The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
•The benefits of upgrading
•Considerations to understand
•How to smooth the transition
•Q & A
For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.
Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.
• Differences and similarities between Subversion and ClearCase
• How to merge in Subversion
• Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
• ClearCase vs. Subversion in a distributed development environment
• Migrating from ClearCase to Subversion
HP Software Customer Spotlight Webinar Series 2015
The Big Data service desk: HEMIT talks HP Service Manager & Smart Analytics
Join us to discover the power of Big Data at the service desk as HP customer HEMIT presents their success story. Using modern data analysis adds tremendous insight and value to the service desk by leveraging so called unstructured data, which makes about 90% of all data. HEMIT is the IT service provider for hospitals in central Norway. By using HP Service Manager Big Data Edition and Smart Analytics, HEMIT is making its service desk more intelligent and providing Smart Ticket and Hot Topic Analytics capabilities. HEMIT’s projected results are 50% time saved on completing self-service tickets and a short 12 month ROI.
• Leverage HP IDOL technology and Big Data for the cutting edge service desk
• Improve your service desk productivity and increase service quality
• Do more with less and still improve the overall business value of IT
• Simplify user experience and improve service desk agent productivity
• Get answers to your own questions during the live Q&A session
‘‘It is probably the most interesting piece of software I’ve seen in the last 10 years. The IDOL engine behind all this - it is really, really cool.’’
Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
•DBA Burnout and Retention
•The DBA’s Role in Major Platform Shifts and Regulatory Compliance
•The Accidental DBA Due to Staff and Skills Shortages
•The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
•The IT Budget Crunch
•Q & A
GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
Agile, at its best, leads to efficient scaling and dynamic responsiveness to software delivery release cycles—improving business value and cutting execution times. However, many teams have difficulties meeting these lofty goals.
With large and complex projects, it’s difficult to get everyone working and thinking together on strategic business objectives and project targets. It takes a combination of people, processes, and technology to make this work.
Join Tye Davis and John Falk for this web seminar as they teach you how to:
Build in quality support and project visibility
Get all agile stakeholders on the same page
Provide insight into the entire project landscape, workflow, and potential issues or bottlenecks
Bolster agile practices, foster continuous improvement, and remove project delays
Check the quality of the code before each build
Learn more about HP’s agile quality solution through a demo of Agile Manager.
L’objectif du webinar sera d’expliquer comment le déploiement continu des applications facilite la transformation digitale. La discussion sera agrémentée d’exemples concrets de clients qui ont commencé cette transformation dans divers secteurs d’activité : bancaire, distribution.
Application continuous deployment allows digital transformation
The objective of the webinar will be to explain how continuous application deployment facilitates digital transformation. The discussion will provide examples of clients who have started this transformation in various domains of activities such as banking and distribution.
You’ve heard the Buzz about Business rules. now, learn what they can do for your business. Learn how Progress® Corticon® can help developers and business users collaborate to handle the complex, rapidly changing regulatory requirements and business logic changes that company strategies and policies demand.
Achieve significant impact to your top and bottom line to boost ROI and reduce time-to-market.
Watch this webinar series to learn:
* What exactly is a business rules engine, and why should your business use it?
* How can Progress Corticon deliver the high-performance, automated decisions businesses need to compete.
* How using a rules engine can speed deployment at a fraction of the time and cost by avoiding the need for “hard coding”
Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.
As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.
Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.
+ How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
+ The need for connectivity to enable workflow re-design
+ Best practice in moving from an application-centric to a data object-centric connectivity approach
Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.
Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.
This webinar will include:
•Deploying Magento through UI and pushing code
•A look into the control panel
•Demo of New Relic and Chef
•Simulation of Rackspace customer experience
Lync 2013 (soon to be Skype for Business) is commonly known as an instant messaging client that includes voice and video capabilities within the enterprise. However, its ability to cross enterprise network boundaries and reach colleagues, partners, and customers across the globe via mobile phones or traditional telephony systems is often overlooked. The natural progression in collaboration may start with a quick instant messaging conversation but often leads to picking up the phone and calling someone to attain resolution.
Join us on Wednesday, March 25th at 2pm EST to learn about the capabilities of Lync Enterprise Voice, ways to implement it as a cost savings to your business, the impact of the launch of Skype for business and how the progression of enterprise voice collaborative tools are changing the way we run our businesses today.
•What is Lync Enterprise Voice
•How can Lync Enterprise Voice be implemented
•Is Skype for Business different than Lync Enterprise Voice
Optimizing your processes should be closely aligned to your business strategy. However, this is often easier said than done, as there are several pitfalls on the road to successful process optimization.
In this webinar, Reint Jan Holterman, publisher at BPMLeader.com, will go deeper into what pitfalls you may encounter. Also, he will present a number of pre-requisites based on the 5-C model to avoid these pitfalls and to realize successful optimization projects.
Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.
As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.
In this webinar, our diverse panel of security experts will:
•Propose an expanded definition and understanding of IoT and the stakeholders at risk
•Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
•Draw some conclusions about the state of software security in IoT today
•Discuss some simple approaches to addressing these problems
Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).
SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.
• Security considerations in each of the architecture layers
• Data isolation risks and mitigation plans
• Overview of CWE/SANS and OWASP Security threats
• Data retention and termination policies
• Infrastructure and cloud related security risks and solutions
The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.
Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.
Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
Businesses are under constant pressure to deliver apps faster and faster, without sacrificing quality. Application performance is a huge part of quality and mandatory for a great user experience. How do you achieve it? HP Performance Testing solutions bring new capabilities to accelerate application delivery while maintaining the required performance.
In this webinar, the HP Product Management team and RnD will present the new features of version 12.20 and a demo of the new, innovative controller (Tech Preview). Join us to learn about:
The new Performance Center user interface
Noise generator feature
New controller (tech preview)
How StormRunner integrates with NewRelic
StormRunner version for Developers – Integration with JMeter and webtest speed tools
L’objectif de ce webcast est de présenter comment la technologie permet d’atteindre les objectifs DevOps en éliminant les contraintes et les goulots d'étranglement qui perturbent la production de valeur pour les clients finaux
Why DevOps is the answer to Digital Transformation
The objective of this webcast is to show how technology allows to reach the DevOps objectives by eliminating constraints and bottlenecks that disrupt the production of value for end users
A lack of manpower and a dearth of resources are often major obstacles for organizations striving to achieve and maintain HIPAA and/or PCI compliance. Compliance guidelines are complex and difficult to decipher, even for the most experienced IT professionals. Recent headlines regarding unprecedented security and compliance breaches are causing companies to examine compliance-as-a-service (CaaS) solutions offered by cloud providers. But with the myriad of options available, it’s difficult for companies to discern which CaaS best fits their needs.
Join Johan Hybinette, HOSTING Chief Information Security Officer (CISO), as he discusses the benefits and risks associated with CaaS. Drawing upon his 20+ years’ of experience in information security and compliance, Johan will also offer tips for selecting the right CaaS for your business. Bring your questions and leave with the information you need to confidently invest in a CaaS solution.
Greater than 80% of today’s breaches occur with application software, yet many companies continue to invest in ‘over the wire’ solutions that are not solving the problem. Runtime Application Self-Protection, or RASP, is an emerging market that promises to protect applications from the inside. Using the rich context of the application’s logic and associated core libraries, RASP identifies attacks in ‘real-time’ and stops them. Implementation is quick and requires no changes to your application’s code. Join us to learn more about what RASP can do for you.
•Why context from inside the application matters
•How easy it can be to use native capabilities of Java and .NET to protect your applications
•Use cases to get you started.
Help lead your enterprise to a stronger, more effective security program.
Security and Scalability in the Hybrid Cloud: How to get one without losing the other
Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:
•Top reasons why people choose the cloud
•Top reason why people think the cloud isn’t the best fit for them
•What is scaling?
•How do you scale?
•How does the hybrid cloud help scale your application?
•How does the hybrid cloud help secure your application?
•So how do you build a hybrid environment?
About the Speakers
Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.
As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.
Why You Should Attend:
• Understand the “risk premium” ascribed to the cloud versus the private data center.
• Learn why the cloud requires new processes for governance and compliance.
• Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
• Understand how to build a holistic approach to cloud security.
When a leading bank states that “in online mortgage sales, a simple change in the colour of a Website calculator resulted in a 10% increase in sales”, it is a reminder of the significant impact the smallest updates in a digital presence can have. However, DevOps adoption faces a major barrier in the enterprise in overcoming organisational debt – historical decisions that will constrain transformation and quick release cycles.
This webinar explores:
•the value of marginal gains made through incremental improvements
•the pitfalls of marginal losses that can build into significant organisational debt
•and highlights ways in which DevOps can overcome challenges to make a positive impact
From flirting (download) to happily ever after (constant re-engagement), dating apps use gamification & messaging tactics very effectively to form an essential engagement habit. If someone has downloaded your app, chances are they have an awareness and the start of an affinity for your brand.
How do you keep your place on their device and keep the mobile relationship going strong? We'll share brand examples that helped create loyal customers.
As Git gains in popularity and Subversion extends its features for enterprise development, the two often operate side-by-side. This session will outline the benefits of each system (centralized vs. distributed), and how to best support a hybrid deployment.
Are you challenged by delays in releasing new application code within your enterprise? If your answer is “yes,” you can accelerate the release process through automation across the various stages of the software development and release lifecycle. Bridge gaps and learn the practice of collaboration between business, development, and operations teams with Agile development, continuous integration (CI), continuous testing (CT), continuous delivery, and continuous deployment.
Join us and learn about HP’s approach to the DevOps Lifecycle by examining DevOps problems and potential solutions from three points of view: people, process, and tools—from planning to operation. Find out how the integration of HP and third-party development and deployment toolsets provides a seamless, end-to-end implementation of the DevOps lifecycle to increase your release velocity. You will learn about CODAR, Agile Manager, ALM, Unified Functional Testing, Performance Center and Change Impact Testing during this session.
Sometimes one cloud isn’t enough. In a recent study by IDC, more than 65% of enterprise IT organizations will commit to hybrid cloud technologies before 2016. In this webinar we will walk you through a case study on a large enterprise customer who optimized their cloud strategy for performance, capabilities, and costs by using a multi-cloud approach. The results were outstanding - $1.5 million in annual savings from examining only 15 apps out of 500 app portfolio. Join Ilyas Iyoob, Director of Advanced Analytics and Lani Dame, Sr. Product Marketing Manager as they walk through this customer success.
With SAP HANA Cloud Platform, developers can quickly build impactful, highly scalable new cloud solutions but also extend existing on-premise landscapes as well as SAP SaaS solutions like SuccessFactors, SAP Cloud for Customer, and SAP Jam.
Confused by Big Data? Have applications ideally suited for Big Data but not sure how to manage the infrastructure? Facebook1 ingests 500 terabytes of new data every day; a Boeing2 737 will generate 240 terabytes of flight data during a single flight across the US; the proliferation of smart phones, the data they create and consume; sensors embedded into everyday objects will soon result in billions of new, constantly-updated data feeds containing environmental, location, and other information, including video3.
The chances are that you are or at some point will be dealing with Big Data driven applications and managing the performance of those applications. In this webcast you will learn about MongoDB and its role in the Big Data universe and the role of APM with Big Data. CA Technologies and MongoDB have teamed to provide database performance insight with CA Application Performance Management to help quickly identify the source of degraded application performance and assure a flawless customer experience.
DevOps and Automation enable faster innovation, but at the expense of a decrease in corporate and technical oversight. Today, enterprise DBAs are challenged to keep pace with increased velocity. How will they keep up tomorrow, with greater velocity from DevOps initiatives?
Datical DB and CA Release Automation can automatically validate database changes, through customizable rules which enforce YOUR corporate policy and best practices, in order to reduce deployment risk and staff ramp time.
Come see how Datical DB and CA Release Automation led to a near 300% increase in the application team’s productivity at a leading Financial Services company.
The borders of the data center has become blurred or eliminated with virtualization, cloud solutions, and mobile devices. With increased complexity comes less visibility coupled with heightened user expectations. In this session, we’ll discuss the impacts of the new ‘borderless enterprise’ on network management practices and provide guidance on how to adapt to this new frontier.
For many organizations MS-SQL is the backend to many of their mission critical applications. The environment provides a cost effective foundation for an organization to develop custom designed solutions that drive the business forward. As MS-SQL has risen in importance, the demands on the storage infrastructure have also increased. MS-SQL needs a high performance, well-protected storage system that is also cost effective. To meet these requirements many organizations are now looking at flash storage.
Join experts from Storage Switzerland and Tegile Systems as we discuss the various options that storage and MS-SQL administrators have as they begin to look for new ways to meet the MS-SQL challenge.
The way Business Users consume services is changing, “Central IT” has an opportunity to increase the value provided to their Business Users. New trends in brokering services are surfacing along with a great diversification in Service Providers across IaaS, PaaS and SaaS solutions, managed and un-managed, that can be leveraged. Come join us in reviewing the steps involved in becoming a Service Provider to your Business through IT-as-a-Service enablement from a Managed Cloud Service Provider perspective.
Julie Craig, Research Director at Enterprise Managment Associates, and Reza Shafii, Mulesoft Director of Product Management, discuss some of the common questions and pitfalls businesses have when developing their API strategy.
Join Gene Kim, CTO, researcher and author of the best-selling book “The Phoenix Project” and Josh Corman, Sonatype CTO and co-founder of Rugged Software as they discuss how high performing organizations are applying proven supply chain principles to accelerate software delivery.
Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.
In particular, the panel will discuss:
•Whether Big Data necessarily increases the risk of a security breach
•How to assess the risks associated with different types of Big Data solutions
•How to avoid data breaches in a Big Data environment
Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
Johan and Cliff will answer your cloud security questions including:
•What are key challenges that IT leaders face when planning for a cloud migration?
•What security factors should you consider when considering a hosted vs. on-premises solution?
•As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
•How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
The masterminds at Zerolag are hosting an exciting discussion about supersizing your Magento platform on Zerolag to fuel your company’s growth in 2015 and beyond! ZeroLag will be looking at two technologies—Clustrix and Instart Logic—that, when combined, have unprecedented potential to transform your Magento platform into a supremely scalable and remarkably robust platform suitable for any large e-commerce merchant.
The How-To’s of installing, configuring and tuning Docker-formatted Linux containers running on Red Hat Enterprise Linux 7 with Solarflare OpenOnload application accelerator and achieving bare metal network performance in Docker containers. In addition, an overview on OpenOnload, a Linux-based, Open Source, high-performance network accelerator for TCP- and UDP-based applications and container-related enhancements specific to Red Hat’s distribution, such as the atomic utility, the implementation of “super-privileged containers” (SPC) will be presented.
- Jeremy Eder, Principal Software Engineer & Network Performance Lead, Red Hat
- Richio Aikawa, Senior Marketing Manager, Partners & Solutions, Solarflare
- David Riddoch, Ph.D., Chief Architect, Solarflare
Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.
You will learn about:
·A qualified, trained talent pool with skillsets aligned to match client needs
·Lower attrition rates and higher corresponding levels of employee engagement
·Opportunities to fulfil corporate social responsibility and diversity objectives
As use of UC continues to grow throughout the enterprise environment, the proliferation of mobile and BYOD devices will drive UC onto the wireless network. Deploying a network for UC requires more consideration than simpler data connectivity. This presentation will look at how to design a wireless network for reliable UC use, and what steps to take to troubleshoot issues when things (inevitably) go wrong.
Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.
Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.
Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.