Hi [[ session.user.profile.firstName ]]

Application Development

  • Machine Learning in Reproductive Science: Human Embryo Selection and Beyond
    Machine Learning in Reproductive Science: Human Embryo Selection and Beyond Oleksii Barash Recorded: Jul 16 2018 42 mins
    Description:

    In this talk, Oleksii Barash PhD, IVF Laboratory Research Director at the Reproductive Science Center of the San Francisco Bay Area, will discuss his team’s approach to applying machine learning for decision making during infertility treatment. Oleksii will also give a quick overview of how he uses Driverless AI to build models for predicting IVF outcomes and select the best embryo for embryo transfer.


    Speaker's Bio:

    Oleksii believes that evidence-based clinical decisions will greatly improve the efficiency and safety of the medicine. He received his Master degree in Clinical Embryology from University of Leeds (UK) and PhD in Cell Biology. The ultimate goal of his findings is to essentially transform medical records into medical knowledge.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start Robbie Carroll, Account Manager, AWS Recorded: Jul 16 2018 34 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Strategies for Improving Enterprise Application Security
    Strategies for Improving Enterprise Application Security Brad Causey, CISSP, and Rami Elron, Senior Director of Product Management at WhiteSource Recorded: Jul 16 2018 64 mins
    Most online attacks begin when a hacker discovers a single vulnerability in an enterprise application. But how can organizations eliminate these vulnerabilities before they are exploited? While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts on application security and the DevOps movement discuss the steps that enterprises can take to build security into the app development process.
  • SOA and legacy modernization: the first step to the New Enterprise
    SOA and legacy modernization: the first step to the New Enterprise Steven Camina, Senior Product Manager Recorded: Jul 13 2018 45 mins
    Service-enabling legacy assets and effectively managing and orchestrating services is the first step toward realizing the promise of the New Enterprise. In this webinar, Steven Camina, Sr. Product Manager at MuleSoft, will present strategies and demo solutions for getting the most out of your legacy assets and outline the steps you can take to build a solid foundation for APIs down the road.

    You will learn how to:
    •Identify legacy assets within your organization
    •Move data in and out of legacy systems without downtime [DEMO]
    •Wrap legacy applications with APIs to capitalize on existing investments [DEMO]
    •Build future-proof integrations that deliver continued value [DEMO]
  • The CIO’s Top 10 Strategic Security Metrics
    The CIO’s Top 10 Strategic Security Metrics Pete Lindstrom Recorded: Jul 13 2018 27 mins
    No enterprise can be completely secure, and in the uncertainty that necessarily permeates the landscape, others will find fault. This web conference provides a way for CIOs to use proven scientific and economic principles to enhance their organizations’ security position. Simply put, the most effective security programs reduce the most risk with the least resources; therefore, an organization must find a way to measure the efficacy of its security program to understand how much of the risk it is reducing after it applies security controls. With the appropriate key risk indicator (KRI) data collected, organizations can determine which initiatives are ultimately the most useful in their security program.
  • Digitising Shared Services
    Digitising Shared Services Iain MacDonald, Director at AuraQ, k2 partner Recorded: Jul 13 2018 28 mins
    Listen to 2 Sisters Food Group disclose how they delivered cost savings of more than £250K p.a. and quality improvements of 40% in just a matter of months.
  • Spring on Google Cloud Platform
    Spring on Google Cloud Platform Ray Tsang, Google Recorded: Jul 12 2018 57 mins
    Pivotal and Google Cloud Platform (GCP) collaborate on a number of projects—including Pivotal Cloud Foundry Service Broker for GCP and Spring Boot starters—that make it easy to leverage GCP's managed services, whether you are starting a new project or migrating an existing on-premise project.

    In this talk, we'll examine different GCP-created tools that help you develop and run Java and Spring applications, such as Spring Cloud GCP. In addition, we'll look at the different runtime environments that you can deploy to, such as Google Kubernetes Engine, App Engine, and Pivotal Cloud Foundry with GCP Service Broker.

    Finally, we'll go over some of the platform services that help you monitor, troubleshoot, profile, and debug your Java production application.


    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Google Privacy Statement:
    https://policies.google.com/privacy

    This Webinar:
    https://content.pivotal.io/webinars/jul-12-spring-on-google-cloud-platform-webinar
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Mind the Gap: The 5 Most Common Cloud Security Oversights Jacob Serpa, Product Marketing Manager, Bitglass, Brandon Dunlap (Moderator) Recorded: Jul 12 2018 60 mins
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
  • Marie Curie, Open Source, Kickstarter and Women in Tech
    Marie Curie, Open Source, Kickstarter and Women in Tech Mandy Whaley, Director of Developer Experience, Cisco Recorded: Jul 12 2018 50 mins
    Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie's treatment of their work in the early 1900's and today's tech industry? I certainly didn't…

    Join Mandy Whaley to explore how the Curie's used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision.

    Also, learn how Marie Curie also used a strategy similar to Kickstarter to raise funds to buy radium for her own research, and how all of these experiences and lessons can help us today.
  • Getting Your Bearings in a DevSecOps World
    Getting Your Bearings in a DevSecOps World Apoorva Phadke, Associate Principal Consultant, Synopsys Recorded: Jul 12 2018 48 mins
    Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software—quickly. By automating manual processes and building tools into the continuous integration and continuous delivery (CI/CD) pipeline, they’ve increased trust between groups, which is essential as these once-disparate teams tackle critical issues together. In this webinar, you’ll learn how to build a DevSecOps culture in your organization with automated and integrated application security tools and the right training for each team.
  • Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution
    Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution Ed Willhide Recorded: Jul 12 2018 59 mins
    edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!

    What you will learn:

    •How our ETV technology collects data for visualization and actionable response
    •How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
    •How to create Role-Based views
    •How a Single Pane of Glass solution is built
  • Tech Talks meet James Herbert, CEO of Notbinary
    Tech Talks meet James Herbert, CEO of Notbinary David Savage Jack Pearce Recorded: Jul 12 2018 41 mins
    Notbinary CEO James is our guest on this episode, describing how they are turning organisations into modern digital businesses. Trusted by government, education, finance and industry to design and implement digital change programs, they exploit the efficiencies and opportunities of digital technology, business models and methods. Where does James see the biggest challenge? A lack of leadership.

    Also on the show Joanne Frearson (Editor at Business Reporter) joins Dave and Jack to discuss Lime and Uber
  • How to Achieve a DevSecOps Culture Using a Lean-Agile Approach
    How to Achieve a DevSecOps Culture Using a Lean-Agile Approach Larry Maccherone, DevSecOps Transformation Leader at Comcast Recorded: Jul 12 2018 60 mins
    There are a lot of DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or more faster than human gating can achieve.

    What's needed to add security to DevOps are tools that work well with rapid-cycle CI/CD pipelines and an approach that reinforces the DevOps culture and process changes. This requires that security specialists become self-service toolsmiths and coaches and stop thinking of their jobs as gatekeepers.

    Join Larry Maccherone, an industry-recognized thought leader on Lean/Agile, Analytics, and DevSecOps, as he introduces a framework to accomplish this mindset shift. It includes guidance on the characteristics of tools compatible with DevOps. It has been successfully used in a large DevSecOps transformation at Comcast and has gained recognition in DevSecOps circles as a leading framework.
  • Blockchain in Government: Important Emerging Use Cases
    Blockchain in Government: Important Emerging Use Cases Shawn P. McCarthy, Research Director, IDC Government Insights Recorded: Jul 11 2018 24 mins
    Join IDC Government Insights' Shawn McCarthy as he discusses blockchain in government and important emerging use cases.
  • Zero Code Multi-Cloud Automation with Ansible and Terraform Recipes
    Zero Code Multi-Cloud Automation with Ansible and Terraform Recipes Gaurav Rastogi, Architect - Avi Networks Recorded: Jul 11 2018 53 mins
    Does your automation require more or less work? Avi's take is less. That’s why Avi offers zero-code multi-cloud automation for Day 0 and Day 1+. DevOps and IT teams can achieve self-service application and infrastructure resources provisioning (Day 0) without writing custom scripts per app or per cloud. We will walk you through how to leverage Ansible and Terraform to automate tasks throughout the lifecycle of an application (Day 1+) using YAML-based declarative configurations.

    Learn how to:
    - Achieve efficient, repeatable, and automated app provisioning without writing code
    - Use Ansible roles and modules or Terraform providers to easily automate common tasks
    - Deploy across multi-cloud environments with consistent experience without customizations
    - Gain visibility into app performance and apply closed-loop analytics to drive automation
  • So Many Browsers, So Little Time
    So Many Browsers, So Little Time Robert Gutierrez, Solution Marketing Lead and Shahar Shiff ADM, SWAT Solution Architect, Micro Focus Recorded: Jul 11 2018 37 mins
    With dozens of web browsers and thousands of mobile devices needed to validate your app, functional testing must evolve to stay on time. Without a test lab to help, running down the clock is inevitable and today's testing tools need to do more than write and maintain tests. Teams need to run tests across many browsers and devices, gather actionable insight when issues are detected, and focus their testing effort for the greatest impact.

    In this webinar, you'll learn:
    • How to prioritize which environments to test
    • How to run your app across mobile devices and browsers
    • Insights to identify and resolve false positive errors after a test run

    By the end of this session, you'll be able to make the most of your cross-browser testing and add some time back into your day.
  • Serverless and Servicefull Apps - where Microservices complements Serverless
    Serverless and Servicefull Apps - where Microservices complements Serverless Burr Sutter Director of Developer Experience, Red Hat Recorded: Jul 11 2018 35 mins
    Serverless is a misnomer, your future cloud native applications will consist of both microservices and functions, wrapped as Linux containers, but in many cases where you the developer ignore the operational aspects of managing that infrastructure. In this session we get started using Function as a Service (FaaS) engine with Apache OpenWhisk deployed on Kubernetes and OpenShift. With Kubernetes/OpenShift being de-facto platform for Cloud Native Java Applications, we will explore on to see how to make Cloud Native Java Applications a.k.a Microservices can complement the serverless Functions. This technical intensive session will open up one of the possible serverless web application architecture where we deploy an API Gateway into the FaaS platform to draw the curtains up to see the microservices talking to the serverless functions. This session ends with us seeing how Event Sinks and Event Sources map in the Serverless World.

    Presenter: Burr Sutter, director of Developer Experience, Red Hat
    A lifelong developer advocate, community organizer, and technology evangelist, Burr Sutter is a featured speaker at technology events around the globe—from Bangalore to Brussels and Berlin to Beijing (and most parts in between). He is currently Red Hat’s director of Developer Experience. a Java Champion since 2005, and former president of the Atlanta Java User Group. Burr founded the DevNexus conference—now the second largest Java event in the U.S.—with the aim of making access to the world’s leading developers affordable to the developer community. When not speaking globally, Burr is the passionate creator and orchestrator of highly-interactive live demo keynotes at Red Hat Summit, the company’s premier annual event.
  • COBOL Analyzer – Application Insight
    COBOL Analyzer – Application Insight Alwyn Royall, Solutions Consultant, COBOL, Micro Focus Recorded: Jul 11 2018 40 mins
    COBOL applications continue to evolve into valuable business process assets, but do we really know what these systems actually do? Watch how COBOL Analyzer can uncover the hidden processing and data access in COBOL applications, with visual representation. COBOL Analyzer will enable you to explore your COBOL applications and report on their health.

    This webinar is relevant to users of most Micro Focus COBOL product ranges, including Net/Server Express (and prior versions), Visual COBOL, RM/COBOL and ACUCOBOL. COBOL Analyzer is the distributed version of Enterprise Analyzer.
  • Build a REST API in 5 Minutes with PubNub
    Build a REST API in 5 Minutes with PubNub Adam Bavosa Recorded: Jul 10 2018 36 mins
    Wouldn’t it be nice if building a REST API wasn’t such a hassle? And you didn't have to go through:

    -choosing a cloud hosting provider
    -purchasing a domain
    -configuring a Kubernetes cluster
    -Dockerizing application code and microservices ... and so much more!

    Join us Tuesday, July 10th, at 10am as the PubNub DevRel Team shows you how to BYPASS ALL THESE STEPS and build a faster, infinitely scalable, and totally secure REST API in just a few minutes using PubNub Functions.
  • Serverless App Dev on AWS
    Serverless App Dev on AWS Amir Kashani, VP of Engineering at Onica Recorded: Jul 10 2018 60 mins
    Servers are fading into obscurity. Instead, the model of “Run code, not servers” is prevailing, spurring a cloud native mindset where developers consider infrastructure and integrations from day one. Join us to learn how AWS makes fault-tolerant, auto-scaling, and self-healing systems a reality for application development with their Serverless offerings. Build, test, and deploy with lower fixed costs and no single points of failure.

    We'll discuss:
    -Serverless Concepts
    -AWS Serverless Offerings
    -Serverless Application Model
    -Traditional App dev vs. Next Gen App Dev
    -Customer Success Story – Alistair Group
    -Serverless App Dev Framework
    -Demo
  • Learn What’s New in Sencha Ext JS 6.6 with Open Tooling
    Learn What’s New in Sencha Ext JS 6.6 with Open Tooling Sandeep Adwankar, Sr. Product Manager & Marc Gusmano, Solutions Architect @ Sencha Recorded: Jul 10 2018 62 mins
    Join us for a webinar on July 10th to learn what’s new in our latest release, Ext JS 6.6 with open tooling. This release includes several major enhancements as well as support for npm packaging and open tooling for exceptionally easy workflows that every JavaScript developer is familiar with. With open tooling, Ext JS developers now have powerful tooling to rapidly generate, build and update Ext JS applications.

    Attend this webinar and you will see Ext JS 6.6 with open tooling in action, including:

    - How to access Ext JS standard and premium components, themes and framework as npm packages, hosted by the Sencha npm repository
    - Introduction to ExtGen, a new open tool that enables developers to generate new Ext JS apps by asking a series of questions and provides a number of new app templates
    - Introduction to ExtBuild, a new open tool to build and transpile your apps
    - New modern components such as modern time field and time panel, as well as the enhanced gauges component with improved ability to display interval values
    - New beautiful Graphite theme that makes your accessible apps visually stunning
    - Dynamic Styling of applications using Material Theme
    - Advanced Ext JS routing enhancements
    - And more!
  • Integrating Secure Message Features Results in Happy Customers
    Integrating Secure Message Features Results in Happy Customers DataMotion Recorded: Jul 10 2018 1 min
    Financial services customers want to interact with you securely, in multiple ways - whether through a mobile or enterprise app or on your customer portal. This short video briefly describes how to integrate secure message features and bring everything together for your customer.
  • Achieving Full Stack DevOps at Colonial Life
    Achieving Full Stack DevOps at Colonial Life Colette Casey - Techical Architect at Colonial Life Recorded: Jul 10 2018 61 mins
    This on-demand webinar highlights the transformation Colonial Life made in bringing DevOps to the entire software stack. In addition, the presentation focuses on the critical role that data and the database play in modern software delivery and the tools Colonial Life used to create their Database DevOps process.


  • Simplifier et automatiser les tests de charge, de performance et d’API
    Simplifier et automatiser les tests de charge, de performance et d’API Pascal Gasp et Olivier Laplace, Consultants Senior chez CA Technologies Recorded: Jul 10 2018 49 mins
    La performance et la robustesse applicatives sont gage d’une expérience utilisateur de qualité. Dans ce contexte, CA BlazeMeter ouvre de nouvelles possibilités que vous pouvez piloter via l’intégration continue :

    •Tests de charge et de performance : tirez profit des outils open source JMeter, Selenium, Gatling et Grinder, et simulez très simplement des millions d’utilisateurs virtuels depuis 56 lieux géographiques ;
    •Tests d’API : intégrez une stratégie de tests sur API dans votre démarche de tests en continu ;
    •Taurus : en complémentarité avec le projet open source Taurus, permettez aux développeurs de décrire leurs scénarios de tests de performance avec une syntaxe YAML.

    Dans ce webinar, vous découvrirez comment CA BlazeMeter vous permet de tester plus tôt, simplement et automatiquement la performance de vos applications.
  • *AST in CI/CD - How to Make it Work
    *AST in CI/CD - How to Make it Work Ofer Maor, Director, Solutions Management at Synopsys Jul 17 2018 11:00 am UTC 60 mins
    SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this session we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The session will review the pros and cons of each of the testing technologies, how to adapt it to rapid development, and how to make testing work as organizations are moving to A/B testing. Finally, this session will guide on how to manage the balance between risk and speed to build the right process, so that real threats will become blockers, but other issues will be handled in a parallel, slower cycle, without slowing down the main delivery.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start AWS Jul 17 2018 1:00 pm UTC 45 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • How to Transform Your Network From “No and Slow” to “Yes and Go”
    How to Transform Your Network From “No and Slow” to “Yes and Go” Mark Hollman - Head of SDN/NFV Product Marketing, Verizon Mark Burgbacher – Lead, Verizon Application Enablement Team Jul 17 2018 1:00 pm UTC 60 mins
    Large enterprises are under pressure to stay ahead of ever increasing customer expectations and developments in technology. They need to be able to innovate, scale and deploy at speed without incurring high costs. Learn how SDN is becoming an enabler to help enterprises accomplish these business objectives, and how Platform as a Service will help your organization accelerate into the future. Now, more than ever, you need to include Network in your full stack DevOps teams.
  • Create Value for Your Business by Evolving Custom Apps into Packaged Solutions
    Create Value for Your Business by Evolving Custom Apps into Packaged Solutions SAP Jul 17 2018 3:00 pm UTC 60 mins
    With the advent of cloud computing and as-a-service providers, organizations are meeting their solution needs in new ways in order to become more intelligent enterprises. As a result, many value-added resellers, consultants, and system integrators are exploring new business models with a focus on packaged software.

    The addition of a packaged software business model opens new opportunities for growing your company’s value. Take advantage of your existing industry and functional development expertise to drive repeatable and scalable revenue from packaged software as a service.

    Join us July 17 to learn how the SAP PartnerEdge program can support you in extending your existing business model to include packaged applications by rapidly commercializing solutions based on SAP Cloud Platform and SAP intelligent technologies. Hear firsthand from our resell- and service partner, Incture Technologies, about moving into the packaged app world!

    Featured Speakers:

    •Christian Baader, VP Strategy & Marcom, SAP Global Channels & Platform GTM Ecosystem

    •Sachin Verma, CEO and Founder, Incture Technologies

    Learn about:

    - Evolving your business by moving to the cloud and to packaged IP
    - Using tools, assets, and services designed to help you get started
    - Leveraging SAP Cloud Platform to speed development and time to market
    - Deploying and going to market through multiple scenarios
    - Harnessing development and go-to-market benefits of the SAP PartnerEdge program

    Join SAP and partner executives as they discuss a packaged software model and how you can act as the enabler for your customers evolution towards an intelligent enterprise based on SAP Cloud Platform, SAP intelligent technologies and SAP PartnerEdge – Build.
  • Government IT transformation at the speed of a collaborative engagement
    Government IT transformation at the speed of a collaborative engagement Josh Ranoa, business development manager, Open Innovation Labs, Red Hat Jul 17 2018 3:00 pm UTC 60 mins
    Our government’s most complex problems won’t be solved by a few genius individuals—or an amazing new technology. They will be solved by high-performing teams—teams who have developed and honed the cultural habits to efficiently cultivate new ideas with innovative technologies to get things done.

    In this webinar, you’ll learn why high-performing teams matter and how Red Hat® Open Innovation Labs is helping organizations create these teams to make an impact. You'll get a glimpse of what happens in an Open Innovation Labs collaborative engagement:

    -Teams are innovating more quickly while improving the quality of their software.
    -Participants are using lean, agile and DevOps methodologies coupled with open source tools and culture.
    -Together, people, process, and technology help government organizations rapidly uncover and prove more effective ways of working together to solve their most complex problems.
  • [Ep.17] Founders' Spotlight: Matthew Lamons & Paul Heirendt, Co-Founders- Skejul
    [Ep.17] Founders' Spotlight: Matthew Lamons & Paul Heirendt, Co-Founders- Skejul Harriet Jamieson, BrightTALK and Matthew Lamons and Paul Heirendt, Skejul Jul 17 2018 4:00 pm UTC 60 mins
    In this episode of Founders Spotlight, Matthew Lamons and Paul Heirendt, Co-Founders of Skejul, share how they started the AI driven, Blockchain-protected Calendar Assistant application.

    Skejul was named “Cool Vendor for Unified Communications 2017” by Gartner, Inc, and enables its users to set meetings in seconds without sharing calendars, bouncing emails, or disclosing private information. It also lets users see all planned and potential events in one place, on any device and lets you share your time, thoughts and activities with whoever you choose, wherever you are.
  • CA Agile Central + CA PPM: Linking Investment Planning to Work Orchestration
    CA Agile Central + CA PPM: Linking Investment Planning to Work Orchestration Laureen Knudsen, Agile Expert, and Lisamarie Manso, PPM Expert Jul 17 2018 5:00 pm UTC 60 mins
    As a CA PPM customer, you have a good handle on the work across your portfolio, but what about your agile work specifically? Agile work, and how that work connects to the overall business strategy is extremely important in understanding the value your entire organization is delivering to the market. To get there, your organization needs to build a cohesive, strategic plan—just one. Not one for different initiatives, or different teams, or different types of investments.

    Join us on July 17th at 10 am PT | 1:00 pm ET for the “Agile Central + PPM: Linking Investment Planning to Work Orchestration” webinar, as CA executive advisor and agile expert Laureen Knudsen and CA PPM expert, Doug Page discuss how such an approach needs to be built, and how to do it with CA Agile Central and CA PPM solutions. They'll also cover:

    -The need for an integrated portfolio to deliver all goals, driven only from the top
    -The importance of a cohesive view of all work regardless of type
    -The role of key leadership, finance and PMO roles in making a realistic plan
    -How to ensure project work (traditional, hybrid and agile) is managed effectively
    -How to handle plan and portfolio adjustments with minimal disruption

    Register for this webinar and learn how to make smarter decisions, in less time, delivering the kind of data insights and portfolio performance your executives expect and your business needs.
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely? Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Jul 17 2018 5:00 pm UTC 45 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • Use Autonomous Analytics to Thrill Your Customers
    Use Autonomous Analytics to Thrill Your Customers Nick Patience of 451 Research, Ira Cohen of Anodot & Tyler Pines of AppNexus Jul 17 2018 5:00 pm UTC 60 mins
    Providing a superior customer experience is the essential goal for many businesses. For AppNexus, they wanted to thrill their customers with care and attention to detail. In a digital advertising world rich with data and rapid customer interactions, AppNexus improved their customers' experience with the help of Anodot's AI capabilities, delivering more reliable platform services, proactive customer service, and higher revenue.

    Traditional monitoring tools are incapable of parsing out the many real-time fluctuations inherent in Appnexus’ business data: seasonality, regular campaign changes, intricate correlations, and measurements across many orders of magnitude.
    Learn how autonomous analytics can help you:
    1. Discover issues before your customers are impacted
    2. Understand your customers’ business and proactively provide care
    3. Enable analysts to optimize your business with the power of AI without needing a data scientist
  • SD-WAN & Hybrid WAN in the Art of Digital Network Transformation
    SD-WAN & Hybrid WAN in the Art of Digital Network Transformation Joel Stradling, Research Director, Global Data, Peter Juffernholz, Associate VP Global Network Services, TATA Communications Jul 17 2018 5:00 pm UTC 60 mins
    GlobalData research reveals that around 70% of businesses have either deployed or are deploying SD-WAN technology. Businesses are moving more and more of their IT estate into cloud platforms which is the driver for SD-WAN adoption. Of course, this easily enables SD-branches for enterprises to make their businesses more agile and cost-effective.

    Join this webinar to understand the benefits and real-life experiences of end-users who have deployed hybrid WAN and SD-WAN services. Hear our speakers discuss the link between their analysis and the over-arching theme of enterprise digital transformation along with security, cloud, and applications. Get deep insights on how current enterprise WANs are transforming, and the drivers causing the change as we approach 2020. We will share insights from case-studies based on industrial applications of SD-WAN and hybrid VPNs across a handful of industry segments.

    From this webinar, you’ll get a clear picture of how you can transform your network through tactical migration to hybrid VPN and SD-WAN.

    AGENDA

    · What does Digital Transformation mean to the Enterprise
    · Drivers for Digital Transformation: Network & IT
    · What should a fully managed hybrid/SD-WAN solution look like in 2020?
    · Industry-specific challenges: Manufacturing, Services and Logistics
    · SD-WAN/Hybrid WAN Case-studies
    · Recommendations and Executive Summary
    · Q&A
  • Trends in Security: How to Create a Scalable Threat-modeling Practice
    Trends in Security: How to Create a Scalable Threat-modeling Practice Chandu Ketkar, Principal Consultant, Synopsys Jul 17 2018 8:00 pm UTC 45 mins
    For most organizations, performing threat-modeling is a difficult and an expensive undertaking. There are good reasons why this is the case. Threat modeling traditionally requires an experienced security architect with knowhow in architecture patterns, design patterns, a breadth of technologies, and above all deep security knowledge.

    Join this webinar and learn:

    - Consistency/Reliability: Use of patterns allows us to identify recurring problems/patterns and provide consistently the same solution. In security this means that identifying patterns during threat modeling will allow us to create consistent design, development, testing, and risk guidance.

    - Efficiency: Use of patterns allows us to automate some part of a problem while leaving the more complex concerns to be tackled by experts. This creates efficiencies.

    - Commonly understood taxonomy: Patterns create a common taxonomy for organizing knowledge, training users/practitioners, communicating with stakeholders (developers, testers, architects, security analysts, etc.)
  • A Framework to turn IoT Technology into Operational Capability for Mining
    A Framework to turn IoT Technology into Operational Capability for Mining Pieter van Schalkwyk, CEO, XMPro Jul 17 2018 11:00 pm UTC 60 mins
    Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.

    This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.

    This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start AWS Jul 18 2018 1:00 pm UTC 45 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Jul 18 2018 2:00 pm UTC 90 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Jakarta EE: What does it mean for the future of Java?
    Jakarta EE: What does it mean for the future of Java? Dr. Mark Little, Vice President Engineering, Red Hat Jul 18 2018 3:00 pm UTC 60 mins
    In case you missed it, Java EE was given a new home at the Eclipse Foundation and on 26th February Jakarta EE was chosen as the new name for Java™ EE. Join this session to gain an understanding where Jakarta EE is heading and how customers and communities can help drive the future of enterprise Java.

    Java EE has been the dominant enterprise Java standard for well over a decade. However, in recent years there has been confusion and concern around its future promoting new efforts such as Eclipse MicroProfile to take just enough Java EE into the world of cloud and microservices. But all of that changed in 2017 when Oracle announced that, working with Red Hat and IBM, they were donating all of Java EE to the Eclipse Foundation and to be rebranded as Jakarta EE. What does this mean for the future of enterprise Java and traditional Java application servers?

    Dr. Mark Little, vice president, Enjgineering, Red Hat
    Mark Little leads the technical direction, research, and development for Red Hat® JBoss® Middleware. Prior to 2008, Mark served as the SOA technical development manager and director of standards. Additionally, he was a chief architect and co-founder at Arjuna Technologies, a spin-off from HP, where he was distinguished engineer. Mark has worked in the area of reliable distributed systems for more than 30 years.

    https://twitter.com/nmcl
  • NS1 Private DNS: Getting You Out of a BIND
    NS1 Private DNS: Getting You Out of a BIND Jonathan Lewis, VP Product Marketing Jul 18 2018 4:00 pm UTC 30 mins
    Cloud architectures, microservices, and infrastructure scale have exposed unmet needs in DNS that now hamper modernization efforts, including the need for flexible traffic management, service discovery, rapid propagation, and comprehensive API support.

    In this webinar, we introduce Private DNS, NS1's next-generation DNS software product providing authoritative and recursive DNS services. Private DNS is designed primarily for deployment within enterprise intranets to meet the needs of user to user, user to device/application and application to application communication.

    We'll cover:

    - Current challenges managing DNS systems
    - How NS1 is different
    - Use cases
    - Deployment and best practices
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive Mike Cooper, Sr. Security Manager Jul 18 2018 5:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • Serverless Language Translation On-the-Fly with Microsoft Translator
    Serverless Language Translation On-the-Fly with Microsoft Translator Johnathan Flowers Jul 18 2018 5:00 pm UTC 60 mins
    Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.

    With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.

    In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications Keith Mokris, Product Marketing Lead, Twistlock Jul 18 2018 5:00 pm UTC 60 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Jul 18 2018 5:00 pm UTC 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Jul 19 2018 9:00 am UTC 45 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start AWS Jul 19 2018 1:00 pm UTC 45 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.