Hi [[ session.user.profile.firstName ]]

Application Development

  • Hungry AI/ML for Fraud, Risk & Payments: Why the Database Matters
    Hungry AI/ML for Fraud, Risk & Payments: Why the Database Matters
    Brian Bulkowski, Founder and CTO, Aerospike; Matt Bushell, Director of Product Marketing, Aerospike Recorded: Jan 23 2019 58 mins
    Artificial Intelligence / Machine Learning is being implemented to make better decisions to avert fraud and lower risk for digital payments. These systems thrive on data: the more you can feed them, the better they perform. We call this “Hungry AI.” Furthermore, fraud and risk decisions need to be conducted in real-time (milliseconds or less).

    Unfortunately, most data infrastructures aren’t built to handle real-time data analysis, ingesting and acting on massive datasets at the global scale needed to mitigate these problems.

    Register now for this webinar to learn:

    - The key characteristics between offline and online AI/ML
    - Why more data is better, and the measurable impacts to your business
    - Real-world AI/ML real-time use cases for fraud and risk prevention that are deployed today
  • Application programming interface (API) management in state and local government
    Application programming interface (API) management in state and local government
    Manav Kumar senior middleware solutions architect, Red Hat & Mike Bourgeois middleware solutions specialist, Red Hat Recorded: Jan 23 2019 43 mins
    In this webinar, we will discuss and demonstrate the following topics to illustrate how customers in state and local government and higher education can use AMP to share the legacy and new services while controlling and monitoring a portfolio of APIs.

    Benefit of APIs in state and local government, and higher education
    Discuss API life-cycle management
    Discuss API-first design approach
    Build and deploy your APIs
    Build and deploy your APIs
    Control your APIs via usage policies
    Operation your APIs via monitoring, analytics, reporting, and billing
    Engage with developers through Developer Portal and interactive API documentation
    Make your APIs available via API discovery
  • Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Priya Rajagopal, Principal Product Manager, Mobile, Couchbase Recorded: Jan 23 2019 59 mins
    Architecting a mobile storage solution may feel like a daunting task, but it doesn’t have to be. In this webinar, we’ll guide you through the toughest challenges and demonstrate how NoSQL can deliver a seamless mobile experience anywhere by extending your data center to the edge.

    We’ll walk you through:

    -Critical requirements of an offline or offline-first storage solution
    -Why NoSQL is uniquely suited for data storage on the edge
    -Key architectural elements of the Couchbase Mobile NoSQL data platform

    You’ll see how Couchbase Mobile makes it easy to ensure your local data is always available. We’ll show you how to achieve auto sync from edge to cloud and direct peer-to-peer sync for exceptional online and offline experiences. And you’ll learn how Couchbase provides enterprise-grade security with end-to-end and over-the-wire encryption.
  • Four Steps Toward a Safer Continuous Delivery Practice (Hint: Add Monitoring)
    Four Steps Toward a Safer Continuous Delivery Practice (Hint: Add Monitoring)
    James Ma, Senior Product Manager, Pivotal & Michael Villiger, Sr. Technical Partner Manager, Dynatrace Recorded: Jan 23 2019 58 mins
    The demands of fast incremental code development require a stable, safe, and continuous delivery pipeline that can get your code into the hands of your customers without delay. Put your continuous delivery pipeline on autopilot by automating and simplifying the workflow—continuous integration to production readiness—and by using an automated monitoring solution to prevent bad builds from impacting production.


    This webinar will cover the steps to building an automated, monitored pipeline:

    1. Modeling and visualizing your build and delivery process as a pipeline (defined as a single, declarative config file) using Concourse CI.

    2. Leveraging integrations to trigger actions and share data, supporting functions like testing, collaboration, and monitoring.

    3. Enhancing your end-to-end continuous delivery pipeline with contextual deployment event feeds to Dynatrace.

    4. Adding automated, metrics-based quality gates between pre-production stages and an automatic post-production approval step, all with specifications defined in source control.

    Attendees will learn how some of the unique capabilities of Concourse CI and Pivotal Cloud Foundry, coupled with Dynatrace’s software intelligence, can put your continuous delivery pipeline on autopilot and ensure safer production outcomes.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Dynatrace Privacy Statement:
    https://www.dynatrace.com/support/help/data-privacy-and-security/

    This webinar:
    https://content.pivotal.io/webinars/jan-23-four-steps-toward-a-safer-continuous-delivery-practice-hint-add-monitoring-webinar
  • Delivering Quality Digital Experiences in Telecommunications and Media
    Delivering Quality Digital Experiences in Telecommunications and Media
    Dr. Gareth Smith Recorded: Jan 23 2019 38 mins
    Join our webinar as we explore the unique challenges faced by telecommunications and media companies in the testing space. You'll learn how our modern approach to testing, Digital Automation Intelligence, is ideal to help you:

    - Analyze all aspects of the user experience.
    - Expand automation beyond test execution with AI, machine learning, and analytics.
    - Take a coherent approach to monitoring and testing.
  • Why You Need a Cloud Native Security Solution and How to Evaluate One
    Why You Need a Cloud Native Security Solution and How to Evaluate One
    Benjy Portnoy, CISSP, CISA, Aqua Security Recorded: Jan 23 2019 50 mins
    Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.

    In this webinar, Benjy will share his experiences to help you figure out:

    • What to expect from platform providers, security-wise, and what gaps remain
    • The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
    • What to expect from a cloud native security platform: Key criteria to consider
    • How to ensure that your organization is ready to go into production across various stake holders and teams
  • The Veracode Community: Powering Your AppSec Program
    The Veracode Community: Powering Your AppSec Program
    Asha May, Customer Engagement at Veracode Recorded: Jan 23 2019 22 mins
    Veracode continues to build and expand a strong community to support the people and teams that make your organization’s software secure. The Veracode Community provides a resource and forum for customers as well as developers or security professionals seeking best practices about securing applications throughout the development lifecycle.

    Join this webinar to see how the Veracode Community can help you tackle tough application security issues while paving the way for an optimized program. We will provide:
    •An overview of the community – a space for developers and security practitioners to find answers and collaborate on application security best practices
    •Tips for community members to access resources, customer support, and forums for collaboration
    •Updates on latest community enhancements including newly-available access to all Veracode Integrations-related content and support
  • Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    David Ingham - Director, Software Engineering, Red Hat. Jakub Scholz, Principal Software Engineer, Red Hat. Recorded: Jan 23 2019 60 mins
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    With the introduction of the Red Hat® AMQ streams component, you can now use the massive scalability of Apache Kafka on the most advanced container management technology, Kubernetes, using Red Hat OpenShift®.

    The Red Hat AMQ streams component, the newest member of the AMQ messaging platform suite, is a massively scalable, distributed, and high-performance data streaming capability based on the Apache Kafka and Strimzi open source projects. The AMQ streams component provides an event-streaming backbone that allows microservices and other application components to reliably exchange data with extremely high throughput. AMQ streams has a particular focus on using Kafka on Red Hat OpenShift, the open source container application platform based on the Kubernetes container orchestrator.

    Join this webinar to learn:

    -Why Kafka is so frequently used in microservices, Internet of Things (IoT), and event processing.
    -Why Apache Kafka on Red Hat OpenShift is a great match.
    -How Red Hat OpenShift delivers clustering, high availability, and observability to Kafka.
    -How the AMQ streams component serves as an automated Kafka administrator, automating the deployment, management, upgrades, and configuration of a Kafka ecosystem installation.
  • Robotic Process Automation Is Not A One Tool Solution
    Robotic Process Automation Is Not A One Tool Solution
    Dominic Colson, ITOM Solutions Architect, Lynne Mullis, Business Process Consultant Recorded: Jan 23 2019 29 mins
    Robotic process automation (RPA) is an exciting new business process automation technology, based on the notion of software robots or artificial intelligence workers.

    Watch this 30-minute webinar to find out what RPA is all about and how multi-vendor solutions can be implemented and supported across both new and existing automation tools.

    •The story so far – Just as industrial robots are remaking the manufacturing industry by creating higher production rates and improved quality, RPA “robots” are revolutionizing the way we think about and administer business processes, IT support processes, workflow processes, remote infrastructure, and back-office work. RPA provides dramatic improvements in accuracy and cycle time and increased productivity in transaction processing, while it elevates the nature of work by relieving workers of dull, repetitive tasks.

    •RPA and AIOps – Where Big Data AI is driving RPA and where it fits in IT Operations.

    •Recommendations – As RPA brings more technologically-advanced solutions to businesses around the world, operating models that adopt automation (whether in-house or offshored) will cut costs, drive efficiency, and improve quality.

    •Demo – See the Micro Focus solution in action.
  • Ubiquitous Open Source Makes for Security Challenges
    Ubiquitous Open Source Makes for Security Challenges
    Rami Sass (WhiteSource) | Baruch Sadogursky (JFrog) | Cindy Blake (Gitlab) Recorded: Jan 23 2019 29 mins
    You don’t need an expert to tell you that open source software will be ubiquitous in the enterprise in 2019. You also don’t need an expert to tell you that this will present security challenges either. But what can you do in 2019 to ensure your open source software is as secure as you can make it? Best practices, processes and tools are coming into focus. 2019 is the year you need to implement and use them.

    Join the panel of experts as they share their best advice to help make 2019 a secure year for your open source use.
  • From Monolithic to Microservices
    From Monolithic to Microservices
    Daniele Stroppa, Solutions Architect, AWS; Ville Takanen, VP Engineering, Digital Goodie Recorded: Jan 23 2019 65 mins
    In this session, we’ll discuss the benefits of moving from monolithic to micro-services application architectures, and examine where micro-services can be used. We’ll share common transition strategies and relate them to the specifics of e-commerce and retail workloads, using customer examples. You’ll learn how to build micro-services using AWS services, and get a better understanding of the role of data storage, API endpoints and service discovery. Plus, you can learn from the real-life experience of Digital Goodie, an online retailing platform for connected commerce.
  • Encryption Lunch and Learn
    Encryption Lunch and Learn
    Alper Kizar, DataMotion; Nathan Ware, Rain Networks Recorded: Jan 22 2019 39 mins
    Resellers, join us on Tuesday, January 22 for a webinar with DataMotion! For nearly 20 years DataMotion has provided users with an easy to use secure email delivery system. With SecureMail Desktop, you can send emails that are encrypted and secure, helping to meet any compliance regulation requirements. The best part is that this can all be done via an easy to install plug-in. During the webinar, we will be discussing the following topics with a Q&A at the end:
    •DataMotion's balance between security and ease of use
    •How DataMotion helps customers stay in compliance with regulations like HIPAA, GLBA, FISMA, and more.
    •Beyond email: SSO, file transfer, inbound communications and APIs
    •DataMotion's Partner Program
  • Guardrails, not Handcuffs: The Right Security for the Digital Era
    Guardrails, not Handcuffs: The Right Security for the Digital Era
    Sam Curcuruto, Security Product Marketing, Box | Alok Ojha, Sr. Director of Security Products, Box Recorded: Jan 22 2019 30 mins
    Many security teams today are overly restrictive  with cloud content because they're worried what users might do.  But putting today's workers in handcuffs only drives them to use workarounds and shadow IT — and that leads to security risks. Watch this informative webinar to learn how you can get the security you need — while giving users the freedom to share and collaborate on content.
  • Redis Enterprise on Kubernetes
    Redis Enterprise on Kubernetes
    Vick Kelkar, Global Alliances Technology Manager, at Redis Labs Recorded: Jan 22 2019 56 mins
    Containers are becoming the basic unit of deployment. Kubernetes is becoming the industry standard for managing containerized applications.

    In this webinar, we will talk about basic Kubernetes constructs and will show how you can run three pod clustered Redis Enterprise on Kubernetes.

    You Will Learn:

    - Kubernetes primitives
    - How to deploy Redis Enterprise service on Kubernetes
    - How to deploy your app and connect to Redis Kubernetes service

    About the presenter:

    Vick Kelkar, Product, Redis Labs
    Vick has been in the technology field for most of his career. In the last few years, he has focused on distributed computing and container technologies.
  • Digital Trust in the Age of Normalized Data Breaches
    Digital Trust in the Age of Normalized Data Breaches
    Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & Sullivan Recorded: Jan 22 2019 44 mins
    In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.

    With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.

    Key Takeaways:

    • Do perceptions of customers in the business community align with consumer reality?
    • What makes (or breaks) consumer digital confidence in organizations?
    • Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
  • Building the Intelligent Enterprise: Digital Transformation through AI
    Building the Intelligent Enterprise: Digital Transformation through AI
    Neil Ward-Dutton and Andrea Minonne Recorded: Jan 22 2019 40 mins
    Digital transformation is a key strategy for every company of size across Europe, as organizations look to remain relevant and competitive in the age of digital business. IDC finds that AI is a key enabler of that transformation, allowing businesses to reimagine processes, services and value propositions to customers. Yet while the focus on customers is as strong as ever but as experience matures, European companies are increasingly looking to AI to drive internal process improvement as well as improve customer experience.

    In this IDC Web Conference, Neil Ward-Dutton, VP of AI and DX European Research Practices, and Andrea Minonne, Research Analyst for IDC's Customer Insight & Analysis team, will discuss the transformative power of AI for European companies, drawing on IDC's qualitative and quantitative research and examples to discuss what are the top drivers and barriers, which are the key use cases, technology and industry adoptions trends across Europe.
  • HeidelbergCement's Solution with Cherwell
    HeidelbergCement's Solution with Cherwell
    Sascha WInd Recorded: Jan 22 2019 4 mins
    Sascha Wind talks about HeidelbergCement's greatest challenge and how they use Cherwell to help pave the way for their 950 IT employees to improve efficiencies through automated processes.
  • HeidelbergCement's Solution with Cherwell
    HeidelbergCement's Solution with Cherwell
    Sascha WInd Recorded: Jan 22 2019 4 mins
    Sascha Wind talks about HeidelbergCement's greatest challenge and how they use Cherwell to help pave the way for their 950 IT employees to improve efficiencies through automated processes.
  • A CISO, CIO, and Compliance Officer Grab Coffee
    A CISO, CIO, and Compliance Officer Grab Coffee
    Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Recorded: Jan 21 2019 47 mins
    What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

    Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

    This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

    Here's what they'll discuss:
    -How to get executives and users to care about security and compliance
    -Top of mind security or compliance issues (and tackling them)
    -The toughest challenges they faced
  • The Top 9 Testing Trends We’re Anticipating in 2019
    The Top 9 Testing Trends We’re Anticipating in 2019
    Elise Carmichael, Judy Chung and Callie McConnell, The qTest Product Team Recorded: Jan 21 2019 37 mins
    The discipline of testing will continue to broaden, become more visible and grow more critical to the success of today’s leading enterprises in 2019. We’ve rounded up the top nine trends that will shape the future of software testing in 2019 and beyond.

    In this webinar, you’ll hear about the changes our product experts are seeing in the market and learn how they’re likely to affect your approach to software quality and your business in 2019. You’ll also learn how qTest is shaping the future and leading innovation in test management and see a preview of key innovations slated for the 2019 qTest roadmap.

    Learn about the trends that will shape the future of testing, including:
    - The growth of software quality as a cross-functional discipline
    - Increasing levels of BYO test automation and increasingly complex testing tool stacks and environments
    - Why software quality is shifting both left and right (and how the right tools make it possible)
    - What’s on the 2019 qTest roadmap to help organizations stay ahead of the trends
  • ¿Qué es RHOAR?
    ¿Qué es RHOAR?
    Red Hat Consulting Recorded: Jan 21 2019 5 mins
    Red Hat® OpenShift® Application Runtimes es una colección de runtimes nativos de la nube para el desarrollo de aplicaciones Java™ o JavaScript en OpenShift. Proporciona portabilidad entre múltiples infraestructuras permitiendo al desarrollador construir microservicios mediante el uso de contenedores y automatización DevOps.
  • The Top 9 Testing Trends We’re Anticipating in 2019
    The Top 9 Testing Trends We’re Anticipating in 2019
    Elise Carmichael, Judy Chung and Callie McConnell, The qTest Product Team Recorded: Jan 21 2019 37 mins
    The discipline of testing will continue to broaden, become more visible and grow more critical to the success of today’s leading enterprises in 2019. We’ve rounded up the top nine trends that will shape the future of software testing in 2019 and beyond.

    In this webinar, you’ll hear about the changes our product experts are seeing in the market and learn how they’re likely to affect your approach to software quality and your business in 2019. You’ll also learn how qTest is shaping the future and leading innovation in test management and see a preview of key innovations slated for the 2019 qTest roadmap.

    Learn about the trends that will shape the future of testing, including:
    - The growth of software quality as a cross-functional discipline
    - Increasing levels of BYO test automation and increasingly complex testing tool stacks and environments
    - Why software quality is shifting both left and right (and how the right tools make it possible)
    - What’s on the 2019 qTest roadmap to help organizations stay ahead of the trends
  • Low-Code in 30 Webinar: Cloud Native Applications and Multi-Cloud Deployment
    Low-Code in 30 Webinar: Cloud Native Applications and Multi-Cloud Deployment
    Simon Black Recorded: Jan 21 2019 31 mins
    Try Mendix: https://signup.mendix.com/

    Join Simon Black, Chief Technology Evangelist at Mendix, for everything about cloud native applications and multi-cloud deployment in this rendition of Low-Code in 30.

    He’ll cover how cloud native is a strategy for building and running applications. It is not concerned about where applications run, but how they’re built. Simon demonstrates this within the Mendix low-code development platform.

    Also covered is how cloud native came about. Simon goes indepth about Heroku’s 12 Factor Apps which set best practices and was designed to enable applications to be built with portability and resilience.

    The importance of cloud native:
    • Portability
    • Cost Reduction
    • Scalability
    • Faster Change
    • Reduces Reliance on IT
    • Access to New Features

    Cloud native apps run the same across all environments: public, virtual and on-premise. They run the same no matter on the web, mobile or tablet. That is the value of cloud native.

    “…a true platform that adopts and utilizes cloud native is not just about deployment, it is not just about utilizing containers, it is about being able to bridge all of that together to bring the application lifecycle for ease of use and being able to deploy very rapidly.”

    - Simon Black

    Questions or Comments? Please post below!

    Examples of Apps Built with Mendix: https://gallery.mendix.com/

    The Latest News: https://www.mendix.com/blogs/

    Guide to Low-Code Development: https://www.mendix.com/low-code-guide/
  • Don’t Let Poor Performance De-Rail Your Release Train
    Don’t Let Poor Performance De-Rail Your Release Train
    Jonathan Sprake, Senior Solutions Architect, Micro Focus Recorded: Jan 21 2019 58 mins
    Because the application and software delivery has changed, our testing tools for software performance engineers have evolved to meet new challenges.

    Watch this webinar, to hear more about the Micro Focus performance testing portfolio.

    Jonathan Sprake, Senior Solutions Architect, will explain how to incorporate StormRunner Load, our Agile, cloud-based solution testing solutions into your CI/CD pipelines.
  • [PODCAST] Containerization Kubernetes for the Enterprise with GM Financial & Nir
    [PODCAST] Containerization Kubernetes for the Enterprise with GM Financial & Nir
    Jeff Lloyd Recorded: Jan 18 2019 8 mins
    Live From KubCon: Complex Workloads and Containers with GM Financial

    In this episode of Keeping Up With Kubernetes, GM Financial Emerging Data Technology Lead Jeff Loyd speaks with JoAnne McDougald about how the evolution of managing complex development workloads has led us to containerization, and how containerization and VMs have completely changed the game.
  • Four steps to enabling real-time insight in a data-driven world
    Four steps to enabling real-time insight in a data-driven world
    Sachin Smotra | Director of Product Management at Couchbase & Matt Aslett | 451 Research Vice President Jan 24 2019 10:00 am UTC 60 mins
    Today’s businesses must operate in the moment in order to maintain a competitive advantage. To do this, they need rapid time to insight, but how ready are businesses to deliver on the promise of real-time operational analytics?

    -Provisioning data in legacy data architectures can take weeks, or even months.
    -The skills required to modernize don’t exist within a traditional IT department.
    -Building business cases for modernization can be challenging without a fast and direct return on investment.
    -A lack of operational dashboarding limits insight due to the complexity of custom reporting.

    To combat these hurdles, you are invited to hear from two experts in the field of operational analytics. Referencing firsthand research and reports, Matt Aslett from 451 Research will discuss the current trends in operational analytics and how they relate to the emergence of hybrid operational and analytic processing (HOAP) databases.

    Matt will also present the four steps organizations must take in order to prepare for real-time insight, and take a peek into the future of what this means for the companies that will succeed, and for those that won’t. Sachin Smotra, Director of Product Management at Couchbase, will then explain how operational analytics can be achieved without the heavy lifting of data lakes, data warehouses, and complex ETL processes.
  • Show and Tell: Blue Prism Digital Exchange and v6.4
    Show and Tell: Blue Prism Digital Exchange and v6.4
    Richard Pauly, Head of DX | Bart Peluso, Head of Product Marketing | Chieng Moua, Solutions Engineering Manager Jan 24 2019 4:00 pm UTC 60 mins
    Following the launch of the Blue Prism Digital Exchange, come and join us for our inaugural Pulse Online Webinar to see the platform in action, as well as a demo of the new features of Blue Prism's v6.4.

    -= What is the Blue Prism Digital Exchange? =-
    The Digital Exchange (DX) is a “shop window” for finding & consuming pre-built AI, cognitive & disruptive technologies. The DX gives global enterprise customers direct access to technologies from Blue Prism and its technology partners as downloadable connectors, reusable Visual Business Objects (VBOs) or via referrals to the partner via an easy-to-use storefront. Thanks to a robust ecosystem of partners, Blue Prism customers can instantly execute their choice of AI, Machine Learning, Analytics, OCR & more through open API’s.

    -= What's new in v6.4? =-
    * Integrated ‘Skills’ (Toolbar) in the product
    * Simple drag & drop functionality.
    * New Web API Services (‘API Configurator’) facilitates easier integration of APIs.
    * Simplifies web services within a process flow.

    -= Speakers =-
    * Richard Pauly, Global Head of the Digital Exchange, Blue Prism
    * Chieng Moua, Solutions Engineering Manager, Blue Prism
    * Bart Peluso, Global Head of Product Marketing, Blue Prism

    Our panel of Blue Prism experts will be taking questions from the audience during the webinar, so make sure to join us for the live webinar.

    Pulse Online is Blue Prism’s product and technology focused webinar series. Every last Thursday of the month, get hands-on demos, tactical insight and best practices for taking your Digital Workforce to the next level.
  • Build for the future with voice search
    Build for the future with voice search
    Dustin Coates, Voice Search go-to-market lead at Algolia Jan 24 2019 5:00 pm UTC 30 mins
    Speaking commands into actions isn’t a futuristic fantasy anymore - it’s the present. Voice as a user interface has arrived and it can elevate the search and discovery experience.

    Join Dustin Coates, Voice Search Go-to-Market Lead, to learn how voice search and its capacity to transform everyday, conversational speech into functional, relevant responses can redefine the way you interact with the world.

    In this session we will cover:

    Why your business should implement voice search
    - Where voice search is useful
    - What good voice search UX looks like
    - How relevancy differs between voice search and typed search
  • Managing the Business Risks of Open Source
    Managing the Business Risks of Open Source
    Scott Crawford, Research Director for Information Security, 451 Research & Phil Odence, GM, Black Duck by Synopsys Jan 24 2019 5:00 pm UTC 60 mins
    It’s no secret that “software is eating the world,” as Marc Andreessen once described—and it’s taking entire development communities to support it. Recently, open source has become a primary contributor to software found in the enterprise. According to a 2018 report from the Synopsys Center for Open Source Research & Innovation, the average percentage of open source in codebases examined in Black Duck audits has increased to 57% from only 36% from the previous year. But open source isn’t risk-free—and the implications can have a direct impact on the business.

    Join Scott Crawford, research director for information security with 451 Research, and Phil Odence, general manager of Black Duck On-Demand with Synopsys, to take a closer look at open source risks and the ways that businesses can better evaluate and mitigate them. They’ll cover the following points and more:

    • One of the highest-profile breaches of 2017 was the result of a widely exposed vulnerability in a popular open source application component, exposing millions of personal financial records—and costing business leaders their jobs.
    • In just the last few weeks, the implicit trust on which the open source ecosystem is based has been exploited to steal tangible assets.
    • What’s the real cost of a data breach? In at least one highly visible case, a breach reduced the dollar value of an acquisition by hundreds of millions. As business dependence on open source grows, so too does business exposure.
    • And of course, compliance with open source licenses remains a concern.

    Getting a handle on taming these threats to the business requires an approach that fits with the central role open source plays in the fast-moving world of continuous innovation.
  • What Matters in Low-Code: Selecting a low-code platform in 2019
    What Matters in Low-Code: Selecting a low-code platform in 2019
    Carlos Carvajal, CMO & Luis Landivar, VP, Digital Architect Jan 24 2019 5:00 pm UTC 75 mins
    To keep up with the pace of digital innovation, enterprises demand ever more from their low-code platform. Yesterday’s advanced features are today’s minimum requirements. What low-code capabilities will you need to succeed in 2019?
  • Abandon Decades-old TCPdump for Modern Troubleshooting
    Abandon Decades-old TCPdump for Modern Troubleshooting
    Nathan McMahon Jan 24 2019 5:00 pm UTC 44 mins
    Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Learn how you can abandon your decades-old CPU-intensive logging tools – and gain intuitive, real-time analytics, faster time-to-resolution, modern SSL encryption, and (most importantly) happy IT teams focused on delivering applications.

    Register for this Avi webinar to #ByeByeTCPdump forever and learn:
    - Why TCPdump should be your tool of last resort
    - How headers compressed with HTTP/2, SSL leveraging PFS, and distributed systems have rendered certain tools useless
    - How automation and visibility can help you troubleshoot more quickly
    - How you can replace TCPdump with intelligent logs and analytics
  • Accelerate business automation with MuleSoft
    Accelerate business automation with MuleSoft
    John Withers, Product Marketing Manager, MuleSoft and Jimil Patel, Product Marketing Manager, MuleSoft Jan 24 2019 5:30 pm UTC 63 mins
    Business processes are complicated and often manual due to an underlying technology landscape that is not connected, constantly changing, and increasingly complex. With MuleSoft’s Anypoint Platform™, unlock data from your systems, orchestrate business processes that automate and optimize workflows, and package them as reusable services to transform your organization into a digital platform.

    Across industries from healthcare to banking to retail, MuleSoft is powering business automation, and helping companies deliver business processes as reusable services, resulting in faster innovation, improved customer satisfaction, and increased revenue.

    Watch this webinar, which includes a demo of the Anypoint Platform, to learn how to:

    - Unlock systems 64% faster: Easily connect to core systems of record and unlock data with out-of-the-box connectors and graphical data mapping
    - Accelerate process automation: Orchestrate processes using a drag-and-drop development environment supported by a library of pre-built implementation templates
    - Reuse business capabilities: Package processes into reusable services and publish them for internal and external use
  • The most important cloud security trends in 2019
    The most important cloud security trends in 2019
    Nutanix Jan 24 2019 6:00 pm UTC 60 mins
    By 2020, 90 percent of businesses will have moved to a hybrid cloud infrastructure, seizing both the competitive advantages of digital evolution -- and the economic and strategic benefits of maintaining legacy applications on premises. But once your data moves outside your private architecture, you're facing a new world of potential attacks and security breaches that your current security practices just can't match.

    Just for starters, not only will you need to implement effective RBAC to lower risk of unauthorized access and enforce mandatory multi-factor authentication, you'll also have to tap into the power of automation to validate security compliance baselines, detect unauthorized cloud config changes, and power self-healing infrastructure. Additionally, application-centric security is a must, with real-time visibility into application dependencies and performance metrics, plus an automatic micro-segmented security policy enforcement, and more.

    To learn more about the advantages of hybrid cloud architectures, where your security needs shoring up, and how to best protect your enterprise and data with automated and application-centric security practices, don't miss this VB Live event!

    Register for free now.

    You'll learn:
    *Why you need a single, fully tested, security-first infrastructure platform
    *How to converge storage, computing, and networking
    *A full understanding of security best practices
    *How to protect against data breaches, unauthorized access, and other threats in a multi-cloud world

    Speakers:
    Mike Wronski, Principal Marketing Manager, Nutanix
    Niel Ashworth, Security Solutions Architect, Nutanix
    Demetrius Comes, VP of Engineering, GoDaddy

    Sponsored by Nutanix
  • KubeCon Reflections & Kubernetes Insights for 2019
    KubeCon Reflections & Kubernetes Insights for 2019
    Eric Carter, Michael Ducy Jan 24 2019 6:00 pm UTC 45 mins
    Kubernetes is now 3.5 years old, the technology has matured, and adoption of containerized applications orchestrated by Kubernetes has scaled beyond tiger teams.

    Enterprises are more comfortable with Kubernetes, and by default, more comfortable with containers.

    We predict that is only the beginning: Enterprises will migrate mission-critical, stateful applications to Kubernetes in droves in 2019. As a result, security and operational visibility needs are growing. Solutions that support enterprise-level capabilities, processes, and support become the requirement.

    Join an expert panel to:

    -hear observations and insights from KubeCon
    -learn about key usage data and trends
    -understand how Kubernetes and other open source and commercial technologies are evolving in the enterprise
  • Kubernetes Use cases: Cloud Native Apps, Hybrid Clouds, at the Edge
    Kubernetes Use cases: Cloud Native Apps, Hybrid Clouds, at the Edge
    Vamsi Chemitiganti, Chief Strategist Jan 24 2019 6:00 pm UTC 75 mins
    Organizations can leverage containers for digital acceleration and to simplify application development. As environments scale and grow, managing all the containers becomes increasingly difficult. This is where Kubernetes can help. Platform9 Managed Kubernetes enables organizations to get value from containers, fast, with container orchestration delivered as a service.

    In this webinar we will outline the benefits of three key use cases:

    1. Manage and monitor Hybrid Clouds: Manage environments that consist of on-premises, public and private clouds.

    2. Cloud-native application development ensures consistency: Leveraging containers and Kubernetes ensures consistency in application development and deployment.

    3. Compute resources at the edge: Organizations are finding more and more need for resources to be closer to where information is generated for faster analysis.

    Join us to learn more about these uses cases!
  • Serverless at Expedia: Learnings from Real Life Use Cases
    Serverless at Expedia: Learnings from Real Life Use Cases
    Bhardi Govindarajan, Principal Application Engineer., Expedia; Aaron Miller, Senior Solutions Engineer, Kong Jan 24 2019 6:00 pm UTC 57 mins
    When it comes to serverless, there’s a lot of justifiable excitement, but not a lot to see in terms of use cases. So when does serverless actually makes sense?

    In this presentation Bhadri Govindarajan, Principal Application Engineer at Expedia, and Aaron Miller, Senior Solutions Engineer at Kong, go over some of the serverless use cases currently in production and in planning at Expedia.

    This presentation explores real-life use cases that bridge the gap between serverless excitement and serverless reality.

    Serverless could become the dominant application development model, lowering operations burden, increasing feature release velocity, and allowing developers to focus on delivering business value rather than worrying about deployment concerns and traffic planning. If fully adopted, serverless could have a massive impact in the infrastructure and the business models of the travel and retail industries as there will no longer be a need to forecast, plan, and provision for spikey workloads or unpredictable compute capacity.

    This presentation also includes an overview of Kong’s implementation at Expedia.
  • Zero Trust Security: Supporting a CARTA approach with Network Security
    Zero Trust Security: Supporting a CARTA approach with Network Security
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Jan 24 2019 6:00 pm UTC 60 mins
    Learn how to support, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Network security enables microsegmentation and is a core component of a zero trust security model. It allows you to protect your workloads against threats without relying on assumptions about the network, infrastructure, and workloads.
  • Automated Continuous Delivery to Kubernetes
    Automated Continuous Delivery to Kubernetes
    Damien Toledo, VP Engineering at Nirmata Jan 24 2019 7:00 pm UTC 60 mins
    Enterprises are looking to automate end-to-end delivery of their applications. Creating continuous delivery pipelines, not only allows enterprise software teams to move faster but also enables them to respond quickly to any failures.

    In this webinar, you will learn how to:
    - Deploy an application to Kubernetes
    - Upload code to Nirmata
    - Create deployment pipeline in Jenkins
    - Deploy development environments
    - Deploy production environments
  • Обзор решения по анализу неструктурированных данных Micro Focus Control Point
    Обзор решения по анализу неструктурированных данных Micro Focus Control Point
    Максим Луганский, технический консультант Jan 25 2019 8:00 am UTC 60 mins
    Комплексный анализ файловых ресурсов, электронной почты, сред коллективной работы и др. Устранение дубликатов данных, выявление редковостребованных и ненужных данных, идентификация персональных данных и конфиденциальной информации.
  • Securing Microservices with Spring and Pivotal Cloud Foundry
    Securing Microservices with Spring and Pivotal Cloud Foundry
    Simon Rowe, Pivotal Jan 29 2019 9:30 am UTC 60 mins
    Microservices offer advantages and disadvantages for security. Microservices can be developed, updated, and scaled separately. However, with more and more microservices to manage, there are numerous doors that intruders can access within an application. While their isolated and standalone structure within applications makes them easier to defend, microservices bring with them their own additional security challenges.

    In this talk, we'll walk through a set of Spring-coordinated microservices that are insecure and will integrate them with an OAuth 2.0 Authorization Server in order to make them secure. Then we’ll look at the challenges with single sign-on and how Pivotal Cloud Foundry can help to overcome them.
  • Best Practices for Measuring your Code Pipeline
    Best Practices for Measuring your Code Pipeline
    Eric Mittelhammer & Tori Wieldt Jan 29 2019 10:00 am UTC 38 mins
    The code’s been written. It’s been reviewed. It’s been tested. The build has passed and it’s finally time to deploy, but will this thing actually work in production? Every team aspires to accelerate their development cycle, but increasing velocity while maintaining quality is hard.
  • Beyond Functional Testing – three new releases that will transform your testing
    Beyond Functional Testing – three new releases that will transform your testing
    Dr. Gareth Smith, Chris Howard, Pamela Gillaspie Jan 29 2019 3:00 pm UTC 60 mins
    While it’s critical to know the extent to which an application meets functional requirements, there is more to software testing than answering the question ‘does it work?'.

    You also need to know if it scales (performance testing) and if the user experience will be acceptable (usability testing). Ultimately, you need to establish that it will deliver the required business value.

    Until now, these extra steps have added layers of complexity in terms of timing, cost and expertise. As a result, they can introduce delays or get overlooked completely.

    In this webinar, we will show you how to:
    • Automate performance testing and usability testing
    • Seamlessly integrate them with functional testing, including using your functional test models to drive performance tests.

    The result: faster release cycles, less duplicated effort, and better software.

    We will also show you how to test enterprise-scale software systems more easily, with submodels allowing you to break down a large, complex system model in a way that makes it far easier to manage.
  • Psychographics of the CISO – New Infosecurity Survey Results from 451 Research
    Psychographics of the CISO – New Infosecurity Survey Results from 451 Research
    Daniel Kennedy, Research Director, Information Security, 451 Research; Brandon Dunlap (moderator) Jan 29 2019 6:00 pm UTC 60 mins
    Security budgets continue to tick upward, but underneath the hood, increasingly hybrid architectures in enterprise IT are driving shifts in where that money is applied. GDPR has driven compliance to the forefront of security project decision making, while other pain points including user behavior and lack of qualified personnel drive specific security product deployments. Security resistance to cloud continues to decrease, while the endpoint security space remains both relevant and increasingly crowded. Join Daniel Kennedy, Research Director for 451 Research on January 29, 2019 at 1:00PM Eastern as he walks through highlights of 451's 2018 surveys and interviews of information security professionals.
  • Privacy Secrets Your Systems May Be Telling
    Privacy Secrets Your Systems May Be Telling
    Kevin Poniatowski, Principal Security Instructor, Security Innovation Jan 29 2019 7:00 pm UTC 60 mins
    Privacy has overtaken security as a top concern for many organizations. New laws such as GDPR come with steep fines and stringent rules, and more are certainly to come. Attend this webcast to learn how everyday business operations put customer privacy data at risk. More importantly understand best practices on protecting this data and dealing with disclosure requirements. 

Topics include:
    * Types of privacy and threats to them
    * How is privacy different than security?
    * Business systems putting you most at risk
    * Mitigating the OWASP Top Ten Privacy Risks
  • Using Mobile to Engage your Audience
    Using Mobile to Engage your Audience
    Daniel Geske, Solutions Architect, AWS Jan 30 2019 10:00 am UTC 48 mins
    In this webinar, you’ll learn how to reduce time-to-market when building or expanding your mobile presence with AWS services. Quickly onboard users of your ecommerce platform and manage identities and access controls. Engage and increase user retention with push notifications, messaging, analytics, and campaigns. Learn more about managing access to your APIs with a serverless back-end architecture, and test your apps on a broad array of devices to ensure quality releases.
  • Adaptive Authentication: What, why and how?
    Adaptive Authentication: What, why and how?
    Thanuja Jayasinghe Associate Technical Lead, WSO2 and Abilashini Thiyagarajah Software Engineer, WSO2 Jan 30 2019 10:00 am UTC 49 mins
    Authentication is the process of recognizing a user’s identity in order to provide access to any resource. In the history of identity and access management (IAM), we have come across different authentication mechanisms that have evolved rapidly in terms of security. But customer experience trumps everything; it’s the path to retention leading towards the success of an enterprise and not all of these mechanisms are able to provide greater usability

    This webinar will discuss the evolution of authentication mechanisms, advantages and the disadvantages of each, and how adaptive authentication may be the answer.
  • Live Interview Panel: Best Practices for Securing DevOps
    Live Interview Panel: Best Practices for Securing DevOps
    Ran Ilany, Guy Dagan, Bar Hofesh Jan 30 2019 11:00 am UTC 60 mins
    Making sure security is included at every step in the software or application development lifecycle is key in the age of breaches, data leaks and third party security risks.

    Join experts from the industry to learn more about:
    - Security challenges and vulnerabilities
    - DevOps vs DevSecOps: What's the difference?
    - How to make disjointed security and DevOps teams work effectively
    - DevOps security scans
    - Steps to better application security

    Panellists
    Ran Ilany, CEO, Portshift
    Bar Hofesh, CTO, NeuraLegion
    Guy Dagan, Cofounder and Partner, Consienta
  • #Shift Happens: The Paradigm of Digital Industries and Growth Opportunities
    #Shift Happens: The Paradigm of Digital Industries and Growth Opportunities
    Ram Ramasamy, Industry Director, Automation and IIoT, Frost & Sullivan Jan 30 2019 1:00 pm UTC 60 mins
    Today, industrial markets are reactive in approaches and digital transformation will help organizations become predictive and preventative. Organizations run the risk of becoming negative latency enterprises, which means customers will predict issues that will happen and prevent them from happening in the first place.

    Key Takeaways:

    • Learn about the significant industrial shifts and enabling technologies driving customer journeys
    • Engage internally and externally, as digital is not about technology implementation but change and culture management
    • Identify customer segments you need to target, based on their digital maturity
    • Discover digital growth opportunities
  • Live Interview Panel: Managing Compliance and Security in the Cloud
    Live Interview Panel: Managing Compliance and Security in the Cloud
    Benny Czarny, Guy Dagan, Ariel Zeitlin, Diana Kelley Jan 30 2019 1:00 pm UTC 60 mins
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Presenters
    Benny Czarny, CEO and Founder, OPSWAT
    Guy Dagan, Cofounder and Partner, Consienta
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • How to Leverage Agile Integration to Reinvent Competitive Advantage
    How to Leverage Agile Integration to Reinvent Competitive Advantage
    Steven Willmott is a Senior Director and Head of API Infrastructure at Red Hat Jan 30 2019 4:00 pm UTC 27 mins
    No industry is safe from being disrupted by fast moving new entrants and new opportunities are continuously arising to be taken advantage of by the fastest mover. Businesses need to adapt quickly to being able to react to changing conditions and IT has often been a stumbling block. In this talk we discuss how Agile Integration can turn IT into a powerful asset: not just enable the transformation of technology, but also to align people and processes for success. We’ll cover numerous real world examples and a repeatable blueprint for success.