The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.
The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.
Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.
Watch this webcast with the OptaPlanner to:
- Work through some actual examples and use cases whose solutions demonstrate business benefits.
- Leave equipped with tools and resources to start solving your own business planning problems.
- Discover how digital transformation and open source are changing the face of business and IT operations
Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?
In this 30-minute webcast:
-Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
-Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
-See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.
At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?
In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
More and more organizations are adopting agile methods to help manage complex work and improve project delivery. If you’re a Project Manager, you may be wondering: Is an agile approach right for my organization? Do I have a role on an agile team, and if so, what is it? How do I make agile methods work in my context?
Join Ann Konkler, Agile Consultant at CA Technologies, on Thursday, February 16, 2017, 10am PT / 1pm ET, to better understand the role of the Project Manager in an agile business. During this webinar, you’ll learn:
• How Project Managers can have a meaningful role
• Which agile framework is right for you
• How to coordinate across teams when some are applying agile methods and others are not
We want to help you better understand your role as a Project Manager in an agile business. Join us to learn more and bring your questions to this engaging webinar.
If your Dev teams are storing their requirements as User Stories in one tool and your QA teams are storing their Test Cases in HPE ALM, then chances are you have no traceability between the two. And what about Test Defects created in HPE ALM? How can you trace those back to the original User Story requirement? I’ll show you how we solved this dilemma using Tasktop to synchronize User Stories to HPE ALM Requirements, pass the User Story id throughout the HPE ALM lifecycle from Requirement to traced Test Case to linked Defect, and how we will synchronize the Test Defects back to our Dev tool and link them back to the User Story for full round trip traceability.
This session is suitable for all levels including VPs, Directors, Dev and QA managers, practitioners, and technical resources. I will cover the following:
Why Requirement and Defect traceability is important to us
The challenges faced that prompted our solution
Detailed explanation of how we implemented the solution
The benefits realized
If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?
Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
To stay competitive in today's global economy, organizations need to harness data from multiple sources, extract information and then make real-time decisions. Depending on the industry and the organization, Big Data encompasses information from multiple internal and external sources. Capturing, integrating and preparing this data for downstream analysis is often time-consuming and presents a big challenge. Today, organizations are struggling to cobble together different open source software to build an effective data pipeline that can withstand the volume as well as the speed of data ingestion and analysis. Robin relieves customers from the pains of building and maintaining a data pipeline and helps enterprises to make the most of Big Data.
In this webinar, we will focus on how Robin’s containerization platform can be used to:
- Build an agile and elastic data pipeline
- Deploy, scale, and manage the most complex big data applications with just a single click of a button
- Deal with variety, velocity, and volume of enterprise Big Data
The use of Software Development Kits (SDKs) continues to be on the rise in mobile apps. In the last six months, we’ve seen a jump of more than 12% in the use of SDKs for creating mobile apps. These off-the-shelf services, from advertising, analytics, social, and more, are helpful in the mobile development process. They offer unique functionality and simplify the coding, while saving time and money. But SDKs are not really YOUR code. You work hard to ensure your users’ experience, safety and privacy in your own code, but can you guarantee the same for the code from these guest SDKs? What about the test implications and impact on user engagement and retention?
Join us to hear about:
Key trends and findings for Mobile SDKs
2 major domains of risk introduced when using SDKs and associated real-life stories
How you can achieve a 5 star rating using HPE Mobile Center and SafeDK
LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.
This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.
- An explanation of LPWAN technology and how it works
- When to use (and not use) LPWAN technology
- What issues such networks solve
- The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
- Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
- How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
- Sample use cases
- Business models that use LPWAN networks for energy management, asset management, and others
- How to make money as both a user and deployer of LPWAN networks
- What returns on investment can be expected and suggested metrics for measurement
Yann Gabay, Co-founder and Board Member, CONNIT
Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
Brian Ray, CTO and Founder, Link Labs
Jeffrey Siegel, CMO, nwave
Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.
Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
Microservices is still a distributed-systems problem and integration is a core component to any distributed system. Many organizations thinking about deploying microservices struggle with VM proliferation; how to test, deploy, and manage; and ultimately how to reliably integrate services.
Fuse integration services for OpenShift by Red Hat® is a docker-native way of packaging microservices to take advantage of powerful integration technology built on Apache Camel. This solution connects the pieces together—either using REST, CQRS, event sourcing, or other powerful microservice patterns and architectures.
In this webinar, we will:
- Explore Red Hat JBoss® Fuse integration services in depth
- Leave you with a working application you can use to build your integration microservices
For organizations with legacy and/or proprietary applications one of the biggest challenges to automating more tests can be the failure of test automation tools to recognize objects. In addition to identifying objects finding a tool that can automate testing across all the different protocols of these applications can also be a major challenge.
During this webcast we’ll share with you two stories shared at CA World from GM and Williams Energy on how they were able to accelerate testing by shifting to an API strategy. During the session we’ll cover how CA’s DevTest solution help clients:
•Shift testing from the UI to the API
•Decrease maintenance efforts and run times for regression tests
•Use a single tool to automate testing across the full stack
•Incorporate testing into continuous integration efforts
In addition to talking about GM and Williams energy we’ll also share additional real world stories on how others have adopted DevTest to delight their management teams and increase speed to market.
Data scientists know, the visualization of data doesn't materialize out of thin air, unfortunately. One of the most vital preparation tactics and dangerous moments happens in the ETL process.
Join Ray to learn the best strategies that lead to successful ETL and data visualization. He'll cover the following and what it means for visualization:
1. Data at Different Levels of Detail
2. Dirty Data
4. Processing Considerations
5. Incremental Loading
Ray Rashid is a Senior Business Intelligence Consultant at Unilytics, specializing in ETL, data warehousing, data optimization, and data visualization. He has expertise in the financial, manufacturing and pharmaceutical industries.
fleet is open source, cluster-scheduling software that treats a group of machines as though they shared an init system. The project has been widely adopted and has proven successful in hundreds of production environments.
In 2014, a year after fleet was introduced, Google released Kubernetes which provides much of the same value and a few features not available in fleet. Kubernetes was designed around a solid, extensible API, which fleet lacked, and had already laid down code for service discovery, container networking, and other key features.
Today, we are seeing widespread adoption of Kubernetes and many in our community are migrating from fleet to Kubernetes. Please join us in this webinar where we will:
- Explore the differences between fleet and kubernetes,
- Outline reasons to migrate (or not) from fleet to kubernetes,
- Detail some of the key considerations for a migration from fleet to Kubernetes
In addition to these, we will also outline a best practice for maintaining legacy fleet clusters on Container Linux with fleet container packaging as you plan your migration.
Innovative mobile operators need to mine the vast troves of unstructured data now available to them to help develop compelling customer experiences and uncover new revenue opportunities. In this webinar, you’ll learn how HDB’s in-database analytics enable advanced use cases in network operations, customer care, and marketing for better customer experience. Join us, and get started on your advanced analytics journey today!
Retail stands as one of the most digitally disrupted industries to date with over 60% of purchases now said to be influenced by digital interactions, according to Deloitte. Against this backdrop, global retailer GANT is trailblazing a strategy which enables digital transformation to be the catalyst for innovation within the GANT ecosystem.
Hear direct from Kiku Mlosch, Global E-Commerce Project Manager at GANT, and supporting partner Gustav Rosen, Integration Architect at Entiros, as they reveal their journey and approach to making omnichannel “a piece of cake”.
Attendees will learn:
- How GANT approached omnichannel and is capitalizing on consumer demand for digital products
- Real-life lessons from an IT strategy that is taking a business from stabilization to innovation to excellence
- Practical steps to creating a center for enablement in technology and embracing a new IT operating model that empowers the wider organization
Watch a demonstration of an end to end loan application built with Bizagi. The demonstration will show you how you can deliver a customer experience across multiple channels both from the perspective of the customers and the employees. Also, walk you through the process model for this application, designed in the Bizagi Modeler.
Bizagi is a digital business platform that wraps around existing legacy systems to transform organizations into agile, engaging and connected digital businesses. The platform comprises of Bizagi Modeler to design the process models, Bizagi Studio to turn process models into running applications and Bizagi Engine to run the applications enterprise-wide.
Headquartered in the UK with customers across the world, Bizagi is a global leader in digital business platforms. With a global user community of over 650,000 process pioneers, Bizagi has helped over 500 enterprises in 50 countries to survive and thrive in the digital age. For more information, please visit www.bizagi.com
As the pace of IT continues to pick up, faster engineering releases with a “no-compromise” approach to quality become increasingly important. Standardizing DevOps environments and mapping to different stages of the pipeline can go a long way in making this happen.
This webinar showcases how cloud sandboxes can easily integrate with popular tools like Ansible, Jenkins and JFrog to automate the workflow, increase release velocity and significantly enhance quality.
The webinar features experts from Quali and a real-world demo of the DevOps tools and sandboxes in action.
Fast and accurate quality verification is important in every release of software—whether your organization releases software several times a day or once a year—and automated testing is the best way to do it. But if automated tests can’t be trusted, they'll prevent the adoption of DevOps and continuous delivery. So what’s the best way to test software releases?
Watch this webcast to learn how Red Hat® JBoss® Middleware can help you:
- Write fast and reliable automated tests for Java™ applications
- Use automated functional testing frameworks
- Automate regression testing to identify performance problems
In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.
CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
Today's computing infrastructure is changing dramatically to support new requirements in design and structure. This is no more evident than in the Internet of Things, where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come.
These new IoT systems need data-centric technology that directly addresses real-time systems to explicitly manage the communications “data model.” No matter what application – from financial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation – industries need solutions to find right data then communicates it to its intended destination in a reliable, flexible, fast, and secure manner.
To learn more about the proven standard for data-connectivity in mission- and business-critical systems join OMG's webinar featuring experts from the leading DDS middleware vendors; PrismTech, RTI and Twin Oaks Computing
What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.
On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.
Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:
- A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
- A view of Enterprise Architecture and DevOps from a leader in the field
- What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.
Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.
This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.
Join us to:
- Learn how industry trends shape your internal challenges
- Explore how companies have resolved tensions between central IT organizations and development teams
- Learn how to use industry metrics to determine where you should be focusing your efforts
- Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
Who should attend:
- Director/VP of technology teams
- Technology executives
- Management seeking strategic alignment with business objectives
PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.
For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.
Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:
•PKI use cases in an enterprise environment to secure access and protect data
•Budgeting for your PKI deployment of modernization
•Outlining the deployment size, scope and timeline
•Analyzing and reviewing current and/or future security policies
•Maintenance and administration of the PKI system
•Configuring and understanding certificate authorities
•Developing a scalable approach to prepare for future needs
•Addressing the protection of sensitive keys and the ecosystem integration
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
Modern application technologies make it possible to provide a better user experience than ever before. With elevated end-user expectations, the difference between success and failure is an organization's ability to efficiently harness the power of complex application architectures to meet customers demands. An application performance management solution that sees through the data deluge to answer critical questions is more important today than ever before.
In this webcast, we will explore:
-Application performance management's role in modern IT organizations
-CA Application Performance Management's role in providing stellar end-user experience
-New innovations within CA Application Performance Management
Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.
As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.
Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.
Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.
Attendees will learn:
- What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
- How to build and manage APIs in a way that improves health data security and increases IT agility.
- How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
This Q&A session will examine the role of a developer portal in API Management, as well as the importance of its function as a hub to bring API Owners, Developers, Business Managers and Operations together to execute a successful API program. Dana and Guillermo will answer questions relating to developer engagement, API Publishing, the importance of the UX, and how a modern cross-platform portal can improve integrations with existing infrastructure.
Join to learn about the latest in enabling your developers and get your questions answered live!
As businesses strive to transform in order to survive and thrive in the digital age, digital initiatives have become increasingly focused on the customer experience (CX) rather than more traditional goals of efficiency and cost reduction.
So what does this mean for those tasked with delivering digital innovation and applications to the business? It means re-thinking operational models to connect employees, processes and devices with personalized and contextualized information – all to better serve customers.
Join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research as they discuss how today’s digital platform technologies can support these goals.
Register now to join the discussion on questions like:
-What does digital transformation mean for traditional businesses?
-Why is the shift from cost efficiency to customer experience so important?
-How can digital platforms help you improve the customer experience?
-Important strategies for delivering business applications faster in 2017
Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.
About Rob Koplowitz
Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing.
Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy.
According to recent research, “67% of high-performing CEOs are actively embracing agility, and 100% of them state that their companies actively experiment with new products and services.”* To deliver what customers really want, improve your bottom line and see teams really engage, you need to go beyond sprints and standups to business-level agile.
As the speed of business grows and more competitors adopt agile, grassroots approaches just won’t cut it anymore. “Doing agile” doesn’t guarantee business value, and many companies now have the opportunity to connect their overall business strategy to the execution of the work. Are your agile practices improving or flatlining? Better yet, are they benefiting your bottom line?
Join CA Technologies and guest speaker Margo Visitacion, Forrester VP and Principal Analyst in Enterprise Architecture, on February 28, at 10:00 AM PT / 1:00 PM ET, for a webinar packed with research-backed tips on sustainable, high-performance agile at scale.
The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
•Which specific guidelines concern customer information at rest and in transit
•How encryption and key management addresses these requirements
•The benefits of a centralized encryption management
A Forrester study commissioned by Synopsys. Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker, Synopsys’ interactive application security testing (IAST) solution, in an Agile development environment.
The economic benefits include:
- Reduced time and cost to remediate security vulnerabilities
- Reduced “noise” due to no false positives
- Reduced risk of a data breach
- Decreased reliance on external security consultants
Everyone’s talking DevOps and today, many are also doing. While first movers have advantage, they also leave a legacy of success patterns and fast failures. In this webinar, HPE DevOps technologists will share the aggregated knowledge of working with HPE’s own IT and R&D teams and global customers and partners who have been embarking on unique DevOps journeys for several years now and continuously implementing, learning and improving. This collective experience begins to shape DevOps patterns and anti-patterns that teams can learn from and apply as needed for their own unique DevOps scenarios.
Explore proven patterns for connecting development and test teams in Continuous testing pipelines, integrating quality analytics into pipeline processes to accelerate progress, and assessing and engineering in the optimal level of automation to a continuous delivery toolchain to balance speed and risk. Avoid common anti-patterns such as “develop, deploy and forget” or “runaway build branches”.
Join HPE’s Ashish Kuthiala and Kelly Emo as we share and explore these real-world DevOps anti-patterns, patterns and success stories.
This is part one in a three-part DevOps webinar series. Join us also for:
A look at the future of software testing: HPE vision for Continuous Testing, March 29
Taking on Enterprise Agile with HPE, April 26
The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*
People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.
Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).
If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.
*Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud without the technical, performance, or financial challenges that normally strain IT resources. They'll dive into the technology behind the new automated migration service, which utilizes CloudEndure’s continuous, block-level replication, automated machine conversion, and application stack orchestration.
This video will provide an overview of how Google and CloudEndure have partnered to create a self-service VM migration service. This service enables you to move your existing server infrastructure to Google Cloud Platform at no cost.
Have you been waiting for just the right moment to migrate to the cloud? Have your questions answered about how companies are using the new automated migration service to simply and easily move to the cloud.
There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
Companies invest in Project & Portfolio Management (PPM) solutions because they are looking for a central platform to gain visibility on projects, track and report on progress, and align their strategy to execution. But with so many options in the market, it’s hard to know if you are investing in the solution that is right for your current and future business needs. Join this webinar on Tuesday, March 7, 2017 for an inside view into the key features and functionality to look for in a dynamic PPM solution.
Whether you are new to PPM automation, or looking to replace a PPM solution you’ve invested in already, this webinar will discuss:
- Best practices for researching and selecting the right solution for your unique needs
- Must haves and deal breakers to look out for during the selection process
- Critical differentiators that will determine your success
Technology is driving business change at a breath-taking pace. Digital transformation is the watchword – established enterprises need to adapt rapidly to compete with agile and flexible digital-first disruptors as well as cater to their customers’ evolving requirements. To hold back is to court obsolescence. But saying and doing are two different matters – legacy infrastructure and applications, increasing security concerns, complexity and the need to be agile all present serious challenges that must be overcome. This is crucial if organizations are to find differentiation and competitive edge in the battle for customer loyalty.
Cloud has become a key agent for digital transformation with cloud first strategies becoming the new norm. With many enterprises now employing multiple cloud combinations, this webinar will look at the trends and expectations for these different environments, drawing upon a new study from 451 Research commissioned by VMware and Atos.
The discussion will include:
• The latest state of play in digital transformation and how it is impacting cloud decisions
• The challenges affecting established enterprises from becoming digital-first
• The latest cloud trends and expectations helping to deliver digital transformation
>>> Cloud first
>>> Multiple cloud combinations
>>> The rise of the digital private cloud
>>> The trends in enterprise use of cloud in European countries and the US
• How the issues of scale, security, agility and complexity can be overcome
• Best practice examples and insight from global enterprises who have adopted a digital private cloud solution from Atos and VMware
Flawless customer support directly translates to bottom line success. And that means reading customers' minds by offering real-time, reliable responses wherever they are—a feat that's not easily accomplished with call centers or even Live Chat.
To help companies get it right every time, AI has stepped into the breach, cape blowing in the breeze. AI is impacting just about all areas of company activity, and now enables cost-effective, efficient, and superpowered solutions that turn customer agents into heroes, helping them assist more customers, more quickly, in the channel they're most accustomed to using—messaging platforms. Or maybe not using agents at all, but bots.
Join our interactive VB Live event where Stewart Rogers will take a deep dive into his latest VB Insight report to give you the who, what, why—and especially how—of AI-powered customer service.
In this webinar you'll:
* Use AI to accelerate your customer support
* Learn why chatbots are the answer to increased customer service
* Get started on the first steps toward implementing an AI solution on the help desk
* Integrated an innovative social customer service operation in a bot-driven world
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Quinn Banks, Sr. Product Marketing Manager, Mobile, Farmers Insurance
* Wendy Schuchart, Moderator, VentureBeat
Nearly $1.5 billion in funding went into over 200 AI companies in 2016, ads powered by IBM’s Watson tech lets users ask questions about the promoted product via voice or text, Google’s RankBrain is changing the business of SEO, and they’ve just announced not only a new range of machine learning APIs, products and upgrades, but a whole new Cloud Machine Learning group.
Let’s call it: It’s honest-to-god paradigm shift, not just an excuse for another round of “open the pod bay doors, HAL” jokes—and it’s one that’s going to inevitably, unavoidably revolutionize marketing to the extent that if you’re not on board, you are going to be buried.
Want to disrupt instead of be disrupted? To learn how to leverage machine learning and artificial intelligence to deliver highly personalized, real-time consumer engagement at a significantly lower cost? Join this interactive VB Live event.
In this webinar you’ll:
* Learn how speech recognition impacts the SEO value on your web presence
* Understand the full ROI of fully automated chat bots for artificial human interaction
* Integrate deep learning into your marketing strategy to realize unbelievable lift
* Stewart Rogers, Director of Marketing Technology, VentureBeat
Wendy Schuchart, Moderator, VentureBeat
More speakers to come