Hi [[ session.user.profile.firstName ]]

Application Development

  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Chris Ricci, Solutions Engineer Live 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Veracode Web Application Scanning: Discover, test, & monitor web applications
    Veracode Web Application Scanning: Discover, test, & monitor web applications Glenn Whittemore, Solution Architect, CA Veracode Live 30 mins
    Looking for a consolidated solution to find, secure, and monitor all of your web applications?

    Join this 20 minute webinar to see how Veracode can help you easily track and inventory all of your external web applications with the ability to scan and scale on thousands of sites in parallel to find critical vulnerabilities and prioritize your biggest risks.

    Learn how to leverage technologies such as Veracode Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). As one of the multiple scanning technologies Veracode offers on a single platform, your organization can systematically reduce risk while continuously monitoring your security posture.
  • Technical Deep Dive: Building a Modern Portal For Your Digital Workforce
    Technical Deep Dive: Building a Modern Portal For Your Digital Workforce Omar ElNaggar, Sr. Product Manager at Sapho, Natalie Lambert, VP of Marketing at Sapho Live 60 mins
    Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.

    Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.

    In this webinar, we will show you how easy it is to build a modern portal that:

    - Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
    - Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
    - Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Recorded: Aug 23 2017 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Using Predictive Analytics to Empower Customer Experience
    Using Predictive Analytics to Empower Customer Experience Patrick Rice, CEO, Lumidatum Recorded: Aug 23 2017 45 mins
    Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.

    In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:

    - Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
    - We have the data, now what? AI & the Future of Customer Experience
    - How to use Predictive Analytics to find the right customer on the right channel
    - 3 ways to drive ROI for your business by applying AI to improve the Customer Experience

    Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Recorded: Aug 23 2017 44 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • Securing the Enterprise in a DevOps World: Keynote & Panel
    Securing the Enterprise in a DevOps World: Keynote & Panel David Wayland, Head of Enterprise Application Security, Fortune 500 Financial Firm & Chris Wysopal, CTO & Co-Founder Veracode Recorded: Aug 22 2017 59 mins
    Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it. 

    Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!

    The discussion will touch upon:
    · Are you crawling, walking or running with your DevOps initiative?
    · Pitfalls? Success?
    · How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?

    Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
  • Getting the Best out of DevSecOps
    Getting the Best out of DevSecOps Colin Domoney, Consultant Solutions Architect—Veracode Recorded: Aug 22 2017 47 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be successful in the new agile process. 

    Join this webinar to understand the perspectives--both the challenges and benefits of a DevSecOps approach, and how to integrate your security, operation and Developer teams.
  • You Can Get There From Here: The Road to Secure DevOps
    You Can Get There From Here: The Road to Secure DevOps Pete Chestna, Director of Developer Engagement—Veracode Recorded: Aug 22 2017 47 mins
    If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:

    · A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
    · Considerations when transitioning between these methodologies
    · An approach to leading the change in your own company
    · How Security can best be integrated into DevOps
  • Your Path to a Mature AppSec Program
    Your Path to a Mature AppSec Program Colin Domoney, Consultant Solutions Architect—Veracode Recorded: Aug 22 2017 46 mins
    According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.

    To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:

    • The different AppSec phases most organizations are currently in
    • The next steps to take when moving toward a more comprehensive AppSec program
    • Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
    • What a comprehensive, mature AppSec program entails
  • Top 4 Ways Vulnerability Gets Into Software
    Top 4 Ways Vulnerability Gets Into Software Maria Loughlin, Senior VP of Engineering| Veracode Recorded: Aug 22 2017 35 mins
    Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?

    We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:

    • Insecure coding
    • A threat landscape that never quits
    • Indiscriminate use of components
    • Programming language choice
  • Stop Living in the Past: A New Approach to Application Security
    Stop Living in the Past: A New Approach to Application Security Joseph Feiman, Chief Innovation Officer, Veracode Recorded: Aug 22 2017 43 mins
    Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point. Attend this session and learn about new approaches such as:

    • Work with the way developers work.
    • Cover not only the apps an organization develops internally, but also those it purchases or assembles from components.
    • Move beyond the software development lifecycle to the full software lifecycle, covering apps from inception through production.
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Recorded: Aug 22 2017 32 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Smart Load Balancer vs Legacy Load Balancer: Overprovisioning
    Smart Load Balancer vs Legacy Load Balancer: Overprovisioning Chris Heggem Recorded: Aug 21 2017 1 min
    Capacity planning is painful and expensive if you use legacy load balancers. Never over-provision again. Visit https://avinetworks.com/.
  • Accenture partners with SAP to leverage the power of the cloud | ISV Partnership
    Accenture partners with SAP to leverage the power of the cloud | ISV Partnership Camilla Dahlen, SAP | Tobias Bloch, Accenture Recorded: Aug 21 2017 4 mins
    Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP and Tobias Bloch, VP Sales, North America at Accenture discuss the benefits of SAP’s ISV Partner Program, including the strength and seamlessness of go-to-market opportunities. Accenture is partnering with SAP to bring the power of SAP Cloud Platform to their customers.
  • PwC partners with SAP to leverage analytics capabilities to manage Risk and Comp
    PwC partners with SAP to leverage analytics capabilities to manage Risk and Comp Camilla Dahlen, SAP | Elizabeth McNichol, PwC Recorded: Aug 21 2017 3 mins
    PwC helps organizations and individuals create the value they're looking for. PwC leverages GRC technology to help clients manage risk with analytics. Elizabeth McNichol, Partner Risk and Compliance, PwC and Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP discuss the benefits of SAP’s ISV Partner Program and SAP’s portfolio to manage large data sets.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Recorded: Aug 21 2017 76 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Recorded: Aug 18 2017 21 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Automated Security for Jenkins
    Automated Security for Jenkins Matthew Barker, Solutions Architect, Twistlock Recorded: Aug 17 2017 26 mins
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Recorded: Aug 17 2017 43 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Using Open Standards to Comply with GDPR
    Using Open Standards to Comply with GDPR Tommaso De Orchi, Solution Manager (EMEA), Yubico and Nic Sarginson, Solutions Engineer (EMEA) Recorded: Aug 17 2017 33 mins
    The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.

    An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).

    Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:

    •How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
    •How to leverage open standards to achieve GDPR compliance for strong authentication
    •How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
  • 5G in Asia Pacific, Forecast to 2022
    5G in Asia Pacific, Forecast to 2022 Quah Mei Lee, Industry Principal - Telecoms & Payments Strategy, Digital Transformation Practice, Frost Sullivan Recorded: Aug 17 2017 17 mins
    5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.

    The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.

    5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
    If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
    •How will 5G impact industry?
    •What are the market challenges and opportunities?
    •What are the key drivers for growth?
    •How big will the market be for 5G by 2022?
  • 5 Ways to Improve Your Agile/DevOps Automation Strategy
    5 Ways to Improve Your Agile/DevOps Automation Strategy Joshua Eastman, Test Automation Architect Aug 23 2017 5:00 pm UTC 60 mins
    Test automation has become a must, especially in agile and DevOps projects with their goals of continuous integration and fast deployment. QA teams face many challenges today with testing including emerging technologies, digital maturity, and fast-paced delivery expectations.

    In this session, attendees will learn about:
    1.Key challenges in today’s testing landscape that impact automation testing
    2.Ways to set expectations for automation that accelerate buy-in and support
    3.Considerations for prioritizing types of testing and technologies for automation
    4.Understanding who should be included in planning for automation
  • Data scientists: Can't live with them, can't live without them.
    Data scientists: Can't live with them, can't live without them. Wyatt Benno, CEO, DataHero Aug 24 2017 3:00 pm UTC 45 mins
    There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
    As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?

    - Should your software emulate a data scientist?
    - Learn about the power of data visualizations.
    - Learn about creating value from disperse data sets.
  • API Strategy and Design: From Prototyping to Results
    API Strategy and Design: From Prototyping to Results Geoff Anderson, CA API Management Product Manager and Strategist Aug 24 2017 4:00 pm UTC 60 mins
    This event is presented as part of the Modernizing Application Architecture with Microservices and APIs Virtual Summit Series. Join the event and live chat here: https://ca.6connex.com/event/APIM/login?lang=en-us

    Your API strategy is the backbone of how your application architecture comes to life. But with pressure to move fast often teams move on to coding and build a first working version to prove out the concept - incidentally investing too much time to be really willing to rethink the approach.

    There is another way... There's a whole world of API prototyping possibilities out there that allows for quick design and more importantly - enables teams to fail fast and get to the best solution that supports the strategy before investing in expensive coding time.

    Join this presentation to learn:

    - What makes a great API strategy
    - What's important for your API design and architecture
    - About API prototyping tools and approaches to help you get started
  • Deliver apps faster with hybrid cloud solutions from Red Hat and Google
    Deliver apps faster with hybrid cloud solutions from Red Hat and Google Brandon Jung from Google Cloud and Christine Puccio & Jeff Ekstrom from RedHat Aug 24 2017 4:00 pm UTC 60 mins
    Many organizations are good at making management plans and then executing against those plans. The problem is organizations are now spending more time trying to understand the future, while at the same time the future is becoming less knowable.Organizations must adapt to growing uncertainty with innovation, not retreat, using the right combination of cloud technologies and agile operations.

    In this webinar, experts from Google and Red Hat discuss how to:
    - Implement hybrid cloud solutions more effectively
    - Launch new initiatives with less risk
    - Collectively use open source to create a more agile environment.
  • Confidently Securing Docker on AWS
    Confidently Securing Docker on AWS Anupam Sahai, Vice President Product Management, Cavirin Systems; Ravi Rajamiyer, Vice President Engineering, Cavirin Systems Aug 24 2017 5:30 pm UTC 30 mins
    Please join us, on August 24th, at 10:30 AM PT, for a Webinar on how to confidently secure Docker on AWS.

    Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:

    > Securing EC2 Container Services, as well as Docker images, brought in from different registries
    > Integrating CloudTrail and CloudFormation
    > Today's best Docker security practices on AWS
    > The latest on Kubernetes

    Attend the AWS Docker Webinar and a chance to win Snapchat Spectacles.
  • Beyond Static Analysis: Securing Your Application Portfolio with DevOps
    Beyond Static Analysis: Securing Your Application Portfolio with DevOps Anne Nielsen, CA Veracode Product Management Aug 29 2017 3:30 pm UTC 45 mins
    It is challenging enough for organizations to stay ahead of the DevOps movement. As part of this trend, application security testing is becoming an integral part of a developer’s job. No longer can Static analysis alone ensure the overall security of an organization’s application portfolio.

    In this webinar, learn how CA Veracode is taking the lead on securing DevOps with specific emphasis on:

    •Validation of the impact of DevOps in the market through Veracode data and API usage analysis
    •Vercode’s product portfolio strategy including Greenlight and IDE integrations enabling customers to stay ahead of DevOps
    •Use case scenarios for customers to consider – each from the Security, Development and Operations perspectives
  • Combat cyber fraud with security orchestration
    Combat cyber fraud with security orchestration Will LaSala, Director Security Solutions, VASCO Aug 29 2017 6:00 pm UTC 60 mins
    Combat cyber fraud with security orchestration without slowing down your customers

    With everything in the enterprise going all digital, bypassing traditional security mechanisms in favor of instantaneous, user-convenient transactions increases the risk to the business exponentially. Accessing confidential employee files electronically, e-signing contracts, or allowing your customers to transfer money via a mobile app without cumbersome verification steps makes you and your customer prone to cyber fraud.

    So, what is a digital business to do? You can’t very well remove security completely from your strategy. And, as passwords become obsolete, users increasingly want solutions that are invisible as well as convenient.

    Security Orchestration may be the answer to the growing security concerns of your digital enterprise. Join this webcast lead by VASCO Data Security and learn how to keep your digital enterprise secure without slowing down customers or their transactions.

    Topics of discussion will include:
    •The role of Digital Trust and Orchestration in using frictionless security mechanisms such as:
    oBehavioral authentication
    oStep-up authentication for risky behavior
    oBiometric authentication including fingerprint scan or face recognition
    oReal-time monitoring
    oContainer security for mobile apps
    •Using security orchestration to improve user experience
  • The Profound Effect Wireless will Have on Your Network Infrastructure
    The Profound Effect Wireless will Have on Your Network Infrastructure Jim Frey, Director of Marketing Aug 30 2017 3:00 pm UTC 30 mins
    Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.

    You should attend this webinar if you want to:
    - Minimize the total cost of ownership (TCO) for your next WiFi project
    - Learn how wireless technology is advancing
    - Be prepared for the next generation of wireless will be here in just a few years
  • Deploy containerized applications & automate pipelines with Kubernetes & Google
    Deploy containerized applications & automate pipelines with Kubernetes & Google William Dennis, Product Manager, Google Cloud (availability based on date) Dan Garfield, Full-Stack Developer, Codefresh Aug 30 2017 4:00 pm UTC 60 mins
    Learn how to 10x your development velocity with an easy-to-setup Kubernetes pipeline. Having a true continuous deployment pipeline is closer than you think. By leveraging powerful technologies like Kubernetes, Google Container Engine (GKE), Google Container Registry (GCR), and Codefresh, we’ll show you how to go from commit to deploy faster than ever.

    In this webinar, join William Dennis, Product Manager at Google Cloud, and Dan Garfield, Full-Stack Developer at Codefresh to see just how easy and powerful continuous deployment can be when using Kubernetes with Google Cloud and Codefresh.

    Topics will include:
    Setting up your first Kubernetes cluster
    A full guide to deploying your first application
    Automating deployment to Google Container Engine (GKE)
    Tactics for testing microservices
    Image tagging strategies for high quality control in Docker Registries

    Not to mention free credits to help you get started!
  • The CIO's Guide to Digital Transformation Strategy
    The CIO's Guide to Digital Transformation Strategy Davinder Gautam, Managing Director, Accenture; Ross Mason, Founder and VP Product Strategy, MuleSo Aug 30 2017 4:00 pm UTC 60 mins
    Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.

    Attendees will learn:

    - What are the obstacles getting in the way of achieving digital transformation?
    - Strategies to end the misalignment of business and IT on digital initiatives
    - A roadmap to closing the IT delivery gap
  • Best Practices for Application Modernization and Migration
    Best Practices for Application Modernization and Migration Tobias Hartwig, Regional product manager EMEA, Red Hat Aug 30 2017 5:00 pm UTC 30 mins
    IT organizations that rely on legacy platforms and traditional development processes struggle to innovate and keep up with competitive pressures and the high rate of change demanded by customers. Application and infrastructure modernization is needed and while many organizations are interested in making this change, they often find themselves asking, “Where and how do we begin?”

    In this webinar we’ll share best practices from successful IT modernization and migration projects to help you get started on your digital transformation journey. Topics include:

    - Analyzing large-scale application portfolios for modernization opportunities.
    - Modernizing existing Java™ applications with containers, CI/CD, and DevOps principles.
    - Creating a business case.
    - Structuring transformation project teams.
    - A proven methodology for migrations.
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Praveen Rajagopalan, Solutions Engineer Aug 30 2017 7:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Leveraging React and GraphQL to Create a Performant, Scalable Data Grid
    Leveraging React and GraphQL to Create a Performant, Scalable Data Grid Mark Brocato, Engineering Director at Sencha Aug 31 2017 5:00 pm UTC 60 mins
    User interfaces often utilize components such as grids and tables to help users browse and understand data. Today’s large data sets require sophisticated capabilities to ensure users can effectively comprehend data while remaining flexible and responsive. Building this functionality is time consuming, has integration and maintenance risks, and worst of all, distracts developers from the task at hand -- actually building the app.

    Attend this webinar to learn how the web’s most powerful data grid and GraphQL can help you deliver advanced functionality with minimal effort. You’ll learn how to:

    - Leverage React and GraphQL to easily group, sort, filter, page, and edit tabular data in a highly performant grid.
    - Use ExtReact’s built-in GraphQL proxy to fetch data from any GraphQL server quickly and easily.
    - Integrate other popular GraphQL libraries such as Apollo and Relay.
  • What's new with Tectonic 1.7
    What's new with Tectonic 1.7 Rob Szumski, CoreOS Aug 31 2017 6:00 pm UTC 60 mins
    Tectonic 1.7 brings you the latest and greatest on enterprise-ready pure, upstream Kubernetes. The features in this release include:

    -Stable support for Microsoft Azure to further extend the portability of applications across hybrid cloud environments
    -Pre-configured monitoring and alerts via Prometheus’ AlertManager,
    -Automated operations
    -Security compliance and governance.

    Rob Szumski, Tectonic product manager at CoreOS, leads this webinar through the changes in the Tectonic 1.7 release. He'll go over the features included from this release and how Tectonic continues the push to breaking open the cloud market.
  • Adapter votre SI pour saisir de nouvelles opportunités business
    Adapter votre SI pour saisir de nouvelles opportunités business Franck Jaffre (Business Technology Architect), Florent Martin (Expert Cyber sécurité), Philippe Cuvecle (Architecte) Sep 5 2017 9:30 am UTC 45 mins
    Dans un monde de plus en plus connecté, il est primordial pour les entreprises performantes de capter les opportunités en provenance de l’ensemble des canaux numériques : web et mobile. Dans ce contexte, les entreprises doivent adapter leur processus et leur système d’information (SI). Au travers de ce webinar, CA Technologies et ELCA vous présentent le rôle des architectures micro-services et des solutions d’API Management dans ce processus de transformation.
  • Container Security 101
    Container Security 101 Benjy Portnoy, Director DevSecOps Aqua Security Sep 5 2017 5:00 pm UTC 45 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Moderated by Limor Schafman, TIA Sep 6 2017 3:00 pm UTC 60 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPED and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
  • How to Modernize Legacy Applications
    How to Modernize Legacy Applications James Falkner Technical marketing manager, Red Hat Sep 6 2017 5:00 pm UTC 30 mins
    Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.

    In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development.
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Jay Lyman, Principal Analyst, 451 Research with Shashi Kiran, CMO, Quali Sep 6 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations
  • NoSQL Database Archtitectures Compared
    NoSQL Database Archtitectures Compared Basavaraj Soppannavar, Owen Stampflee Sep 6 2017 5:00 pm UTC 60 mins
    NoSQL Databases are among the most important core components of Big Data infrastructure. This webinar covers 3 such NoSQL databases such as Cassandra, MongoDB and Toshiba's GridDB. Get more insights on the below attributes of these NoSQL databases

    - Introduction & Data types
    - Cluster topology
    - Replication & Partitioning
    - Caching & Storage mechanism
    - ACID & Consistency
    - Accessibility & Client APIs
  • Monetizing VR: Turning the magic into money
    Monetizing VR: Turning the magic into money Charlie Fink, VR columnist, Forbes Sep 6 2017 5:00 pm UTC 60 mins
    VR has sprouted a lot of startups, but not a whole lot of revenue yet. Yet the theory is that where there’s investment, there’s got to be fire. In this new wave of VR technology, refined console headsets are being set loose in the world, and mobile VR and mobile 360 are growing more popular with consumers. So it’s time to start thinking about a monetization strategy.

    In mobile, for instance, freemium with a combination of ads and in-app purchases is the powerhouse that generates over 95 percent of revenues. For consoles, downloadable and extended content plus microtransactions are the big money makers. But virtual reality is an entirely new way of interacting with content. Will consumers be willing to stand through advertisements? Will they trust a virtual reality payment method, or is the technology too new to engender consumer confidence?

    In this VB LIve event, you’ll learn about:
    The future of VR payments, commerce, and innovation
    How payments technology is revolutionizing VR/AR experiences
    The challenges that emerge from the consumer and merchant side
    The global perspective of VR/AR and where it is headed

    * Stewart Rogers, Director of Marketing Technology, VB
    * Cleveland Brown, CEO, Payscout
    * Charlie Fink, VR columnist, Forbes
    * Rachael Brownell, Moderator, VentureBeat
  • Managing Multi-tenancy & Security on Kubernetes with CoreOS Tectonic
    Managing Multi-tenancy & Security on Kubernetes with CoreOS Tectonic Saurabh Malhotra, Aleks Saul Sep 6 2017 6:00 pm UTC 60 mins
    Many Kubernetes users are interested in hosting various workloads on Kubernetes. Aleks and Saurabh walks through multitenancy and security primitatives in Kubernetes to successfully run mixed workloads.