The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Everyone’s talking DevOps and today, many are also doing. While first movers have advantage, they also leave a legacy of success patterns and fast failures. In this webinar, HPE DevOps technologists will share the aggregated knowledge of working with HPE’s own IT and R&D teams and global customers and partners who have been embarking on unique DevOps journeys for several years now and continuously implementing, learning and improving. This collective experience begins to shape DevOps patterns and anti-patterns that teams can learn from and apply as needed for their own unique DevOps scenarios.
Explore proven patterns for connecting development and test teams in Continuous testing pipelines, integrating quality analytics into pipeline processes to accelerate progress, and assessing and engineering in the optimal level of automation to a continuous delivery toolchain to balance speed and risk. Avoid common anti-patterns such as “develop, deploy and forget” or “runaway build branches”.
Join HPE’s Ashish Kuthiala and Kelly Emo as we share and explore these real-world DevOps anti-patterns, patterns and success stories.
This is part one in a three-part DevOps webinar series. Join us also for:
A look at the future of software testing: HPE vision for Continuous Testing, March 29
Taking on Enterprise Agile with HPE, April 26
As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.
In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.
Join us to learn:
- How to test recipes that are powered by search and data bags
- How to test resource guards
- How to test helper methods
Who should attend:
Chef users with experience using ChefSpec, InSpec, and Test Kitchen
Implementing Seeker, Interactive Application Security Testing by Synopsys, in your Agile development environment not only reduces time and cost to remediate security vulnerabilities, but also reduces risk of a data breach. To quantify these benefits, Synopsys commissioned Forrester Consulting to conduct an in-depth customer case study to examine the potential ROI an organization may realize from deploying Seeker.
Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker.
The Asia-Pacific data center services landscape is highly competitive, and dominated by telecommunications companies/carriers, wholesale/retail data center service providers, as well as managed service players. Who are the leading data center market participants in the region, based on market revenues and strategy vision? What are some initiatives taken by leading participants to stay ahead of the curve?
The 2017 FrostIQ – Asia-Pacific Data Center Service Providers matrix provides a snapshot for industry CIOs and other decision makers, on the selection of best-in-class data center service providers in the region.
The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
•Which specific guidelines concern customer information at rest and in transit
•How encryption and key management addresses these requirements
•The benefits of a centralized encryption management
Container technology is hot and evolving every day by leaps and bounds. Just why are containers so attractive and how are they different from VMs? To add to the confusion, complex container environments need orchestration solutions, such as Kubernetes, to be managed effectively. There are a few different ways to deploy these solutions, each with their own drawbacks and benefits. In this BrightTALK session, we'll take a look at containers, container orchestration, and walk through a real-world application that shows why containers are leading the way.
A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there
The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.
Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
Spring Boot and Pivotal Cloud Foundry users won’t want to miss Spring team’s Madhura Bhave and Pieter Humphrey as they tour through the Spring Boot 1.5 release.
Inspired in part by cool community open source work from Ordina JWorks, one of the hottest new directions that the two teams are working on is the integration of Spring Boot Actuators with Pivotal Cloud Foundry.
Attendees will be given direct linkage to product management - this is your chance to influence future integration direction! You’ll also walk away understanding all the highlights of the Spring Boot 1.5 release, including exciting improvements in Kafka and JPA support.
According to recent research, “67% of high-performing CEOs are actively embracing agility, and 100% of them state that their companies actively experiment with new products and services.”* To deliver what customers really want, improve your bottom line and see teams really engage, you need to go beyond sprints and standups to business-level agile.
As the speed of business grows and more competitors adopt agile, grassroots approaches just won’t cut it anymore. “Doing agile” doesn’t guarantee business value, and many companies now have the opportunity to connect their overall business strategy to the execution of the work. Are your agile practices improving or flatlining? Better yet, are they benefiting your bottom line?
Join CA Technologies and guest speaker Margo Visitacion, Forrester VP and Principal Analyst in Enterprise Architecture, on February 28, at 10:00 AM PT / 1:00 PM ET, for a webinar packed with research-backed tips on sustainable, high-performance agile at scale.
As businesses strive to transform in order to survive and thrive in the digital age, digital initiatives have become increasingly focused on the customer experience (CX) rather than more traditional goals of efficiency and cost reduction.
So what does this mean for those tasked with delivering digital innovation and applications to the business? It means re-thinking operational models to connect employees, processes and devices with personalized and contextualized information – all to better serve customers.
Join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research as they discuss how today’s digital platform technologies can support these goals.
Register now to join the discussion on questions like:
-What does digital transformation mean for traditional businesses?
-Why is the shift from cost efficiency to customer experience so important?
-How can digital platforms help you improve the customer experience?
-Important strategies for delivering business applications faster in 2017
Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.
About Rob Koplowitz
Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing.
Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy.
This Q&A session will examine the role of a developer portal in API Management, as well as the importance of its function as a hub to bring API Owners, Developers, Business Managers and Operations together to execute a successful API program. Dana and Guillermo will answer questions relating to developer engagement, API Publishing, the importance of the UX, and how a modern cross-platform portal can improve integrations with existing infrastructure.
Join to learn about the latest in enabling your developers and get your questions answered live!
As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.
Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.
Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.
Attendees will learn:
- What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
- How to build and manage APIs in a way that improves health data security and increases IT agility.
- How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.
Modern application technologies make it possible to provide a better user experience than ever before. With elevated end-user expectations, the difference between success and failure is an organization's ability to efficiently harness the power of complex application architectures to meet customers demands. An application performance management solution that sees through the data deluge to answer critical questions is more important today than ever before.
In this webcast, we will explore:
-Application performance management's role in modern IT organizations
-CA Application Performance Management's role in providing stellar end-user experience
-New innovations within CA Application Performance Management
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.
For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.
Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:
•PKI use cases in an enterprise environment to secure access and protect data
•Budgeting for your PKI deployment of modernization
•Outlining the deployment size, scope and timeline
•Analyzing and reviewing current and/or future security policies
•Maintenance and administration of the PKI system
•Configuring and understanding certificate authorities
•Developing a scalable approach to prepare for future needs
•Addressing the protection of sensitive keys and the ecosystem integration
More IT and computing is moving to public networks such as Amazon Web Services (AWS) and Microsoft Azure. Increasingly, internal/private IT is being restructured to provide similar services. Along with this are changes in the ways applications are being built, deployed, and maintained reflected by the rapid adoption of containers and microservices. What does this mean to IT Service Management and the service desk organization?
Join this webinar to learn w HPE Software and our ITSM Automation (ITSMA) solutions are doing to both take advantage of these trends and also help support these trends. We’ll discuss the benefits to the service desk team of faster deployments, quicker time to value, and reduced administration and maintenance. Please join us to learn more about what HPE ITSMA provides today and what’s coming soon.
There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.
This webinar will:
- Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
- Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
- Introduce an engineered solution from Berk-Tek that will solve this emerging problem.
Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates his favorite new features of the latest Microsoft SQL Server 2016 Service Pack 1.
During the webinar, Rodney will touch on the following:
• A demo of his favorite new features in SQL Server 2016 and SP1 including:
o Query Store
o Database Cloning
o Dynamic Data Masking
o Create or Alter
• A review of Enterprise features that are now available in standard edition
• New information in Dynamic Management Views and SQL Error Log that will make your DBAs job easier.
In the past years of Big Data and digital transformation “euphoria”, Hadoop and Spark received most of the attention as platforms for large-scale data management and analytics. Data warehouses based on relational database technology, for a variety of reasons, came under scrutiny as perhaps no longer needed.
However, if there is anything users have learned recently it’s that the mission of data warehouses is as vital as ever. Cost and operational deficiencies can be overcome with a combination of cloud computing and open source software, and by leveraging the same economics of traditional big data projects - scale-up and scale-out at commodity pricing.
In this webinar, Neil Raden from Hired Brains Research makes the case that an evolved data warehouse implementation continues to play a vital role in the enterprise, providing unique business value that actually aids digital transformation. Attendees will learn:
- How the role of the data warehouse has evolved over time
- Why Hadoop and Spark are not replacements for the data warehouse
- How the data warehouse supports digital transformation initiatives
- Real-life examples of data warehousing in digital transformation scenarios
- Advice and best practices for evolving your own data warehouse practice
Theming is critical for creating great looking web applications. With Sencha Themer, it’s easier than ever for you to create custom themes for your Ext JS apps. We recently updated Themer 1.1 EA, so you can uniquely theme components including grid, list, tabpanel, and more.
Join us for our upcoming webinar and learn:
-How you can visually build creative themes
-How to connect to an app and inspect component styles
-How to create UIs for modern grid and make them unique
-How to use your themes created with Themer in Sencha Architect
Christian Renaud, Research Director, Internet of Things, discusses the vertical and horizontal approaches to the Internet of Things, the state of IoT deployments, 2016 IoT M&A, and a preview of what to expect at the upcoming Real World IoT event, 5-6 April at the Landmark London.
Con la Digital Transformation le performance applicative e la User Experience sono diventati fattori determinanti per il successo di un’iniziativa digitale. Allo stesso tempo l’adozione di metodologie Agile impone un approccio “as-a-code” nella gestione di tutte le fasi del ciclo di vita del software. È per questi motivi che risulta fondamentale indirizzare la verifica delle performance già dalle prime fasi dello sviluppo software, abilitando l’esecuzione dei Test di Performance già nei cicli di build di una nuova release.
The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*
People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.
Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).
If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.
*Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud using the talent, technology, and applications they already have. They'll dive into the technology behind a free cloud migration service that utilizes CloudEndure’s continuous, block-level replication to provide disruption-free migration to Google Cloud Platform.
This video will provide an overview of key considerations for IT and live-demonstrate Google Cloud and CloudEndure's partnership to create a self-service VM migration solution for enterprise. Whether it's on-prem or in the cloud already, move your existing server infrastructure to Google Cloud Platform at no cost.
Have you been waiting for the right moment to migrate to the cloud? Get your questions answered about how companies are using the new automated migration service to seamlessly migrate to the cloud.
Enterprise development teams are frequently working with multiple types of SCM repositories, such as Git and Subversion. Git does a solid job handling source code; Subversion does a solid job handling binary artifacts and is likely where many older projects' full histories reside. Managing both Subversion and Git repositories together is quite a challenge. Join us to learn how to make it easy.
There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.
Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.
Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
As agile upstarts continue to displace established incumbent companies, the imperative to adopt (and adapt to) modern technologies and platforms - cloud, big data, IoT, mobile - has never been greater.
All too often, legacy systems, which form the backbone of many enterprises, can stand in the way of the implementation and adoption of these technologies. As the number of digital transformation initiatives and the speed with which they must be delivered intensifies, IT leaders are being overwhelmed by the sheer number of requests for data feeds from legacy systems. Moreover, existing legacy interfaces, developed in a world of daily, batch calls, are not fit for purpose for today's digital channels requiring real-time data causing additional pain.
Join Matt Serna, Manager Industry Marketing, Mike O'Meara, VP of Infoview Systems, and Dmitriy Kuznetsov, VP of Integration and Cloud Services, Infoview Systems for an in depth look at a specific customer use-case.
Listeners will learn:
- Best practices for leveraging Anypoint Platform as part of a broader legacy modernization initiative
- How to enable AS/400 and other legacy systems to consume external APIs [DEMO]
- How to leverage Anypoint Platform and the MuleSoft-Certified AS/400 connector to expose AS/400 data and services via APIs [DEMO]
Companies invest in Project & Portfolio Management (PPM) solutions because they are looking for a central platform to gain visibility on projects, track and report on progress, and align their strategy to execution. But with so many options in the market, it’s hard to know if you are investing in the solution that is right for your current and future business needs. Join this webinar on Tuesday, March 7, 2017 for an inside view into the key features and functionality to look for in a dynamic PPM solution.
Whether you are new to PPM automation, or looking to replace a PPM solution you’ve invested in already, this webinar will discuss:
- Best practices for researching and selecting the right solution for your unique needs
- Must haves and deal breakers to look out for during the selection process
- Critical differentiators that will determine your success
This webinar demonstrates the practical realization of standards-based executable modeling in UML, showing its importance for moving forward in a number of, perhaps, unexpected areas, including agile development methods, multi-core programming and model-based system engineering. Today’s Executable UML is based on the OMG’s Foundational UML (fUML) standard, for executable object-oriented and activity modeling, and the Action Language for fUML (Alf) standard, which defines a corresponding textual representation. But this is only the beginning. Additional Executable UML standards are being built on this foundation, including recent ones for composite structure and state machines. Come learn about the growing suite of OMG Executable UML specifications, watch these standards in action and discover the promise they hold for the future.
TIA's executive team and TIA NOW, its online video network, are attending Mobile World Congress '17, one of the leading annual events showcasing the latest in mobile and wireless technologies. TIA hosted a pre-conference CTO Council Meeting in Barcelona on Sunday, focusing on the Internet of Things. The meeting was sponsored by iconectiv.
On Thursday, March 9 at 11 am ET, join TIA for a post-event webcast on sights and insights from the MWC17 show floor. Hear from TIA executives, members and communications leaders from around the world as they discuss the transformation of connectivity infrastructure, the expansion of IoT applications, and the proliferation of Smart Communities projects.
> David Heard, Chairman of the Board, TIA
> Brenda Boehm, Chief Strategy Officer and Executive Vice President of Technology and Products
> Susan Schramm, Chief Marketing Officer & Senior Vice President of Membership and Marketing
> John Jacobs, Vice President, Market Intelligence and Research
Flawless customer support directly translates to bottom line success. And that means reading customers' minds by offering real-time, reliable responses wherever they are—a feat that's not easily accomplished with call centers or even Live Chat.
To help companies get it right every time, AI has stepped into the breach, cape blowing in the breeze. AI is impacting just about all areas of company activity, and now enables cost-effective, efficient, and superpowered solutions that turn customer agents into heroes, helping them assist more customers, more quickly, in the channel they're most accustomed to using—messaging platforms. Or maybe not using agents at all, but bots.
Join our interactive VB Live event where Stewart Rogers will take a deep dive into his latest VB Insight report to give you the who, what, why—and especially how—of AI-powered customer service.
In this webinar you'll:
* Use AI to accelerate your customer support
* Learn why chatbots are the answer to increased customer service
* Get started on the first steps toward implementing an AI solution on the help desk
* Integrated an innovative social customer service operation in a bot-driven world
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Quinn Banks, Sr. Product Marketing Manager, Mobile, Farmers Insurance
* Wendy Schuchart, Moderator, VentureBeat
Mobile application development projects are expected to outnumber desktop development projects four to one over the next few years. These mobile applications pose testing challenges not shared by their desktop counterparts.
In this webinar, we will cover how HPE Mobile Center, an integrated mobile application testing software development suite, combined with its unique integrations, helps you and your organization rapidly build, test and deliver high-quality mobile applications.
Join us to hear more about:
• Mobile Analytics - incorporate usage data from production, including most problematic devices, popular devices, common flows etc.
• Security Scans - run security code scans at the click of a button on .apk or .ipa files powered by Fortify on Demand
• Sentiment Analysis - analyze the comments users write about your application in the public app stores and categorize and score them
• Crowd Testing - manually test applications internally or externally while communicating directly to ALM
• SDK scanning - scan .apk files and list all the SDKs inside the application including which SDKs are deprecated and which ones are not actually in use
Cloud applications have garnered widespread adoption from enterprises in part due to their advantages such as ease of deployment, lower TCO, and high scalability. These applications are also popular because end-users can rely on these applications to work and collaborate from anywhere and on any device. But should the enterprise trust cloud app providers to protect their data from malware and ransomware? Currently, there are only a handful of enterprise cloud applications that provide native malware protection which, in almost all the cases, does not include zero-day protection. Join Bitglass and (ISC)2 for the first part of our next Security Briefings series on March 9, 2017 at 1:00PM Eastern when we will discuss malware protection solutions offered by various cloud application providers, how malware can penetrate into cloud applications and how Cloud Access Security Brokers (CASB) can protect enterprise cloud applications from malware.
The market for ADCs is very competitive, with nearly every vendor claiming a performance advantage. Join Avi Networks CTO, Ranga Rajagopalan for an extraordinary demo on how you can scale from zero to 1 million SSL transactions per second (TPS) at a fraction of the cost of a traditional, appliance-based load balancers.
In this webinar, Ranga will debunk the performance myth commonly perpetuated by vendors of hardware load balancers. He will perform a live test during the webinar using the Google Cloud Platform (GCP). Don't miss this opportunity to learn how to achieve “ludicrous scale without incurring ludicrous costs” for high-volume SSL transactions.
Learn how next-generation load balancers:
• Provide truly elastic scale – scaling up or scaling down
• Deliver multi-cloud capabilities
• Lower your total cost of ownership
The promise of the cloud in healthcare is clear; delivering on that promise, less so. Security and HIPAA compliance challenges, combined with the technical difficulty of configuring on-premise EHR systems to co-exist with modern cloud platforms, have delayed cloud adoption in the industry.
This webinar will share how Anypoint Platform’s unique combination of data integration and API lifecycle management can help power the rapid, secure adoption of Salesforce and other modern healthcare cloud applications. It will also showcase how PwC has leveraged the MuleSoft platform to develop innovative solutions for its healthcare clients, and feature a demo of PwC's Smart Agent.
Attendees will learn:
- Common pitfalls healthcare organizations face in migrating to the cloud, and how they can be addressed with a hybrid integration model
- How APIs can be used to increase the security and governance of health data
- How PwC leverages MuleSoft’s platform to drive business outcomes in healthcare
Health care spending reached $3.2 trillion in the U.S. in 2015, accounting for over 17% of GDP. Nobody is sure how much of that spending was wasted on fraudulent insurance claims and unnecessary procedures, but $200 billion, or more, is likely in the ballpark. Data science-driven methods for detecting health care fraud and abuse have the potential to help reduce this price tag and hold bad actors to account.
Join Hulya Emir-Farinas, a Master Data Scientist at Pivotal, as she provides a framework for using data science to detect healthcare fraud, shares best practices for applying this framework in real-world scenarios, and illustrates with examples drawn from recent engagements with Pivotal health care clients.
IT decision makers today realize that the enterprise and consumer worlds are merging closer together in how they secure our digital identities. As the consumer world tightens its security around online identities, the corporate world is embracing intuitive, user-friendly identity architectures.
Enterprises are moving from traditional two-factor solutions, which are based on a binary yes/no validation, to more fluid methods of identity verification, such as context-based, risk-based and continuous authentication. They are also embracing architectures that allow users to import their social, government-issued or commercial identities into the enterprise space. Join this webinar to learn more about:
•Key concepts impacting the enterprise security space
•The consumerization of enterprise security
•Designing enterprise security with UX in mind
•The impact standards have on the future of strong authentication
Initiatives to modernize applications to a cloud-native architecture begin with big questions - where do I start, what applications would require the most changes, and what is the user impact?
Join Mike Villiger from Dynatrace and Kamala Dasika from Pivotal as they take you step-by-step from planning through scoping strategies, so you can begin your app modernization journey today. In this webinar, you will learn how to:
- Discover dependencies in your applications
- Identify parts of your applications that are good candidates for refactoring
- Minimize customer impact during migration
- Deliver business value through measurable digital transformation
About the Speakers:
Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.
Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.
Enterprises are facing an ever growing demand for mobile applications. To create and manage meaningful and sustainable mobility programs, while keeping up with the pace of this demand, enterprises should seek solutions that help them conquer the top challenges in large scale mobility programs by providing:
•Security across apps, data, users & devices
•Reducing cost & increasing the speed of development
•Seamless connectivity to multiple systems including legacy and home grown environments
•Holistic & consistent experience across mobile & web channels
•Deployment of applications to customers, partners, employees and vendors
•Streamlined post launch operations by providing real time monitoring abilities
We will discuss these challenges and look at how one of the next generation mobile platforms is simplifying enterprise mobility and addressing these key challenges.
It's been two years since we released Chef Client 12, and in that time the world has changed. Chef Client 13 will be released in April 2017, featuring more resources, a more streamlined way of writing custom resources, and many other improvements to making automating your infrastructure as efficient as possible.
In this webinar, Thom May, Community Engineering Lead at Chef, will give a guided tour of what's coming in Chef 13, how you can ensure that your Chef cookbooks are ready for the upgrade, and how you can write the best possible cookbooks.
Join us to learn:
- What's new in Chef Client 13
- How to prepare for the Chef Client 13 upgrade
- The state of the art in writing Chef cookbooks
Microservices are about more than just building software. They solicit questions about architecture, your organization, processes, and your way of thinking. Innovation doesn’t come naturally to everyone, so let's explore the journey necessary to take advantage of your current architecture and learn how containers are the foundational building blocks to microservices.
In this session, you’ll learn:
- The answer to the question, “Are you doing microservices today?”
- About the journey needed to reach a microservices architecture.
- Why containers are the foundation of microservices.
Containers are key to adopting DevOps and continuous integration / continuous deployment (CI/CD) across organizations. Docker provides a simple API to build and run containers; however, running a large number of containers across many hosts needs more than that. Kubernetes orchestration capabilities bring the operational support needed to run containers at scale on any type of infrastructure. OpenShift builds on top of Kubernetes to add a developer focused experience for building, distributing and running containers and put the dev back into DevOps.
Join this session to learn how to take advantage of Docker and OpenShift to automate application delivery through its entire life cycle—from source code all the way to an orchestrated application running in multiple containers.
Containers provide an easy way to package applications and deliver them seamlessly from development to test to production. This helps ensure consistency across a variety environments, including physical servers, VMs, or a private or public cloud. With all of these benefits, organizations are rapidly adopting containers to easily develop and manage the applications that add business value. However, as with any newer technology, enterprise use requires strong security at every stage. You need to think about security throughout the layers of the software stack, and you need to secure your continuous integration / continuous deployment (CI/CD) pipeline.
Join this session to learn about:
- The 10 layers of an enterprise-scale container deployment.
- The best ways to build security into each layer.
- How to manage security layers yourself, or deploy a container platform that includes built-in security features.
- How Red Hat Open Shift container platform can be used to deliver continuous security for containers.