Hi [[ session.user.profile.firstName ]]

Application Development

  • Netflix fmr-Product VP Gib Biddle on how to go from strategy to execution
    Netflix fmr-Product VP Gib Biddle on how to go from strategy to execution Gib Biddle Recorded: Nov 24 2017 82 mins
    How do you reconcile vision and execution? Netflix Former Product VP Gibson Biddle shares the two models he uses to define product strategy and answer the question, “How do we delight customers in hard-to-copy, margin-enhancing ways?” He’ll then share how he puts the strategy into practice via carefully defined metrics and tactics. Last, he’ll simulate a product strategy meeting, demonstrating the fast-paced “debate, decide, then do” environment at Netflix as he presents two modern-day, Netflix mini-cases.
  • Une expérience utilisateur 5 étoiles grâce à CA App Experience Analytics
    Une expérience utilisateur 5 étoiles grâce à CA App Experience Analytics Bilel Sfaxi, Principal Consultant, CA Technologies Recorded: Nov 24 2017 37 mins
    Votre responsable de la stratégie numérique, les opérationnels et les propriétaires d’applications subissent une forte pression pour accélérer votre transformation vers une entreprise entièrement numérique, mais cette responsabilité est écrasante.
    Apprenez avec notre expert comment récolter des informations pertinentes sur l’expérience de vos utilisateurs, de manière facile et efficace, pour un objectif d’analyse de la performance, de l’usage et du design de vos applications Web et mobiles.
  • SafeNet Authentication Service Live Product Demo
    SafeNet Authentication Service Live Product Demo Ms. Mukta Gupta - Technical Consultant Engineer, Identity & Data Protection, India & SAARC, Gemalto Recorded: Nov 24 2017 26 mins
    SafeNet Authentication Service (SAS) delivers fully-automated, highly secure strong authentication-as-a service. A new product demo webinar is now available.

    Register now for our 30 minute demo and see how easy and simple it is to:
    - Set up a strong authentication account on SAS
    - Add users to an account
    - Assign tokens to users
    - Generate reports

    Please email us at InfoAPAC@gemalto.com if you have any questions or problems registering.
  • 10-step plan to roll out Cloud devops
    10-step plan to roll out Cloud devops Mark Baker, OpenStack Product Manager Recorded: Nov 22 2017 57 mins
    In this webinar we will talk about practical steps that will help you:
    - Reap the benefits of hybrid cloud by adapting to cloud devops
    - Deal with the technical and operational pitfalls involved in migrating to native cloud
    - Make the right choices for your cloud architectural to achieve lean devops
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Recorded: Nov 22 2017 61 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Managing a hybrid application development environment
    Managing a hybrid application development environment John Falk, Solution Architect, Micro Focus & Collin Chau, Product Marketing, Micro Focus Recorded: Nov 21 2017 20 mins
    Let’s face it. Not all enterprise applications are born for Agile delivery. Organizations will have mission critical applications that are updated infrequently and will continue using waterfall development methodologies. “Why change when it is working well?” say customers. The question then becomes – Will your businesses be able to plan/build/test/track across an enterprise application portfolio for agile and non-agile teams?

    Join us in this webinar, as we talk about balancing the needs of legacy and digital first applications, and what true hybrid application development means to your complex application portfolio.
  • The Enterprise UC Reality – and Cisco’s UC Approach
    The Enterprise UC Reality – and Cisco’s UC Approach Bill Haskins Sr. Analyst and Partner, UC, Chad Elford Global Director UCaaD Cisco Collab Slutions at TATA Communications Recorded: Nov 21 2017 61 mins
    Enterprises have a variety of choices when it comes to adopting new Unified Communications (UC) solutions. The current reality is that very few enterprises come close to unlocking the full potential of their UC platform to achieve the ideal experience. The UC landscape is evolving and the buying decision is becoming increasingly complex. IT teams need to constantly re-evaluate their strategy keeping in mind the numerous UC and UCaaS solutions, the end-user behavior, and growing expectations from the platform.

    In this webinar, Bill Haskins from Wainhouse Research provides his expert analysis of the current UC market. Bill will discuss the pros and cons of leading enterprise UC solutions. Having observed the evolution of the UC industry closely, Bill will coverkey considerations for enterprise IT teams as they prepare their UC roadmaps for current and future needs. As most mid and large organizations have a considerable Cisco UC infrastructure footprint, Bill will also talk about Cisco’s approach to UC.

    Bill will be joined by Chad Elford from Tata Communications who will discuss the UC approach taken by many leading enterprises globally. Chad will provide insights on business collaboration through UCaaS solutions and how it helps enterprises achieve their goals.

    If you are currently deciding the UC strategy for your organization or mid-way through executing one, this webinar will provide you with valuable intelligence to help you fine tune/pivot your UC roadmap for your organization’s digital transformation.

    Key Learning Objectives
    •Understand the enterprise UC and UCaaS landscape today with an analyst perspective of the leading solutions
    •Gain strategic insights which would help in planning and/or optimize current enterprise UC plans
    •Learn how enterprises can achieve the full potential of their UCaaS platform to drive digital transformation for the organization
  • Build & integrate digital apps with SAP Cloud Platform & SAP API Business Hub
    Build & integrate digital apps with SAP Cloud Platform & SAP API Business Hub David Sacks / Matthias Steiner / Harsh Jegadeesan Recorded: Nov 21 2017 62 mins
    As a savvy software provider, you’re looking to capitalize on the latest tech trends and enable customers to master digital transformation. But it’s a constant balancing act – weighing development cycles against customer requests.

    With SAP Cloud platform, the Platform as a Service (PaaS) from SAP, you can build modern cloud apps and microservices using open standards that use the skills you already have – enabling you to connect systems at the edge to core processes, move to the cloud, and deliver on customer expectations.

    Join us November 21 for an online Webcast designed to help ISVs explore the benefits of building and integrating digital apps using SAP Cloud Platform and SAP API Business Hub.

    SAP Cloud Platform combined with SAP API Business Hub enables you to:
    -Rapidly connect to SAP and non-SAP systems
    -Manage, publish, and analyze APIs with an open API Hub
    -Standardize API usage through a single environment
    -Select the database options you’re used to
    -Develop with open standards - so you can use the language and tools you know
    -Run on an open multi-cloud environment
    -Build once and run on any device

    Find out how, as an SAP partner in the “build” engagement model, you can take advantage of partner benefits and cloud platform technology to connect everything, speed time to market, and build on the open standards that you’re already invested in.

    Join us and start building apps of the future, making the most of what you know today.

    Speakers: 
    - David Sacks, Senior Director, Platform Partner Ecosystem, SAP
    - Matthias Steiner, Cloud Platform Evangelist, SAP
    - Harsh Jegadeesan, Head of Product Management, Digital Transformation Services, SAP Cloud Platform.

    Webcast details:
    Date: Tuesday, November 21, 2017
    Time: 10:00 a.m. EST
  • Introduction to Crowd Machine
    Introduction to Crowd Machine CEO- Craig Sproule, CTO - Ben Gorlick, Network Architect - Johnny Dilley Recorded: Nov 20 2017 47 mins
    Crowd Machine is a distributed computational network powering next generation blockchain and decentralized apps.

    It leverages the principles of strong federations in a trust-less environment to deliver interoperable blockchain apps on a network of peers. The network includes an embedded code-less app development capability that allows anyone to create decentralized apps at unprecedented speeds.

    During this webinar, we will be demonstrating the technology and providing an overview of the decentralized architecture.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Endpoint Security: The Final Frontier
    Endpoint Security: The Final Frontier Ed Metcalf, Senior Director Product Marketing, Cylance Recorded: Nov 16 2017 46 mins
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • Integrating Quality into Software Development
    Integrating Quality into Software Development Edward Paulet Recorded: Nov 16 2017 29 mins
    Agile teams are beginning to test earlier than ever before in order to improve quality, shorten test cycles and reduce the possibility of releasing bugs. To successfully move fast without breaking things, teams must integrate quality assurance into their CI/CD processes.

    In this webinar, you will learn:

    1. The fundamentals of automatable QA strategies
    2. How to successfully integrate quality into your CI process
    3. How to shorten the feedback loop between catching and fixing bugs
  • Next Gen Apps Need Next Gen Databases
    Next Gen Apps Need Next Gen Databases James Curtis Senior Analyst of Data Platforms & Analytics at 451 Research; Leena Joshi, VP of Marketing at Redis Labs Recorded: Nov 16 2017 51 mins
    The next generation of applications being built at the rising star companies are different from the clunky software being built in traditional businesses. As traditional companies modernize their software stacks, they need to incorporate renewed expectations into their applications such as tailored user experiences, built-in analytics and decision-making while meeting response time requirements under any conditions.

    James Curtis, senior analyst at 451 group, outlines top trends in user experience requirements and the higher bar for application developers when it comes to delivering complex analytics so users can take real time action. The wide availability of new NoSQL, streaming and advanced analytics technologies are enabling state of the art functionality in applications.  Join this session for a discussion of top drivers and barriers organizations face while overhauling their applications to incorporate cutting edge functionality.

    Leena Joshi, VP Product Marketing at Redis Labs examines specific advantages of the Redis Enterprise platform that simplify the implementation of real-time analytics functionality such as probabilistic counts, time-series analysis, leaderboards, personalized recommendations, location-based calculations into modern applications.
  • Microservices AMA: Load Balancing and Service Discovery
    Microservices AMA: Load Balancing and Service Discovery Charles Pretzer, Technical Architect; Floyd Smith, Technical Marketing Writer Recorded: Nov 16 2017 61 mins
    Learn how NGINX Plus supports service discovery and load balancing in the NGINX Microservices Reference Architecture (MRA).

    More specifically, join this webinar to learn:

    - Get the latest answers to your questions about implementing microservices
    - Learn about the challenges others are facing in development and deployment
    - Ask questions about converting monolithic apps to microservices
    - Get an update on the NGINX Microservices Reference Architecture
  • Exchanging Cyber Threat Intelligence: There has to be a better way
    Exchanging Cyber Threat Intelligence: There has to be a better way Dr. Larry Ponemon, Founder, Ponemon Institute; Krupa Srivatsan, Infoblox; Tom Gorup, Rook Security; B. Dunlap (Moderator) Recorded: Nov 16 2017 62 mins
    Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against them on their own. More and more companies are using multiple threat intelligence sources and reaching out to their peers for threat intelligence data. In fact, 66% of respondents in the recent 2017 Ponemon survey, “The Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way”, report that threat intelligence could have prevented or minimized the consequences of a cyber attack or data breach. Join Infoblox and (ISC)2 on November 16, 2017 at 12:00pm (Noon) Eastern where our panel will discuss top trends that describe the current state of threat intelligence sharing, how threat intelligence sharing and usage has changed from previous years and best practices to using threat intelligence effectively to counter attacks.
  • DDS Technical Overview Part III - Using DDS to Secure Data Communications
    DDS Technical Overview Part III - Using DDS to Secure Data Communications Larry Johnson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Recorded: Nov 16 2017 53 mins
    Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

    To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical oveview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

    This webinar, Part III of the OMG DDS Webinar series, will take an in-depth look at the latest advances in the DDS standards to meet the demanding cyber-security requirements of today’s industrial connected systems. From authentication and access control to integrity and encryption, learn how to leverage DDS Security features to secure your connected system against cyber attacks, while maintaining a flexible, scalable architecture. Presented by Nina Tucker, Vice President of Twin Oaks Computing.

    Part I of the OMG DDS Webinar Series: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technologies and co-chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252365

    Part II of the OMG DDS Webinar series: Applying DDS QoS to Solve Real-World Problems, presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252387
  • How Prometheus 2.0 adds serious muscle for monitoring millions of containers
    How Prometheus 2.0 adds serious muscle for monitoring millions of containers Chris Ricci and Frederic Branczyk Recorded: Nov 16 2017 41 mins
    Prometheus has long been a darling of the open source container monitoring space. Prometheus is built-in and preconfigured with CoreOS Tectonic, helping make it the most advanced enterprise ready Kubernetes distribution on the market. With the release of Prometheus 2.0, we're seeing new features which simultaneously simplify, speed up, and improve the scalability of the solution.

    Tune in for an overview and Q&A with lead Prometheus developer, Frederic Branczyk. We'll be discussing what the major advancements in the Prometheus storage layer mean to you, migrating to Prometheus 2.0, and more.
  • Security Heretic: What got us here, won't get us there
    Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 57 mins
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • Managing Complexity and Scalability in the Agile Enterprise
    Managing Complexity and Scalability in the Agile Enterprise Malcolm Isaacs, Micro Focus Recorded: Nov 16 2017 32 mins
    Businesses today are under pressure to deliver software quicker than ever before, without compromising on quality. As they strive for increased agility, parts of the organization are moving to agile development methodologies, and continuous delivery with DevOps.

    This webinar will explore the challenges that enterprises face as they juggle legacy applications, tools, and methodologies with ultra-modern architectures, technologies and delivery models. We will look at how HPE Project and Portfolio Management (PPM) and ALM Octane work together with modern and legacy toolsets to provide all of the information that executives need in order to make the strategic decisions that will keep their business ahead of the competition.
  • Increasing grant success rates with funding insights, discovery and decisions
    Increasing grant success rates with funding insights, discovery and decisions Lesley Thompson, VP Strategic Alliances; Andreea Serban, Product Lead Funding Solutions; Bob M. Hendriks, Marketing Manager Recorded: Nov 16 2017 43 mins
    Funding is a major priority for virtually all research institutions, but finding and securing grants is a time-consuming and increasingly competitive process. To succeed you need to gain insight into the complicated funding landscape, discover hidden opportunities and make informed decisions.
    In this webinar, you will learn about the key challenges in funding and how Elsevier’s Funding Institutional addresses them by supporting institutional staff across the funding workflow
  • Strategic Design: Domains, Subdomains, Bounded Contexts & Context Maps-Part Two
    Strategic Design: Domains, Subdomains, Bounded Contexts & Context Maps-Part Two Michael Plöd, Principal Consultant, InnoQ Recorded: Nov 16 2017 64 mins
    In the second installment of Pivotal’s five-part webinar series on Domain-Driven Design, we will take a look at how domains, subdomains and especially bounded contexts relate to each other.

    You will leave this webinar knowing how to use context mapping and the context map’s patterns, like shared kernel, anticorruption layer or published language, among others, to analyze existing applications or application landscapes for possible transformations of monolithic applications. And you will understand how the idea of a bounded context can relate to microservices.
  • Crack the Automation Code and Create a Balanced Test Automation Strategy
    Crack the Automation Code and Create a Balanced Test Automation Strategy Derek Choy, CIO, Rainforest QA Recorded: Nov 15 2017 60 mins
    Test automation is often held up as the QA endgame. Teams mistakenly believe that if they can crack the automation code, all of their quality problems will be solved. But even when implemented perfectly, automated tests are brittle, flaky, and require significant upkeep.

    Automation is a critical QA tool, but it's not a magic bullet. To get the most out of automated testing and drive high-quality releases, teams must devise a QA strategy that balances management costs and testing speed.

    Join this web seminar to learn how to create a balanced test automation strategy that satisfies your team’s needs.

    You’ll also learn:

    - The true cost of test automation
    - How to adapt your test automation approach to fit faster iteration cycles
    - The best tools and processes to complement your automation strategy
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Recorded: Nov 15 2017 48 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?