The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Is your cybersecurity protection making the grade? Healthcare rates a 'C' in security, almost half of US residents have been compromised, and the end-user impact is tens of billions of dollars a year.
An easy first step is understanding the attack vectors and automating HIPAA technical controls. This automation lets you quickly understand your baseline security posture both on-premise and within the public cloud, where you have gaps, and how to remediate them.
The low code movement is erupting in the enterprise, creating some confusion but also providing opportunity. The boundaries between IT and Lines of Business are blurring as a need for agility and velocity drives adoption of less code-centric development tools. Low code approaches to building microservices and APIs offer a way to simplify complex application development and data integration into graphical, declarative configuration, thus accelerating the development lifecycle and making developers more efficient and productive. This provides an opportunity to accelerate delivery of key initiatives without sacrificing quality.
Jason Bloomberg, president of Intellyx, will discuss the low code movement, its impact on the enterprise and developers, and its future. Renu Motwani, Product Manager for CA Live API Creator, will then discuss CA’s low code solution for creating and executing low code APIs and microservices, and provide a demonstration of its capabilities.
Agile works well for small, co-located teams that can hover around sticky notes on a Kanban board, and collaborate on-demand. But as initiatives become more complex, and teams become dispersed, Agile can be difficult to scale across the enterprise.
What’s missing in Agile practices today is the ability to see the whole picture. With user stories as the source of record for an application, it’s hard to connect all the dots to see the complete functionality of a feature or capability. Think about the new team who will be developing additional features on that capability - where can they learn everything it does today? How will they know the impact their changes will have on that capability or potentially other capabilities? How will they collaborate on those changes and get them reviewed in a timely manner? How will your business stakeholder understand the impact of new those changes to the overall business process? Storyteller provides a centralized reusable searchable repository of exiting business and technical process models and requirements (business, non-functional and regulatory). In addition we also offer rich visualization, collaboration and review functionalities. These base capabilities are being used today to address the questions above. And - we do it in a way that everyone can understand from Business Stakeholders down to developers and testers.
Storyteller is a key player in Enterprise Agile. We bridge the business gaps in the current agile process. For companies struggling with Agile Transformation, we providing guardrails around writing user stories and feature decomposition. Project teams can save time and effort by using our user story and test plan generation which can them be automatically synched over to ALM tools. We are also a key player in the BizDevOps chain by providing that upfront business alignment so what is produced though “Dev” and delivered and maintained by “Ops” is exactly what “Biz” wanted.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
DNS plays a central role in all online services but for many enterprises, DNS is inhibiting efforts to modernize infrastructure and boost online performance. In this webinar, Liam Eagle from the 451 Group and Jonathan Sullivan, co-founder of NS1 discuss the role of DNS in how applications are deployed and delivered. Learn the results of the latest 451 research and discover how a modern, intelligent DNS delivers positive business results for online enterprises. Topics include:
1.How the application deployment landscape is changing: DevOps, automation, infrastructure as code.
2.Application performance and new techniques for getting more value at less cost from your cloud, CDN and network providers.
3.How enterprises are leveraging intelligent DNS to gain better results from their top IT initiatives.
Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW
In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!
Join our webinar to find out...
>How businesses can monetise the internet of things in the long term
>What skills they need and where to find them
>How to address fundamental security considerations.
This webcast will explore modern messaging and the dynamics and trends that can lead to messaging becoming more strategic. Flexible, standards-based messaging are needed with the trends and dynamics of Cloud and Internet of Things (IoT). Simply, messaging has evolved to address highly scalable, cloud-native architectures with the qualities of services expected of enterprise-grade messaging.
- Why is next generation messaging is important to Cloud and IoT?
- Examples of successful, real-time enterprises, connecting information across data, devices, applications and IoT.
- Best Practices for implementing next generation messaging to connect business applications, cloud, devices and IoT
This webcast is intended for application developers, architects and business analysts who are interested in connecting information across a diverse environment.
Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.
This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
Yann Palmore, Vice President, Smart Building Solutions, JLL
Ray Moya, COO/CTO, Argent Associates, Inc.
>> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.
>> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.
For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.
Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.
Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.
Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:
- Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.
- Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.
- Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.
Viewers will learn:
- The magnitude of the impact of this breach across consumers and industries
- The true costs of a breach
- How to discover if your personal information has been exposed and what you can do about it
- What to expect in terms of cyber threats in the future
- How can to protect your data and secure your organization
- Expert recommendations on improving breach protection, detection and response
- Brian Robison, Sr. Director of Security Technology, Cylance
- Stephan Chenette, CEO, AttackIQ
- Michael Davis, CTO, CounterTack
- Kevin Flynn, Global Director of Products, Skybox Security
HDFS on Kubernetes: Lessons Learned is a webinar presentation intended for software engineers, developers, and technical leads who develop Spark applications and are interested in running Spark on Kubernetes. Pepperdata has been exploring Kubernetes as potential Big Data platform with several other companies as part of a joint open source project.
In this webinar, Kimoon Kim will show you how to:
–Run Spark application natively on Kubernetes
–Enable Spark on Kubernetes read and write data securely on HDFS protected by Kerberos
Microservice architectures enable development teams to bring new features and updates to market faster. But enterprises adopting microservices also experience common challenges like service redundancy, duplication, and not being able to connect to existing databases and SaaS tools easily. With an increasing number of services across the organization, visibility and governance become even more critical for IT.
In this webinar, we will cover how Pivotal and Mulesoft are addressing these challenges with a modern application development and operations environment so that application developers can remain focused on generating value for customers, and operators can deploy, monitor, and scale their apps faster.
Topics include how you can:
* Rapidly build and deliver scalable, resilient microservices and applications implementing distributed system patterns
* Easily catalogue, discover, and consume your microservices
* Quickly connect your microservices to legacy or SaaS applications
* Analyze API metrics and manage appropriate policies to govern interaction patterns across the services/APIs landscape
More than ever, it has become imperative that today’s fast-moving enterprises modernize their IT infrastructure and operations and improve their capacity to meet demand. For many companies, accomplishing this goal means containerizing products and applications and managing those containers with Kubernetes, the container orchestration platform. Ticketmaster is one such company.
Join Ticketmaster SVP Platform and Operations, Justin Dean, and CoreOS Founder and CEO, Alex Polvi, on Tuesday, September 19 at 10:00AM PT as they deep dive into how Ticketmaster used CoreOS Tectonic, an enterprise-ready Kubernetes platform, to:
-Reduce time to deployment from 20 minutes to 60 seconds
-Improve stability and scalability of application infrastructure
-Automate operational activities (e.g., OS- and cluster-level upgrades)
-Migrate applications off legacy technology and onto a modern infrastructure
In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.
Join this webinar to learn:
• How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
• How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
• Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
• And more
Mangesh as a pratitioner working with multiple customers, talks about the initiatives being undertaken, the types of tools, process fits and assessments depending on where customers are at on their RPA Journey.
To request attendance to the Event on the 28th September register here: http://bit.ly/2wKdNlL
Arnaud Lagarde Strategic Account Manager, Automation Anywhere describes the content to be covered in the upcoming automation event on the 28th September at the CBR Dining Club with NTT DATA Services,relationship with man and machine,where companies are automating and the adjustments companies are making with software robots taking on the human tasks.
Interested in Attending the event on the 28th September - visit http://bit.ly/2wKdNlL
As organisations use CI/CD pipelines to build, test and deploy software at ever increasing speed it becomes imperative that the software supply chain should be secured to prevent the deployment of code of unknown provenance or with known vulnerabilities. In this webinar we will examine this topic from the following perspectives:
1. Ensuring that a ‘chain of custody’ is maintained from source control through to deployed production code.
2. Understanding how software components and artefacts are introduced into the supply chain.
3. Best practices for controlling and assessing third party components in the supply chain.
The adoption and popularity of containerized applications has exploded in recent years. According to Gartner, more than 50% of new workloads will be deployed in containers by 2018.
But where does that leave the other 50%? How are virtual machines measuring up and how will applications built on these infrastructures survive the digital transformation caused by Docker and other container platforms?
Join this expert panel discussion with Fabio Gomez, Cloud Solution Architect- CASE, IBM, Tarak Modi, President & CTO of TekNirvana, Swen Conrad, CEO of Ocean9, and Phil Mullan, Head of Engineering at Huddle, to discuss which IT infrastructure makes the most sense for your business in the digital age, and the pros and cons of different operating systems.
Docker containers are changing the way we build, deploy, and access current day software solutions. They help us build, share and use software across any device, on any platform and anywhere in a seamless manner. In this session, you will see how to dockerize a basic piece of software, pushing it to the docker registry and pulling other docker images into your system.
Join Dr. Ganesh Neelakanta Iyer, Manager, Technical Support, Core Products and Software Developer, Progress for an in-depth guide into all things docker.
If you have been tasked with building an application security program, or your organization is starting to consider one, you may be curious where to start.
Not only does application security rely on sound security understanding, it also relies on a fundamental understanding of software development. You must consider things like budget, or lack thereof, resources, priorities, and strategy when building an application security program.
In this talk, James Jardine, CEO of DevelopSec, will talk about these different considerations when just getting started. Come learn some of the key elements to helping get your application security program started in the right direction.
James Jardine is CEO of DevelopSec, owner of Jardine Software, an application security consultancy, as well as founder and regular contributor to Down the Security Rabbit Hole and DevelopSec podcasts. He has over 16 years experience focusing on application security and software development. James is a regular keynote speaker, including InfoSec World 2017.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?
Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
•Securing blockchain from the edge to the core
•The operational benefits and pitfalls of blockchain technology
•Our 4 step qualification process for blockchain business opportunities:
1.Is there an established business process?
2.Are there more 3 parties involved – i.e. is it a distributed problem?
3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
4.Would automation improve the performance of the process?
There’s no way around it; as a software developer, system engineer, or system architect, you’re going to encounter design complexity when developing safe, secure and reliable IoT systems for today’s critical infrastructure. But in this new software-defined world and with the IoT exploding around us, companies like yours must adapt to stay relevant. While legacy critical infrastructure is too expensive to just replace completely, there are ways to implement new features that will define premium products for your market and meet the safety and security requirements necessary for connecting to the IoT. In Day 1 of this three-day class, we’ll look at how you can transform digitally and ensure that your applications remain safe and secure. Sponsored by Wind River.
Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.
Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.
VR Simulation & Training has been used successfully for decades, but often at a cost of tens of millions in industrial hardware. Now Sim & Training is far more accessible and has myriad use cases in Industry - Oil & Gas, Retail (warehousing), Manufacturing, even Corporate Training.
Amy Peck will share how industries are embracing this technology and seeing measurable ROI. The critical component is end-to-end execution, from building bespoke training modules to integrating into existing Learning Management Systems (LMS) and back-end data stores and analytics.
Companies are updating their critical infrastructure, and safety has become a key issue, with increased regulation and risk of litigation driving the need for safety certification in industries such as aerospace, energy, industrial automation, medical, and robotics. One area of concern is partitioning safety certified and non-safe code and that’s what we’ll cover in Day 2 of this three-day course. We’ll look at how using virtualization, Java, analytics and various types of partitioning in your IoT design can maximize safety and reduce your overall design cost and risk. Sponsored by Wind River.
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Smith, CTO, Cloud, Imagine Communications
Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.
Host: Limor Schafman, Content Development Director, TIA
With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
•Overview of DFARS mandate
•Use cases – our experience from the field
•Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
•Mapping solutions to the needs of your department
Despite the past two years of hoopla surrounding VR technology, adoption rates are low and retention rates are even worse. Giants such as Facebook, Google, and Samsung have dumped billions into the space, but why isn't it taking off yet? In this webinar, Brian Herrera, CEO of Vidi VR, will give an outsider's look at the inside of this nascent industry and lead a candid discussion about:
- Hurdles in the way of widespread adoption (spoiler alert: it's NOT technology)
- The true value proposition of VR for consumers
- What the big players and "thought leaders" got wrong
- How Vidi VR is a differentiator in the industry
Learn how Veracode Developer Training can help your development team code more securely!
Join this 20 minute webinar to get your application security program and secure DevOps initiatives off the ground with Veracode Developer Training. Learn how your developers can address important security concerns, such as:
•OWASP Top 10 and PCI requirements
•Secure coding for multiple languages (e.g., Java, .Net, CC++) and architectures (e.g., Mobile, Web and ClientServer)
•Proactive techniques, such as Threat Modeling and Secure Architecture that can be used in the early stages of the Software Development Life Cycle (SDLC), minimizing the number of security defects in the code
Join this webinar to learn what is new in Canonical OpenStack Pike. Product Manager Mark Baker will highlight some of the new features in OpenStack Pike as well as many of the updates to underlying technologies such as OpenvSwitch and Ceph that are fully integrated with Pike. We'll discuss how to upgrade from Ocata to Pike using OpenStack Charms and how you can get going with Pike from scratch in a matter of hours.
Can government institutions use modern tools and technologies to become more flexible and responsive to their constituents? What should they be looking at, and how should they adapt to the challenges of data security, privacy, and reliance on legacy systems? Digital transformation is an ambitious project for any organization; government decision-makers are hoping it will provide a path to broader citizen engagement, empowered employees, and new digital infrastructures that will provide better access to data and services.
In this webinar we will discuss the results of a survey on the challenges and imperatives of digital transformation, including the perspectives of government managers on their technology and operational challenges and expectations.
Conversational interfaces are ubiquitous and take many forms, from chatbots on the web to voice bots on your appliances (Siri, what is a voice bot?)
We are now seeing these features evolve in Virtual Reality: in role-playing games such as Star Trek Bridge Crew and much more. For developers and conversational designers, it is important to understand on which medium the message is being communicated.
Join this webcast with Anamita Guha, Product Manager of IBM Watson's Developer & AR/VR Labs, as she shares some best practices for designing conversations in VR between the user and your virtual entity.
A converged APM/IPM solution can facilitate true root-cause analysis from an end-to-end IT service management (ITSM) perspective, inclusive of both supporting and customer-facing IT services, as well as across multiple service lifecycle stages. In addition, by having all service team members share an easy-to-use interface that is tailored to each of their requirements minimizes learning curves, enhances operational efficiency and ensures user satisfaction by providing a production-grade monitor to IT staff that are working in staging environments.
Attend this webinar to discover how a converged APM/IPM solution can be leveraged effectively in pre-production to eliminate bottlenecks in testing, delays, re-work or increased deployment risk.
Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. When a data breach occurs, Security Operations teams often struggle to pinpoint and resolve the problem. Lack of sufficient visibility, silo’d, disparate tools combined with manual processes, can weaken your organization's overall security posture.
Join this interactive webinar to discover a better way to defend your network against cyber threats. Learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
The public’s perception of virtual reality runs the spectrum from excitement to unknowing to downright confusion. When creating a VR product and brand, how should you navigate the landmines of being associated with virtual reality for better or worse. The science fiction, futuristic, and gaming-oriented identity of the medium can be appeal to fanboys and VR aficionados, but how do you build a brand that fosters frictionless adoption of your product? How does your VR technology product enter the market next to existing products and services? We’ll chat through visual and verbal branding and marketing issues that you may encounter in launching a VR product.
With the connection to the Internet and the connectivity to a plethora of devices, cybersecurity is a big issue. This dovetails with the need for multiple levels of safety that were discussed in Day 2, as it pertains to the cost of certification in critical infrastructure IoT. While this may sound like a complex endeavor, it doesn’t have to be. Attend Day 3 of this three-day course, and we’ll make sure that you’re headed in the right direction. We will show you how your IoT applications can be made secure and updated with critical cybersecurity patches while at the same time your safe and certified critical infrastructure applications remain untouched. In addition, we’ll provide a wrap-up of the three days and be sure to answer any outstanding questions. Sponsored by Wind River.
Corporations across all industries face the challenge of taking power and data to new distances while meeting higher bandwidth demand. Frequently combined with this challenge is the requirement to provide local power in excess of 100 meters for remote IP-based devices, such as security cameras, wireless access points, emergency blue-light phones and card readers. Learn how OneReach™, a Berk-Tek PoE extender system, combines optical fiber for long-distance gigabit transmission and copper conductors in a single system.
Register for this BrightTALK™ to learn how you can:
- Take PoE and PoE+ to distances further than ever before (3,600 ft and 2,400 ft respectively)
- Simplify your network and device management through centralized IT infrastructure
- Leverage this game-changing technology to reliably and cost-effectively power remote devices