Hi [[ session.user.profile.firstName ]]

Application Development

  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Recorded: Oct 17 2019 47 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Geek's guide to the workspace (part 4): first you get content, then the apps
    Geek's guide to the workspace (part 4): first you get content, then the apps
    Brian Jozefat, Crystal Ricevuto Recorded: Oct 17 2019 30 mins
    Users create an ever-increasing number of documents, presentations, drawings and other content that are stored in files. There is also no shortage of locations to store those files. Making sure that your users have seamless access to all those files, in any repository, is key to providing a productive user experience. In this session, we will demonstrate how Citrix Workspace provides access to all those repositories, including the native Citrix Content Collaboration repository, existing repositories on-premises and in the cloud, and repositories inside Workspace apps to those integrated into Explorer and Finder, all with a seamless experience.
  • Case Study: How Boomi is helping AO Foundation to improve patient care
    Case Study: How Boomi is helping AO Foundation to improve patient care
    Armin Donhauser, CIO and Brian Ingles IT Project Manager, Architect, AO Foundation Recorded: Oct 17 2019 31 mins
    AO Foundation, the world's leading educational and research organisation for the treatment of trauma and musculoskeletal disorders shares their story of how Boomi supports the processes leading to surgeon education and new product development to improve patient care. (Recording from live session at Boomi World Tour London)
  • Forrester Research: DevOps Quality Metrics That Matter
    Forrester Research: DevOps Quality Metrics That Matter
    Wayne Ariola, CMO, Tricentis Recorded: Oct 16 2019 47 mins
    With DevOps, almost every aspect of application delivery has been put under the microscope and re-evaluated. Quality metrics have largely escaped that scrutiny…until now.

    Tricentis recently commissioned Forrester to research how 75 quality metrics are used and valued among 603 DevOps leaders and laggards. The goal: provide the software testing community an objective perspective on which quality metrics matter most for DevOps success.

    In this on-demand webinar, we’ll take a deep dive into the findings, answering questions such as:

    - In the context of DevOps, do the “popular” quality metrics like number of automated tests, test case coverage, and pass/fail rate really matter?
    - Which metrics are best suited for ensuring that continuous updates won’t undermine the very user experiences you’re working so hard to enhance?
    - How do your team’s quality metrics rank? Are you taking advantage of the ‘hidden gems’ or getting caught up in vanity metrics?
  • Get to the Point! Communicate More By Saying Less
    Get to the Point! Communicate More By Saying Less
    Diane DiResta Recorded: Oct 16 2019 49 mins
    Do you do most of the talking? Do you take too long to get your point across? Do you allow the conversation to go down a rabbit hole?

    Whether you’re an entrepreneur or business professional, you can’t seal the deal unless you can speak clearly and concisely. In this webinar you’ll learn:
    - how speakers and high level executives lose their audience
    - how to create a message that’s crisp
    - a mantra for keeping you on track

    When you learn to be crisp, you’ll see glazed eyes of boredom turn into raised eyebrows of interest.
  • How to enhance and manage your IoT security in a Microsoft Azure environment
    How to enhance and manage your IoT security in a Microsoft Azure environment
    James Penney, Device Authority and Ian Banham, Microsoft Recorded: Oct 16 2019 52 mins
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • Build your own BPM application
    Build your own BPM application
    Myriam Fentanes and Phil Simpson, Red Hat Recorded: Oct 16 2019 58 mins
    Have you ever built a working application that automates a business process? Now's your chance to try it hands-on. In this workshop, we’ll take you through the steps required to build a simple application based on a real-world use case: automating the handling of credit card disputes.

    We’ll use Red Hat® Process Automation Manager, a leading business process management (BPM) platform. Bring your laptop (no software installation required), and you’ll see how to get started with process modeling, decision modeling, and deploying your finished application to the cloud.

    We’ll cover:

    • How to create models of business processes and decisions using standard notations such as BPMN.
    • How to convert models into fully working applications with Red Hat Process Automation Manager.

    Featuring:
    Myriam Fentanes, Principal technical marketing manager, Business Automation, Red Hat
    Phil Simpson, Senior principal product marketing manager, Red Hat
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Breaking the Business Bottleneck: Fixing the Problems (Part 2)
    Breaking the Business Bottleneck: Fixing the Problems (Part 2)
    Rick Clark, Field CTO and Coté, Director at Pivotal Recorded: Oct 16 2019 55 mins
    For the most part, we know what IT needs to do become a "tech company": move to a more frequent, usually weekly release cycle, focus on customer-centric design, and rely on cloud platforms to automate infrastructure toil. What does the rest of your organization, outside of IT, need to do?

    In part two of this webinar series, we discuss new models and tactics to break the business bottleneck across strategy, finance, and management. Based on case studies and first hand experience you'll be able to start planning the rollout of digital transformation beyond IT.
  • Forrester Research: DevOps Quality Metrics That Matter
    Forrester Research: DevOps Quality Metrics That Matter
    Wayne Ariola, CMO, Tricentis Recorded: Oct 16 2019 47 mins
    With DevOps, almost every aspect of application delivery has been put under the microscope and re-evaluated. Quality metrics have largely escaped that scrutiny…until now.

    Tricentis recently commissioned Forrester to research how 75 quality metrics are used and valued among 603 DevOps leaders and laggards. The goal: provide the software testing community an objective perspective on which quality metrics matter most for DevOps success.

    In this on-demand webinar, we’ll take a deep dive into the findings, answering questions such as:

    - In the context of DevOps, do the “popular” quality metrics like number of automated tests, test case coverage, and pass/fail rate really matter?
    - Which metrics are best suited for ensuring that continuous updates won’t undermine the very user experiences you’re working so hard to enhance?
    - How do your team’s quality metrics rank? Are you taking advantage of the ‘hidden gems’ or getting caught up in vanity metrics?
  • Forrester Research: DevOps Quality Metrics That Matter
    Forrester Research: DevOps Quality Metrics That Matter
    Wayne Ariola, CMO, Tricentis Recorded: Oct 16 2019 47 mins
    With DevOps, almost every aspect of application delivery has been put under the microscope and re-evaluated. Quality metrics have largely escaped that scrutiny…until now.

    Tricentis recently commissioned Forrester to research how 75 quality metrics are used and valued among 603 DevOps leaders and laggards. The goal: provide the software testing community an objective perspective on which quality metrics matter most for DevOps success.

    In this on-demand webinar, we’ll take a deep dive into the findings, answering questions such as:

    - In the context of DevOps, do the “popular” quality metrics like number of automated tests, test case coverage, and pass/fail rate really matter?
    - Which metrics are best suited for ensuring that continuous updates won’t undermine the very user experiences you’re working so hard to enhance?
    - How do your team’s quality metrics rank? Are you taking advantage of the ‘hidden gems’ or getting caught up in vanity metrics?
  • The Role of Automated Testing In Legacy Modernization
    The Role of Automated Testing In Legacy Modernization
    Dave Tanacea, Chief Domains Officer at Ness Digital Engineering Recorded: Oct 15 2019 19 mins
    Modern Systems' Rob Anderson welcomes our guest, technology partner Ness Digital Engineering, for an educational talk about the critical importance of automated testing (test early, test faster, test often!) to increase productivity and improve quality legacy application modernization projects.
  • Enterprise Content Management: A Digital Operations Future?
    Enterprise Content Management: A Digital Operations Future?
    John Newton, Founder, Alfresco / Charles Araujo, Principal Analyst, Intellyx Recorded: Oct 15 2019 56 mins
    What are the content management trends influencing the market and which new capabilities will help you unlock the value hidden in your organization's content?

    Alfresco founder John Newton, believes working towards a state of ‘Digital Operations’ is key to putting content at the heart of your digital transformation.

    Join him for this webinar, hosted by Charles Araujo, Principal Analyst at Intellyx, where they will explore:
    - Digital Operations that lead to meaningful Digital Customer Experiences and instant services.
    - Why several independent analysts all agree Alfresco is an ECM market leader.
    - The impact of Open Source, API-driven Microservices and Containerization and AI.
  • Case Study: Transforming Data Integration at Enterprise Scale with Amadeus
    Case Study: Transforming Data Integration at Enterprise Scale with Amadeus
    Olivier Muller & Emmanuel Viguie, Amadeus S.A.S Recorded: Oct 15 2019 25 mins
    Hear how Amadeus managed to build 100+ data flows across 100+ applications per year in an efficient and flexible way by evolving their technology and organization. (Recording of customer session from Boomi World Tour London 2019) #winwithboomi
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Recorded: Oct 14 2019 61 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • The State of Data Security in Retail
    The State of Data Security in Retail
    Andy Kicklighter, Director of Product Marketing, Thales Recorded: Oct 10 2019 35 mins
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
    with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
    •How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    •The data security challenges facing retail companies today
    •Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Customer Update: Aerospike 4.7 for Intel® Ethernet 800 Series with ADQ
    Customer Update: Aerospike 4.7 for Intel® Ethernet 800 Series with ADQ
    Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at Intel Recorded: Oct 10 2019 40 mins
    Application Device Queues (ADQ) is a new Intel innovation for system-level network input/output (I/O) performance. This will improve application response predictability and scalability in a cost-effective manner. ADQ dedicates queues and shapes traffic for the transfer of data through Ethernet for critical applications. This is accomplished by using standard operating system networking stacks and interfaces supplemented with Intel hardware technologies for improved performance. The goal of ADQ is to ensure that high-priority applications receive predictable high performance through dramatically reduced jitter.

    Aerospike is the first commercial/open database that supports Intel’s innovative product lines – Intel PMEM and now Intel ADQ. The close collaboration between Aerospike and Intel resulted in unprecedented performance gains and low latency in applications powered by the Aerospike database.

    Aerospike 4.7 is optimized for the Intel Ethernet 800 Series with ADQ. The network adapter hardware enables enterprises to move beyond NUMA pinning to speed up applications by quickly moving vast amounts of data to and from the edge, the core and the cloud.


    Join this Special Customer Update featuring Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at Intel. Each will share perspective on the significance of these advancements.

    You’ll hear details on Intel Ethernet 800 Series with ADQ directly from one of Intel’s most influential engineers and Srini’s expectations for what 4.7 will mean for Aerospike customers.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Geek's guide to the workspace (part 3): protecting your SaaS
    Geek's guide to the workspace (part 3): protecting your SaaS
    Matthew Brooks, Vijaya Raghavan Krishnan Recorded: Oct 10 2019 43 mins
    SaaS apps are great. They are extremely easy to buy, easy to deploy and easy to access. Regardless of the user's endpoint and location, they can access the app without relying on IT to deploy complex VPNs. Unfortunately, each SaaS app introduces a new identity for the user to remember. User accounts can be easily compromised with a weak password, resulting in stolen data. We have no easy way to disable access to SaaS apps when users leave the company. This session will demonstrate how to incorporate single sign-on, enhanced security, and website filtering for SaaS and web apps into the Citrix Workspace experience.
  • Case Study: How Tele2 built their Modern Integration Architecture
    Case Study: How Tele2 built their Modern Integration Architecture
    Andris Soms-Sakne, System Manager, Tele2 Shared Services Center & Saila Lehtovaara, Senior Integration Specialist, Solita Oy Oct 22 2019 8:00 am UTC 14 mins
    Tele2 and Solita have partnered together to develop a modern integration architecture. Tele2 has chosen Dell Boomi as their integration platform solution to enable digital transformation with Solita. Through the partnership they integrate on-premise and cloud applications safely and securely by utilizing Dell Boomi Integrate, MDM, EDI and APIs. (Recording of live customer session at Boomi World Tour London 2019) #winwithboomi
  • Desktops as a service with Citrix
    Desktops as a service with Citrix
    Kireeti Valicherla, Paul Carley Oct 22 2019 9:00 am UTC 45 mins
    Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
  • Why config matters in DevSecOps
    Why config matters in DevSecOps
    Ben Riley, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, Sweagle Oct 22 2019 2:00 pm UTC 30 mins
    In this upcoming webinar, Ben Riley, Technical Director, will demonstrate the vital role of fighting bad config data and how you can help save your CI/CD pipeline from falling foul of violations, errors, and security risks.

    Topics we will cover in this session:

    1. Secrets management
    Join us to see how sweagle will scan through your config data and discover and automatically encrypt sensitive data such as plain text passwords, API keys, and access tokens.

    2. Fine granular RBAC
    We will demonstrate how you limit access based upon the type of config data and the stage (whether it's for DEV, STAGING, or PROD) for human users, software systems, UI users, and API integrations.

    3. GDPR compliancy, validation & mitigating risks
    We'll show you how you can prevent data transfer violations through geographic validation rules and how to detect bad configurations to cloud resources which could be opening up vulnerabilities in your release process.

    4. CI/CD evidence repository
    We'll clearly demonstration how you can turn collected config data into an unalterable evidence repository that's available for analytics, reporting, and automated diff comparisons. A solid evidence repository is a prerequisite for everyone looking at reducing the effort of self-audit.

    Join us for this technical webinar to see demos and practical illustrations of how you can secure, validate and audit your config data automatically.
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware
    Part 1: Why State and Local Governments are Prime Targets for Ransomware
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane Oct 22 2019 5:00 pm UTC 60 mins
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • Building Resilient Cloud Load Tests for SAP Fiori
    Building Resilient Cloud Load Tests for SAP Fiori
    Kevin Dunne, SVP, Strategic Initiatives, Tricentis Oct 23 2019 2:00 am UTC 45 mins
    SAP promises that Fiori is the ultimate way to deliver an exceptional user experience on multiple devices. However, you can’t talk about the user experience today without addressing performance issues.

    Are your Fiori applications meeting performance expectations in terms of response time, concurrency, availability, and scalability? Do the enhancements in each update you roll out actually undermine the user experience that the update is supposed to improve?

    Join Kevin Dunne, General Manager of Flood IO, to learn how you can start load testing Fiori as painlessly as possible.

    You’ll learn how:

    - Fiori’s customization and dynamic nature complicate load testing (as well as functional testing)
    - A new browser-based load testing approach lets you reuse your existing functional tests for load testing
    - To start and scale tests without waiting on constrained performance testing resources and expensive performance testing labs
  • Building Resilient Cloud Load Tests for SAP Fiori
    Building Resilient Cloud Load Tests for SAP Fiori
    Kevin Dunne, SVP, Strategic Initiatives, Tricentis Oct 23 2019 11:00 am UTC 45 mins
    SAP promises that Fiori is the ultimate way to deliver an exceptional user experience on multiple devices. However, you can’t talk about the user experience today without addressing performance issues.

    Are your Fiori applications meeting performance expectations in terms of response time, concurrency, availability, and scalability? Do the enhancements in each update you roll out actually undermine the user experience that the update is supposed to improve?

    Join Kevin Dunne, General Manager of Flood IO, to learn how you can start load testing Fiori as painlessly as possible.

    You’ll learn how:

    - Fiori’s customization and dynamic nature complicate load testing (as well as functional testing)
    - A new browser-based load testing approach lets you reuse your existing functional tests for load testing
    - To start and scale tests without waiting on constrained performance testing resources and expensive performance testing labs
  • Building Resilient Cloud Load Tests for SAP Fiori
    Building Resilient Cloud Load Tests for SAP Fiori
    Kevin Dunne, SVP, Strategic Initiatives, Tricentis Oct 23 2019 5:00 pm UTC 45 mins
    SAP promises that Fiori is the ultimate way to deliver an exceptional user experience on multiple devices. However, you can’t talk about the user experience today without addressing performance issues.

    Are your Fiori applications meeting performance expectations in terms of response time, concurrency, availability, and scalability? Do the enhancements in each update you roll out actually undermine the user experience that the update is supposed to improve?

    Join Kevin Dunne, General Manager of Flood IO, to learn how you can start load testing Fiori as painlessly as possible.

    You’ll learn how:

    - Fiori’s customization and dynamic nature complicate load testing (as well as functional testing)
    - A new browser-based load testing approach lets you reuse your existing functional tests for load testing
    - To start and scale tests without waiting on constrained performance testing resources and expensive performance testing labs
  • Using Evidence-Based Security in Your Secure Development Life Cycle
    Using Evidence-Based Security in Your Secure Development Life Cycle
    Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting​, Synopsys Oct 23 2019 5:00 pm UTC 60 mins
    All too often, security is stuck in the 1960s doing slow desk checks, the results of which are out of date before the PDF report lands on an auditor’s desk. If developers see this report, they’ll find it’s full of hot garbage. Security folks must become agile, thinking like developers and helping build secure applications, not criticizing and using recommendations from the last century. In this talk, you’ll learn how you can contribute data, offer better remediation advice, and use modern evidence-based standards such as the forthcoming OWASP Top 10 2020 and the OWASP Application Security Verification Standard 4.0 in your development pipeline. Security professionals have heard this all before, but we persist in doing the wrong things. Let’s not do security like it’s 1998; let’s build assurance in from the get-go, with each and every build.
  • CCS [Ep.5]: Application Security Meets Multicloud
    CCS [Ep.5]: Application Security Meets Multicloud
    John Burke, CIO and Principal Research Analyst, Nemertes Research Oct 23 2019 5:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Agile Blind-spots: Angles to Keep at Sight for a True Agile Transformation
    Agile Blind-spots: Angles to Keep at Sight for a True Agile Transformation
    Cristiane (Coca) Pitzer, Retail inMotion Oct 24 2019 10:00 am UTC 45 mins
    This Talk is based on real-life experience while leading Agile transformation in organisations.

    I will speak about what I have learned as well as some angles I almost missed, and that other Agile Coaches typically miss while identifying corporate problems.

    A practical session where I call out the blind spots and actual actions taken to course-correct.

    Presented by:
    Cristiane (Coca) Pitzer, Head of Agile & Agile Transformation, Retail inMotion
  • Avoid performance stress when using hybrid cloud workloads
    Avoid performance stress when using hybrid cloud workloads
    Thomas Poppelgaard, Christiaan Brinkhoff Oct 24 2019 2:00 pm UTC 44 mins
    Performance is always key for the end user, whether it’s on-premises, hybrid, or public cloud workloads. If your environment faces performance issues, you’ll be pleasantly surprised by the same performance when you move to the cloud. What is the most cost-effective sizing for your virtual machines to get the best performance? Are GPU workloads still relevant? What about WAN optimizers for cloud workloads, such as the HDX Enlightened Data Transport (EDT) protocol and Citrix SD-WAN? During this session, Citrix Technology Professionals (CTPs) will walk you through best practices gathered while deploying workloads on several clouds in addition to Citrix Cloud. Join this session to learn the fundamentals, gain insights into Citrix Virtual Apps and Desktop workloads, and ultimately get prepared to work on your first or second date towards Citrix Cloud services.
  • The Importance of Automation to DevOps
    The Importance of Automation to DevOps
    Scott Willson and Ron Gidron Oct 24 2019 3:00 pm UTC 60 mins
    Automation is a core tenant of continuous delivery and a core capability of any successful DevOps practice. The fact that the average DevOps teams deal with 25 toolchains is a testament that automation remains siloed and fragmented. There is a better way. On this webinar, we will discuss why automation and strategically using it is vital to a sustainable DevOps practice.
  • Demystifying Cisco Orchestrators for Infrastructure as Code
    Demystifying Cisco Orchestrators for Infrastructure as Code
    Tony Dubiel, DevOps/Automation Lead for GES, Cisco Systems Oct 24 2019 3:00 pm UTC 60 mins
    By automating the software development lifecycle (code, test, to production) developers and operators (DevOps) are becoming more agile, reducing costs, and delivering a superb customer experience to their customers. Cisco Orchestration solutions extend the benefits of automation to the entire stack by treating each layer of the underlying infrastructure as Code (IaC). Orchestrators reduce the complexity of programmability, operational state, and visibility. In this session, we decode the differences between domain-specific workflow automation versus cross-domain orchestration. As there are many layers in the ‘stack’, achieving a goal of ‘Automate everything’ requires the right tool for the right use case. To that end, we will cover Cisco Cloud Center Suite (Workload Manager and Action Orchestrator), UCS Director, Intersight, and Network Services Orchestrator (NSO). A brief demo will showcase Open Source and Cisco Orchestration tools working hand-in-hand.
  • What is an OSPO? The Rise of the Open Source Program Office
    What is an OSPO? The Rise of the Open Source Program Office
    Taylor Udell, Director of Product Marketing at FOSSA Oct 24 2019 5:00 pm UTC 45 mins
    Managing your open source program is all about improving efficiency and decreasing risk. Determining what packages to leverage, when developers should contribute, and what internal projects you may want to publish are all strategic business decisions. An Open Source Program Office (OSPO) helps to define your open source management strategy while considering the implications of open source components on product viability, competitiveness, resources, security and the risk profile of your company.

    In this webinar you will learn:
    ●Things to know when evaluating your need for an OSPO
    ●Areas managed by an OSPO
    ●Roles key to an OSPO's success
    ●The key pillars of a successful OSPO
    ●A list of resources to read if you want to build an OSPO

    FOSSA Director of Product Marketing Taylor Udell will share how getting the most from open source is not about how much code is deployed, but rather how about how developing the right open source management strategy can impact business goals, revenue, risk, recruiting and reputation. Move away from tactical, manual OSS management and into a strategic, holistic OSPO program that serves the needs of the company, your customers and your developers.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.
  • Part 2: What can State and Local Governments do to Prevent Ransomware?
    Part 2: What can State and Local Governments do to Prevent Ransomware?
    David Morris, Reid Eastburn and Skeet Spillane Oct 29 2019 5:00 pm UTC 60 mins
    This session will be a short recap of Session 1 and will then go into detail as to what State and Local Governments can do to prevent Ransomware Attacks.
  • Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Alexis Kushner, Director of Product Marketing, Salesforce and Sam Steiny, Product Marketing Manager, MuleSoft Oct 30 2019 3:00 pm UTC 44 mins
    Business efficiency is the No. 1 priority for CEOs and CIOs. In fact, 84% of IT leaders say improving employee-facing technology is critical for their company’s success.

    Join this webinar for a live demo of Salesforce Lightning Platform with MuleSoft-powered integrations. Learn how to:
    - Deliver a connected experience by integrating back-office applications and systems like Workday and Salesforce.
    - Overcome data silos, IT backlogs, and outdated development tools.
    - Modernize and automate internal processes like onboarding to improve employee experience.
  • Power Through Presence
    Power Through Presence
    Leah Marone Oct 30 2019 4:00 pm UTC 60 mins
    Stress is a normal part of life that we will continue to experience from time to time. But understanding when stress has gained too much power and is interfering with our daily functioning is critical. Are you constantly multitasking, struggling with sleep, feeling unfulfilled, experiencing symptoms of anxiety? If so, listen in to’ reset’ yourself and regain presence in your world.

    Leah Marone is a psychotherapist who specializes in anxiety, depression, relationships, and Mindfulness. By having a variety of clinical roles in various states and countries, she has developed diverse professional experience and global perspective. Currently, Leah sees individuals and families at her practice in Charlotte. She is also sought out by corporations and non-profits to work with executives and teams on improving communication, productivity and job satisfaction.
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 31 2019 3:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • How to get your DevNet Certification for Data Center Automation
    How to get your DevNet Certification for Data Center Automation
    John McDonough, Developer Advocate, Cisco DevNet Oct 31 2019 3:00 pm UTC 38 mins
    This webinar will help you start your journey towards Cisco Certified DevNet Specialist in Data Center Automation and Programmability. The webinar takes you on a tour of developer.cisco.com with respect to Data Center Automation and Programmability. You will gain an understating of the technologies tested and the respective weighted percentages of those technologies on the certification exam. You will see how DevNet has aligned the DevNet resources to each section of the certification exam.
  • Building a platform for digital insurance
    Building a platform for digital insurance
    Ben Turner, CTO, Legal and General and Dan Snowdon, UK&I Financial Services Marketing Lead, MuleSoft Nov 6 2019 5:00 pm UTC 43 mins
    Digital insurance platforms enable insurance companies to connect with their ecosystem of customers, partners, and vendors on a single, unified platform. Hear firsthand from CTO Ben Turner how Legal and General’s digital insurance platform helped the company diversify product offerings, and scale quickly to meet customer expectations.

    Key Takeaways:
    - How industry leaders have digitally transformed insurance offerings with a platform business model.
    - How to build an integrated insurance platform to connect your ecosystem of suppliers and exceed customer expectations.
    - Best practices to increase customer retention and profitability with a single view of the customer.
  • Network Automation with pyATS, Genie and Cisco DNA Center
    Network Automation with pyATS, Genie and Cisco DNA Center
    Siming Yuan, Technical Leader Engineering, Cisco Systems Nov 7 2019 4:00 pm UTC 30 mins
    Cisco DNA Center brings about a new way to manage and visualize your enterprise network. But above and beyond the UI, AI and ML, how do you integrate it into your NetDevOps cycle, and ensure your network is well-validated end-to-end? In this webinar, we’ll demonstrate how to integrate Cisco DNA Center REST APIs with pyATS | Genie, take configuration and operation snapshots, diff them programmatically, and track any changes over time.
  • Real-time Personalised customer interaction at scale
    Real-time Personalised customer interaction at scale
    Perry Krug, Couchbase | Claudiu Lucaci, Rares Rusu, Paddy Power BetFair Nov 13 2019 10:30 am UTC 60 mins
    How do you build a customer interaction platform that is agile enough to respond to constantly changing requirements and still able to perform at scale? This is the challenge the Customer Interaction team set out to solve at Paddy Power.

    You will learn how they rebuilt their promotional platform moving from one based on a closed slow relational database to a high-performance agile platform that integrates promotions from 3rd parties. You will see how this transformation has enabled marketing to continuously innovate and apply timely, relevant personalised offers to hundreds of thousands of customers across two brands, even during massive spikes in traffic.

    Moderator:
    - Perry Krug, Customer Engagement Architect; Couchbase

    Panelists:
    - Claudiu Lucaci, Head of Delivery; Paddy Power BetFair
    - Rares Rusu, Principal Developer; Paddy Power BetFair
    - Couchbase representative to be confirmed shortly