The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Josh Rosenberg, Group Product Marketing, Confluent + Ricardo Ferreira, Developer Advocate, ConfluentRecorded: May 22 202060 mins
The number of mission-critical apps and the amount of data underpinning them has grown exponentially in the increasingly digital world - with no sign of slowing down. But rigid data architectures slow organizations down, forcing them to spend too much up front on resources they don’t use, and causing lag or downtime across their apps. In today’s hypercompetitive digital world where customer loyalty connects with the best performing applications, every millisecond delay could be another lost customer.
Adjusting to the real-time needs of your mission-critical apps is only possible with an architecture that scales elastically. Confluent re-engineered Apache Kafka into an elastically scalable, next-gen event streaming platform that processes real-time data wherever it lives - making it accessible for any budget or use case.
Register now to learn how to:
-Quickly deploy Kafka in Confluent Cloud with just a few clicks and elastically scale your workloads
-Effortlessly connect your critical data sources and sinks to Kafka to build a complete data pipeline for your real-time apps
-Easily process streaming data with a simple interactive SQL interface using fully-managed KSQL
-Accelerate the deployment of standardized, self-managed Kafka clusters as cloud-native systems on Kubernetes to achieve elastic scale with Confluent Platform
Aviv Ambramovich, Head of Product Management, Security Services, Check Point & Jonathan Florian,Systems Engineer, Silver PeakRecorded: May 22 202055 mins
Enterprises need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud. Check Point and Silver Peak have partnered to create a joint solution that addresses the network security challenges of a cloud-first architecture, enabling enterprises to securely automate branch office Internet connections to the cloud, leveraging Silver Peak’s Unity EdgeConnect SD-WAN edge platform and Check Point CloudGuard Connect cloud-hosted security service.
Are your searches not yielding the help that you hoped? Are you spending more time than any one person should, simply writing search criteria? Come spend an hour with us where we will explore ways to alleviate these challenges. You'll walk away with best practices, tips, and tricks to solve many common search problems.
Alex Chalkias & Sohini Roy - Ubuntu Product Managers & Nuno Do Carmo - Ferring PharmaceuticalsRecorded: May 22 202021 mins
Learn to unleash the power of Kubernetes on Windows easier and faster than before. Join us for a demonstration from Microsoft MVP and Docker Captain, Nuno Do Carmo as he guides us through how to configure a full Kubernetes on-rails on your Windows machine. This is made possible through two tools, MicroK8s and WSL2.
During this session, you’ll learn how easy it is to not only access a full Linux terminal on Windows, and with the updates on the newest WSL2 (wide release in May) how you can enable MicroK8s, a lightweight, single-package application that brings a fully-featured, conformant and secure Kubernetes system directly on users machines.
What is the Windows Subsystem for Linux, and what’s are some of the great features that will be enabled in the newest version, WSL2, released in May by Microsoft
What is MicroK8s
How to install a local Kubernetes using MicroK8s with WSL2
The advantages / what this combo can help you achieve
Janavi Ravi co-founder of Loonycorn and Pluralsight AuthorRecorded: May 22 202053 mins
Breakdown - More and more organizations find themselves juggling multiple cloud providers—some through careful planning, but many by happenstance. Regardless of their journey, many companies may be asking, “what now?”Join Pluralsight author and cloud expert Janani Ravi for an in-depth discussion on how to build a successful hybrid, multi-cloud strategy. You’ll learn:• Popular beliefs about cloud, and the evidence that supports and contradicts those beliefs• Questions to ask when building and implementing a cloud strategy (and what the answers should look like)• Technological design patterns that matter in a hybrid, multi-cloud, ML/AI-permeated world
Once your operators are built, you can test and deploy them using Operator Lifecycle Manager (OLM) from OperatorHub. If you want to test this out yourself, follow along using a test OpenShift cluster provided by OpenShift Playground.
Dathan Demone, Director Verification Services, Entrust DatacardRecorded: May 22 202035 mins
Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.
During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.
• Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
• Tools for renewing certificates in bulk with fewer touch points
• Methodologies for streamlining certificate verification
• Insights and best practices from some of our other customers
Jenn Markey, Product Marketing, Entrust DatacardRecorded: May 22 202024 mins
2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:
- Keep corporate assets secure
- Protect and verify worker identities
- Help remote employees stay productive
- Reduce the administrative burden on IT
Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
Pascal Joly, Quali; Mark Galpin, JFrogRecorded: May 21 202050 mins
As your organization goes through the application transformation journey, DevOps engineers are faced with difficult questions around the need to maintain security compliance and infrastructure costs under control while implementing full automation of your release process.
Join us and learn how JFrog and Quali combine forces to speed up the application release cycle and enforce governance and control. In particular, how Environment as a Service can help with security compliance, with a consistent blueprint throughout the value stream and cost control with built in automation and business-driven policies.
Michael Bordash, Lead Cloud Architect and Connie Chen, Field Marketing Specialist at Onica, a Rackspace CompanyRecorded: May 21 202044 mins
We live in a uniquely challenging world today where we find ourselves in an unpredictable situation with Covid-19. As a result of this, a majority of the global workforce has begun to work remotely. If your organization utilizes legacy software and applications to run the bulk of your business activities, and do not have a remote work plan in place, now is an important time to look at what options are available to support your employees to help them maintain productivity, while avoiding further workforce disruption.
Learn how you can gain the scalability, security, and global reach of AWS’ network by leveraging Amazon WorkSpaces, a fully managed, secure virtual cloud desktop, and Amazon Appstream 2.0, an application streaming service able to easily stream desktop applications to any device running a web browser.
What we’ll cover:
- A deep dive comparison on Amazon WorkSpaces & Amazon Appstream 2.0
- How to enable a remote workforce based on your position on the remote-ready spectrum
- Enabling your proprietary or legacy applications for remote access
- How to optimize your cloud resources during times of lower utilization
Dave Landa, Kintone CEORecorded: May 21 202028 mins
The democratizing forces of no-code software development and citizen developers are turning disruptive Digital Transformation into productive Digital Execution. In this webinar by Kintone’s CEO Dave Landa, learn how citizen developers and new mode IT teams together are revolutionizing agile software development, deployment and iteration from the ground up.
Hosted by Marten den Haring, PhDRecorded: May 21 202042 mins
Webinar Series: Re-engaging Patients and Employees Post-COVID 19
As cognitive and regulatory barriers have been cleared by the impact of COVID-19, usage and satisfaction has increased exponentially for both patient and physician—physicians gain a more holistic understanding of home and circumstances, while patients get to make eye contact with their physician again. This has paralleled a shift in telehealth usage not just for urgent care but for chronic conditions and mental health, highlighting the potential for increased access to care while maintaining empathy.
Join Lirio COO Marten den Haring as he talks with Ann Mond Johnson, CEO of American Telemedicine Association, about the role of virtual care in this reopening phase and the opportunity to meet people where they are.
Navdeep Gill, Senior Data Scientist and Software Engineer at H2O.ai and Patrick Hall, Advisory Consultant at H2O.aiRecorded: May 21 202062 mins
Utilization of artificial intelligence (AI) and machine learning models have become a common practice in many aspects of the economy. Furthermore, more sections of the economy will start to embrace automation and data-driven decision making over the coming years. While these predictive systems can be quite accurate, they have been treated as inscrutable black boxes in the past, that produce only numeric predictions with no accompanying explanations. Unfortunately, recent studies and recent events have drawn attention to mathematical and sociological flaws in prominent weak AI and ML systems, but practitioners usually don’t have the right tools to pry open machine learning black-boxes and debug them.
This presentation goes over how one can use Driverless AI to increase transparency, accountability, and trustworthiness in machine learning models. If you are a data scientist or analyst and you want to explain a machine learning model to your customers or managers (or if you have concerns about documentation, validation, or regulatory requirements), then this presentation is for you!
What you will learn:
- How to build interpretable models in Driverless AI
- How to explain models in Driverless AI
- How to evaluate fairness of models in Driverless AI
- How to debug models in Driverless AI
This webinar will be a deep dive into responsible machine learning. Please watch the webinars below to get an introduction to responsible machine learning:
- Fairness in AI and Machine Learning: https://www.h2o.ai/webinars/?commid=382828
- Towards Responsible AI: https://www.h2o.ai/webinars/?commid=387075
- Key Terms and Ideas in Responsible AI: https://www.h2o.ai/webinars/?commid=395829
Gorav Arora, Office of CTO at Thales and Ted Shorter, CTO, KeyfactorRecorded: May 21 202048 mins
The Internet of Things (IoT) has transformed our lives, providing convenience, enabling personalization, and changing our expectations of how devices behave. Products have become smarter with an extended usable life, allowing companies to deepen customer engagement through bi-directional touchpoints and enhanced usage analytics.
With Internet connectivity opening these formerly isolated devices, they are digitally transformed into data hubs – sending and receiving critical information to the end-user and the enterprise. While this flow of data offers enhanced product features and new revenue opportunities, it can introduce security risks to the user and enterprise.
Join Thales and Keyfactor to learn:
• The state of IoT security today;
• Best practices for securing the entire IoT ecosystem and product lifecycle – from development, manufacturing, updates, decommissioning; and
• How a robust, secure PKI process can protect device identities, sign application artifacts in all environments, secure communication channels to and from the device, and ensure authorized access to the device, software and data.
Smriti Jaggi, Threat Intelligence Analyst, Shape SecurityRecorded: May 21 202032 mins
Researchers estimate that as many as 80% of people reuse passwords across multiple accounts. With more than 13 billion compromised credentials for sale on the dark web, many organizations are highly exposed and do not even know it.
In this webinar, you will learn how to protect your organization from compromised credentials even before they hit the Dark Web while providing a simplified password experience for your users.
Lenny Zeltser, CISO, Axonius; Nathan Burke, CMO, Axonius; Brandon Dunlap, ModeratorRecorded: May 21 202058 mins
As IT complexity increases at organizations, gaining visibility into a comprehensive asset inventory becomes progressively difficult for information security teams. The convergence of three trends account for this new era of complexity: the increase in the number and types of devices, rapid public cloud adoption, and the looming IoT explosion. Axonius commissioned a research survey with Enterprise Strategy Group (ESG) to uncover what kinds of visibility gaps, challenges, and strategies are top of mind for information security professionals. Join Axonius and (ISC)2 on May 21, 2020 at 1:00PM Eastern for the third of three webinars focusing on the looming and inevitable IoT explosion. By some reports, there will be 500 billion connected devices by 2030 (Cisco). Organizations are most concerned about visibility into the volume and diversity of devices.
Webinar attendees will learn:
• Detailed research findings on the looming IoT explosion, visibility challenges, and security implications
• An understanding of the key asset inventory challenges and how organizations are addressing these issues
• Best practices when implementing and improving an asset inventory process
• Emerging innovations and approaches to continuous asset discovery and automation
Edson Yanaga, Director of Developer Experience, Red HatRecorded: May 21 202066 mins
Delivering Value Faster, Better and More Reliably
Now every company is a software company: software is the fuel to this new digital economy, and how can we deliver software and value faster? Many try to show you what to do or how to do it. If you really want to know the “why”, come and check this session.
We’ll show the real reasons for you to engage in DevOps and Microservices. With this knowledge you and your team will be enabled to stop discussing and start delivering real value every time faster, better and more reliably.
About the speaker:
Yanaga is a Java Champion and a Microsoft MVP. He is also a published author and a frequent speaker at international conferences, discussing Java, Microservices, Cloud Computing, DevOps, and Software Craftsmanship. Yanaga considers himself a software craftsman, and is convinced that we all can create a better world for people with better software. His life purpose is to deliver and help developers worldwide to deliver better software faster and safely - and he can even call that a job!
Patrick Walsh (IronCore Labs) and Michele Kubicek (Rally Software, Broadcom)Recorded: May 21 202025 mins
Join Rally and IronCore Labs for a 30-minute webinar discussing how the two companies partnered to bring industry-leading data privacy to Rally’s customers. While there is an inherent risk in storing sensitive data in the cloud, Rally is the first agile lifecycle management solution to take security a step further by offering customers advanced data controls.
Who should attend:
- Companies who store sensitive data with Rally or wish to do so
- Companies with strict security departments
- Security-minded product or business managers and their security teams
What you’ll learn:
- What Rally does to protect your data
- New options you have to take deeper control of your data
- How to take advantage of Rally’s new privacy options
Bring your questions for a 15-minute Q&A following the main presentation.
About the Speakers:
Patrick Walsh has 20 years of experience building security products and Enterprise SaaS solutions. Most recently he ran an Engineering division at Oracle bringing productivity and insights to the world’s largest companies. Now Patrick leads IronCore Labs, a technology platform that helps businesses get back control of their data so they can meet increasingly stringent data protection requirements.
Michele Kubicek is a Manager of Product Management at Rally Software. She has 14 years of proven leadership experience in building agile teams and promoting a culture of innovation and continuous improvement. Michele is most driven and inspired by seeing her teams thrive and tackling complex challenges in creative ways.
Paul Hampton & Tara Combs, Alfresco and Charles Araujo, IntellyxrRecorded: May 21 202059 mins
With many employees currently working from home, have you considered the governance & compliance implications for the content they create, store locally and share?
Most organizations are already grappling with the explosion in digital content, new regulatory demands and the complexity of first-gen Records Management tools. But getting a handle on information governance doesn't have to be hard.
On this one-hour webinar we explore market conditions and share simple strategies to help you address today's information risks.
Artificial intelligence (AI) is rapidly progressing and has the potential to reduce mortality, morbidity, and healthcare costs by improving diagnostic accuracy and screening efficiency. Multiple recent studies have demonstrated the ability of AI algorithms to match, if not outperform, clinicians in the diagnosis of several diseases. It becomes clear that artificial intelligence will play an important role in the medicine of the future, and the use cases can come in different forms: from the use of AI as a diagnostic tool to the optimization of the internal management and logistics of a hospital. In this webinar, we will present the current state of artificial intelligence and review some healthcare applications. We will also try to showcase the current gaps that this technology has to overcome until we have successful deployment of AI in healthcare.
Marc Combalia, an Artificial Intelligence Research Project Engineer working at Hospital Clínic de Barcelona in close collaboration with AASA Inc., graduated in Telecommunications Science and Technology with an MSc in Telecommunications Engineering. His master thesis is titled “A Deep Learning Approach for Histological Image Classification” and had held several seminars on the topic of Deep Learning. He has a wide experience in research on computer vision and artificial intelligence, especially on the applications of artificial intelligence in the biomedical field with an emphasis on deep learning techniques.
Florent Lebeau, Staff Solution ArchitectRecorded: May 21 202028 mins
Arm Scalable Vector Extension (SVE) is an instruction set for the Arm v8-A architecture that introduces customized features for improving High Performance Computing (HPC), including vectorization and increased floating point performance. This webinar presents the main concepts of SVE, showing how your applications can benefit from it and how easily you can port your code – even before getting access to an SVE based processor. We’ll also provide tips on how to optimize and evaluate the benefits of different vector widths.
In this webinar, Florent Lebeau, Solutions Architect from Arm, will demonstrate how to:
• Compile applications for SVE
• Run SVE applications on non-SVE hardware while you wait for processor availability
• Analyze SVE applications to tune for maximum performance
Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, ThalesMay 26 20201:00 amUTC90 mins
For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.
- What is Microsoft Migration Program?
- How Microsoft manages customer data?
- What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
HCL Software AppScan Leaders; Randeep Chhabra and Peter LeeMay 26 20206:30 amUTC60 mins
Fast, Accurate, Agile Security Testing with HCL AppScan V10. Empower your CISO, AppSec and Development Teams with Application Security Testing.
Join us on Tuesday 26th May for the APAC Launch of HCL AppScan V10, the premier version of the most comprehensive application security solution in the market.
Hear from Randeep Chhabra, Application Security Business Leader, Asia Pacific and Peter Lee, Application Security Technical Lead, Asia Pacific at HCL Software and learn how HCL AppScan V10 can be your single solution for application security testing and management activity. This live webinar event will showcase the latest AppScan V10 enhancements in the Fast, Accurate Scanning, Secure DevOps and Enterprise Management categories. Experience a demo and see how AppScan V10 integrates directly into your software development lifecycle tools and DevOps toolchains and processes.
Ema Rimeike & Magdalena ModricMay 26 20208:00 amUTC28 mins
Wasserfall, Agilität, DevOps … es macht den Eindruck, dass alle paar Jahre wieder, weitere Methoden für die optimale Softwareerstellung für Unternehmen erscheinen. Obwohl all diese Prozesse ihre Stärken und Schwächen haben, kann die Optimierung (und, “die vorher nicht vorhandene red tape”), die sie mit sich bringen, wie ein Hindernis für das Hauptziel der Entwickler anfühlen: KICK-ASS FEATURES ERSTELLEN. In diesem Webinar werden Ihnen taktische Methoden vorgeschlagen die erforderlich zum Aufbau einer erfolgreichen DevSec Strategie werden. Wir wünsche Ihnen interessante Einblicke.
Julian Totzek - Hallhuber | Solution Architect at VeracodeMay 26 20209:00 amUTC45 mins
Gerade wenn Sie dachten es kann nicht schlimmer werden, passiert es. Cyber-Angriffe haben sich in den letzten 12 Monaten verdoppelt. Egal für wen Sie arbeiten, auch Ihr Unternehmen wird mehrfach jeden Minute angegriffen.
Es ist nicht nur die Bedrohung, die Ihre Ressourcen zu überwältigen droht, sondern auch das Ausmaß und die Geschwindigkeit Ihrer Reaktion. Das stimmt, solange Sie nicht die Strategien, Richtlinien und Prozesse von DevSecOps implementieren.
Veracode behauptet, dass Cloud-native Technologien Entwicklern helfen, die Zeit zu reduzieren, die zur Beseitigung von Sicherheitslücken erforderlich ist. Laut Gartner werden Unternehmen, die die Cloud-Infrastruktur zur Automatisierung des Sicherheitsschutzes verwenden, bis 2022 60% weniger Sicherheitsvorfälle erleiden, und DevSecOps-Teams, die auf diese Weise arbeiten, lösen ihre Sicherheitsprobleme dreimal schneller, so Veracode.
Aber wie? Nehmen Sie an unserem Webinar teil und sehen Sie, wie Veracodes Principle Solutions Architect Julian Totzek-Hallhuber zeigt, was DevSecOps in der Praxis bedeutet und welche pragmatischen Schritte zu schnellen und effektiven Ergebnissen in Ihrem Unternehmen führen.
Scott Seal, Senior Product Marketing ManagerMay 26 202010:00 amUTC30 mins
Operational reports help organisations present and distribute information to the right people, in the right format, and in a timeframe that supports their business needs. However, if operational reports are cumbersome or difficult to read, the benefits can vanish quickly.
Today, reporting requirements are more complex–outdated tools are no longer meeting end user expectations.
Join our webinar to discover why and how organisations are modernizing their operational reports.
1. Complex needs of common reporting scenarios
2. Five modern operational reporting features
3. An example of an organisation that transformed their operational reporting
In this talk, Tim van Baarsen will take you on a journey beyond the basics of Spring Kafka and will share his knowledge, pitfalls and lessons learned based on real-life Kafka projects that are running in production for many years at ING Bank in the Netherlands.
John Waters von OneLogin und Patrick Schnell von YubicoMay 26 20201:00 pmUTC45 mins
Der Zugang zu Unternehmensinformationen wird in der Regel über Passwörter verwaltet. Aufgrund der wachsender von Sicherheitsverletzungen, die hauptsächlich durch schwache oder gestohlene Passwörter entstehen, evaluieren immer mehr Unternehmen alternative Authentifizierungs Optionen.
Erfahren Sie wie moderne Standards der Authentifizierung Sie auf ihrer Reise von passwortlosen Anmeldung unterstützen können. Unternehmen haben dafür heute die Flexibilität z.B. YubiKeys (Security Keys) oder Biometrie für ihre starke Authentifizierung zu nutzen, ohne die Sicherheit zu vernachlässigen. Gleichzeitig steigern diese Lösungen die Akzeptanz beim Benutzer da der Login prozess stark vereinfacht wird.
In diesem Webinar sprechen John Waters von OneLogin und Patrick Schnell von Yubico über folgende Themen:
-Wie moderne Authentifizierung heutige Belegschaften beeinflusst
-Fallbeispiele über WebAuthN/FIDO2
-Bewährte Praktiken zur Verwendung der WebAuthN-/FIDO2- Authentifizierung, um Ihnen einen sicheren Zugriff auf Unternehmensinformationen Ihrer Organisation zu ermöglichen
John Bailey, Blue Prism; Arvid Aendenboom, BrightKnight & Fred Versyck, BrightKnightMay 26 20201:00 pmUTC60 mins
SAP is a powerful software suite, used extensively in many corporations of all sizes across the globe. BrightKnight have come across many business processes executed in SAP. Many of them have a tremendous potential for automation with Blue Prism. During this webinar we will focus on two of them.
Focus will be on how we went about the automation journey and on the benefits realized with these processes. Furthermore, we will also share a quick word on how we tackled this from technical standpoint.
Both use cases focus on Customer Service in the utilities sector, specifically customer data quality. SAP relies on verified and correct customer data to work as intended; this is where automation comes in. A significant amount of manual work was spent on simple checks to verify how a client contract should be handled. Now all this preparation is done by a Blue Prism robot and the manual work focuses on handling the actual contract.
In another use case, the aftercare of a mass migration of data is being done. It wasn’t technically feasible to couple incoming clients with existing clients and therefore RPA came into the picture. Due to the implementation of this Blue Prism robot, business could take the correct decisions in handling the rest of the cases.
Sumita Yadav of Catholic Health Services, Zayna Khayat of SE Health, Shawn Nason of MOFi & Michael Godoy of UCSFMay 26 20202:00 pmUTC60 mins
Part 2 of a Special 2-part Series
Many of the use cases common in healthcare did not scale to accommodate the Covid-19 crisis. As world governments begin to look past the peak of the Coronavirus pandemic, stakeholders are pushing across industries to resume operations. As we prepare to reopen in this post-COVID world, what are the new rules of engagement for your healthcare system? Where do you start? What can other businesses learn from the experiences of healthcare systems? What critical role can IoT play in COVID-19 recovery?
Join us for an industry-led, round table discussion on the strategy, planning and preparation to be considered as health systems reopen for patient care. While healthcare organizations have scrambled to adapt to the COVID-19 crisis, the lessons learned can be applied across all industries as companies ramp up digital transformation capabilities in the post-Covid era.
Sumita Yadav, Vice President, Cardiovascular and Orthopedic Service Lines at Catholic Health Services
Michael Godoy, Telemedicine and Scalable Therapeutics Program Director, UCSF Medical Center
Shawn Nason Founder, CEO & Eco-System Disruptor, MOFi
Zayna Khayat, Futures Strategist, SE Health
In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.
In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.
Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing ManagerMay 26 20202:00 pmUTC56 mins
WhiteSource’s Annual Report on The State of Open Source Security Vulnerabilities in 2020 found that a record-breaking number of new open source security vulnerabilities in was published in 2019.
In our research, we focused on open source security’s weakest and strongest points in the hopes of bringing some clarity to the fast-paced and complex space of known open source security vulnerabilities.
Join Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager at WhiteSource as they discuss:
•How the open source community is evolving when it comes to security research and what to expect in 2020.
•Ways software development outfits can implement secure coding from the earliest stages of the DevOps pipeline.
•Best practices for development, DevOps, and Security teams to make sure they address the most critical issues to their software products’ security.
Ezio Viola The Innovation Group, Constanino Croce Appian, Fabrizio Custro Amadori, Alexia Zeri Prysmian GroupMay 26 20202:00 pmUTC67 mins
ho il piacere di invitarla al Webinar “Hyperautomation – oltre l’RPA” organizzato da Appian, in collaborazione con The Innovation Group, sul tema dell’automazione dei processi aziendali.
In particolare di parlerà di automazione end-to-end dei processi e di come le applicazioni di Robotic Process Automation (RPA) oggi si stiano espandendo verso contesti di automazione più ampi.
Nella sessione interverrano, oltre ad un esperto di automazione di Appian, un analista di mercato di The Innovation Group ed alcune aziende italiane che hanno già fatto esperienza ini questo percorso di automazione più ampio. Verranno trattati:
Esempi applicativi per vari ambiti dell’impresa
Automazione dei processi nell’area amministrativa
Benefici raggiungibili con i sistemi RPA e limiti dei robot software
Come unificare e orchestrare la collaborazione tra umani, bot e algoritmi IA
Il valore di una piattaforma che unisce RPA, BPM e sviluppo Low Code
Kimm Yeo, Product Marketing Manager and Rikke Kuipers, Product ManagerMay 26 20203:00 pmUTC60 mins
“Another day, another data breach” is not just a cliché; it’s a reality. But all data breaches are not equal. To avoid becoming the next victim, you must create software that’s more secure, higher quality, and compliant with standards.
This webinar will introduce you to the concept of fuzzing, as well as Synopsys’ best-of-breed fuzzing solution, Defensics. Fuzzing is well established as an excellent technique for locating vulnerabilities in software. Register for this webinar to learn:
•What fuzzing is, how it works, and when and why you should use it
•How various fuzzing approaches differ and the pros and cons of each
•How Defensics uses generational / specification-based fuzzing to test over 250 protocols effectively and efficiently
Stuart Clark, Eugene Black, Sai Suchandan Reddy Marapareddy, Silvia Spiva - Cisco SystemsMay 26 20203:00 pmUTC60 mins
In the BrightTalk webinar, you will hear how we planned and built the new Cisco SD-WAN Sandbox, what goes into building a sandbox, and an awesome demo from Sai showing you how to use Postman collection examples to get started with Cisco vManage APIs. Then we will look at how to use vManage Aggregation APIs to generate reports on statistics related to loss/latency/jitter of SD-WAN overlay tunnels and we will also look at how to use APIs to trigger policy updates to change the preferred transport for certain application traffic. Finally, we look at how to use Viptela Python SDK to simplify operations related to feature/device templates. We will also be taking your questions live too.
Emmanuel Bertolin, SVP and General Manager of Provider Services, AppDirect and Laura Stevenson, Senior Director, AppDirectMay 26 20203:00 pmUTC45 mins
Today, chances are good that you’re part of the consumer subscription economy. Maybe you have an Amazon Prime account, stream Hulu, or listen to your favorite songs on Spotify. But selling, implementing, and managing recurring B2B digital products is entirely different than selling simple subscriptions to consumers.
In this webinar, Emanuel "Bert" Bertolin, AppDirect's Senior Vice President and General Manager of Provider Services, will give an overview of B2B subscription commerce. He will also detail five key reasons why a consumer subscription playbook won't work for businesses. Specifically, he'll cover how B2B subscriptions are:
- More complex and multi-dimensional
- Need more sales assistance
- Often include the channel
- Require seamless integration
- Must accommodate a range of payment options
Attendees will come away with a better understanding of how to adapt to these differences and succeed in the new world of B2B subscription commerce.
Travis Greene, Director of Product Marketing, Micro Focus and David Gehringer, Principal, Dimensional ResearchMay 26 20203:00 pmUTC60 mins
Micro Focus recently surveyed business and technology professionals around the globe about their experiences adopting and scaling RPA. By automating a range of processes—from HR and IT to sales, customer service, finance, compliance, and auditing—more than half of them have saved 30+ hours per week.
But how should you start RPA? What scalability challenges will you face? And—are the business benefits real? Micro Focus recently asked RPA practitioners these very questions. Join our interactive Q&A webinar to hear their answers. We’ll cover:
• Benefits to be gained—today and tomorrow—from RPA.
• Key lessons learned by early adopters.
• Critical capabilities needed to implement RPA.
• Challenges companies face when scaling RPA.
• How needs and challenges change as RPA experience grows.
Dr. Juan Nogueira-Nine, Jack Ogawa, Charlene Marini, Pete Swabey & Bob O'DonnellMay 26 20204:00 pmUTC60 mins
Webinar 1: Managed IoT Devices with simple security, efficiency and AI
Join experts from Vodafone, Flex, Atos, Cypress (An Infineon Technologies Company), Altair Semiconductor, Arm and The Economist to learn more.
The current crisis is showing us the importance of precise and reliable data. It has highlighted how thinking it's obvious what's in a box marked 'PPE' and being certain of its contents can be at odds. How vital it is to track production line operations in real-time when stoppages cannot be tolerated, and how data-driven processes across any system can be fine-tuned when every element of the system is connected and manageable. It's not a test anyone wanted to see but we are now seeing the true potential of a global IoT, and the data-driven insight and actions it can enable.
But driving a pervasive IoT to take connected industries, businesses and people to the next level of value and control is not simply a case of deploying more devices. Considerations such as clearly defined objectives, security, component interoperability, speed to market and turnkey vs tailored solutions are all areas that must be tackled before embarking on a commercial IoT journey.
Join two webinars with industry experts at the cutting edge of IoT evolution debating what they think happens next. How they imagine the vision of a Hyperscale IoT can become a reality.
Hear about the compute curve is driving up the potential for IoT but how opportunities must be weighed against the need to protect system value through choices made at the outset of any IoT deployment.
Global device maker Flex's Senior Director of Connectivity Dr. Juan Nogueira-Nine
Senior Director of Embedded Products Jack Ogawa, Cypress, An Infineon Technologies Company
Arm’s VP/GM of the Devices IoT Platform BU Charlene Marini
The Economist Intelligence Unit's Editorial Director Pete Swabey
With panel moderator Bob O'Donnell from analyst firm TECHnalysis
Zohar Kaufman, VP R&D PortshiftMay 26 20204:30 pmUTC60 mins
How to Remain Efficient and Secure
Asynchronous messaging brokers like RabbitMQ and Kafka are commonly used for microservices applications. Although KubeMQ is the CNCF option for message broker and message queue, most enterprises still use Kafka and RabbitMQ in their Kubernetes deployments to create a messaging scheme that decouples message production by a producer from its processing by a consumer.
But message brokers and queues imply a new security challenge for DevSecOps teams, as it eliminates the option to create any level of segmentation between microservices that use the message queues, classical Kubernetes network policies are useless when all services can communicate with the broker.
In this webinar we’ll explore microservices deployments in Kubernetes using message brokers like Kafka, examine their deployments options. We’ll also examine the security angle of messaging queues and brokers and show how to create effective security governance for these deployments.
Key Discussion Points:
1.Messaging queues/brokers deployment options in Kubernetes clusters
2.Explore the security challenges of native Kubernetes network policies
3.Explore different options to implement efficient network security policies that addresses messages queues/brokers
James Shelburne, Ujjwal KrishnamurthiMay 26 20205:00 pmUTC45 mins
If you’re an app developer, you know mobile app users have frustrating experiences -- screen sizes are small, dropdowns and other UX elements are hard to navigate and require the user to learn and get used to. Touch and type is impossible to use while on the go. Graphical User Interfaces have reached their limits.
Join us May 26th and learn how you can revolutionize your app UX with the Alan Voice AI Platform. With Alan, you have everything you need to Build, Debug, and Integrate a powerful voice interface into your applications. Once Integrated, Alan provides deep insights with logs and analytics so you can Iterate quickly to bring users an amazing experience.
We'll show you prime use cases for voice and give a step-by-step guide on how you can add a voice interface to an existing iOS application.
Hear from leaders in Voice Application Development and learn how voice interfaces will play a significant role in enhancing the quality of our interactions with computers and transform every global industry.
Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. Examples include:
- Exploits of unpatched and new vulnerabilities
- Insecure configurations
- Leaked or weak credentials
- Insider threats
Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail. In order to keep up with threats at runtime, an open-source based approach can help you stay up to date.In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what. We will also cover how Sysdig Secure extends the Falco detection engine and eases the burden of creating and updating Falco rules. It can also generate fewer false positives by tuning Falco-based policies for your own environment.
Frank Konieczny, CTO, U.S. Air Force & Mark Palmer, SVP Analytics, TIBCO Software.May 26 20205:00 pmUTC52 mins
Watch TIBCO’s Virtual Supply Chain Round Table on to gain access to exclusive thought leadership concerning the current state and future of supply chain.
Gain industry perspective from guest speakers including; Frank Konieczny, CTO, U.S. Air Force and Mark Palmer, SVP Analytics, TIBCO Software.
Explore how you can:
Eliminate data silos with an integrated solution
Ensure accuracy & one version of the truth
Analyze and gather insights from designated data sources to create timely & reliable plans/forecasts
Understand the impacts of potential outcomes in order to adapt to market conditions
Eric Miller, Senior Director, Customer Solution Architecture, Onica, a Rackspace CompanyMay 26 20206:00 pmUTC75 mins
The power of machine learning allows us to produce actionable insights with our data and streamline decision making, but it can be challenging to manage ML development workflow due to a lack of advanced ML tooling. Learn how you can leverage Amazon SageMaker Studio, a fully integrated development environment for ML in AWS, to easily and quickly build machine learning models under a convenient and intuitive single pane of glass. We’ll explore the Amazon SageMaker Studio service and discuss how the integrated visual interface manages workflow in order to build, train, and deploy machine learning models at scale.
What we’ll cover:
- An introduction to Amazon SageMaker Studio
- Core features such as SageMaker Studio Notebooks, Autopilot and Experiments
- How to enable and create your own Amazon SageMaker experiments
- How to engineer features, tune models and obtain data for analysis
Iddo Gino, Founder and CEO - RapidAPIMay 26 20207:00 pmUTC45 mins
Applications Programming Interfaces (APIs) have risen in popularity and adoption by financial services, which has been thrust into the API economy by regulatory involvement in open banking and PSD2, evolving customer expectations, and the growth of fintech startups bringing technology to every aspect of banking. APIs fuel innovation and elevate customer experiences by enabling banks to enhance their web portals and mobile applications, extend payment systems, and expand their offerings by exposing data and services to customers and partners.
In this session, RapidAPI’s Founder and CEO, Iddo Gino:
-Explores the driving forces behind this rise in adoption for APIs in financial services
-Examines the types of APIs being created and exposed by banks around the world
-Presents a set of recommendations for doing APIs smartly based on information from more than a dozen different banks