Hi [[ session.user.profile.firstName ]]

Application Development

  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Live 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Build Great Looking Themes with Themer 1.1 Build Great Looking Themes with Themer 1.1 Sandeep Adwankar Live 60 mins
    Theming is critical for creating great looking web applications. With Sencha Themer, it’s easier than ever for you to create custom themes for your Ext JS apps. We recently updated Themer 1.1 EA, so you can uniquely theme components including grid, list, tabpanel, and more.

    Join us for our upcoming webinar and learn:

    -How you can visually build creative themes
    -How to connect to an app and inspect component styles
    -How to create UIs for modern grid and make them unique
    -How to use your themes created with Themer in Sencha Architect
  • Qt on Ubuntu Core Qt on Ubuntu Core Nils Christian Roscher-Nielsen: Product Manager (The Qt Company), Pat McGowan; Director of Developer Tools & Apps (Canonical) Recorded: Feb 22 2017 60 mins
    Are you working on an IoT, point of sale or digital signage device? Are you looking for a secure, supported solution to build it on? Do you have needs for graphic performance and complex UI? Did you know you could build great solutions using Qt on Ubuntu and Ubuntu Core?

    To find out how why not join this upcoming webinar. You will learn the following:

    - Introduction to Ubuntu and Qt in IoT and digital signage
    - Using Ubuntu and Ubuntu Core in your device
    - Packaging your Qt app for easy application distribution
    - Dealing with hardware variants and GPUs

    Please note: webinar registrants’ contact information will be shared with the co-presenter, The Qt Company.
  • Unsung Heroes: An Architect's Role in the New IT Operating Model Unsung Heroes: An Architect's Role in the New IT Operating Model Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management; Mark Daly, Client Architect, MuleSoft Recorded: Feb 22 2017 60 mins
    With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.

    Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:

    - A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
    - A view of Enterprise Architecture and DevOps from a leader in the field
    - What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
  • IIoT Endpoint Security – The Model in Practice IIoT Endpoint Security – The Model in Practice Marcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc. Recorded: Feb 22 2017 61 mins
    What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
  • DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies Recorded: Feb 22 2017 59 mins
    In the application economy where traditional business is being disrupted, velocity, agility, quality and customer experience is critical for enterprises to drive differentiation to remain competitive. While many believe that DevOps is only for startups and unicorns, forward-thinking organizations are focusing on unlocking the potential of their mainframe investments to drive their Business Technology culture, leveraging DevOps practices including agile development, automated CI/CD pipelines, testing and release automation, to deliver differentiated products and services.

    Join guest speaker Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies, for an in-depth discussion on how bringing DevOps to the mainframe can challenge traditional development methodologies, delivering code faster with greater quality in responding to escalating market demands.
  • What is the Best Connectivity Solution for Your IIoT Systems? What is the Best Connectivity Solution for Your IIoT Systems? Andrew Watson, OMG; Angelo Corsaro, PrismTech; Gerardo Pardo-Castellote, RTI; Nina Tucker, Twin Oaks Computing Recorded: Feb 22 2017 60 mins
    Today's computing infrastructure is changing dramatically to support new requirements in design and structure. This is no more evident than in the Internet of Things, where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come.

    These new IoT systems need data-centric technology that directly addresses real-time systems to explicitly manage the communications “data model.” No matter what application – from financial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation – industries need solutions to find right data then communicates it to its intended destination in a reliable, flexible, fast, and secure manner.

    To learn more about the proven standard for data-connectivity in mission- and business-critical systems join OMG's webinar featuring experts from the leading DDS middleware vendors; PrismTech, RTI and Twin Oaks Computing
  • Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 22 2017 27 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources Silvia Siqueria, HPE, Mohammed Wahab, HPE Recorded: Feb 21 2017 61 mins
    Struggling to manage time, cost and resources across your business applications? Are you missing real-time critical information to make the right investment decisions at the right time? Then join us as we hear how industry practitioners standardize, manage and capture execution of their projects, resources and operational activities.

    Examine best practices by your peers who are using HPE Project and Portfolio Management to provide the business both visibility and data consolidation as they govern and collaborate across application projects and portfolio. Learn how they have differentiated their application delivery through speed and agility, while at the same time reducing costs for quality IT operations.

    Explore out-of-the-box methods for tracking project time, cost and resources
    Learn easy ways to establish standardization for your HPE PPM environment
    Hear customer-proven methods for project governance and collaboration through HPE PPM
  • Microservices with OpenShift: Experience from the fields Microservices with OpenShift: Experience from the fields Sébastien Pasche, Security Architect Recorded: Feb 21 2017 63 mins
    Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.
  • How to Get the Best Out Of DevSecOps - From The Security Perspective How to Get the Best Out Of DevSecOps - From The Security Perspective Colin Domoney, Sr Product Innovations Manager at Veracode Recorded: Feb 21 2017 47 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Join this webinar to understand from the security perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the developer and operations teams.
  • Deliver Real Value with Open Source Business Optimization Technology Deliver Real Value with Open Source Business Optimization Technology Geoffrey De Smet, founder and project lead, OptaPlanner Recorded: Feb 16 2017 63 mins
    The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.

    Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.

    Watch this webcast with the OptaPlanner to:
    - Work through some actual examples and use cases whose solutions demonstrate business benefits.
    - Leave equipped with tools and resources to start solving your own business planning problems.
    - Discover how digital transformation and open source are changing the face of business and IT operations
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • Keeping Applications Compliant and Secure Using ARA Keeping Applications Compliant and Secure Using ARA Keith Puzey, CA Technologies Recorded: Feb 16 2017 25 mins
    Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?

    In this 30-minute webcast:
    -Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
    -Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
    -See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.

    At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
  • The Role of the Project Manager in an Agile Business The Role of the Project Manager in an Agile Business Ann Konkler, CA Technologies Agile Consultant and PMI-ACP Recorded: Feb 16 2017 57 mins
    More and more organizations are adopting agile methods to help manage complex work and improve project delivery. If you’re a Project Manager, you may be wondering: Is an agile approach right for my organization? Do I have a role on an agile team, and if so, what is it? How do I make agile methods work in my context?

    Join Ann Konkler, Agile Consultant at CA Technologies, on Thursday, February 16, 2017, 10am PT / 1pm ET, to better understand the role of the Project Manager in an agile business. During this webinar, you’ll learn:

    • How Project Managers can have a meaningful role
    • Which agile framework is right for you
    • How to coordinate across teams when some are applying agile methods and others are not

    We want to help you better understand your role as a Project Manager in an agile business. Join us to learn more and bring your questions to this engaging webinar.
  • Synchronizing with HPE ALM for Traceability Across Toolsets Synchronizing with HPE ALM for Traceability Across Toolsets Mark Ford, TIAA Recorded: Feb 16 2017 50 mins
    If your Dev teams are storing their requirements as User Stories in one tool and your QA teams are storing their Test Cases in HPE ALM, then chances are you have no traceability between the two. And what about Test Defects created in HPE ALM? How can you trace those back to the original User Story requirement? I’ll show you how we solved this dilemma using Tasktop to synchronize User Stories to HPE ALM Requirements, pass the User Story id throughout the HPE ALM lifecycle from Requirement to traced Test Case to linked Defect, and how we will synchronize the Test Defects back to our Dev tool and link them back to the User Story for full round trip traceability.

    This session is suitable for all levels including VPs, Directors, Dev and QA managers, practitioners, and technical resources. I will cover the following:
    Why Requirement and Defect traceability is important to us
    The challenges faced that prompted our solution
    Detailed explanation of how we implemented the solution
    The benefits realized
  • Bridging the Data Silos Bridging the Data Silos Merav Yuravlivker, Chief Executive Officer, Data Society Recorded: Feb 15 2017 48 mins
    If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?

    Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
  • Build an Agile and Elastic Big Data Pipeline Build an Agile and Elastic Big Data Pipeline Deba Chatterjee Director of Products, Robin Systems Recorded: Feb 15 2017 55 mins
    To stay competitive in today's global economy, organizations need to harness data from multiple sources, extract information and then make real-time decisions. Depending on the industry and the organization, Big Data encompasses information from multiple internal and external sources. Capturing, integrating and preparing this data for downstream analysis is often time-consuming and presents a big challenge. Today, organizations are struggling to cobble together different open source software to build an effective data pipeline that can withstand the volume as well as the speed of data ingestion and analysis. Robin relieves customers from the pains of building and maintaining a data pipeline and helps enterprises to make the most of Big Data.

    In this webinar, we will focus on how Robin’s containerization platform can be used to:

    - Build an agile and elastic data pipeline
    - Deploy, scale, and manage the most complex big data applications with just a single click of a button
    - Deal with variety, velocity, and volume of enterprise Big Data
  • Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Ronnie Sternberg, SafeDK, Kimm Yeo, HPE Recorded: Feb 15 2017 57 mins
    The use of Software Development Kits (SDKs) continues to be on the rise in mobile apps. In the last six months, we’ve seen a jump of more than 12% in the use of SDKs for creating mobile apps. These off-the-shelf services, from advertising, analytics, social, and more, are helpful in the mobile development process. They offer unique functionality and simplify the coding, while saving time and money. But SDKs are not really YOUR code. You work hard to ensure your users’ experience, safety and privacy in your own code, but can you guarantee the same for the code from these guest SDKs? What about the test implications and impact on user engagement and retention?

    Join us to hear about:
    Key trends and findings for Mobile SDKs
    2 major domains of risk introduced when using SDKs and associated real-life stories
    How you can achieve a 5 star rating using HPE Mobile Center and SafeDK
  • LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 62 mins
    LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

    This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

    - An explanation of LPWAN technology and how it works
    - When to use (and not use) LPWAN technology
    - What issues such networks solve
    - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
    - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
    - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
    - Sample use cases
    - Business models that use LPWAN networks for energy management, asset management, and others
    - How to make money as both a user and deployer of LPWAN networks
    - What returns on investment can be expected and suggested metrics for measurement

    Speakers:
    Yann Gabay, Co-founder and Board Member, CONNIT
    Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
    Brian Ray, CTO and Founder, Link Labs
    Jeffrey Siegel, CMO, nwave

    This webcast is NOT BICSI accredited.
  • Chasing Shadows: Session 2 - Ansible Tower Chasing Shadows: Session 2 - Ansible Tower Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 15 2017 33 mins
    Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.

    Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Feb 23 2017 5:00 pm UTC 60 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • What's New in CA APM What's New in CA APM Janelle Shaw, Joshua Napier Feb 23 2017 6:00 pm UTC 60 mins
    Modern application technologies make it possible to provide a better user experience than ever before. With elevated end-user expectations, the difference between success and failure is an organization's ability to efficiently harness the power of complex application architectures to meet customers demands. An application performance management solution that sees through the data deluge to answer critical questions is more important today than ever before.

    In this webcast, we will explore:
    -Application performance management's role in modern IT organizations
    -CA Application Performance Management's role in providing stellar end-user experience
    -New innovations within CA Application Performance Management
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Brandon Dunlap (Moderator) Feb 23 2017 6:00 pm UTC 75 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • Going Global with In-Memory Data Going Global with In-Memory Data Viktor Gamov, Senior Solution Architect Hazelcast, Michael Hilmen,Solutions Architect, Solace Feb 28 2017 3:00 pm UTC 60 mins
    Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
    This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
    In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.
  • Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Matt Serna, Manager, Industry Marketing; Jonathan Ben-Hamou, Enterprise Systems Architect, ICOE Group Feb 28 2017 4:00 pm UTC 60 mins
    As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.

    Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.

    Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.

    Attendees will learn:

    - What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
    - How to build and manage APIs in a way that improves health data security and increases IT agility.​
    - How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
  • Improving Developer Engagement – A Q&A Session with CA API Product Management Improving Developer Engagement – A Q&A Session with CA API Product Management Dana Crane - Program Manager, Guillermo Tellez - Product Manager, Bill Oakes - Product Marketing Feb 28 2017 5:00 pm UTC 60 mins
    This Q&A session will examine the role of a developer portal in API Management, as well as the importance of its function as a hub to bring API Owners, Developers, Business Managers and Operations together to execute a successful API program. Dana and Guillermo will answer questions relating to developer engagement, API Publishing, the importance of the UX, and how a modern cross-platform portal can improve integrations with existing infrastructure.

    Join to learn about the latest in enabling your developers and get your questions answered live!
  • Why Digital Business Automation is vital to the Customer Experience Why Digital Business Automation is vital to the Customer Experience Rob Koplowitz, VP and Principal Analyst - Forrester Research & Sapna Maheswari, Product Marketing Manager - Bizagi Feb 28 2017 5:00 pm UTC 60 mins
    As businesses strive to transform in order to survive and thrive in the digital age, digital initiatives have become increasingly focused on the customer experience (CX) rather than more traditional goals of efficiency and cost reduction.

    So what does this mean for those tasked with delivering digital innovation and applications to the business? It means re-thinking operational models to connect employees, processes and devices with personalized and contextualized information – all to better serve customers.

    Join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research as they discuss how today’s digital platform technologies can support these goals.

    Register now to join the discussion on questions like:

    -What does digital transformation mean for traditional businesses?
    -Why is the shift from cost efficiency to customer experience so important?
    -How can digital platforms help you improve the customer experience?
    -Important strategies for delivering business applications faster in 2017

    Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.

    About Rob Koplowitz

    Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing.
    Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy.
  • Take Agile to the Next Level: Featuring Forrester Take Agile to the Next Level: Featuring Forrester Forrester VP and Principal Analyst, Margo Visitacion and Agile Advisor, CA Technologies, Laureen Knudsen Feb 28 2017 6:00 pm UTC 60 mins
    According to recent research, “67% of high-performing CEOs are actively embracing agility, and 100% of them state that their companies actively experiment with new products and services.”* To deliver what customers really want, improve your bottom line and see teams really engage, you need to go beyond sprints and standups to business-level agile.

    As the speed of business grows and more competitors adopt agile, grassroots approaches just won’t cut it anymore. “Doing agile” doesn’t guarantee business value, and many companies now have the opportunity to connect their overall business strategy to the execution of the work. Are your agile practices improving or flatlining? Better yet, are they benefiting your bottom line?

    Join CA Technologies and guest speaker Margo Visitacion, Forrester VP and Principal Analyst in Enterprise Architecture, on February 28, at 10:00 AM PT / 1:00 PM ET, for a webinar packed with research-backed tips on sustainable, high-performance agile at scale.
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Alex Hanway, Encryption Marketing at Gemalto Feb 28 2017 7:00 pm UTC 60 mins
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management
  • Pattern your DevOps success & avoid the anti-pattern landmines: best practices Pattern your DevOps success & avoid the anti-pattern landmines: best practices Ashish Kuthiala and Kelly Emo, HPE Mar 1 2017 6:00 pm UTC 45 mins
    Everyone’s talking DevOps and today, many are also doing. While first movers have advantage, they also leave a legacy of success patterns and fast failures. In this webinar, HPE DevOps technologists will share the aggregated knowledge of working with HPE’s own IT and R&D teams and global customers and partners who have been embarking on unique DevOps journeys for several years now and continuously implementing, learning and improving. This collective experience begins to shape DevOps patterns and anti-patterns that teams can learn from and apply as needed for their own unique DevOps scenarios.

    Explore proven patterns for connecting development and test teams in Continuous testing pipelines, integrating quality analytics into pipeline processes to accelerate progress, and assessing and engineering in the optimal level of automation to a continuous delivery toolchain to balance speed and risk. Avoid common anti-patterns such as “develop, deploy and forget” or “runaway build branches”.

    Join HPE’s Ashish Kuthiala and Kelly Emo as we share and explore these real-world DevOps anti-patterns, patterns and success stories.

    This is part one in a three-part DevOps webinar series. Join us also for:
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
    Taking on Enterprise Agile with HPE, April 26
  • Forrester Total Economic Impact™ Study: Seeker® – IAST Forrester Total Economic Impact™ Study: Seeker® – IAST Liz Witherspoon, Forrester & Nadav Kotlarsky, Sr. Product Manager, Seeker Mar 1 2017 6:00 pm UTC 75 mins
    A Forrester study commissioned by Synopsys. Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker, Synopsys’ interactive application security testing (IAST) solution, in an Agile development environment.

    The economic benefits include:
    - Reduced time and cost to remediate security vulnerabilities
    - Reduced “noise” due to no false positives
    - Reduced risk of a data breach
    - Decreased reliance on external security consultants
  • From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] From Virtual to Cloud: Migrating Your Servers to Google [Live Q&A] Gonen Stein, CloudEndure and Andy Tzou, Google Mar 2 2017 4:00 pm UTC 30 mins
    Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud without the technical, performance, or financial challenges that normally strain IT resources. They'll dive into the technology behind the new automated migration service, which utilizes CloudEndure’s continuous, block-level replication, automated machine conversion, and application stack orchestration.

    This video will provide an overview of how Google and CloudEndure have partnered to create a self-service VM migration service. This service enables you to move your existing server infrastructure to Google Cloud Platform at no cost.

    Have you been waiting for just the right moment to migrate to the cloud? Have your questions answered about how companies are using the new automated migration service to simply and easily move to the cloud.
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 5:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • Information Overload - Making Sense of Threat Intelligence Sources Information Overload - Making Sense of Threat Intelligence Sources John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Brandon Dunlap (Moderator) Mar 2 2017 6:00 pm UTC 75 mins
    There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
  • What to Look For in a Project & Portfolio Management Solution What to Look For in a Project & Portfolio Management Solution Lynn Reling Mar 7 2017 6:00 pm UTC 60 mins
    Companies invest in Project & Portfolio Management (PPM) solutions because they are looking for a central platform to gain visibility on projects, track and report on progress, and align their strategy to execution. But with so many options in the market, it’s hard to know if you are investing in the solution that is right for your current and future business needs. Join this webinar on Tuesday, March 7, 2017 for an inside view into the key features and functionality to look for in a dynamic PPM solution.

    Whether you are new to PPM automation, or looking to replace a PPM solution you’ve invested in already, this webinar will discuss:
    - Best practices for researching and selecting the right solution for your unique needs
    - Must haves and deal breakers to look out for during the selection process
    - Critical differentiators that will determine your success
  • Destination Digital - plotting a new course for Digital Transformation w/ Cloud Destination Digital - plotting a new course for Digital Transformation w/ Cloud William Fellows (451 Research), Nick Law (Atos), & Ken Audette/Yatin Chalke (VMware) Mar 8 2017 3:00 pm UTC 60 mins
    Technology is driving business change at a breath-taking pace. Digital transformation is the watchword – established enterprises need to adapt rapidly to compete with agile and flexible digital-first disruptors as well as cater to their customers’ evolving requirements. To hold back is to court obsolescence. But saying and doing are two different matters – legacy infrastructure and applications, increasing security concerns, complexity and the need to be agile all present serious challenges that must be overcome. This is crucial if organizations are to find differentiation and competitive edge in the battle for customer loyalty.

    Cloud has become a key agent for digital transformation with cloud first strategies becoming the new norm. With many enterprises now employing multiple cloud combinations, this webinar will look at the trends and expectations for these different environments, drawing upon a new study from 451 Research commissioned by VMware and Atos.
    The discussion will include:
    • The latest state of play in digital transformation and how it is impacting cloud decisions
    • The challenges affecting established enterprises from becoming digital-first
    • The latest cloud trends and expectations helping to deliver digital transformation
    >>> Cloud first
    >>> Multiple cloud combinations
    >>> The rise of the digital private cloud
    >>> The trends in enterprise use of cloud in European countries and the US
    • How the issues of scale, security, agility and complexity can be overcome
    • Best practice examples and insight from global enterprises who have adopted a digital private cloud solution from Atos and VMware


    www.vmware.com/go/Atos

    https://atos.net/en/solutions/infrastructure-transformation-hybrid-cloud/digital-private-cloud
  • Customer support: Unleash your superpowers with AI Customer support: Unleash your superpowers with AI Stewart Rogers, Director of Marketing Technology, VentureBeat Mar 9 2017 6:00 pm UTC 60 mins
    Flawless customer support directly translates to bottom line success. And that means reading customers' minds by offering real-time, reliable responses wherever they are—a feat that's not easily accomplished with call centers or even Live Chat.

    To help companies get it right every time, AI has stepped into the breach, cape blowing in the breeze. AI is impacting just about all areas of company activity, and now enables cost-effective, efficient, and superpowered solutions that turn customer agents into heroes, helping them assist more customers, more quickly, in the channel they're most accustomed to using—messaging platforms. Or maybe not using agents at all, but bots.

    Join our interactive VB Live event where Stewart Rogers will take a deep dive into his latest VB Insight report to give you the who, what, why—and especially how—of AI-powered customer service.

    In this webinar you'll:
    * Use AI to accelerate your customer support
    * Learn why chatbots are the answer to increased customer service
    * Get started on the first steps toward implementing an AI solution on the help desk
    * Integrated an innovative social customer service operation in a bot-driven world

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Quinn Banks, Sr. Product Marketing Manager, Mobile, Farmers Insurance
    * Wendy Schuchart, Moderator, VentureBeat
  • How machine learning and AI will impact your marketing forever How machine learning and AI will impact your marketing forever Stewart Rogers, Dir. of Marketing Technology, VentureBeat Mar 16 2017 7:30 pm UTC 60 mins
    Nearly $1.5 billion in funding went into over 200 AI companies in 2016, ads powered by IBM’s Watson tech lets users ask questions about the promoted product via voice or text, Google’s RankBrain is changing the business of SEO, and they’ve just announced not only a new range of machine learning APIs, products and upgrades, but a whole new Cloud Machine Learning group.

    Let’s call it: It’s honest-to-god paradigm shift, not just an excuse for another round of “open the pod bay doors, HAL” jokes—and it’s one that’s going to inevitably, unavoidably revolutionize marketing to the extent that if you’re not on board, you are going to be buried.

    Want to disrupt instead of be disrupted? To learn how to leverage machine learning and artificial intelligence to deliver highly personalized, real-time consumer engagement at a significantly lower cost? Join this interactive VB Live event.

    In this webinar you’ll:
    * Learn how speech recognition impacts the SEO value on your web presence
    * Understand the full ROI of fully automated chat bots for artificial human interaction
    * Integrate deep learning into your marketing strategy to realize unbelievable lift

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat
    More speakers to come

    Sponsored by TreasureData
  • How to Get the Best Out Of DevSecOps - From the Ops Perspective How to Get the Best Out Of DevSecOps - From the Ops Perspective Colin Domoney, Sr Product Innovations Manager at Veracode Mar 21 2017 11:00 am UTC 45 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Join this webinar to understand from the operations perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the developer and security teams.
  • IoT Overview and the Major Issues IoT Overview and the Major Issues Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 21 2017 3:00 pm UTC 60 mins
    In this lead-off class, we will briefly review the principles of the IoT and some of the basic configurations that we may encounter (star with gateway, tree, and mesh) and how the devices are best connected to maximize efficiency. We will look at the major issues we face as these networks and associated “things” become more complex, including data issues, communication issues, device monitoring and troubleshooting, and system security. We will identify potential weaknesses in each of these areas and compile a checklist of features that we need in a management system that will carry out these needs. We will also look at ways to prioritize the criticality of the devices and/or their data to help us in assigning levels of security and monitoring capabilities (for example, a temperature sensor used to sense a fire versus a temperature sensor for outside ambient temperature). Day 1 sponsored by WInd River
  • Monitoring and Securing IoT Data and Communications Monitoring and Securing IoT Data and Communications Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 22 2017 3:00 pm UTC 60 mins
    In our second class, we will begin at the heart of the Internet of Things – the sending and receiving of data to our “things.” Whether it’s collecting a simple room temperature reading or capturing a video frame for analysis, the IoT enables us to collect huge amounts of data for analysis then send out data in the form of commands or as human-readable data. The diversity of end devices makes this task difficult at best, as it involves myriad data types and protocols. This is key as we want to ensure the safety, security, and integrity of that data from its source to its intended destination. We will look at various methods we can use in our device design to effectively monitor and secure our data flow throughout the entire IoT network. Also, we will look at ways that we can approach communications issues with different protocols and physical layers in our network, which often consist of legacy devices that were not originally designed for the robustness required in the IoT. Day 2 sponsored by WInd River
  • Quantifying DevOps Outcomes - Increasing Speed Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Mar 22 2017 5:00 pm UTC 30 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams (Engineering/IT/DevOps/etc)
    - Technology executives (CIO/CTO)
    - Management seeking strategic alignment w/ business objectives
  • How AI turns customers into big-spending brand loyalists How AI turns customers into big-spending brand loyalists Stewart Rogers, Dir. of Marketing Technology, VentureBeat Jun 1 2017 5:00 pm UTC 60 mins
    Customer loyalty is won with both marketing messaging and customer service that anticipates needs, answers questions, and solves issues on the fly. And a well-integrated, data-soaked AI platform can deliver that perfectly timed, exquisitely personalized customer service with the right message, right time, right place support and communication that leads to big jumps in engagement rates. Not to mention enduring loyalty.

    But while integrating AI technology into your marketing automation systems can help build profitable long-term relationships, there are security issues to tackle, privacy issues to consider, and data integration to execute flawlessly.

    Want to do it right? Join our free VB Live event to learn how master marketers join marketing insight with AI intelligence execution to significantly boost customer loyalty.

    In this webinar, you’ll:
    * Learn how deep learning can help your customers get a "human" through chat
    * Cut through the hype around chat bots and learn what really matters
    * Understand privacy issues around AI and how it may impact your org's security
    * Integrate a successful marketing campaign using chatbot interactions

    Speakers:
    Stewart Rogers, Director of marketing technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat
  • IoT Device Management IoT Device Management Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 23 2017 3:00 pm UTC 60 mins
    In our final class, we will look at the “Things” of the IoT – our nodes and devices – and how we can effectively commission, monitor, and detect problems in them throughout their lifecycle. We will look at methods for adding device management capabilities in our devices from the design stage as well as ways to add these capabilities in the legacy devices we looked at in the previous class. One topic we will look at is effective commissioning and decommissioning of devices in the network – how can we add or remove a node from the network without adversely impacting the rest of the network? Another area we will look at is security assurance and testing: how can we be sure of the device security – and how can we test it? And lastly we will look at maintenance. What methods can we use for testing devices or paths within the network and how can we effectively and safely perform system updates? To conclude our class, we will review our checklist and see what other issues we may need to be aware of in our IoT design. Day 3 sponsored by Wind River