Hi [[ session.user.profile.firstName ]]

Application Development

  • UML® (Unified Modeling Language™) and SysML® (Systems Modeling Language™)
    UML® (Unified Modeling Language™) and SysML® (Systems Modeling Language™)
    Ed Seidewitz, CTO, Model Driven Solutions, co-chair of OMG fUML, Alf and PSCS RTFs, and Model Interchange SIG Recorded: Nov 16 2018 52 mins
    This presentation will provide an overview of both UML (Unified Modeling Language) and SysML (Systems Modeling Language) and demonstrate how they are successfully applied in practice. You will also learn about the exciting work going on as these standards continue to evolve, including the expanding suite of standards defining precise, executable semantics for UML and SysML and the broad industry effort ongoing to develop SysML v2. Presentation recorded in Ottawa, Canada September 2018.
  • Driving Digital Transformation Through 2019 and Beyond
    Driving Digital Transformation Through 2019 and Beyond
    Forrester Research and Comcast Business Recorded: Nov 15 2018 56 mins
    Join us on November 15th at 2 p.m. ET for “Driving Digital Transformation Through 2019 and Beyond,” a webinar from Forrester Research and Comcast Business, where our expert panelists will explore the key considerations for successful advanced data network technology adoption and long-term strategy.

    We’ll discuss:
    •Why Digital Transformation is not a “one-and-done” concept.
    •The changing narrative around Digital Transformation, as we shift from adding digital features (1.0), to having digital become a core part of an ongoing enterprise strategy (2.0).
    •The ways in which the continuous transformation and evolution of a company’s digital initiatives requires a complete re-think of your business’ go-to-market, including how you interact with your customers, how you drive operational excellence, how you approach innovation, and the technologies you use as the foundation.
    •Why companies using advanced data networks to embrace Digital Transformation 2.0 experience proven gains in customer satisfaction, revenue, and employee productivity.
    •The technologies you can put to work on your own Digital Transformation journey.

    Our panelists include”
    •Andre Kindness, principal analyst at Forrester Research, serves IT Infrastructure & Operations Professionals. He is a leading expert on enterprise network operations and architecture. His research focuses on networking technology and strategy—such as software defined networking and network function virtualization—for private cloud, remote locations, and hybrid cloud.
    •Allan Langfield, executive director, product management at Comcast Business, is responsible for Product Management, Development and Deployment of the Comcast NFV platform, ActiveCore. Allan’s group is focused on delivering a customer-oriented Digital Experience, enabling and integrating services including SD-WAN.
  • Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata, Recorded: Nov 15 2018 60 mins
    Ready to learn how to manage persistent storage for containers in the multi-cloud environment?

    Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.

    In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.


    Presenters:
    Anubhav Sharma, VP, Business Development, Nirmata
    Michael Ferranti, VP, Marketing, Portworx,
  • RESTful API Testing using Postman, Newman, and Jenkins
    RESTful API Testing using Postman, Newman, and Jenkins
    Elise Carmichael, VP of Product, QASymphony Recorded: Nov 15 2018 53 mins
    If you’re going to automate one kind of tests at your company, API testing is the perfect place to start. It’s fast and simple to write as well as fast to execute. If your company writes an API for its software, then you understand the need and importance of testing it. In this webinar, we’ll do a live demonstration of how you can use free tools, such as Postman, Newman, and Jenkins, to enhance your software quality and security.

    Elise Carmichael covers:

    - Why your API tests should be included with your CI
    - Real examples using Postman, Newman and Jenkins + Newman
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, CA Vercode Recorded: Nov 15 2018 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this REPLAY session, you'll have the opportunity to view CA Veracode CTO Chris Wysopal talk about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them.

    *This webinar session was previously recorded.*
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS Recorded: Nov 15 2018 59 mins
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    • Learn why automatic mitigation is crucial to keeping your business up and running
    • Understand the power and importance of the Incapsula 10-second DDoS SLA
    • Participate in a live Q&A with DDoS experts
  • Using advanced analytics to help farmers optimize resources and maximize yield
    Using advanced analytics to help farmers optimize resources and maximize yield
    Erich Hochmuth, Big Data Architect, The Climate Corporation and Ben Smith, Senior Product Marketing Manager, Vertica Recorded: Nov 15 2018 54 mins
    The Climate Corporation aims to help the world's farmers sustainably increase their productivity with digital tools. The integrated Climate FieldView™ digital agriculture platform provides farmers with one comprehensive, connected suite of digital tools to help them optimize resources and maximize yield. Building the digital tools to support this mission requires processing and analyzing petabytes of diverse datasets. Everything from satellite imagery and weather data, to sensor data from on-farm equipment and clickstream data must be ingested and made available for analytics.

    Join us on the latest Data Disruptors webcast featuring Erich Hochmuth, Big Data Architect at The Climate Corporation, to hear how Climate’s fit for purpose, best in class analytics platform FieldView™ brings together Vertica, Spark, Kettle, Looker, and other tools in a cloud deployment on AWS that democratizes access to data and enables a data driven culture. Learn about Vertica’s role in this ecosystem and how the advanced analytics platform has enabled Climate to achieve:
    • 100% automation
    • Minimal maintenance overhead
    • A highly available redundant deployment in the cloud
  • IDC FutureScape: Worldwide Security Products & Services 2019 Predictions
    IDC FutureScape: Worldwide Security Products & Services 2019 Predictions
    Sean Pike, Program Vice President, Security Products Recorded: Nov 15 2018 52 mins
    In this IDC FutureScape presentation, IDC's Sean Pike will lead a team discussion of the key predictions that will impact enterprise security purchase decisions over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Delivering Quality Digital Experiences with Intelligent Automation
    Delivering Quality Digital Experiences with Intelligent Automation
    Dr. Gareth Smith, VP Products Recorded: Nov 15 2018 56 mins
    In the new world of mobile apps, cloud services and the Internet of Things, people, processes, data and devices are all converging to reshape how day-to-day business is done. This widens the customer’s experience beyond a single, siloed, application into a much broader context, where not everything is under your control. In this presentation, Dr. Gareth Smith will outline the challenges of delivering quality digital experiences, the benefits of employing predictive analytics and an approach for achieving amazing digital experiences by focusing on the customer experience and the goals of the business.
  • Event-driven Business: How Leading Companies Are Adopting Streaming Strategies
    Event-driven Business: How Leading Companies Are Adopting Streaming Strategies
    John Santaferraro, Research Director, EMA + Lyndon Hedderly, Director of Customer Solutions, Confluent Recorded: Nov 15 2018 61 mins
    With the evolution of data-driven strategies, event-based business models are influential in innovative organizations. These new business models are built around the availability of real-time information on customers, payments and supply chains. As businesses look to expand traditional revenues, sourcing events from enterprise applications, mobile apps, IoT devices and social media in real time becomes essential to staying ahead of the competition.

    Join John Santaferraro, Research Director at leading IT analyst firm Enterprise Management Associates (EMA), and Lyndon Hedderly, Director of Customer Solutions at Confluent, to learn how business and technology leaders are adopting streaming strategies and how the world of streaming data implementations have changed for the better.

    You will also learn how organizations are:
    -Adopting streaming as a strategic decision
    -Using streaming data for a competitive advantage
    -Using real-time processing for their applications
    -Evolving roadblocks for streaming data
    -Creating business value with a streaming platform
  • Learn Key Announcements from Catalyst 18
    Learn Key Announcements from Catalyst 18
    Bizagi Recorded: Nov 15 2018 36 mins
    At Catalyst 18, our annual international conference in Miami, Bizagi made some key announcements about the future of its products and services.

    This is your chance to learn more about those announcements with the Bizagi team and exclusive news shared at the event.

    Watch now to hear from our panel speakers where we will take the opportunity to give you highlights on:

    - Key updates on recent launches and upcoming product releases
    - Highlights and insights from presentations at Catalyst 18
    - Technology showcase, review what’s new and cool at the event
  • Graph-Based Customer Journey Analytics with Neo4j
    Graph-Based Customer Journey Analytics with Neo4j
    Jesús Barrasa, Neo4j Recorded: Nov 15 2018 37 mins
    Today's customers use a combination of channels to interact with a business. Customer Journey Analytics (CJA) is the process of tracking and analyzing every touchpoint that a customer interacts with, across multiple channels and over time. This requires connecting events from multiple sources into customer-centric journeys. Both "connected data points" and "journey analysis" immediately suggest graphs but if we add the need for timeliness (even real-time) and actionable insights there is no doubt about the right technical solution. Find out how to use Neo4j to understand, visualise and influence your customers' journeys, whether that's in the form of recommendations, cause analysis or personalisation to name just a few.

    In this webinar, Jesús will briefly introduce Graph Databases and then show how can they crucially enhance CJA initiatives with a Telco based example.
  • Nordstrom SVP on Designing With Personal Touch
    Nordstrom SVP on Designing With Personal Touch
    Brian Gill, SVP Technology, Nordstrom Recorded: Nov 15 2018 58 mins
    Customer interactions with technology are more connected to the human touch than ever before. With the increasing use of wearables and gesture commands, how can you effectively use technology to provide customers with a personalized experience? Join Nordstrom SVP Brian Gill for a discussion on the importance of customer experience. Brian will share his experience in applying a personal touch to technology strategy in order to connect with more customers.

    About The Speaker: Brian Gill is the SVP of Technology at Nordstrom, focused on strategic planning and digital platform development. In addition, Brian’s team manages store technology and operational excellence initiatives. With more than 20 years of experience, Brian also served as Chief Technology Officer at Hotwire, Inc., an operating company of Expedia, Inc. In this role, Brian managed Hotwire’s platform technologies and the company’s data science team.
  • Secure DevOps: Fact or Fiction?
    Secure DevOps: Fact or Fiction?
    SANS Jim Bird and Barb Filkins and Rani Osnat, Aqua Security Recorded: Nov 14 2018 62 mins
    A new survey of SANS practitioners has examined how security and risk management leaders will manage the collaborative, agile nature of DevOps to be seamless and transparent in the development process.

    In this webcast, Part 1 on the topic, SANS Analyst Authors Jim Bird and Barb Filkins will reveal how practitioners are handling evolving DevOps requirements and challenges, and how they're integrating security into the process.
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Mike Cooper, Sr. Security Engineer Recorded: Nov 14 2018 24 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • New Research Reveals Key Strategy to Manage Open Source Security
    New Research Reveals Key Strategy to Manage Open Source Security
    Scott Crawford, Research Director at Information Security & Rami Elron, Senior Director of Product Management at WhiteSource Recorded: Nov 14 2018 55 mins
    According to the latest open source security research report, "The State of Vulnerabilities Management in 2018", almost 97% of developers rely upon open source components in order to develop their applications nowadays. But with the recent spike in disclosed open source vulnerabilities, the question arises whether security and development teams have the right strategy in place in order to meet their security objectives?

    Join Scott Crawford, Research Director at Information Security, and Rami Elron, Senior Director of Product Management at WhiteSource, as they discuss:

    -the current state of Open Source Security;
    -the challenges faced by security and development teams when handling open source vulnerabilities; and
    -how Open Source Security strategies need to be stepped up with the latest next-gen technology for management and prioritization
  • How to Use Containers to Simplify Speedy Deployment of Database Workloads
    How to Use Containers to Simplify Speedy Deployment of Database Workloads
    Stephen O'Grady, RedMonk, Cornelia Davis & Ivan Novick, Pivotal Recorded: Nov 14 2018 59 mins
    Containers have been widely adopted to make development and testing faster, and are now used at enterprise scale for stateless applications in production. Database infrastructure has not seen quite the same gains in terms of velocity over that same period, however.

    Can containers be as transformative for databases as they have been for application development? If container technology can be leveraged for running database workloads, what impact does this have on architects and operations teams that are responsible for running databases?

    We’ll discuss the trends—from virtualization to cloud to containerization—and the intersection of these platform trends with the data-driven world.
  • IDC FutureScape: Worldwide Cloud 2019 Predictions
    IDC FutureScape: Worldwide Cloud 2019 Predictions
    Frank Della Rosa, Al Gillen, and Deepak Mohan of IDC's Cloud Services Team Recorded: Nov 14 2018 60 mins
    In this IDC FutureScape presentation, IDC's Frank Della Rosa, Al Gillen, and Deepak Mohan will discuss some of the key predictions that will impact the global market for cloud services over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Challenges and Myths of Enterprise Blockchain
    Challenges and Myths of Enterprise Blockchain
    Rao Cherukuri, CTO and James Penney, Director, Product Management Recorded: Nov 14 2018 48 mins
    This webinar will explore:
    •Reality checks of Private Blockchain implementations
    •IAM a key security and foundation layer in Enterprise Blockchain implementations
    •Options to protect private keys and crypto keys
    •Ensuring data security and privacy between participating entities

    With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology.

    Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys.

    Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes.

    Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation.

    Who should attend?
    •Blockchain as a Service Providers
    •Systems Integrators with Blockchain Practices
    •Private Blockchain Platform Providers
    •Healthcare Blockchain Providers
    •IoT Blockchain Providers
  • Trust and responsibility throughout your software distribution chain
    Trust and responsibility throughout your software distribution chain
    Juan Asenjo, Senior Manager for Solutions Marketing, Thales eSecurity & Tomas Gustavsson CTO, PrimeKey Recorded: Nov 14 2018 56 mins
    Harmful code is today a real threat to users and organizations alike. Criminal groups and even governments increasingly use malicious software to steal, manipulate, and monitor data, to export money, or empty bank accounts. An efficient way to prevent this, to protect your intellectual property, and brand equity is through code signing. That is why the solution today has the attention of the business owner and developer community worldwide. However, code signing requires not only signing keys to be robust, but also to be stored securely. With the use of a hardware security module (HSM), you can manage the risk of having critical code signing keys stolen and your security compromised. In this webinar, PrimeKey a leading provider of PKI and signing solutions, together with Thales eSecurity, a leader in HSM technology, will take you through the world of safe code through proper code signing.

    Join this webinar to learn how to:

    • Achieve trusted and secure software distribution using PKI and HSMs
    • Take advantages of server-side signing with central key management
    • Support multiple code signing needs, drivers, firmware, and formats
    (Microsoft, JAR, P#1, P#7, CMS etc.), in one single installation
    • Integrate with existing build and distribution processes for automation
    • Deploy best practices for code signing solutions and improve security
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Recorded: Nov 14 2018 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • RI Purchasing Strategies for AWS
    RI Purchasing Strategies for AWS
    Garrett Reynolds, Head of Customer Success Recorded: Nov 13 2018 31 mins
    In this webinar you will learn how to use a big data analytics engine with machine learning to make intelligent decisions on purchasing reserved instances on AWS. Register for this webinar to get insights on:

    • How to make data-driven decisions on the amount of RI's to purchase
    • Understanding the optimal frequency of RI purchases
    • How to reduce the overall cost of your AWS infrastructure
  • How to turn customer experience into customer trust
    How to turn customer experience into customer trust
    Louise Thorpe, Chief Privacy Officer, American Express Recorded: Nov 13 2018 62 mins
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    Speakers:
    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Ting Ting Luo, Senior Product Marketing Manager, Docusign
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • Ecommerce, ML and Recommendation Engines: Why The Database Matters
    Ecommerce, ML and Recommendation Engines: Why The Database Matters
    Sucharita Kodali, Vice President & Principal Analyst, Forrester and Bharath Yadla, VP Product Strategy, Aerospike Recorded: Nov 13 2018 60 mins
    Online shoppers expect the right product at the right price at the right time. While this is a simple concept, the applications supporting these goals are extremely complex. An online retailer’s inventory, pricing and marketing management system must deliver real-time updates and associated recalculations within milliseconds in order to serve millions of dynamically-generated pages per second.

    The problem is exacerbated as an e-commerce business scales. Most databases cannot handle the inventory updates, price adjustments and personalized recommendations in real-time as early successes deliver a significant increase in demand. This degrades the customer experience just as word of mouth starts to take hold.

    In this webinar, Matt Bushell, Director of Product Marketing - Aerospike, and guest speaker, Sucharita Kodali, Vice President and Principal Analyst - Forrester Research, will cover:
    > The latest technology trends affecting the Retail/Ecommerce space
    > Where and how Machine Learning can be deployed
    > How one larger retailer is managing its dynamic growth and needs with a real-time database
  • The Life of a Female Founder
    The Life of a Female Founder
    Hui Wang - Founder, Koala - www.koalago.co Recorded: Nov 13 2018 43 mins
    Hui Wang is the founder of Koala, an early stage travel tech start-up that connects people by curating small group tours.

    Koala encourages people to travel more by designing experiences which suit their interests - and furthermore, enables like-minded individuals to share the experience together.

    Hui will be sharing her experience as a female founder of an early-stage start-up. People say life is stranger than fiction, and that much is true!
  • How To Take Your DDoS Protection To The Next Level
    How To Take Your DDoS Protection To The Next Level
    Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at Cloudflare Nov 19 2018 2:00 pm UTC 45 mins
    As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.

    Join this webinar to learn about:

    - How small DDoS attacks can still bring your site down
    - A little known way attackers can bypass traditional DDoS protections
    - Why TCP services may make you vulnerable to a DDoS attack
    - Pros and cons of multiple solutions: BGP, MPLS, and building your own
    - How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • Wofür können Sie Kubernetes einsetzen?
    Wofür können Sie Kubernetes einsetzen?
    Naomi Albuquerque Nov 20 2018 11:00 am UTC 60 mins
    Sie benötigen schnell umfassende und aktuelle Informationen über die Kubernetes Plattform? Dieses Webinar liefert Ihnen alle wichtigen Informationen und zeigt Ihnen den Einstieg in die Kubernetes-Distribution von Canonical.

    Nutzen Sie dieses Webinar, um ...
    > zu erfahren, wie Unternehmen Geld und Zeit mit Kubernetes sparen
    > zu lernen, wie Sie erfolgreich einsteigen, von der Implementierung bis zu ersten Workloads
    > Initiale Konfiguration, Installation und Validierung
  • Evolution of integration and microservices patterns with Istio service mesh
    Evolution of integration and microservices patterns with Istio service mesh
    Christian Posta, Chief Architect, Red Hat Nov 20 2018 4:00 pm UTC 60 mins
    As we build distributed systems on cloud platforms (like Kubernetes, or public clouds), we must understand where the responsibility of the developer teams lies with respect to the platform. The platform provides some useful abstractions to make us more productive, but the correctness and safety of our applications and business requirements is still the responsibility of the developer and development teams. Tools like Istio, and service mesh in general, solve for some difficult problems like observability, security, and resilience and are highly encouraged for cloud-native application deployments. In this talk, we'll take a look at how Istio can help build resilient distributed-systems applications, but we'll also be very specific about Istio's boundaries and where application frameworks built for integrating systems like Apache Camel fit into the picture. One does not remove the need for the other.
  • IDC FutureScape: Worldwide Robotics 2019 Predictions
    IDC FutureScape: Worldwide Robotics 2019 Predictions
    Jing Bing Zhang, Research Director, IDC Manufacturing Insights and John Santagate, Research Director, Service Robotics Nov 20 2018 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Robotics team discusses the key predictions that will impact CIOs and IT professionals in the worldwide robotics industry over the next three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas Baumgart Nov 20 2018 4:00 pm UTC 60 mins
    The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communicate with various healthcare IT systems. Frost & Sullivan estimates that there were 4.5 billion IoMT devices in 2015, a number that they expect to increase to between 20 and 30 billion by 2020.

    As the IoMT device landscape heats up and hospitals delve more into remote care, healthcare systems need to protect each and every IoT device from potential cybersecurity risks. To do this, medical device manufacturers should integrate the power of automation into a rock-solid digital technology foundation, making it easier to stay on top of the security needed to protect both the device and the patient, while also adhering to regulatory compliance.

    Hear from Device Authority, SyroCon and PTC on a real customer use case which encourages building secure connected IoT medical devices. Learn about potential benefits, best practices and key challenges, and how they can be solved with out of the box solutions and integrations between PTC, SyroCon and Device Authority.
  • Proactive Security: Revamp Your Security Strategy with Containers
    Proactive Security: Revamp Your Security Strategy with Containers
    Sonya Koptyev, Director of Evangelism and Keith Mokris, Product Marketing Lead Nov 20 2018 6:00 pm UTC 60 mins
    If you ask DevOps engineers about the benefits of containers and microservices, their responses will center on the agility, modularity, and scalability that microservices-based architectures provide.
    Security is a crucial and often overlooked advantage of migrating to containers and microservices.

    Containers allow enterprise to secure applications and environments at a more granular and nuanced level. They also empower enterprises to identify and resolve potential security threats before they disrupt workflows, rather than having to adopt a defensive stance oriented around addressing attacks once they are fully underway.

    Watch this webinar to learn:

    •Challenges with traditional security strategies

    •What a proactive approach to security for a microservices-based environment looks like

    •How your organization can adopt a proactive security stance when it makes the migration to containers.
  • Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Jacquie Touma, Chaitra Vedullapalli, Terri Stephan Nov 20 2018 8:00 pm UTC 60 mins
    We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.

    The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.

    Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!

    In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.

    Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
  • The State of Open Source Vulnerabilities Management
    The State of Open Source Vulnerabilities Management
    Rami Elron, Senior Director of Product Management at WhiteSource Nov 21 2018 1:00 pm UTC 60 mins
    The number of open source vulnerabilities hit an all-time record in 2017 with 3,500 reported vulnerabilities - that's 60% higher than the previous year, and the trend continues in 2018.

    Since it’s impossible to keep up with today’s pace of software production without open source, development and security teams are challenged to meet security objectives, without compromising on speed and quality.

    It's time for organizations to step up their open source security game. Join WhiteSource's Senior Director of Product Management, Rami Elron, as he discusses:

    - the current state of open source vulnerabilities management;
    - organizations' struggle to handle open source vulnerabilities; and
    - the key strategy for effective vulnerability management.
  • DNS for a DevOps Future
    DNS for a DevOps Future
    Jonathan Lewis, VP of Product Marketing Nov 21 2018 5:00 pm UTC 30 mins
    Advancements in DNS (Domain Name Systems), including the ability to communicate via APIs and the power to couple real-time telemetry with automation capabilities, give this often overlooked but foundational component of the application delivery stack a critical role in a DevOps-driven world.

    Leading-edge enterprises have stopped viewing DNS as just a "phone book" and are now leveraging next-generation DNS to better manage their infrastructure, improve application performance and lower costs.

    In this webinar we'll focus on 3 case study examples of next-generation DNS in action:

    - How a gaming company integrated and automated multiple CDNs to cut content delivery costs in half
    - How an ad delivery platform delivers impressions 70% faster using a multi-cloud strategy managed by DNS
    - How a security SaaS organization used DNS to improve performance and reduce help desk calls
  • Stop Configuring Varnish and Start Coding (APAC)
    Stop Configuring Varnish and Start Coding (APAC)
    Remy Guercio, Product Marketing, Cloudflare Nov 22 2018 1:00 am UTC 23 mins
    In this webinar, we'll discuss how to swap out wrestling Varnish Configuration Language (VCL) with writing modern JavaScript. Using JavaScript will not only make it easier to configure traditional caching behavior but also open up new possibilities for moving additional functionality away from the origin.

    As part of this, we'll briefly cover:
    - How to perform custom routing
    - Creating custom authorization
    - Building an API Gateway
  • Web Performance Matters: Challenges, Solutions, Best Practices
    Web Performance Matters: Challenges, Solutions, Best Practices
    Anand Guruprasad, Solutions Engineer, Cloudflare | Nithyanand Mehta, Director of Technical Services, Catchpoint Nov 22 2018 6:00 am UTC 45 mins
    At Cloudflare, we not only protect 12 million domains against DDoS attacks with our global network but also accelerate their performance. Our 150+ data centers all over the world puts us in a key position to serve content from the edge to the end users, blazingly fast.

    Join this webinar to learn about:

    • How performance affects your revenue
    • What is the right metric to measure and how
    • Challenges in achieving an optimal performance on your web assets
    • How to improve your website’s performance and user-experience
    • Learn from industry experts on best practices for improving web performance
  • ¿Estás cometiendo algunos de los 6 errores más comunes en AppSec?
    ¿Estás cometiendo algunos de los 6 errores más comunes en AppSec?
    Antonio Reche, Senior Solutions Architect at CA Veracode Nov 22 2018 10:00 am UTC 45 mins
    Más del 70% del profesionales senior de TI reconocen que el software y los problemas de seguridad relacionados con el código son una preocupación creciente.

    Hay errores comunes que las empresas cometen con sus programas AppSec. ¿Has cometido alguno de ellos? ¿Sabes como poder solucionarlos?

    Durante este seminario web, Antonio Reche, Senior Solutions Architect @ CA Veracode compartirá ejemplos y casos de uso que permitirá conocer:

    -Acciones y mejores practicas para tener éxito en la implementación de Programas AppSec
    -Puntos clave en la gestión de la seguridad de aplicaciones, incluyendo componentes Open Source
    -La correcta aplicación de las políticas de seguridad
    -Integración de la seguridad en el ciclo de vida de las aplicaciones
  • Best Practices in NetSuite Integration
    Best Practices in NetSuite Integration
    Peter Frayn, Consulting Director, RSM UK; Sidd Mishra, Technical Lead & Gunveer Mahandru, Solution Architect, PageGroup Nov 22 2018 10:00 am UTC 60 mins
    Join this webinar to hear RSM Consulting and PageGroup share their experience of designing and deploying Dell Boomi to enable a global finance transformation programme, including:

    - Applying best practice design principles to achieve a deliverable and supportable solution
    - Creating innovative and scalable integration patterns
    - Resourcing and a smooth transition to support
  • Stop Configuring Varnish and Start Coding (EMEA)
    Stop Configuring Varnish and Start Coding (EMEA)
    Remy Guercio, Product Marketing, Cloudflare Nov 22 2018 10:00 am UTC 23 mins
    In this webinar, we'll discuss how to swap out wrestling Varnish Configuration Language (VCL) with writing modern JavaScript. Using JavaScript will not only make it easier to configure traditional caching behavior but also open up new possibilities for moving additional functionality away from the origin.

    As part of this, we'll briefly cover:
    - How to perform custom routing
    - Creating custom authorization
    - Building an API Gateway
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity Nov 22 2018 10:00 am UTC 45 mins
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Modelling Complex Financial Instruments with Neo4j
    Modelling Complex Financial Instruments with Neo4j
    Joe Depeau, Neo4j Nov 22 2018 11:00 am UTC 50 mins
    In recent years the number and complexity of financial instruments has increased, and continues to grow. The market for these types of products is strong - even though the financial crisis of 2007-2008 highlighted the risks inherent in some complex and opaque financial instruments, and has led to increased regulation of the industry.

    Join us for a discussion and demonstration of how Neo4j’s powerful graph database technology can be used to easily and effectively model complex financial instruments and help address many of the challenges associated with them: pricing, due diligence, calculating and managing risk, and regulatory compliance and reporting.
  • Digital Inclusion and Economic Empowerment in the Developer Community
    Digital Inclusion and Economic Empowerment in the Developer Community
    Caroline Williams - Founder, The Do Good Only Company Nov 22 2018 4:00 pm UTC 60 mins
    I'm always curious about the larger world and the structure and struggles of organizations and communities. My work is focused on digital inclusion and economic empowerment for all residents of the Netherlands. I believe in community sourced development instead of prescriptive guidance.

    What does this mean in practice? That the solutions that we are contributing to are relevant, effective and able to be enhanced by the communities we work with.

    Previously focused on DevOps and how to implement and benefit from improvement in processes and tools, combined with people development. I believe in providing clear and practical guidance to help teams iterate on meaningful and achievable goals in their journey towards Continuous Delivery. I share my knowledge and experiences with teams looking to transform their practices, whether that is on premise, in the cloud or a hybrid model.
  • Smart Cities: Real IoT Use Cases
    Smart Cities: Real IoT Use Cases
    Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus Network Nov 26 2018 5:00 pm UTC 60 mins
    Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!

    Topics will include:
    - Real World Applications & Uses Cases
    -Where is the money in supplying products and services and the commercialization aspects of them!
    - What is the true meaning of ROI in the Smart Cities and Smart Buildings space?

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
  • Building Custom Apps on the Box Platform
    Building Custom Apps on the Box Platform
    Mike Schwartz, Product Marketing @ Box Nov 26 2018 10:00 pm UTC 60 mins
    In this session, we explore the capabilities and common application patterns for the Box Platform; and provide an overview of our developer tools.

    Watch now to learn why:

    - Content is the lifeblood of business processes and vital to engagement inside your organization — and beyond
    - Box Platform content services that use the same technologies that power Box can quickly bring best-in-class content sharing and collaboration to your custom apps
    - Flexible authentication models and powerful tools make it easy for developers to tackle content management challenges
  • Don't Let Legacy CDNs Hold You Back (EMEA)
    Don't Let Legacy CDNs Hold You Back (EMEA)
    Remy Guercio, Product Marketing, Cloudflare Nov 27 2018 10:00 am UTC 22 mins
    In this webinar we'll discuss how moving away from legacy CDNs with bulky XML based configuration files and specifications can improve both development velocity and application performance. We'll be using Cloudflare Workers written with modern JavaScript to reduce large and difficult to decipher configuration files into small, clean and easy to modify files.

    As part of this, we'll briefly cover:
    - How to cleanly create custom routes
    - Easy header modification
    - As a bonus, how to port existing edge side includes
  • How to Survive the Upcoming Java Cost Tsunami
    How to Survive the Upcoming Java Cost Tsunami
    Kevin Phillips, Middleware Solutions Sales Specialist, Red Hat. Nov 27 2018 4:00 pm UTC 60 mins
    Oracle documentation indicates that effective January 20, 2019 access to OracleJDK for production use is limited to customers with a support contract. This will impact production use of Java applications as well as the ability to get patch updates and support. Most customers have not planned for this un-budgeted expense which could sink your IT budget. Fortunately, there is an alternative which could be implemented for little or no additional cost.

    Customers who don't act (by either purchasing OracleJDK or moving to an alternative) could expose themselves to risk.

    Join Red Hat to learn about Red Hat’s lifeline for Java workloads - the OpenJDK.

    Don’t wait – January 20th is less that 3 months away.
  • Mission Leads, Technology Follows
    Mission Leads, Technology Follows
    Jeff Cherrington, VP, Product Management, Systems, ASG Technologies Nov 27 2018 6:00 pm UTC 60 mins
    Technology serves business and people. Business serves people - not technology. Having a perfectly tuned mainframe, server, virtual, or cloud technology stack won’t provide your business with value – only the ability to leverage the technology to focus on business outcomes will add that insight.

    As Gartner wrote in its Insights from the 2018 CIO Agenda Report, “The CIO role is changing from IT-outcome-focused to business-outcome-focused." Does your enterprise support this view?

    In this session, find out what you should be looking for from software products and the vendors supplying them to ensure you can focus on mission critical processes, and less on the underlying technology.
  • Your Bank’s Digital Side Door
    Your Bank’s Digital Side Door
    Ed Adams, CEO of Security Innovation Nov 27 2018 7:00 pm UTC 60 mins
    A widely-used but little known technology has created a vulnerable “Side Door” to thousands of financial institutions in North America. This discovery started with a simple question: why does my bank require multi-factor authentication (MFA), but Quicken does not? This led to an exploration of the 20-year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it.  The conclusion:  80% of banks supporting OFX have no MFA support, putting consumers at risk by exposing login credentials. 

    This presentation provides a summary of our research. It also describes how organizations can assess and mitigate enterprise risk posed by OFX.  Topics include:

    · Open Financial Exchange (OFX) protocol — how it works and where it’s vulnerable 

    · Research findings —  OFX security vulnerabilities that create enterprise and consumer risk

    · Compliance implications - using a known vulnerable component creates headaches

    · Assessment techniques — commercial scanning tools don’t work with OFX. Learn how to assess this risk quickly

    ·Mitigation techniques — compensating controls that reduce exposure while using the OFX protocol
  • Enabling Data Connectors in H2O Driverless AI
    Enabling Data Connectors in H2O Driverless AI
    Nicholas Png Nov 27 2018 7:00 pm UTC 45 mins
    Enabling Data Connectors in H2O Driverless AI

    H2O Driverless AI is H2O.ai's flagship platform for automatic machine learning. It fully automates the data science workflow including some of the most challenging tasks in applied data science such as feature engineering, model tuning, model optimization, and model deployment. Driverless AI turns Kaggle Grandmaster recipes into a full functioning platform that delivers "an expert data scientist in a box" from training to deployment.

    Driverless AI provides various data connectors for external data sources. Data sources are exposed in the form of the file systems. Each file system is prefixed by a unique prefix.
    We will go over various data connectors available in H2O Driverless AI and how to use them with docker image and native installs. Following are a few connectors to learn of:

    Using Data Connectors with the Docker Image

    o HDFS
    o S3
    o Google Cloud Storage
    o Google BigQuery
    o kdb+
    o Minio
    o Snowflake

    • Using Data Connectors with Native Installs

    o HDFS
    o S3
    o Google Cloud Storage
    o Google Big Query
    o kdb+
    o Minio
    o Snowflake
  • Multi-Cloud in the Age of Serverless and DevOps
    Multi-Cloud in the Age of Serverless and DevOps
    Eric Wright (Turbonomic), Leonid Igolnik (SignalFx), Simon Jones (PubNub), Arabella Hallawell (NETSCOUT) Nov 27 2018 9:00 pm UTC 60 mins
    Join this live panel discussion with experts at AWS re:Invent 2018 for a closer look at multi-cloud management.

    Tune into this interactive Q&A session with world renowned Cloud, DevOps and IT leaders while they discuss the following:

    - What a successful multi-cloud strategy looks like and how to get started
    - How serverless architectures and DevOps are evolving multi-cloud management
    - How serverless impacts or intersects with microservice architectures and the future of solutions development

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Panelists:
    Eric Wright, Technology Evangelist, Turbonomic (Moderator)
    Simon Jones, VP Marketing, PubNub
    Leonid Igolnik, Executive VP Engineering, SignalFX
    Arabella Hallawell, VP Corporate Strategy, NETSCOUT