Hi [[ session.user.profile.firstName ]]

Application Development

  • Your Medical Device Firm Just Bought Some Software - Now What?
    Your Medical Device Firm Just Bought Some Software - Now What?
    Brad Hinke, Director of Quality Services & Validation at Propel Recorded: Mar 21 2019 51 mins
    If your company is thinking about buying software to help with product development and manufacturing, validation is a critical step for complying with FDA 21 CFR Part 11 and Part 820. But many firms often lack detailed expertise and experience to make sure their non-product software is validated. With lack of resources and direction, how can you make sure your software is validated at a reasonable cost.

    Brad Hinke, Director of Quality Services & Validation at Propel will host a live webinar and provide guidance and best practices from real-life lessons on validation. Brad has worked with both small and large medical device firms in all aspects of validation and implementation.
    In this webinar, learn the following:
    - what software needs to be validated and lessons learned from past validation efforts
    - frameworks for approaching validation
    - steps you must do to be compliant with the FDA.
  • Getting Started with AWS IoT Demo
    Getting Started with AWS IoT Demo
    Tolga Tarhan, CTO at Onica Recorded: Mar 21 2019 30 mins
    Learn how AWS can accelerate your IoT strategy by allowing for rapid IoT prototyping in less than 6 weeks. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost. We'll cover serverless IoT architecture as well as do a live demo on how to connect & configure devices on AWS IoT Core.

    What we’ll cover:
    * Device connectivity & security
    * Ingesting data with AWS IoT
    * Reacting to IoT data in real-time
    * Storing data in Amazon DynamoDB and Amazon S3
    * Building a simple RESTful API to consume the stored data
    * Analytics: Batch processing, analytics at the edge device with AWS Greengrass
    * IoTanium by Onica for quick hardware/software prototyping
    * Customer success: automation and remote management with AWS IoT
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web Services Recorded: Mar 21 2019 45 mins
    With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.

    In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:

    >Leverage compliance policies for scanning images in your CI/CD pipeline
    >Scan Kubernetes and Docker environments and visualize compliance posture
    >Enforce runtime container compliance
    >Investigate policy violations post-mortem by using forensics after container is disposed
  • Essential SaaS benchmarks for a competitive advantage
    Essential SaaS benchmarks for a competitive advantage
    Recurly Recorded: Mar 21 2019 61 mins
    The competition is coming. By 2020, eighty percent of SaaS players will move to a subscription-based model, which means your success strategies have to evolve — and that includes the all-important fundamental: how your subscriptions are structured.

    Your subscription pricing and plan structure have a profound impact on subscriber acquisition and retention, and once you nail the formula, you'll see revenue increase. Do you choose an annual or monthly plan? Offer a trial or discounts?

    This is where a test plan is critical. Combined with benchmark data, you can test and iterate your way to the right pricing and plan structure. And when important decisions are backed by comprehensive benchmark data, you’re far more likely to see an increase in adoption and revenue.

    Join this VB Live event to discover essential SaaS benchmarks and best practices to maximize revenue, improve acquisition, and spur adoption.

    Registration is free!

    Attendees will learn:

    * Important SaaS benchmarks by industry segment
    * How to structure your SaaS subscription plans and pricing to maximize revenue and retention
    * How successful SaaS companies use a test, learn, and iterate framework to optimize revenue
    * The key metrics — and reports — to monitor for success and maximum LTV
    * The results of an in-depth case study on SaaS testing and pricing

    Speakers:
    *Panelist: Emma Clark, Chief of Staff, Recurly
    *Moderator/Analyst: Sean Joyce, Recurring Revenue Technologies, Navint
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Recorded: Mar 21 2019 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Rohit Kelapure, Pivotal Consulting Practice Lead Recorded: Mar 21 2019 64 mins
    Digital transformation includes replatforming applications to streamline release cycles, improve availability, and manage apps and services at scale. But many enterprises are afraid to take the first step because they don’t know where to start. In this webinar, Rohit will provide a step-by-step guide that covers:

    ● How to find high-value modernization projects within your application portfolio
    ● Easy tools and techniques to minimally change applications in preparation for replatforming
    ● How to choose the platform with the right level of abstraction for your app
    ● Examples that show how Java EE Websphere applications can be deployed to Pivotal Cloud Foundry

    We look forward to you joining us.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy
  • Limiting the attack vectors of a cloud-native app
    Limiting the attack vectors of a cloud-native app
    John Osborne principal OpenShift architect, Red Hat & Glen Kosaka vice president of product management, Neuvector Recorded: Mar 21 2019 53 mins
    NeuVector, a software company focusing on container network security, uses security features built into Red Hat OpenShift to provide defense in depth for business critical production deployments. This webinar will cover:

    Potential attack vectors for container deployments and explain how the combination of Red Hat OpenShift and NeuVector can detect and prevent damaging attacks.
    How to integrate security into the pipeline using Red Hat OpenShift and NeuVector automation and integration points.
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Recorded: Mar 21 2019 33 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Using Infrastructure-as-Code to manage third-party apps in Red Hat's OpenShift C
    Using Infrastructure-as-Code to manage third-party apps in Red Hat's OpenShift C
    Red Hat Consulting Recorded: Mar 21 2019 5 mins
    How can Infrastructure-as-Code (IaC) be used to manage your third-party applications with ease? How does Red Hat® Ansible® Automation and inventories source controlled in git repositories pair up with Red Hat OpenShift® Container Platform to simplify these tasks? This Red Hat Consulting whiteboarding video provides a brief introduction to IaC, and how it is used to perform the customized deployment of a third-party software solution from a provider such as Dynatrace. It also discusses how IaC can be applied and integrated with existing infrastructure to be managed as a complete solution.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Recorded: Mar 21 2019 43 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 20 2019 35 mins
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product Manager Recorded: Mar 20 2019 45 mins
    Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

    Join us live Wednesday, March 20 @10AM PST to learn

    * Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
    * How to set triggers based on thresholds important to your business
    * Set feature flags to control specific parts of your environment to reduce stress levels.

    See a Honeycomb demo, ask questions and learn more.
  • AI Improves Profitability of Core Financial Services at Paraguay Bank
    AI Improves Profitability of Core Financial Services at Paraguay Bank
    Ruben Diaz, Data Scientist at Vision Banco and Rafael Coss, Maker at H2O.ai Recorded: Mar 20 2019 60 mins
    In the financial industry, data can translate to revenue if used correctly, yet financial institutions need to operate with scale, speed, and immense accuracy.

    Data scientists at Visión Banco needed to improve the bank’s credit scoring process, including predicting existing customer behavior and churn, determining credit risk, and offering credit to new customers. Join our webinar to learn how the bank saved time and improved accuracy by building and deploying models using H2O Driverless AI. As a result, the Paraguayan bank has doubled its rate of customer propensity to buy.

    Join our webinar to learn:

    • How to automate machine learning modeling to create more models faster and scale data science efforts
    • How you can use high-performance computing to solve complex data challenges such as real-time targeting of promotions or customer churn predictions
    • How one financial institution now easily determines credit risks and expands offers to customers using H2O Driverless AI
    • How you can optimize business processes across your financial institution, such as evaluating credit scores or credit risk, detecting fraud, or performing analysis for Know Your Customer (KYC)
  • Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Allison Willams, Pivotal Senior Solutions Architect & Tom Collings, Pivotal Advisory Solutions Architect Recorded: Mar 20 2019 35 mins
    Migrating your applications to the cloud can be a harrowing journey, one fraught with complexity and uncertainty. What’s required to succeed, above and beyond the right platform, are the right set of people, equipped with modern practices, to build and run cloud native applications with confidence.

    Join Allison and Tom, from Pivotal's Application Transformation (AppTx) team, as they discuss what common problems arise when teams try to get their apps on the platform and the AppTx team approach to solving them.

    Whether you have purchased PCF (Pivotal Cloud Foundry) or are of a mind to move your legacy applications to the cloud this webinar will help you understand:

    ● Why it’s imperative to have a small team dedicated to the application portfolio
    ● When to re-platform, modernize or rewrite an application
    ● Strategies to address the most common issues we see

    We look forward to you joining us.
  • OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    Jay Dobies, Red Hat & Dave Meurer, Synopsys Recorded: Mar 20 2019 59 mins
    OpenShift 4 represents the culmination of a number of new technologies. One key feature of this release is CRI-O, the new container runtime that is optimized for OpenShift. But a new runtime doesn’t have to be scary. Black Duck OpsSight for OpenShift still provides the same security intelligence and visibility into all the third-party open source software that composes your containers.

    Join experts from Synopsys and Red Hat as we explore the following topics:
    • Upcoming features in Red Hat OpenShift 4, including the drivers and benefits of the Operator Framework
    • How Black Duck and Clair complement each other
    • The Synopsys application security portfolio
    • Black Duck OpsSight for OpenShift architecture
    • OpenShift 4 Black Duck OpsSight demonstration on a CRI-O container
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Using Apache Kafka to Optimize Real-Time Analytics in Financial Services & IoT
    Using Apache Kafka to Optimize Real-Time Analytics in Financial Services & IoT
    Peter Simpson, VP Panopticon Streaming Analytics, Datawatch + Tom Underhill, Partner Solutions Architect, Confluent Recorded: Mar 20 2019 53 mins
    When it comes to the fast-paced nature of capital markets and IoT, the ability to analyze data in real time is critical to gaining an edge. It’s not just about the quantity of data you can analyze at once, it’s about the speed, scale, and quality of the data you have at your fingertips.

    Modern streaming data technologies like Apache Kafka and the broader Confluent platform can help detect opportunities and threats in real time. They can improve profitability, yield, and performance. Combining Kafka with Panopticon visual analytics provides a powerful foundation for optimizing your operations.

    Use cases in capital markets include transaction cost analysis (TCA), risk monitoring, surveillance of trading and trader activity, compliance, and optimizing profitability of electronic trading operations. Use cases in IoT include monitoring manufacturing processes, logistics, and connected vehicle telemetry and geospatial data.

    This online talk will include in depth practical demonstrations of how Confluent and Panopticon together support several key applications. You will learn:

    -Why Apache Kafka is widely used to improve performance of complex operational systems
    -How Confluent and Panopticon open new opportunities to analyze operational data in real time
    -How to quickly identify and react immediately to fast-emerging trends, clusters, and anomalies
    -How to scale data ingestion and data processing
    -Build new analytics dashboards in minutes
  • [Webinar] Test Management in Jira: Strategies for Success
    [Webinar] Test Management in Jira: Strategies for Success
    Dr. Milan Verma and Ashwini Sathe Recorded: Mar 19 2019 58 mins
    As the trend towards Agile adoption continues to grow, Atlassian’s Jira software has emerged as the number one software development tool for Agile teams. Now, as your organization is looking to further compress software delivery cycles, it’s important to explore the benefits of sophisticated test management solutions that support Jira workflows and keep pace with the fast-evolving testing landscape.
  • Leveraging Machine Learning to Prevent eCommerce Fraud
    Leveraging Machine Learning to Prevent eCommerce Fraud
    Dave Klein (Guardicore), Trevor Anderson (Whitepages Pro), Ajay Andrews (Whitepages Pro) and Angie Dobbs (Wave Financial) Recorded: Mar 19 2019 35 mins
    Finding the balance between staying compliant and providing a frictionless eCommerce experience for your customers is a difficult task. Machine Learning has been touted as a game changer in validating information at speed, managing identities, and preventing and detecting fraud.

    Join this live-streamed session where our expert panel will discuss:

    -The latest trends in eCommerce
    -Is friction really a bad thing?
    -Best practices for using machine learning for pricing optimization, fraud prevention, and improving the customer experience

    Moderator:
    Dave Klein, Senior Director Engineering & Architecture at GuardiCore

    Panelists:
    Trevor Anderson, Director, Solutions Architecture, Whitepages
    Ajay Andrews, Senior Director, Product, Whitepages
    Angie Dobbs, Director of Risk, Wave Financial Inc
  • Key Application Security Strategies for your Cloud Migration
    Key Application Security Strategies for your Cloud Migration
    Rohit Gupta, Global Segment Leader; Surag Patel, Chief Strategy Officer Recorded: Mar 19 2019 52 mins
    Cloud computing is one of the major shifts in technology that is gaining rapid traction and is helping fuel the growth in today’s digital transformation. As leading organizations modernize their hardware and software environments, they are demanding flexibility, business agility and operational efficiencies. This ultimately equates to tangible cost savings, loyal customers and higher profits, as organizations leverage the cloud to compete more effectively and differentiate their digital service and product offerings.

    As a real-world example, you will hear from Chris Perkins, Senior Security Architect at a major Fortune 500 medical technology and solutions company on:

    - Key drivers and use cases in migrating from traditional legacy technologies and embracing modern hybrid cloud computing approaches.
    - Application Security threat landscape, testing pipelines and native integrations.
    - Major hurdles and lessons learned (organizationally, culturally, technology) and how to reduce friction and increase collaboration between Dev & Ops teams
    in order to optimize resources and ensure a secure Cloud migration.
    - The cost curve for remediation of defects enabling a safer speed to market and growth

    You’ll also hear from Rohit Gupta, Global Segment Leader, Security: Amazon Web Services (AWS) highlighting key tenets for security for AWS and the framework required to help their customers meet compliance, regulation and security objectives and Surag Patel, Chief Strategy Officer, Contrast Security, underscoring modern approaches to automate, integrate and scale Application Security.

    As a result of this webinar, you will hear about the major benefits in migrating to a secure, compliant cloud environment and learn from a customer’s experience on how to successfully automate and secure your applications. There will also be a Q&A session at the end of the webinar.
  • Web Application Security for  Continuous Delivery Pipelines
    Web Application Security for Continuous Delivery Pipelines
    Christian Treutler Recorded: Mar 19 2019 59 mins
    Learn how to secure your modern web applications for continuous delivery, and how to solve the challenges proposed by integrating a modern web application firewall (WAF).
  • Creating Quick, Codeless Connectivity with Autonomous REST Connector
    Creating Quick, Codeless Connectivity with Autonomous REST Connector
    Ken Beuter, Product Manager and James Goodfellow Product Marketing Manager Recorded: Mar 19 2019 31 mins
    APIs enable businesses to access popular data sources from their enterprise apps, but creating these connections is both difficult and time consuming. With Autonomous REST Connector, you can consume APIs in minutes using codeless configuration and intelligent sampling. Learn more in this demonstration.
  • Power of Automated Testing & Test Management
    Power of Automated Testing & Test Management
    Dr. Milan Verma & Greg Hanson Recorded: Mar 19 2019 53 mins
    Dr. Milan Verma, Zephyr’s Lead Client Services Engineer and Greg Hanson, Senior Director of Global Sales Engineering for SmartBear recently gave a presentation and answered some essential questions on automated testing and test management with SmartBear and Zephyr.
  • Conversion Rate Optimization through Web Performance
    Conversion Rate Optimization through Web Performance
    Alex Painter, Eggplant Recorded: Mar 19 2019 14 mins
    Why do customers abandon purchases?
     
    Poor-performing pages in the conversion funnel can leach success from an otherwise effective marketing campaign.
     
    In this webinar, we’ll show you how an often-overlooked factor can cause people to drop out before completing a sale and how to identify problem pages quickly and easily.
     
    Finally, we’ll bring you simple but powerful and rarely used techniques for slicker user journeys that deliver real, measurable improvements in conversion.
  • Intelligent Fraud Management – Banking and Insurance
    Intelligent Fraud Management – Banking and Insurance
    Ritika Sehgal Director Pre-Sales Analytics and Alain Martens Analytics Solutions Consultant, TIBCO Software Recorded: Mar 19 2019 54 mins
    A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies require you to be proactive in detecting fraud quicker and more effectively.

    TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control, because you’re in charge of priorities, not a vendor.
    All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models.
    This webinar will cover:

    - Why is a fraud management platform necessary
    - How to gain an understanding of the components of a fraud management platform
    - The benefits of implementing a fraud management platform
    - How TIBCO’s platform has helped other companies
  • Lessons Learned from an Enterprise-Scale Migration Project
    Lessons Learned from an Enterprise-Scale Migration Project
    Lars Muller, CRM Partners AG, TIBCO MVP Mar 25 2019 3:00 pm UTC 37 mins
    Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.

    Watch this webinar to learn:

    - The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
    - Key decisions you need to make at the outset of your project that will minimize risks
    - How to prepare your data for a successful migration
    - How to test and execute your migration to ensure a smooth launch
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Mar 25 2019 5:00 pm UTC 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Thomas Stocker, Product Manager, Tricentis and Sunil Mavadia, Customer Journey, Electric Cloud Mar 26 2019 2:00 am UTC 59 mins
    DevOps and Agile teams have already recognized that today’s “low-code/no-code” application development approaches are an efficient way to satisfy the relentless demand for more software, faster. Yet, most continue wrestling with the high-maintenance, script-based approach to software delivery and automated testing designed decades ago.

    Watch Electric Cloud and Tricentis as they share hard-won lessons that can help any organization climb out of their scripting hole—for both software test automation and the software delivery pipeline. You’ll learn how scriptless and model-based automation can help you escape the script maintenance trap—enabling you to:

    - Dedicate more time to creative tasks
    - Increase process speed, resiliency ,and scalability
    - Achieve a new level of process visibility and control
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack Mar 26 2019 9:00 am UTC 60 mins
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • Blockchain: Flying the Friendly Skies
    Blockchain: Flying the Friendly Skies
    Nelson Petrack, CTO, TIBO Software Mar 26 2019 10:00 am UTC 36 mins
    According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.

    Watch this webinar with TIBCO CTO Nelson Petrack presenting:

    -A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
    -How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
    -What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?

    Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
  • Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Sean Carpenter & Stephen Crowley Mar 26 2019 10:00 am UTC 39 mins
    Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.

    New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
  • Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Thomas Stocker, Product Manager, Tricentis and Sunil Mavadia, Customer Journey, Electric Cloud Mar 26 2019 1:00 pm UTC 59 mins
    DevOps and Agile teams have already recognized that today’s “low-code/no-code” application development approaches are an efficient way to satisfy the relentless demand for more software, faster. Yet, most continue wrestling with the high-maintenance, script-based approach to software delivery and automated testing designed decades ago.

    Watch Electric Cloud and Tricentis as they share hard-won lessons that can help any organization climb out of their scripting hole—for both software test automation and the software delivery pipeline. You’ll learn how scriptless and model-based automation can help you escape the script maintenance trap—enabling you to:

    - Dedicate more time to creative tasks
    - Increase process speed, resiliency ,and scalability
    - Achieve a new level of process visibility and control
  • The Fastest Way to Build Enterprise Web, Mobile, and Chatbots
    The Fastest Way to Build Enterprise Web, Mobile, and Chatbots
    Rob Lauer –Senior Manager, Developer Relations, Progress & TJ VanToll – Principal Developer Advocate, NativeScript Mar 26 2019 2:00 pm UTC 95 mins
    Enterprises always want their applications to be better, cheaper and faster, but they’ve often been forced to settle with two of the three. Until now, that is.

    What’s coming in Kinvey is a new tool built for visually creating engaging chatbots and immersive experiences across web, iOS and Android. Kinvey remains focused on developers and this approach delivers visual productivity while providing full control over the application code and development experience. You can build and maintain no-compromise enterprise-grade applications while avoiding many of the headaches traditionally associated with app development.

    To learn more, view this webinar as we discuss how Kinvey Studio gives you everything you need to:

    - Visually design and build apps in a matter of minutes
    - Write custom logic and UI to finetune the digital experience
    - Connect to enterprise data sources and authentication providers with low-code integration
    - Extend your applications across web, mobile and chat with ease
    - Accelerate delivery by sharing code between different platforms
  • Running Kubernetes on AWS EC2 with Avi Networks
    Running Kubernetes on AWS EC2 with Avi Networks
    Bhushan Pai, Lei Yang Mar 26 2019 3:00 pm UTC 50 mins
    Azure Kubernetes Service (AKS) is offered by Microsoft Azure as a fully-managed Kubernetes orchestration service.
  • Enterprise Security in Data Access
    Enterprise Security in Data Access
    Jim Silhavy, Manager of Software Engineering, Progress Mar 26 2019 4:00 pm UTC 45 mins
    Get up-to-speed on the latest security advances for cloud, big data and relational databases. In the wake of increasingly frequent data breaches and emerging data protection laws like GDPR, enterprise security has become paramount. Spending on enterprise security is forecasted to increase to $96.3 billion in 2018.

    As organizations continue to invest in business intelligence, big data, IoT and cloud, IT teams are introducing increasingly complex security mechanisms to authorize and encrypt access to data. Your analytics and data management tools need to be able to securely access data spread across different systems. They must run within existing policies, and without introducing security risks.

    Listen to the Progress experts as they explain what it takes to securely access data from rapidly evolving enterprise data access layers.

    Watch this webinar to learn about:
    - Advances in end-to-end data security
    - Latest technologies for big data and cloud—Knox, Ranger, Sentry, Kerberos, OAuth
    - Newest security innovations in enterprise databases such as Oracle, SQL Server and more
    - How Progress configures and tests security in complex environments
  • How to Prepare for Your HubSpot-CRM Integration Project
    How to Prepare for Your HubSpot-CRM Integration Project
    TIBCO Mar 26 2019 4:00 pm UTC 31 mins
    Any integration project can have gotchas, such as custom fields or duplicate records that can slow you down. Proper up-front planning can help you successfully manage the gotchas, reduce the time needed and achieve better results.

    In this presentation, integration experts from LyntonWeb discuss:

    - How to prepare for your HubSpot-Dynamics CRM integration project to get the results you want
    - How to apply this advice to other marketing automation-CRM integration projects, including Salesforce integrations
  • Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Thomas Stocker, Product Manager, Tricentis and Sunil Mavadia, Customer Journey, Electric Cloud Mar 26 2019 5:00 pm UTC 59 mins
    DevOps and Agile teams have already recognized that today’s “low-code/no-code” application development approaches are an efficient way to satisfy the relentless demand for more software, faster. Yet, most continue wrestling with the high-maintenance, script-based approach to software delivery and automated testing designed decades ago.

    Watch Electric Cloud and Tricentis as they share hard-won lessons that can help any organization climb out of their scripting hole—for both software test automation and the software delivery pipeline. You’ll learn how scriptless and model-based automation can help you escape the script maintenance trap—enabling you to:

    - Dedicate more time to creative tasks
    - Increase process speed, resiliency ,and scalability
    - Achieve a new level of process visibility and control
  • Customer-proven Source Code Management Migration Process to Compuware ISPW
    Customer-proven Source Code Management Migration Process to Compuware ISPW
    Francois Dansereau, Director of Migration Services Team Mar 26 2019 5:00 pm UTC 39 mins
    Have you been reluctant to change your Source Code Management (SCM) system because it’s too risky? For Compuware ISPW customers, our migration process helped them switch and they found the grass to be greener on the other side. In this webcast, you’ll hear their stories. We know migrating away from an entrenched mainframe SCM system is daunting. Our customers have massive amounts of code in their SCM systems and numerous active development projects that cannot be disrupted. They also lack both in-house expertise in SCM migration and headcount to spare for large migration projects.

    Leveraging 24+ years of experience, our team of experts in SCM migration, with their proven methodology and state of-the-art migration tools, seamlessly migrate customers to ISPW.The Compuware ISPW SCM Migration Service is a customized solution for organizations migrating from CA Endevor, CA Panvalet, CA Librarian, Micro Focus/Serena ChangeMan, IBM RTC as well as homegrown systems to ISPW SCM. This service is designed to quickly and economically take you through all the steps of your migration—from project planning, data migration and integration to testing and knowledge transfer. Our methodology and infrastructure provide a single, lighter, more robust and agile SCM environment.

    This proven SCM migration practice: Accurately finds and documents codebase characteristics including histories and inter-application dependencies, so they can be fully preserved in the new environment

    •Manages migration in targeted, rightsized stages to accelerate time-to-benefit and limit exposure to risk
    •Rigorously tests code artifacts in the customer’s new SCM environment and brings them to a near-live state in parallel to the old environment to ensure zero disruption of development work
    •Improves code structure and reduces code complexity due to reorganizing the code base during the migration
    •Involves an end-to-end methodology addressing all critical dimensions of the migration project
  • Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Srini Srinivasan, Co Founder and Chief Development Officer Mar 26 2019 5:00 pm UTC 60 mins
    The Aerospike Connect family of add-on modules as well a new REST-API now make it even easier to integrate the Aerospike Database into both new and existing enterprise infrastructure systems, helping customers modernize and optimize their data architecture. We are happy to announce that Aerospike Connect for Kafka and Aerospike Connect for Spark are our two newest add-on modules.

    Join us on March 26 at 10am PT to hear from Aerospike Founder and Chief Product Officer, Srini Srinivasan, who will cover:
    - The Aerospike Connect product strategy

    - How Aerospike Connect for Spark enables companies to directly integrate the Aerospike database with their existing Spark infrastructure

    - How Aerospike Connect for Kafka makes it easy for enterprises to exchange data bi-directionally between the Aerospike database and enterprise transactional systems at the edge and core

    - How Aerospike REST Client can be utilized as an easy and standard interface for the Aerospike database that enables developers to work with the Aerospike data layer
  • Understanding U.S. SMS Compliance
    Understanding U.S. SMS Compliance
    Sheila Jambekar, Associate General Counsel @ Twilio & Pranav Deshpande, Sr. Product Marketing Manager @ Twilio Mar 26 2019 5:00 pm UTC 57 mins
    The business SMS messaging ecosystem is complex and can easily seem overwhelming. Sending a message to the wrong person–at the wrong time–may not only affect your customer’s experience, but could also put your business at risk of legal action.

    Buzzwords like opt-in, opt-out, P2P, A2P, TCPA, and the CTIA can make the idea of sending messages to customers that much more daunting. On the other hand, a welcome text message to the right person can be a powerful and effective way to communicate with your users.

    In this webinar, we’ll touch on:

    -The basics of messaging compliance
    -The in's and out's of U.S. regulations
    -Expert advice from helping thousands of companies deliver powerful communications experiences
  • Throwing IoT in the Trash (literally)
    Throwing IoT in the Trash (literally)
    Shane Swiderek, Brett Orr, Peter Girgis, Gavin Adams Mar 26 2019 5:00 pm UTC 55 mins
    Innovative IoT solutions are solving real-world problems, with data serving communities in ways you would never expect. Who would have predicted the hidden insights and cost savings waiting to be uncovered in our trash? Well, Bigmate! This IoT solutions provider turns real-time sensor data into insights.

    Realizing the trash collection process was outdated and inefficient, Bigmate developed a system with IoT sensors providing location, temperature, and bin level monitoring to optimize trash pickup. Saving money, streamlining operations, and optimizing processes, IoT sensor data can help your business discover new ways to solve old problems.

    Join our interactive webinar panel with Bigmate and AWS to learn:

    -How city-wide IoT implementation is optimizing trash pickup
    -How to translate raw data into actionable insights for users
    -The ins and outs of Bigmate’s IoT platform


    Presented By:

    -Gavin Adams, Sr. Solutions Architect, IoT at Amazon Web Services
    -Peter Girgis, Chief Technology Officer, Bigmate
    -Brett Orr, General Manager, Bigmate
    -Shane Swiderek, Product Marketing Manager, TIBCO Jaspersoft
  • Mastering the API life cycle in an agile world
    Mastering the API life cycle in an agile world
    Nicolas Masse, Technical Marketing Manager for API management, Red Hat. David Codelli Product Marketing Manager, Red Hat Mar 26 2019 6:00 pm UTC 36 mins
    Investment in application programming interface (API) management software increased by an average of 44% from 2012 to 2017, according to IDC.1 This growth reflects the tremendous importance of APIs to today’s businesses. While opening up digital assets promises new opportunities, companies must develop new processes to ensure that APIs are built efficiently and securely.

    This session will cover Red Hat’s approach for API development. We’ll discuss how to:

    - Use mocking to speed up and break dependencies.
    - Use a contract-first approach for defining tests that will harden your implementation.
    - Protect exposed APIs through a management gateway.
    - Manage deliveries using a continuous integration/continuous delivery (CI/CD) pipeline.
  • 7 Key Elements of an Enterprise AI Strategy
    7 Key Elements of an Enterprise AI Strategy
    Guest speaker Mike Gualtieri, Forrester Research and Ingrid Burton, H2O.ai Mar 26 2019 6:00 pm UTC 60 mins
    Artificial Intelligence (AI) is influencing every industry and decision makers are being asked: What is your AI Strategy for 2019? Most have begun thinking about how AI can be incorporated into their business strategy but the exponential growth of AI resources and offerings is making it difficult to find the right fit for one's organization. What is needed is a practical approach to AI that filters out the signal-to-noise ratio when deciding on an enterprise AI strategy. In this webinar, guest speaker and Forrester Research Vice President & Principal Analyst, Mike Gualtieri, maps out the seven key elements of an enterprise AI strategy.
  • Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Priya Shivakumar, Director of Product, Confluent + Ryan Lippert, Product Marketing, Google Cloud Mar 27 2019 10:00 am UTC 56 mins
    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka® service, to migrate to Google Cloud Platform. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    Register now to learn:
    -How to take the first step in migrating to GCP
    -How to reliably sync your on premises applications using a persistent bridge to cloud
    -How Confluent Cloud can make this daunting task simple, reliable and performant
  • How Micro Focus PlateSpin Strengthens Operational Agility
    How Micro Focus PlateSpin Strengthens Operational Agility
    Alain Salesse, Senior Solutions Architect, Micro Focus Mar 27 2019 11:00 am UTC 60 mins
    Your IT run budget is shrinking and you need a more agile way to deliver application services to the business. You could move to software-as-a-service. You could redesign your apps to leverage container or platform-as-a-service technologies. Or, you could opt for the fastest, least risky transformation option of all—re-hosting.

    This webinar is all about re-hosting. More specifically, it’s all about the Micro Focus PlateSpin re-hosting solution and what it can do for you. Here’s what you can look forward to learning:

    • How PlateSpin stands apart from other re-hosting approaches, including data centre consolidation, (re)virtualisation, the adoption of or switching between managed service providers, and the adoption of public or private cloud services.

    • How PlateSpin re-hosts entire server workloads between physical, virtual, and cloud platforms with minimal risk, downtime, and effort.

    • How PlateSpin helps enterprises and service providers deliver large-scale transformation projects on time and within budget.
  • Integrating Application Security Into Your Development Environment
    Integrating Application Security Into Your Development Environment
    Pej Pourmousa, Vice President Security Program Management, Veracode and Johnny Wong, Director Presales, Veracode Mar 27 2019 3:00 pm UTC 45 mins
    Once you define, adopt and standardize application security best practices for protecting your software, the next step is to determine how your program integrates into your existing environment. The Veracode Platform integrates with the development, security and risk-tracking tools you already use. Coupled with our broad range of APIs, your teams can create your own custom integrations or leverage those from open source community.

    Join Pej Pourmousa, Vice President Security Program Management at Veracode and Johnny Wong, Director Presales, Veracode for a webinar that will outline the ways your organization can integrate application security into your development environment. Specifically he will discuss how Veracode integrates into your development and DevOps processes using:
    •Integrated Development Environments (IDEs)
    •Build Servers
    •Defect Tracking Systems
    •APIs
  • The Myths and Future of Low-Code Development Platforms
    The Myths and Future of Low-Code Development Platforms
    John Rymer - VP Application Development & Delivery Professionals at Forrester & Ed Gross - SVP, Product Management at Kony Mar 27 2019 4:00 pm UTC 75 mins
    Corporate development teams are adding low-code platforms to their arsenals to speed application development. Why? Speed of delivery is crucial to business success, particularly for digital transformation initiatives. Come to this webinar to learn the reality of the low-code trend. Our guest speaker, John Rymer, from Forrester will bust the most common myths associated with low-code development platforms and look ahead to the new uses and unfolding strategic value that low-code brings to enterprises.
  • Securing the Istio Service Mesh: Twistlock Compliance Checks
    Securing the Istio Service Mesh: Twistlock Compliance Checks
    Neil Carpenter, Principal Solution Architect and Sonya Koptyev, Director of Product Marketing and Evangelism Mar 27 2019 5:00 pm UTC 60 mins
    Service meshes are one of the newest innovations in the world of microservices and cloud-native computing. They’re a critical tool for making microservices applications feasible to implement and manage.

    At the same time, however, service meshes — like all components of the software stack — must be properly secured. Without sufficient security oversight, service meshes run the risk of becoming a vector for attack into software infrastructure, as well as a compliance liability.

    Register now to learn more about:

    •How service meshes work and which security considerations apply to them
    •Why Twistlock identified Istio compliance checks as an important gap to address for the cloud native community
    •The official Twistlock compliance checks for Istio, including proper configurations, risk severity, major threats, and countermeasures
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Mar 27 2019 5:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Smart City Solutions: Futuristic or Feasible?
    Smart City Solutions: Futuristic or Feasible?
    Ritika Sehgal Director PreSales Analytics and Ashwin Datla Senior Solution Consultant TIBCO Software Mar 28 2019 10:00 am UTC 29 mins
    How does a modern city transform into a smart city? A city that would like to function as an integrated orchestration of people, processes, services, organizations and technologies to enhance living conditions has some challenges.

    What’s needed is an agile AI and machine learning-enabled ecosystem that can provide intelligent, connected and predictive services in healthcare, utilities, and/or transportation.

    Watch this short webinar on smart cities for real-life customer examples of how TIBCO’s Connected Intelligent solutions can help:

    - Make use of data sources for informed decision-making
    - Monitor and manage change through streaming analytics
    - Realize new revenue streams and engagement models for modern urban environments