Hi [[ session.user.profile.firstName ]]

Application Development

  • HCL AppScan v10 APAC Rehearsal
    HCL AppScan v10 APAC Rehearsal
    Randeep Chhabra & Peter Lee Recorded: May 25 2020 63 mins
    Rehearsal Meeting
  • Elastically Scaling Kafka Using Confluent
    Elastically Scaling Kafka Using Confluent
    Josh Rosenberg, Group Product Marketing, Confluent + Ricardo Ferreira, Developer Advocate, Confluent Recorded: May 22 2020 60 mins
    The number of mission-critical apps and the amount of data underpinning them has grown exponentially in the increasingly digital world - with no sign of slowing down. But rigid data architectures slow organizations down, forcing them to spend too much up front on resources they don’t use, and causing lag or downtime across their apps. In today’s hypercompetitive digital world where customer loyalty connects with the best performing applications, every millisecond delay could be another lost customer.

    Adjusting to the real-time needs of your mission-critical apps is only possible with an architecture that scales elastically. Confluent re-engineered Apache Kafka into an elastically scalable, next-gen event streaming platform that processes real-time data wherever it lives - making it accessible for any budget or use case.

    Register now to learn how to:
    -Quickly deploy Kafka in Confluent Cloud with just a few clicks and elastically scale your workloads
    -Effortlessly connect your critical data sources and sinks to Kafka to build a complete data pipeline for your real-time apps
    -Easily process streaming data with a simple interactive SQL interface using fully-managed KSQL
    -Accelerate the deployment of standardized, self-managed Kafka clusters as cloud-native systems on Kubernetes to achieve elastic scale with Confluent Platform
  • Check Point Partners with Silver Peak to Secure SD-WAN Connections to the Cloud
    Check Point Partners with Silver Peak to Secure SD-WAN Connections to the Cloud
    Aviv Ambramovich, Head of Product Management, Security Services, Check Point & Jonathan Florian,Systems Engineer, Silver Peak Recorded: May 22 2020 55 mins
    Enterprises need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud. Check Point and Silver Peak have partnered to create a joint solution that addresses the network security challenges of a cloud-first architecture, enabling enterprises to securely automate branch office Internet connections to the cloud, leveraging Silver Peak’s Unity EdgeConnect SD-WAN edge platform and Check Point CloudGuard Connect cloud-hosted security service.
  • Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Neal Carter Recorded: May 22 2020 49 mins
    Are your searches not yielding the help that you hoped? Are you spending more time than any one person should, simply writing search criteria? Come spend an hour with us where we will explore ways to alleviate these challenges. You'll walk away with best practices, tips, and tricks to solve many common search problems.
  • Kubernetes on Windows with WSL 2
    Kubernetes on Windows with WSL 2
    Alex Chalkias & Sohini Roy - Ubuntu Product Managers & Nuno Do Carmo - Ferring Pharmaceuticals Recorded: May 22 2020 21 mins
    Learn to unleash the power of Kubernetes on Windows easier and faster than before. Join us for a demonstration from Microsoft MVP and Docker Captain, Nuno Do Carmo as he guides us through how to configure a full Kubernetes on-rails on your Windows machine. This is made possible through two tools, MicroK8s and WSL2.

    During this session, you’ll learn how easy it is to not only access a full Linux terminal on Windows, and with the updates on the newest WSL2 (wide release in May) how you can enable MicroK8s, a lightweight, single-package application that brings a fully-featured, conformant and secure Kubernetes system directly on users machines.

    You’ll learn:

    What is the Windows Subsystem for Linux, and what’s are some of the great features that will be enabled in the newest version, WSL2, released in May by Microsoft
    What is MicroK8s
    How to install a local Kubernetes using MicroK8s with WSL2
    The advantages / what this combo can help you achieve
  • CIO Guide, Building a successful hybrid, multi-cloud strategy
    CIO Guide, Building a successful hybrid, multi-cloud strategy
    Janavi Ravi co-founder of Loonycorn and Pluralsight Author Recorded: May 22 2020 53 mins
    Breakdown - More and more organizations find themselves juggling multiple cloud providers—some through careful planning, but many by happenstance. Regardless of their journey, many companies may be asking, “what now?”Join Pluralsight author and cloud expert Janani Ravi for an in-depth discussion on how to build a successful hybrid, multi-cloud strategy. You’ll learn:• Popular beliefs about cloud, and the evidence that supports and contradicts those beliefs• Questions to ask when building and implementing a cloud strategy (and what the answers should look like)• Technological design patterns that matter in a hybrid, multi-cloud, ML/AI-permeated world
  • Testing Operator OLM Deployment using OpenShift Playground
    Testing Operator OLM Deployment using OpenShift Playground
    Yanai Gonzalez Recorded: May 22 2020 7 mins
    Once your operators are built, you can test and deploy them using Operator Lifecycle Manager (OLM) from OperatorHub. If you want to test this out yourself, follow along using a test OpenShift cluster provided by OpenShift Playground.
  • 情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan Recorded: May 22 2020 47 mins
    CISSPは(ISC)²が認定を行っている国際的に認められた情報セキュリティ・プロフェッショナル認定資格です。情報セキュリティの共通言語とも言える『(ISC)² CISSP CBK』を理解している情報セキュリティ・プロフェッショナルのみに与えられる資格で、CISSPの取得は、国内外において、個人および所属組織の信用・信頼の獲得につながります。Webinarでは、このCISSPについてわかりやすく説明します。
  • Best practices for verification to support reduced certificate lifetimes
    Best practices for verification to support reduced certificate lifetimes
    Dathan Demone, Director Verification Services, Entrust Datacard Recorded: May 22 2020 35 mins
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • AppScan V10
    AppScan V10
    GN Recorded: May 22 2020 1 min
    AppScan V10
  • How to effectively secure your remote workforce - Asia Pacific
    How to effectively secure your remote workforce - Asia Pacific
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: May 22 2020 24 mins
    2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:

    - Keep corporate assets secure
    - Protect and verify worker identities
    - Help remote employees stay productive
    - Reduce the administrative burden on IT

    Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
  • Bringing Governance and Cost Control to your Application Release Pipeline
    Bringing Governance and Cost Control to your Application Release Pipeline
    Pascal Joly, Quali; Mark Galpin, JFrog Recorded: May 21 2020 50 mins
    As your organization goes through the application transformation journey, DevOps engineers are faced with difficult questions around the need to maintain security compliance and infrastructure costs under control while implementing full automation of your release process.

    Join us and learn how JFrog and Quali combine forces to speed up the application release cycle and enforce governance and control. In particular, how Environment as a Service can help with security compliance, with a consistent blueprint throughout the value stream and cost control with built in automation and business-driven policies.
  • Enabling Remote Workforce Productivity with AWS
    Enabling Remote Workforce Productivity with AWS
    Michael Bordash, Lead Cloud Architect and Connie Chen, Field Marketing Specialist at Onica, a Rackspace Company Recorded: May 21 2020 44 mins
    We live in a uniquely challenging world today where we find ourselves in an unpredictable situation with Covid-19. As a result of this, a majority of the global workforce has begun to work remotely. If your organization utilizes legacy software and applications to run the bulk of your business activities, and do not have a remote work plan in place, now is an important time to look at what options are available to support your employees to help them maintain productivity, while avoiding further workforce disruption.

    Learn how you can gain the scalability, security, and global reach of AWS’ network by leveraging Amazon WorkSpaces, a fully managed, secure virtual cloud desktop, and Amazon Appstream 2.0, an application streaming service able to easily stream desktop applications to any device running a web browser.

    What we’ll cover:
    - A deep dive comparison on Amazon WorkSpaces & Amazon Appstream 2.0
    - How to enable a remote workforce based on your position on the remote-ready spectrum
    - Enabling your proprietary or legacy applications for remote access
    - How to optimize your cloud resources during times of lower utilization
  • Move From Disruptive to Productive Digital Transformation
    Move From Disruptive to Productive Digital Transformation
    Dave Landa, Kintone CEO Recorded: May 21 2020 28 mins
    The democratizing forces of no-code software development and citizen developers are turning disruptive Digital Transformation into productive Digital Execution. In this webinar by Kintone’s CEO Dave Landa, learn how citizen developers and new mode IT teams together are revolutionizing agile software development, deployment and iteration from the ground up.
  • Episode 2: How Virtual Care Changes Population Health Management Post COVID-19
    Episode 2: How Virtual Care Changes Population Health Management Post COVID-19
    Hosted by Marten den Haring, PhD Recorded: May 21 2020 42 mins
    Webinar Series: Re-engaging Patients and Employees Post-COVID 19

    As cognitive and regulatory barriers have been cleared by the impact of COVID-19, usage and satisfaction has increased exponentially for both patient and physician—physicians gain a more holistic understanding of home and circumstances, while patients get to make eye contact with their physician again. This has paralleled a shift in telehealth usage not just for urgent care but for chronic conditions and mental health, highlighting the potential for increased access to care while maintaining empathy.

    Join Lirio COO Marten den Haring as he talks with Ann Mond Johnson, CEO of American Telemedicine Association, about the role of virtual care in this reopening phase and the opportunity to meet people where they are.
  • Deep Dive into Responsible Machine Learning with H2O Driverless AI
    Deep Dive into Responsible Machine Learning with H2O Driverless AI
    Navdeep Gill, Senior Data Scientist and Software Engineer at H2O.ai and Patrick Hall, Advisory Consultant at H2O.ai Recorded: May 21 2020 62 mins
    Utilization of artificial intelligence (AI) and machine learning models have become a common practice in many aspects of the economy. Furthermore, more sections of the economy will start to embrace automation and data-driven decision making over the coming years. While these predictive systems can be quite accurate, they have been treated as inscrutable black boxes in the past, that produce only numeric predictions with no accompanying explanations. Unfortunately, recent studies and recent events have drawn attention to mathematical and sociological flaws in prominent weak AI and ML systems, but practitioners usually don’t have the right tools to pry open machine learning black-boxes and debug them.

    This presentation goes over how one can use Driverless AI to increase transparency, accountability, and trustworthiness in machine learning models. If you are a data scientist or analyst and you want to explain a machine learning model to your customers or managers (or if you have concerns about documentation, validation, or regulatory requirements), then this presentation is for you!

    What you will learn:
    - How to build interpretable models in Driverless AI
    - How to explain models in Driverless AI
    - How to evaluate fairness of models in Driverless AI
    - How to debug models in Driverless AI

    This webinar will be a deep dive into responsible machine learning. Please watch the webinars below to get an introduction to responsible machine learning:
    - Fairness in AI and Machine Learning: https://www.h2o.ai/webinars/?commid=382828
    - Towards Responsible AI: https://www.h2o.ai/webinars/?commid=387075
    - Key Terms and Ideas in Responsible AI: https://www.h2o.ai/webinars/?commid=395829
  • Evolving Security for an IoT World
    Evolving Security for an IoT World
    Gorav Arora, Office of CTO at Thales and Ted Shorter, CTO, Keyfactor Recorded: May 21 2020 48 mins
    The Internet of Things (IoT) has transformed our lives, providing convenience, enabling personalization, and changing our expectations of how devices behave. Products have become smarter with an extended usable life, allowing companies to deepen customer engagement through bi-directional touchpoints and enhanced usage analytics.

    With Internet connectivity opening these formerly isolated devices, they are digitally transformed into data hubs – sending and receiving critical information to the end-user and the enterprise. While this flow of data offers enhanced product features and new revenue opportunities, it can introduce security risks to the user and enterprise.

    Join Thales and Keyfactor to learn:
    • The state of IoT security today;
    • Best practices for securing the entire IoT ecosystem and product lifecycle – from development, manufacturing, updates, decommissioning; and
    • How a robust, secure PKI process can protect device identities, sign application artifacts in all environments, secure communication channels to and from the device, and ensure authorized access to the device, software and data.
  • Compromised Credentials, Customer Satisfaction, and Your Bottom Line
    Compromised Credentials, Customer Satisfaction, and Your Bottom Line
    Smriti Jaggi, Threat Intelligence Analyst, Shape Security Recorded: May 21 2020 32 mins
    Researchers estimate that as many as 80% of people reuse passwords across multiple accounts. With more than 13 billion compromised credentials for sale on the dark web, many organizations are highly exposed and do not even know it.

    In this webinar, you will learn how to protect your organization from compromised credentials even before they hit the Dark Web while providing a simplified password experience for your users.
  • Axonius #3: Navigating the Coming IoT Asset Visibility Gap
    Axonius #3: Navigating the Coming IoT Asset Visibility Gap
    Lenny Zeltser, CISO, Axonius; Nathan Burke, CMO, Axonius; Brandon Dunlap, Moderator Recorded: May 21 2020 58 mins
    As IT complexity increases at organizations, gaining visibility into a comprehensive asset inventory becomes progressively difficult for information security teams. The convergence of three trends account for this new era of complexity: the increase in the number and types of devices, rapid public cloud adoption, and the looming IoT explosion. Axonius commissioned a research survey with Enterprise Strategy Group (ESG) to uncover what kinds of visibility gaps, challenges, and strategies are top of mind for information security professionals. Join Axonius and (ISC)2 on May 21, 2020 at 1:00PM Eastern for the third of three webinars focusing on the looming and inevitable IoT explosion. By some reports, there will be 500 billion connected devices by 2030 (Cisco). Organizations are most concerned about visibility into the volume and diversity of devices.

    Webinar attendees will learn:

    • Detailed research findings on the looming IoT explosion, visibility challenges, and security implications

    • An understanding of the key asset inventory challenges and how organizations are addressing these issues

    • Best practices when implementing and improving an asset inventory process

    • Emerging innovations and approaches to continuous asset discovery and automation
  • The Why Behind DevOps and Microservices
    The Why Behind DevOps and Microservices
    Edson Yanaga, Director of Developer Experience, Red Hat Recorded: May 21 2020 66 mins
    Delivering Value Faster, Better and More Reliably

    Now every company is a software company: software is the fuel to this new digital economy, and how can we deliver software and value faster? Many try to show you what to do or how to do it. If you really want to know the “why”, come and check this session.

    We’ll show the real reasons for you to engage in DevOps and Microservices. With this knowledge you and your team will be enabled to stop discussing and start delivering real value every time faster, better and more reliably.

    About the speaker:

    Yanaga is a Java Champion and a Microsoft MVP. He is also a published author and a frequent speaker at international conferences, discussing Java, Microservices, Cloud Computing, DevOps, and Software Craftsmanship. Yanaga considers himself a software craftsman, and is convinced that we all can create a better world for people with better software. His life purpose is to deliver and help developers worldwide to deliver better software faster and safely - and he can even call that a job!
  • How Rally is Bringing Industry-Leading Data Privacy to Customers
    How Rally is Bringing Industry-Leading Data Privacy to Customers
    Patrick Walsh (IronCore Labs) and Michele Kubicek (Rally Software, Broadcom) Recorded: May 21 2020 25 mins
    Join Rally and IronCore Labs for a 30-minute webinar discussing how the two companies partnered to bring industry-leading data privacy to Rally’s customers. While there is an inherent risk in storing sensitive data in the cloud, Rally is the first agile lifecycle management solution to take security a step further by offering customers advanced data controls.

    Who should attend:
    - Companies who store sensitive data with Rally or wish to do so
    - Companies with strict security departments
    - Security-minded product or business managers and their security teams

    What you’ll learn:
    - What Rally does to protect your data
    - New options you have to take deeper control of your data
    - How to take advantage of Rally’s new privacy options

    Bring your questions for a 15-minute Q&A following the main presentation.

    About the Speakers:
    Patrick Walsh has 20 years of experience building security products and Enterprise SaaS solutions. Most recently he ran an Engineering division at Oracle bringing productivity and insights to the world’s largest companies. Now Patrick leads IronCore Labs, a technology platform that helps businesses get back control of their data so they can meet increasingly stringent data protection requirements.

    Michele Kubicek is a Manager of Product Management at Rally Software. She has 14 years of proven leadership experience in building agile teams and promoting a culture of innovation and continuous improvement. Michele is most driven and inspired by seeing her teams thrive and tackling complex challenges in creative ways.
  • Building a Data Driven Strategy: Unify Data to achieve Business outcomes faster
    Building a Data Driven Strategy: Unify Data to achieve Business outcomes faster
    Claes Huber, Senior Account Executive, Boomi Recorded: May 21 2020 49 mins
    Hear from Claes Huber, Senior Account Executive from Boomi discuss how important it is to consolidate data to enable a business to become more agile and achieve better business outcomes faster.
  • Six Information Governance Challenges to Tackle in 2020
    Six Information Governance Challenges to Tackle in 2020
    Paul Hampton & Tara Combs, Alfresco and Charles Araujo, Intellyxr Recorded: May 21 2020 59 mins
    With many employees currently working from home, have you considered the governance & compliance implications for the content they create, store locally and share?

    Most organizations are already grappling with the explosion in digital content, new regulatory demands and the complexity of first-gen Records Management tools. But getting a handle on information governance doesn't have to be hard.

    On this one-hour webinar we explore market conditions and share simple strategies to help you address today's information risks.
  • Challenges and Opportunities for Artificial Intelligence in Healthcare
    Challenges and Opportunities for Artificial Intelligence in Healthcare
    Marc Combalia Recorded: May 21 2020 57 mins
    Artificial intelligence (AI) is rapidly progressing and has the potential to reduce mortality, morbidity, and healthcare costs by improving diagnostic accuracy and screening efficiency. Multiple recent studies have demonstrated the ability of AI algorithms to match, if not outperform, clinicians in the diagnosis of several diseases. It becomes clear that artificial intelligence will play an important role in the medicine of the future, and the use cases can come in different forms: from the use of AI as a diagnostic tool to the optimization of the internal management and logistics of a hospital. In this webinar, we will present the current state of artificial intelligence and review some healthcare applications. We will also try to showcase the current gaps that this technology has to overcome until we have successful deployment of AI in healthcare.

    Marc Combalia, an Artificial Intelligence Research Project Engineer working at Hospital Clínic de Barcelona in close collaboration with AASA Inc., graduated in Telecommunications Science and Technology with an MSc in Telecommunications Engineering. His master thesis is titled “A Deep Learning Approach for Histological Image Classification” and had held several seminars on the topic of Deep Learning. He has a wide experience in research on computer vision and artificial intelligence, especially on the applications of artificial intelligence in the biomedical field with an emphasis on deep learning techniques.
  • Porting code to Arm SVE – HPC Webinar
    Porting code to Arm SVE – HPC Webinar
    Florent Lebeau, Staff Solution Architect Recorded: May 21 2020 28 mins
    Arm Scalable Vector Extension (SVE) is an instruction set for the Arm v8-A architecture that introduces customized features for improving High Performance Computing (HPC), including vectorization and increased floating point performance. This webinar presents the main concepts of SVE, showing how your applications can benefit from it and how easily you can port your code – even before getting access to an SVE based processor. We’ll also provide tips on how to optimize and evaluate the benefits of different vector widths.
    In this webinar, Florent Lebeau, Solutions Architect from Arm, will demonstrate how to:
    • Compile applications for SVE
    • Run SVE applications on non-SVE hardware while you wait for processor availability
    • Analyze SVE applications to tune for maximum performance
  • Secure Your Digital Transformation Journey with Thales and Microsoft
    Secure Your Digital Transformation Journey with Thales and Microsoft
    Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, Thales May 26 2020 1:00 am UTC 90 mins
    For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • HCL AppScan V10 APAC Launch
    HCL AppScan V10 APAC Launch
    HCL Software AppScan Leaders; Randeep Chhabra and Peter Lee May 26 2020 6:30 am UTC 60 mins
    Fast, Accurate, Agile Security Testing with HCL AppScan V10. Empower your CISO, AppSec and Development Teams with Application Security Testing.

    Join us on Tuesday 26th May for the APAC Launch of HCL AppScan V10, the premier version of the most comprehensive application security solution in the market.

    Hear from Randeep Chhabra, Application Security Business Leader, Asia Pacific and Peter Lee, Application Security Technical Lead, Asia Pacific at HCL Software and learn how HCL AppScan V10 can be your single solution for application security testing and management activity. This live webinar event will showcase the latest AppScan V10 enhancements in the Fast, Accurate Scanning, Secure DevOps and Enterprise Management categories. Experience a demo and see how AppScan V10 integrates directly into your software development lifecycle tools and DevOps toolchains and processes.
  • Dev zu DevSec: Secure Developer werden als die neuen Rockstars gefeiert
    Dev zu DevSec: Secure Developer werden als die neuen Rockstars gefeiert
    Ema Rimeike & Magdalena Modric May 26 2020 8:00 am UTC 28 mins
    Wasserfall, Agilität, DevOps … es macht den Eindruck, dass alle paar Jahre wieder, weitere Methoden für die optimale Softwareerstellung für Unternehmen erscheinen. Obwohl all diese Prozesse ihre Stärken und Schwächen haben, kann die Optimierung (und, “die vorher nicht vorhandene red tape”), die sie mit sich bringen, wie ein Hindernis für das Hauptziel der Entwickler anfühlen: KICK-ASS FEATURES ERSTELLEN. In diesem Webinar werden Ihnen taktische Methoden vorgeschlagen die erforderlich zum Aufbau einer erfolgreichen DevSec Strategie werden. Wir wünsche Ihnen interessante Einblicke.
  • Mittels DevSecOps Applikationen Sichern
    Mittels DevSecOps Applikationen Sichern
    Julian Totzek - Hallhuber | Solution Architect at Veracode May 26 2020 9:00 am UTC 45 mins
    Gerade wenn Sie dachten es kann nicht schlimmer werden, passiert es. Cyber-Angriffe haben sich in den letzten 12 Monaten verdoppelt. Egal für wen Sie arbeiten, auch Ihr Unternehmen wird mehrfach jeden Minute angegriffen.

    Es ist nicht nur die Bedrohung, die Ihre Ressourcen zu überwältigen droht, sondern auch das Ausmaß und die Geschwindigkeit Ihrer Reaktion. Das stimmt, solange Sie nicht die Strategien, Richtlinien und Prozesse von DevSecOps implementieren.

    Veracode behauptet, dass Cloud-native Technologien Entwicklern helfen, die Zeit zu reduzieren, die zur Beseitigung von Sicherheitslücken erforderlich ist. Laut Gartner werden Unternehmen, die die Cloud-Infrastruktur zur Automatisierung des Sicherheitsschutzes verwenden, bis 2022 60% weniger Sicherheitsvorfälle erleiden, und DevSecOps-Teams, die auf diese Weise arbeiten, lösen ihre Sicherheitsprobleme dreimal schneller, so Veracode.

    Aber wie? Nehmen Sie an unserem Webinar teil und sehen Sie, wie Veracodes Principle Solutions Architect Julian Totzek-Hallhuber zeigt, was DevSecOps in der Praxis bedeutet und welche pragmatischen Schritte zu schnellen und effektiven Ergebnissen in Ihrem Unternehmen führen.
  • Pluralsight Customer Workshop - Next
    Pluralsight Customer Workshop - Next
    James Mason, Next - Service Delivery Software and Projects Manager May 26 2020 10:00 am UTC 60 mins
    This session will present Next's story of Tech Skills development and the steps they have taken with Pluralsight to address staff retention and in supporting the organisations key business strategies.
  • Modernizing Your Legacy Operational Reports
    Modernizing Your Legacy Operational Reports
    Scott Seal, Senior Product Marketing Manager May 26 2020 10:00 am UTC 30 mins
    Operational reports help organisations present and distribute information to the right people, in the right format, and in a timeframe that supports their business needs. However, if operational reports are cumbersome or difficult to read, the benefits can vanish quickly.

    Today, reporting requirements are more complex–outdated tools are no longer meeting end user expectations.

    Join our webinar to discover why and how organisations are modernizing their operational reports.

    We’ll explore:
    1. Complex needs of common reporting scenarios

    2. Five modern operational reporting features

    3. An example of an organisation that transformed their operational reporting
  • Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Tim van Baarsen May 26 2020 10:00 am UTC 57 mins
    In this talk, Tim van Baarsen will take you on a journey beyond the basics of Spring Kafka and will share his knowledge, pitfalls and lessons learned based on real-life Kafka projects that are running in production for many years at ING Bank in the Netherlands.
  • Stärken Sie Ihre Belegschaft durch moderne Authentifizierung
    Stärken Sie Ihre Belegschaft durch moderne Authentifizierung
    John Waters von OneLogin und Patrick Schnell von Yubico May 26 2020 1:00 pm UTC 45 mins
    Der Zugang zu Unternehmensinformationen wird in der Regel über Passwörter verwaltet. Aufgrund der wachsender von Sicherheitsverletzungen, die hauptsächlich durch schwache oder gestohlene Passwörter entstehen, evaluieren immer mehr Unternehmen alternative Authentifizierungs Optionen.

    Erfahren Sie wie moderne Standards der Authentifizierung Sie auf ihrer Reise von passwortlosen Anmeldung unterstützen können. Unternehmen haben dafür heute die Flexibilität z.B. YubiKeys (Security Keys) oder Biometrie für ihre starke Authentifizierung zu nutzen, ohne die Sicherheit zu vernachlässigen. Gleichzeitig steigern diese Lösungen die Akzeptanz beim Benutzer da der Login prozess stark vereinfacht wird.

    In diesem Webinar sprechen John Waters von OneLogin und Patrick Schnell von Yubico über folgende Themen:

    -Wie moderne Authentifizierung heutige Belegschaften beeinflusst
    -Fallbeispiele über WebAuthN/FIDO2
    -Bewährte Praktiken zur Verwendung der WebAuthN-/FIDO2- Authentifizierung, um Ihnen einen sicheren Zugriff auf Unternehmensinformationen Ihrer Organisation zu ermöglichen
  • BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    John Bailey, Blue Prism; Arvid Aendenboom, BrightKnight & Fred Versyck, BrightKnight May 26 2020 1:00 pm UTC 60 mins
    SAP is a powerful software suite, used extensively in many corporations of all sizes across the globe. BrightKnight have come across many business processes executed in SAP. Many of them have a tremendous potential for automation with Blue Prism. During this webinar we will focus on two of them.
    Focus will be on how we went about the automation journey and on the benefits realized with these processes. Furthermore, we will also share a quick word on how we tackled this from technical standpoint.

    Both use cases focus on Customer Service in the utilities sector, specifically customer data quality. SAP relies on verified and correct customer data to work as intended; this is where automation comes in. A significant amount of manual work was spent on simple checks to verify how a client contract should be handled. Now all this preparation is done by a Blue Prism robot and the manual work focuses on handling the actual contract.
    In another use case, the aftercare of a mass migration of data is being done. It wasn’t technically feasible to couple incoming clients with existing clients and therefore RPA came into the picture. Due to the implementation of this Blue Prism robot, business could take the correct decisions in handling the rest of the cases.
  • Industry Discussion: "Back to Business" After the Covid-19 Crisis (Part 2)
    Industry Discussion: "Back to Business" After the Covid-19 Crisis (Part 2)
    Sumita Yadav of Catholic Health Services, Zayna Khayat of SE Health, Shawn Nason of MOFi & Michael Godoy of UCSF May 26 2020 2:00 pm UTC 60 mins
    Part 2 of a Special 2-part Series
    Many of the use cases common in healthcare did not scale to accommodate the Covid-19 crisis. As world governments begin to look past the peak of the Coronavirus pandemic, stakeholders are pushing across industries to resume operations. As we prepare to reopen in this post-COVID world, what are the new rules of engagement for your healthcare system? Where do you start? What can other businesses learn from the experiences of healthcare systems? What critical role can IoT play in COVID-19 recovery?

    Join us for an industry-led, round table discussion on the strategy, planning and preparation to be considered as health systems reopen for patient care. While healthcare organizations have scrambled to adapt to the COVID-19 crisis, the lessons learned can be applied across all industries as companies ramp up digital transformation capabilities in the post-Covid era.

    Speakers include:
    Sumita Yadav, Vice President, Cardiovascular and Orthopedic Service Lines at Catholic Health Services
    Michael Godoy, Telemedicine and Scalable Therapeutics Program Director, UCSF Medical Center
    Shawn Nason Founder, CEO & Eco-System Disruptor, MOFi
    Zayna Khayat, Futures Strategist, SE Health
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois May 26 2020 2:00 pm UTC 25 mins
    In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.

    In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.
  • The State of Open Source Security Vulnerabilities in 2020
    The State of Open Source Security Vulnerabilities in 2020
    Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager May 26 2020 2:00 pm UTC 56 mins
    WhiteSource’s Annual Report on The State of Open Source Security Vulnerabilities in 2020 found that a record-breaking number of new open source security vulnerabilities in was published in 2019.

    In our research, we focused on open source security’s weakest and strongest points in the hopes of bringing some clarity to the fast-paced and complex space of known open source security vulnerabilities.

    Join Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager at WhiteSource as they discuss:
    •How the open source community is evolving when it comes to security research and what to expect in 2020.
    •Ways software development outfits can implement secure coding from the earliest stages of the DevOps pipeline.
    •Best practices for development, DevOps, and Security teams to make sure they address the most critical issues to their software products’ security.
  • Webinar - Hyperautomation oltre l'RPA
    Webinar - Hyperautomation oltre l'RPA
    Ezio Viola The Innovation Group, Constanino Croce Appian, Fabrizio Custro Amadori, Alexia Zeri Prysmian Group May 26 2020 2:00 pm UTC 67 mins
    ho il piacere di invitarla al Webinar “Hyperautomation – oltre l’RPA” organizzato da Appian, in collaborazione con The Innovation Group, sul tema dell’automazione dei processi aziendali.
    In particolare di parlerà di automazione end-to-end dei processi e di come le applicazioni di Robotic Process Automation (RPA) oggi si stiano espandendo verso contesti di automazione più ampi.

    Nella sessione interverrano, oltre ad un esperto di automazione di Appian, un analista di mercato di The Innovation Group ed alcune aziende italiane che hanno già fatto esperienza ini questo percorso di automazione più ampio. Verranno trattati:

    Esempi applicativi per vari ambiti dell’impresa
    Automazione dei processi nell’area amministrativa
    Benefici raggiungibili con i sistemi RPA e limiti dei robot software
    Come unificare e orchestrare la collaborazione tra umani, bot e algoritmi IA
    Il valore di una piattaforma che unisce RPA, BPM e sviluppo Low Code
  • The Ins and Outs of Fuzzing
    The Ins and Outs of Fuzzing
    Kimm Yeo, Product Marketing Manager and Rikke Kuipers, Product Manager May 26 2020 3:00 pm UTC 60 mins
    “Another day, another data breach” is not just a cliché; it’s a reality. But all data breaches are not equal. To avoid becoming the next victim, you must create software that’s more secure, higher quality, and compliant with standards.

    This webinar will introduce you to the concept of fuzzing, as well as Synopsys’ best-of-breed fuzzing solution, Defensics. Fuzzing is well established as an excellent technique for locating vulnerabilities in software. Register for this webinar to learn:

    •What fuzzing is, how it works, and when and why you should use it
    •How various fuzzing approaches differ and the pros and cons of each
    •How Defensics uses generational / specification-based fuzzing to test over 250 protocols effectively and efficiently
  • Deep Dive into the new SD-WAN Sandbox
    Deep Dive into the new SD-WAN Sandbox
    Stuart Clark, Eugene Black, Sai Suchandan Reddy Marapareddy, Silvia Spiva - Cisco Systems May 26 2020 3:00 pm UTC 60 mins
    In the BrightTalk webinar, you will hear how we planned and built the new Cisco SD-WAN Sandbox, what goes into building a sandbox, and an awesome demo from Sai showing you how to use Postman collection examples to get started with Cisco vManage APIs. Then we will look at how to use vManage Aggregation APIs to generate reports on statistics related to loss/latency/jitter of SD-WAN overlay tunnels and we will also look at how to use APIs to trigger policy updates to change the preferred transport for certain application traffic. Finally, we look at how to use Viptela Python SDK to simplify operations related to feature/device templates. We will also be taking your questions live too.
  • 5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    Emmanuel Bertolin, SVP and General Manager of Provider Services, AppDirect and Laura Stevenson, Senior Director, AppDirect May 26 2020 3:00 pm UTC 45 mins
    Today, chances are good that you’re part of the consumer subscription economy. Maybe you have an Amazon Prime account, stream Hulu, or listen to your favorite songs on Spotify. But selling, implementing, and managing recurring B2B digital products is entirely different than selling simple subscriptions to consumers.

    In this webinar, Emanuel "Bert" Bertolin, AppDirect's Senior Vice President and General Manager of Provider Services, will give an overview of B2B subscription commerce. He will also detail five key reasons why a consumer subscription playbook won't work for businesses. Specifically, he'll cover how B2B subscriptions are:

    - More complex and multi-dimensional
    - Need more sales assistance
    - Often include the channel
    - Require seamless integration
    - Must accommodate a range of payment options

    Attendees will come away with a better understanding of how to adapt to these differences and succeed in the new world of B2B subscription commerce.
  • Insights from Global RPA Survey
    Insights from Global RPA Survey
    Travis Greene, Director of Product Marketing, Micro Focus and David Gehringer, Principal, Dimensional Research May 26 2020 3:00 pm UTC 60 mins
    Micro Focus recently surveyed business and technology professionals around the globe about their experiences adopting and scaling RPA. By automating a range of processes—from HR and IT to sales, customer service, finance, compliance, and auditing—more than half of them have saved 30+ hours per week.

    But how should you start RPA? What scalability challenges will you face? And—are the business benefits real? Micro Focus recently asked RPA practitioners these very questions. Join our interactive Q&A webinar to hear their answers. We’ll cover:
    • Benefits to be gained—today and tomorrow—from RPA.
    • Key lessons learned by early adopters.
    • Critical capabilities needed to implement RPA.
    • Challenges companies face when scaling RPA.
    • How needs and challenges change as RPA experience grows.
  • Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Dr. Juan Nogueira-Nine, Jack Ogawa, Charlene Marini, Pete Swabey & Bob O'Donnell May 26 2020 4:00 pm UTC 60 mins
    Webinar 1: Managed IoT Devices with simple security, efficiency and AI
    Join experts from Vodafone, Flex, Atos, Cypress (An Infineon Technologies Company), Altair Semiconductor, Arm and The Economist to learn more.

    The current crisis is showing us the importance of precise and reliable data. It has highlighted how thinking it's obvious what's in a box marked 'PPE' and being certain of its contents can be at odds. How vital it is to track production line operations in real-time when stoppages cannot be tolerated, and how data-driven processes across any system can be fine-tuned when every element of the system is connected and manageable. It's not a test anyone wanted to see but we are now seeing the true potential of a global IoT, and the data-driven insight and actions it can enable.

    But driving a pervasive IoT to take connected industries, businesses and people to the next level of value and control is not simply a case of deploying more devices. Considerations such as clearly defined objectives, security, component interoperability, speed to market and turnkey vs tailored solutions are all areas that must be tackled before embarking on a commercial IoT journey.

    Join two webinars with industry experts at the cutting edge of IoT evolution debating what they think happens next. How they imagine the vision of a Hyperscale IoT can become a reality.

    Hear about the compute curve is driving up the potential for IoT but how opportunities must be weighed against the need to protect system value through choices made at the outset of any IoT deployment.


    Global device maker Flex's Senior Director of Connectivity Dr. Juan Nogueira-Nine

    Senior Director of Embedded Products Jack Ogawa, Cypress, An Infineon Technologies Company

    Arm’s VP/GM of the Devices IoT Platform BU Charlene Marini

    The Economist Intelligence Unit's Editorial Director Pete Swabey

    With panel moderator Bob O'Donnell from analyst firm TECHnalysis
  • Adding Message Queues to Kubernetes Deployments
    Adding Message Queues to Kubernetes Deployments
    Zohar Kaufman, VP R&D Portshift May 26 2020 4:30 pm UTC 60 mins
    How to Remain Efficient and Secure

    Asynchronous messaging brokers like RabbitMQ and Kafka are commonly used for microservices applications. Although KubeMQ is the CNCF option for message broker and message queue, most enterprises still use Kafka and RabbitMQ in their Kubernetes deployments to create a messaging scheme that decouples message production by a producer from its processing by a consumer.

    But message brokers and queues imply a new security challenge for DevSecOps teams, as it eliminates the option to create any level of segmentation between microservices that use the message queues, classical Kubernetes network policies are useless when all services can communicate with the broker.

    In this webinar we’ll explore microservices deployments in Kubernetes using message brokers like Kafka, examine their deployments options. We’ll also examine the security angle of messaging queues and brokers and show how to create effective security governance for these deployments.

    Key Discussion Points:
    1.Messaging queues/brokers deployment options in Kubernetes clusters
    2.Explore the security challenges of native Kubernetes network policies
    3.Explore different options to implement efficient network security policies that addresses messages queues/brokers
  • Develop Voice Enabled Apps: Revolutionizing App UX with the Alan Platform
    Develop Voice Enabled Apps: Revolutionizing App UX with the Alan Platform
    James Shelburne, Ujjwal Krishnamurthi May 26 2020 5:00 pm UTC 45 mins
    If you’re an app developer, you know mobile app users have frustrating experiences -- screen sizes are small, dropdowns and other UX elements are hard to navigate and require the user to learn and get used to. Touch and type is impossible to use while on the go. Graphical User Interfaces have reached their limits.

    Join us May 26th and learn how you can revolutionize your app UX with the Alan Voice AI Platform. With Alan, you have everything you need to Build, Debug, and Integrate a powerful voice interface into your applications. Once Integrated, Alan provides deep insights with logs and analytics so you can Iterate quickly to bring users an amazing experience.

    We'll show you prime use cases for voice and give a step-by-step guide on how you can add a voice interface to an existing iOS application.

    Hear from leaders in Voice Application Development and learn how voice interfaces will play a significant role in enhancing the quality of our interactions with computers and transform every global industry.
  • Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco
    Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco
    Pawan Shankar, Director, Secure Product Marketing, Sysdig & Vicente Garcia, Technical Marketing Engineer, Sysdig May 26 2020 5:00 pm UTC 70 mins
    Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. Examples include:

    - Exploits of unpatched and new vulnerabilities
    - Insecure configurations
    - Leaked or weak credentials
    - Insider threats

    Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail. In order to keep up with threats at runtime, an open-source based approach can help you stay up to date.In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what. We will also cover how Sysdig Secure extends the Falco detection engine and eases the burden of creating and updating Falco rules. It can also generate fewer false positives by tuning Falco-based policies for your own environment.
  • Supply Chain Resiliency: Countermeasures & Resource Mobilization
    Supply Chain Resiliency: Countermeasures & Resource Mobilization
    Frank Konieczny, CTO, U.S. Air Force & Mark Palmer, SVP Analytics, TIBCO Software. May 26 2020 5:00 pm UTC 52 mins
    Watch TIBCO’s Virtual Supply Chain Round Table on to gain access to exclusive thought leadership concerning the current state and future of supply chain.

    Gain industry perspective from guest speakers including; Frank Konieczny, CTO, U.S. Air Force and Mark Palmer, SVP Analytics, TIBCO Software.

    Explore how you can:
    Eliminate data silos with an integrated solution
    Ensure accuracy & one version of the truth
    Analyze and gather insights from designated data sources to create timely & reliable plans/forecasts
    Understand the impacts of potential outcomes in order to adapt to market conditions
  • Predicting Customer Behavior with Amazon SageMaker Studio
    Predicting Customer Behavior with Amazon SageMaker Studio
    Eric Miller, Senior Director, Customer Solution Architecture, Onica, a Rackspace Company May 26 2020 6:00 pm UTC 75 mins
    The power of machine learning allows us to produce actionable insights with our data and streamline decision making, but it can be challenging to manage ML development workflow due to a lack of advanced ML tooling. Learn how you can leverage Amazon SageMaker Studio, a fully integrated development environment for ML in AWS, to easily and quickly build machine learning models under a convenient and intuitive single pane of glass. We’ll explore the Amazon SageMaker Studio service and discuss how the integrated visual interface manages workflow in order to build, train, and deploy machine learning models at scale.

    What we’ll cover:
    - An introduction to Amazon SageMaker Studio
    - Core features such as SageMaker Studio Notebooks, Autopilot and Experiments
    - How to enable and create your own Amazon SageMaker experiments
    - How to engineer features, tune models and obtain data for analysis
  • How APIs are Fueling the Next Wave of Financial Services
    How APIs are Fueling the Next Wave of Financial Services
    Iddo Gino, Founder and CEO - RapidAPI May 26 2020 7:00 pm UTC 45 mins
    Applications Programming Interfaces (APIs) have risen in popularity and adoption by financial services, which has been thrust into the API economy by regulatory involvement in open banking and PSD2, evolving customer expectations, and the growth of fintech startups bringing technology to every aspect of banking. APIs fuel innovation and elevate customer experiences by enabling banks to enhance their web portals and mobile applications, extend payment systems, and expand their offerings by exposing data and services to customers and partners.

    In this session, RapidAPI’s Founder and CEO, Iddo Gino:

    -Explores the driving forces behind this rise in adoption for APIs in financial services
    -Examines the types of APIs being created and exposed by banks around the world
    -Presents a set of recommendations for doing APIs smartly based on information from more than a dozen different banks