Crisis: Managing Cloud Compliance
    Compliance-as-a-Crisis: Managing Cloud Compliance Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success, and Jeff Bennett, CEO of Allgress Jun 27 2017 6:00 pm UTC 60 mins
    The minimum investment to meet cloud compliance obligations is $200,000 per year, and the fees for not complying can start at $100,000. So while the investment is worthwhile, many companies are unable to achieve such standards due mainly to budget constraints and a lack of expertise.

    Join Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success at Allgress, and Jeff Bennett, CEO of Allgress for the webinar, Compliance as a Crisis: Managing Compliance in the Cloud. During the live event, they will discuss the following:

    •Public cloud (AWS and Azure) compliance considerations
    •Compliance standards and common industry trends
    •SecComp cloud best practices
    •Factors that contribute to a Compliance Crisis

    We’ll also demo a couple new solutions such as an industry-leading compliance dashboard and a (free) Compliance Posture Evaluation tool recently launched to provide you with actionable items for passing an audit.
  • Hybrid Hop for Containers - Results and deep dive from 451 Research Report
    Hybrid Hop for Containers - Results and deep dive from 451 Research Report Jay Lyman, 451 Research, and Rob Szumski, CoreOS Jun 27 2017 8:00 pm UTC 60 mins
    Join a webinar presented by 451 Research and CoreOS regarding a recent study and analysis of container software in the enterprise. Jay Lyman, principal analyst, 451 Research, will go over the main drivers and challenges of containers and container management and orchestration software as evidenced by the results of our survey of enterprise IT decision makers. He’ll show how Kubernetes is winning production use and growing as an enterprise priority over other options. We'll also discuss the prominent role of multi, hybrid clouds and how containers are helping enterprise organizations better serve developers and achieve speed and other advantages.
  • Getting Rid of Risky Business: How contextual info is securing cloud app access
    Getting Rid of Risky Business: How contextual info is securing cloud app access Ella Segura, Identity and Access Management Expert at Gemalto Jun 28 2017 3:00 pm UTC 60 mins
    Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.

    Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.

    During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.

    Join us for a deep dive into:
    -Current implications of multi-cloud environments on IAM
    -Proactively using analytics to define access policies
    -Avoiding security fatigue through scenario-based authentication
    -Preparing for audits using policy implementations
    -A live demonstration of how this all fits together in a multi-cloud environment
  • The Fastest Way to Redis on Pivotal Cloud Foundry
    The Fastest Way to Redis on Pivotal Cloud Foundry Greg Chase, Director of Products, Pivotal and Craig Olrich, Platform Architect, Pivotal Jun 28 2017 3:00 pm UTC 60 mins
    What do developers choose when they need a fast performing datastore with a flexible data model? Hands-down, they choose Redis.

    But, waiting for a Redis instance to be set up is not a favorite activity for many developers. This is why on-demand services for Redis have become popular. Developers can start building their applications with Redis right away. There is no fiddling around with installing, configuring, and operating the service.

    Redis for Pivotal Cloud Foundry offers dedicated and pre-provisioned service plans for Cloud Foundry developers that work in any cloud. These plans are tailored for typical patterns such as application caching and providing an in-memory datastore. These cover the most common requirements for developers creating net new applications or who are replatforming existing Redis applications.

    We'd like to invite you to a webinar discussing different ways to use Redis in cloud-native applications. We'll cover:
    - Use cases and requirements for developers
    - Alternative ways to access and manage Redis in the cloud
    - Features and roadmap of Redis for Pivotal Cloud Foundry
    - Quick demo
  • Biometrics and Strong Authentication Create Opportunities for Financial Services
    Biometrics and Strong Authentication Create Opportunities for Financial Services Jean-Noël Georges, Christopher Schenking, Gemalto and Yves Chemla, United Biometrics Jun 28 2017 3:00 pm UTC 60 mins
    Digital transformation is already impacting financial services, and future banking will evolve to leverage technology in ways that will have a much deeper implication to customer service than current use cases. As a result, numerous interactions between customers and digital banking will be done by using mobile devices and cloud-based platforms. Furthermore, security will be key to creating confidence in the value chain. Financial service providers are investing in bringing services to customers on personal devices, increasing the need for software/hardware security solutions for authentication of transactions. Biometrics can be leveraged for strong authentication and to comply with regional regulations.
  • Under the Hood of Vertica & Dataiku: Faster Insights from Machine Learning
    Under the Hood of Vertica & Dataiku: Faster Insights from Machine Learning Thomas Cabrol, CTO, Dataiku and Waqas Dhillon, CTO, HPE Vertica Jun 28 2017 4:00 pm UTC 60 mins
    Designing and deploying an effective predictive analytics model that is integrated into a company’s daily business operations can be very challenging. Data scientists often use complex machine learning models to exploit large volumes of data from multiple environments and technologies to deliver analytics that the business needs.

    Join us on this webcast as we walk you through the data science journey applied to a real case and learn how you can automate the entire data science workflow.

    See how the integration of Dataiku, the collaborative data science platform, and Vertica, the ultra-fast analytics database platform with built-in machine learning, can help you speed the deployment of data-intensive predictive analytics.

    Learn how to:
    • Design connections to existing data sources with Dataiku
    • Understand your datasets with built-in charting capabilities and data pre-aggregation
    • Reduce the time it takes for the data preparation phase
    • Leverage the scalability and speed of Vertica
  • Risk-Based Testing 101
    Risk-Based Testing 101 Robert Poole Jun 28 2017 5:00 pm UTC 60 mins
    How do you decide what’s most important to test in your development projects? Risk-based testing provides a straightforward way to decide how and what to prioritize in your tests. In this informative session, Experis introduces you to the concepts of Risk-Based Testing, leaving you with methods and tools to improve your testing processes.
    In this training we answer these questions while teaching participants how to measure and rank risks, using a simple yet comprehensive method:
    •What is Risk-Based Testing?
    •What forms does it take?
    •When should it be used?
    •What are the key elements of risk?
    Who should attend:
    •QA practitioners interested in efficient testing
    •Business analysts who create requirements
    •Technical architects and developers who design and implement solutions to requirements
    •Project managers interested in effective development and test methods
  • Docker Containers: From Pilots to Production
    Docker Containers: From Pilots to Production Jay Lyman Principal Analyst in the Development, DevOps at 451 Research, Rob Lalonde VP and General Manager at Univa Navops Jun 28 2017 6:00 pm UTC 60 mins
    Ensuring you’re prepared for the next series of challenges

    Docker Containers and Kubernetes are taking the industry by storm, promising new levels of efficiency for both application developers and operations teams. Even organizations not engaged in a wholesale re-architecture of their application environments can benefit from desirable properties of containers like packaging, portability and service isolation.

    While the benefits are real, many organizations face choppy waters as they evolve from initial public or private cloud deployments to production. While Kubernetes is impressive at abstracting resources and managing containers, new services still need to interact with existing applications, and challenges abound related to multi-tenancy, resource scarcity and ensuring that business priorities are met.

    Join us for an informative and insightful look at containers in the enterprise, and learn about new technologies and strategies that can help ensure a smooth and trouble free evolution as you chart your course from pilot to production. Whether you’re advanced in your use of containers or just getting started, there are important insights to be gained.

    Key takeaways
    •451 Group’s latest research and analysis
    •The “state of containers” and their adoption in IT
    •Benefit from case studies and lessons learned by early adopters
    •Considerations when deploying applications to production
    •Techniques to maximize utilization and optimize expenditures
    •Strategies for supporting mixed container and non-container workloads
  • Demo: Introduction to CoreOS Tectonic and Quay Enterprise
    Demo: Introduction to CoreOS Tectonic and Quay Enterprise Grant Liu, Solutions Engineer Jun 28 2017 6:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.

    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches)
    Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto Jun 29 2017 12:00 am UTC 60 mins
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • ICBC automate its Core banking applications deployment with HPE Software
    ICBC automate its Core banking applications deployment with HPE Software Salih Onur Tezel, Head of IT Core Banking, ICBC, Riccardo Sanna HPE Software Jun 29 2017 9:00 am UTC 45 mins
    Discover the evolution of the software delivery chain at ICBC. Hear how ICBC automates its core banking application deployment from demand management to operational rollout, using HPE Software solutions. Moving toward risk control architecture to improve compliance with local regulation, software security, and quality.

    Join this webinar to learn how!
  • Future Proof Docker and Microservices with Modern Monitoring
    Future Proof Docker and Microservices with Modern Monitoring Presenter: Chris Kline, VP DevOps Strategy Jun 29 2017 3:00 pm UTC 60 mins
    Containerized applications and microservices challenge existing monitoring tools and processes. The ephemeral nature of containers presents massive tracking issues and the massive increase in objects, service and metrics makes traditional alerting obsolete.

    In this webcast, you will learn:
    • The benefits of using an agentless application monitoring approach in Docker environments
    • How an open data model is key to understanding and tracking microservice relationships and dependencies
    • The importance of analytics-driven monitoring to help detect anomalies, predict problems and prevent alert storms
  • The CIO's Guide to Digital Transformation Strategy
    The CIO's Guide to Digital Transformation Strategy Davinder Gautam, Managing Director, Accenture; Ross Mason, Founder and VP Product Strategy, MuleSoft Jun 29 2017 3:00 pm UTC 60 mins
    Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.

    Attendees will learn:

    - What are the obstacles getting in the way of achieving digital transformation?
    - Strategies to end the misalignment of business and IT on digital initiatives
    - A roadmap to closing the IT delivery gap
  • Learn Key Insights from the State of Web Application Testing Research Report
    Learn Key Insights from the State of Web Application Testing Research Report Diane Hagglund, Senior Research Analyst, Dimensional Research, Jon Jarboe and Kristin Brennan from Sencha Jun 29 2017 5:00 pm UTC 60 mins
    In a recent study by Dimensional Research of 1,011 development and QA professionals, almost every survey respondent cited that application quality is important, with 84% believing it is very or critically important. Despite this, findings revealed that 94% of teams still face challenges when it comes to conducting adequate QA.

    Join us to learn why organizations must prioritize automated testing and QA practices to deliver high-quality applications and increase customer satisfaction.

    What You’ll Learn:

    - The latest trends, challenges, and technologies in web application testing
    - What’s holding companies back from delivering higher quality applications
    - The frequency and impact of web application issues – 98% say quality issues have direct business impact
    - Investment strategies for delivering higher quality applications – 73% plan to increase their investment in testing within the coming year
  • The Value of Kubernetes at Production Scale
    The Value of Kubernetes at Production Scale Jordan Cooks, Solutions Engineer Jun 29 2017 5:00 pm UTC 60 mins
    Kubernetes is seeing rapid adoption and innovation, but how do real customers quantify the value Kubernetes provides in production? This webinar requires no familiarity with Kubernetes, and underlines the value our customers have realized by adopting Kubernetes, including increases in infrastructure ROI and a reduction in required administrative overhead.

    Jordan Cooks, Solutions Engineer at CoreOS, leads this webinar highlighting the benefits and flexibility Kubernetes provides enterprises of all sizes. He will discuss the automation, enhanced security, and enterprise features available through Tectonic.
  • Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics
    Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics Orion Cassetto, Sr. Product Marketing Manager, Exabeam. Anne Saita (Moderator) Jun 29 2017 5:00 pm UTC 75 mins
    Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
  • Caching for Microservices Architectures: Session II - Caching Patterns
    Caching for Microservices Architectures: Session II - Caching Patterns Jagdish Mirani, Product Marketing Manager, Pivotal Jun 29 2017 6:00 pm UTC 60 mins
    In the first webinar of the series we covered the importance of caching in microservice-based application architectures—in addition to improving performance it also aids in making content available from legacy systems, promotes loose coupling and team autonomy, and provides air gaps that can limit failures from cascading through a system.

    To reap these benefits, though, the right caching patterns must be employed. In this webinar, we will examine various caching patterns and shed light on how they deliver the capabilities needed by our microservices. What about rapidly changing data, and concurrent updates to data? What impact do these and other factors have to various use cases and patterns?

    Understanding data access patterns, covered in this webinar, will help you make the right decisions for each use case. Beyond the simplest of use cases, caching can be tricky business—join us for this webinar to see how best to use them.
  • Continuous Security on AWS
    Continuous Security on AWS Chuck Dudley, Vice President of Services at Stelligent, a division of HOSTING Jun 29 2017 6:00 pm UTC 60 mins
    If you are planning on deploying resources onto AWS, or if you have already started on the journey and are looking for opportunities to improve the security of your DevOps environments on AWS, then this webinar is for you.

    Learn how to infuse security validation in your development and deployment processes for continuous security on AWS. Hear from Chuck Dudley, Vice President of Services at Stelligent on leveraging the same process and objective criteria used successfully with their customers and get a DevOps best practices security demo with opportunities to ask questions.

    Who should attend? Security professionals, DevOps engineers, application developers, solutions architects, engineering managers, and IT managers who are familiar with their organization's AWS environments and security needs.
  • CA ARD : efficacité et optimisation des tests grâce au "Model-Based-Testing"
    CA ARD : efficacité et optimisation des tests grâce au "Model-Based-Testing" Reza Khodabaccus Jun 30 2017 9:00 am UTC 60 mins
    A l’heure où les initiatives IT doivent être étroitement alignées aux métiers de l’entreprise, la capacité à communiquer les besoins métier dans un mode qui soit directement compréhensible par l’IT devient un impératif.
    CA ARD utilise l’approche "Model Based Testing" pour éliminer toute ambiguïté dans les exigences, améliorant la collaboration entre les équipes et optimisant les cycles des tests. La couverture de tests se trouve ainsi maximisée et les applications de meilleure qualité car testées plus rapidement, plus complètement et plus efficacement.
  • Catalyst Accelerator for Banking: How to Get Started with Open Banking and PSD2
    Catalyst Accelerator for Banking: How to Get Started with Open Banking and PSD2 David Chao, Head of Industry Solutions, MuleSoft Jul 6 2017 3:00 pm UTC 60 mins
    The mandate for digital transformation in financial services is clear. The question that IT leaders must answer is not "if", but "how?"

    In particular, how should financial services organizations respond to the competitive threat, and opportunity, that Open Banking and PSD2 presents? How should IT leaders think about internal vs external API strategies? How should they think about security, regulation, and even compliance? And how should they think about re-use to drive greater agility and increase time to market?

    Drawing on its work with 5 of the top 10 global banks, MuleSoft has developed Catalyst Accelerator for Banking, a set of API designs and supporting reference implementations, that codify integration best practices with a focus on account information, payments initiation and legacy modernization use cases.

    Join this webinar to:

    - See a demo of the Catalyst Accelerator solution in action, powering web and mobile channels
    - Understand how an API-led connectivity approach can increase speed and agility by driving re-use of API assets
    - Learn how Anypoint Platform supports the design, development and management of APIs through a single, unified platform
  • How Quants are Winning the Battle for Alpha using AI and Smarter Infrastructure
    How Quants are Winning the Battle for Alpha using AI and Smarter Infrastructure Terry Roche from Tabb Group and Keith McAuliffe from Solace Jul 11 2017 2:00 pm UTC 60 mins
    Data-driven quant strategies have been around for a while now, but recently we’ve seen a boom in the use of next-generation AI technologies and innovative new feeds to capture alpha. Firms are re-imagining how they think about data, their workflow and value proposition. Quants applying the latest machine learning techniques fed by cloud-based and internal data sources are transforming the make up of today's financial services value propositions.

    In this webinar Terry Roche from Tabb Group and Keith McAuliffe from Solace will discuss the new technologies that are enabling these quant-based instruments, algos and funds, and explain how technology choices can smooth your path to a fast, flexible infrastructure to execute on quant strategies.
  • Turning the Table on Hackers and Breaches
    Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Jul 11 2017 3:00 pm UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • Catalyst Accelerator for Retail: Improving API-led Retail Experiences
    Catalyst Accelerator for Retail: Improving API-led Retail Experiences Allegra Margolis, Industry Marketing Manager; Brett Roeder, Principal Client Architect; Anton Kravchenko, Product Manager Jul 11 2017 3:00 pm UTC 60 mins
    The mandate for digital transformation in retail is clear. The question that IT leaders must answer, is not "if", but "how?"

    In particular, how should Retail organizations deliver a consistent and compelling customer experience across multiple channels? How should they think about internal vs external APIs? How should they think about security for retail APIs? And how should they think about re-use to drive greater agility, increase time to market and support an omnichannel retail experience?

    Drawing on its work with 2 of the top 5 global retailers, MuleSoft has developed Catalyst Accelerator for Retail, a set of API designs and supporting reference implementations, that codify integration best practices.

    Join this webinar to:

    - See a demo of the Catalyst Accelerator solution in action, powering web and mobile channels
    - Understand how an API-led connectivity approach can increase speed and agility by driving re-use of API assets
    - Learn how Anypoint Platform supports the design, development and management of APIs through a single, unified platform