Hi [[ session.user.profile.firstName ]]

Application Development

  • Chart Your Path to Application Security Best Practices
    Chart Your Path to Application Security Best Practices Christian Dalomba, CA Veracode Solution Architect Live 30 mins
    According to Gartner, the application layer contains 90% of all vulnerabilities.

    Despite this alarming trend, many organizations are struggling to adopt application security best practices for protecting software, data and users. However, with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- a clear path toward adoption of application security best practices is within reach!

    Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
  • How to Create Seamless Digital Experiences in Financial Services
    How to Create Seamless Digital Experiences in Financial Services Rick Kickert, Global Sr. Director of Business iQ, AppDynamics and Amod Gupta, Director Product Management, AppDynamics Live 45 mins
    With the rise of digital and mobile technologies across the financial services industry, traditional services are becoming commoditized. As a result, businesses must provide customers with seamless digital experiences in order to maintain customer loyalty and gain market share. Companies also need a clear line of sight into how application performance and customer experience are impacting revenue in real time.

    Register for the webinar and find out how to:

    - Analyze and optimize customer experience for your most critical customer journeys
    - Gain insight into key customer segments and answer questions in real time
    - Measure business KPIs like conversions and abandonment and understand the impact application performance is having on your bottom line
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Why Cloud Adoption is Different in Europe?
    Why Cloud Adoption is Different in Europe? Carla Arend and Angela Vacca Recorded: Jun 20 2018 41 mins
    The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
    IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
  • Der IT Brennpunkt: GDPR/DSGVO
    Der IT Brennpunkt: GDPR/DSGVO Oliver Stöeckl - Solution Strategist Recorded: Jun 20 2018 43 mins
    Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
  • Digging In: Preparing for IoT in Mining
    Digging In: Preparing for IoT in Mining Peter Klement, XMPro and Mikey Kalis, Unearthed Recorded: Jun 19 2018 61 mins
    Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
  • What Technical Leaders Should Know about Automation Before Biting the Bullet
    What Technical Leaders Should Know about Automation Before Biting the Bullet Derek Choy, CIO, Rainforest QA & Russ Smith, CTO and Co-founder, Rainforest QA Recorded: Jun 19 2018 55 mins
    As products and organizations mature, testing and QA become more critical to the overall success of a business. The ideal QA strategy should be fast, reliable, and fit right into a modern continuous integration pipeline. This leads many technical leaders to conclude that everything should be automated.

    In reality, not everything can, or should, be automated. Leaders must make difficult, high-impact decisions on behalf of their teams by asking: What should be automated? When should investments in automation be made? Is automation the most cost-effective solution to delivering quality?

    Join this web seminar to learn:

    1. How to mitigate risk and create a plan to proactively manage the biggest automated testing threats
    2. Ways to identify gaps in your current testing strategy and address them with solutions that complement CI/CD practices
    3. How to deliver working solutions to customers quickly to achieve business objectives in a crowded market
  • Connecting Clinical and Non-Clinical Systems Using Anypoint Platform
    Connecting Clinical and Non-Clinical Systems Using Anypoint Platform Matt Serna, Healthcare Marketing Manager; Gregg Prothero, Solution Consulting; Maxim Abrams, Product Management Recorded: Jun 19 2018 34 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Attendees will learn:

    - Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
    - How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
    - How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
  • Kubernetes – How to Prevent Attacks with Admission Controllers
    Kubernetes – How to Prevent Attacks with Admission Controllers Benjy Portnoy, CISSP, CISA, and Rani Osnat, VP Product Marketing at Aqua Security Recorded: Jun 19 2018 34 mins
    This is an expanded version of what was presented at the KubeCon Lightning Talk

    An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.

    In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.

    You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
  • The Role of Security Champions in Scaling Application Security
    The Role of Security Champions in Scaling Application Security Ryan O'Boyle, Manager of Product Security at CA Veracode and Ronda Kiser Oakes, Director DevOps Consulting at Perficient Recorded: Jun 19 2018 61 mins
    Securing a portfolio of applications can be a practice in extremes. On one hand, you have a small team of security experts trying to help a multitude of developers, testers, and other engineers meet security requirements. At the same time, you have to support all the microservices that the Agile and DevOps teams are building and pushing to production anywhere from once a month to several times a day. Even if you have a fully staffed security team, there still are not enough experts in this area to go around, which means creating a guild of Security Champions is more important than ever.

    Join Ryan O’Boyle, Manager of Product Security at CA Veracode and Ronda Kiser Oakes, Director DevOps Consulting at Perficient, who will examine the value of the Security Champion role within the development team. They will discuss which groups need to commit for the program to succeed, how to find good champions, and the benefits for all stakeholders. Based on lessons learned from building a successful Security Champion program over the past five years, you will come away with detail actionable steps to bootstrap, monitor, and maintain a customized program that fosters these champions in your organization and scales your security program.
  • Cylance and Amar Singh at Infosecurity Europe 2018
    Cylance and Amar Singh at Infosecurity Europe 2018 Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) Recorded: Jun 19 2018 9 mins
    Join Matt Stephenson, Cylance and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
  • 2018 Cyberthreat Defense Report
    2018 Cyberthreat Defense Report Mark Bouchard, Co-Founder and COO, CyberEdge Group and Graham Melville, Sr. Director Security Solutions Marketing, Gigamon Recorded: Jun 19 2018 60 mins
    New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.

    Attendees will learn how to:

    - Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
    - Reduce incident response and remediation time with automation.
    - Find products that use automation to minimize their dependency on skilled security personnel.

    Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
  • Dynamic Reporting & Analytics
    Dynamic Reporting & Analytics Lisa Lafayette, Solutions Consultant - Bizagi Recorded: Jun 18 2018 24 mins
    Learn how monitor and continuously optimize business processes and turn process information into business strategy.
  • Expose Business Insights Through Process Data
    Expose Business Insights Through Process Data Roberto Biondini - Solutions Consultant, Bizagi Recorded: Jun 15 2018 43 mins
    Watch a demonstration and learn how Bizagi can help you gain business insights by allowing users to easily abstract and consume process data across your operations
  • Modernize & Automate .NET Applications on AWS
    Modernize & Automate .NET Applications on AWS Tolga Tarhan, CTO at Onica Recorded: Jun 14 2018 30 mins
    Please join Onica and AWS for a webinar focused on migrating Windows workloads to AWS and running .NET applications in the cloud. Whether you're running Microsoft Windows, SQL Server, Exchange, SharePoint, or custom .NET applications, you can rely on the secure global infrastructure of Amazon Web Services to easily run any Microsoft Windows Server application in the cloud. We’ll discuss the various benefits running Windows workloads on AWS bring such as cost savings & reliability as well as how to reinvent your business with accelerated innovation through Windows automation & faster .NET application release cycles.

    What we'll cover: 
    •Why AWS is the chosen platform for Windows Workloads: more secure, more cost effective & higher performance
    •Enhance your Windows applications and accelerate innovation by utilizing the AWS platform for serverless .NET development
    •Demo on how to seamlessly integrate & automate your .NET development & deployment onto AWS
    •Customer success story: Learn how Onica enabled a leading provider of technology-enabled financial solutions to deploy & re-deploy their 150+ Windows applications within minutes, greatly contrasting with an average pre-migration release window of 8.5 hours.
  • DevOps 2020 Vision - Achieve Full Continuous Testing Agility
    DevOps 2020 Vision - Achieve Full Continuous Testing Agility Ankita Bhargava Recorded: Jun 14 2018 29 mins
    The year 2020 is approaching faster that you imagined. And the paradigm is shifting rapidly, with go, no go decisions being made in seconds and the battle for customer loyalty becoming an everyday reality. As companies across the board are moving towards DevOps and a shift-left approach, defining clear goals and making the right decisions, right now, is critical to success. The enterprises that most espouse shared responsibility, empowered autonomous teams, and continuous learning environment allow DevOps to thrive in their organization, in the truest sense.

    Join Zephyr Product Manager, Ankita Bhargava as she covers the four critical components to test management in a DevOps ecosystem and why it is integral to achieving continuous software delivery.

    In this session Ankita addresses:

    - Why your organization needs to focus NOW on Continuous Testing Agility
    - Actions your organization can take to get ahead in the race
    - How Zephyr is accelerating the global adoption of DevOps with the launch of Zephyr DevOps

    Presenter Bio: Ankita Bhargava brings over 7 years of product, engineering, and networking technology experience. Prior to Zephyr, Ankita has worked in product and marketing roles in companies such as Godrej, Aadtech and Loadstar. She holds an MBA in Product Management & Marketing and a Bachelor’s degree in Computer Science. Outside of work, Ankita enjoys playing tennis, scuba diving, hiking and travelling and experiencing new cultures.
  • How to Modernize Your IT Infrastructure & Secure Your Applications
    How to Modernize Your IT Infrastructure & Secure Your Applications Lee Calcote, SolarWinds, Jim Bugwadia, Robert Starmer, Kumulus Technologies, and John Morello, Twistlock Recorded: Jun 14 2018 46 mins
    Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - The pros and cons to modernizing your monolithic applications
    - Trends and technologies in application security
    - The security risks associated with open source and cloud native applications
    - How containers and microservice architectures can increase security and modernize your IT infrastructure

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
    Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
  • Beyond Containers: Going Cloud Native with Serverless Architectures
    Beyond Containers: Going Cloud Native with Serverless Architectures John Morello, CTO, Twistlock and Lee Calcote, Head of Technology Strategy, SolarWinds Recorded: Jun 14 2018 28 mins
    The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.

    Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.
  • What’s Your Network Firewall Hiding from You?
    What’s Your Network Firewall Hiding from You? Chris McCormack, Sen Prod Mgr, Sophos; Bruce Beam, Dir, TPO, (ISC)2; Brandon Dunlap, Moderator Recorded: Jun 14 2018 53 mins
    Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
  • Simple Facts About Encryption
    Simple Facts About Encryption Andy Nieto Recorded: Jun 14 2018 48 mins
    Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
    In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:

    The who, what, where, why, when, and how’s of encryption
    The difference between proprietary and open source encryption
    Encrypting data at rest
    Encrypting data in motion
    Key management
    Mobile devices and encryption
  • How to Accelerate Serverless Application Development
    How to Accelerate Serverless Application Development Asankha Perera and Chathura Widanage, SLAppForge Recorded: Jun 14 2018 54 mins
    Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:

    - A significantly more productive IDE for Serverless computing
    - How to develop an end-to-end Serverless application in a few minutes
    - How to build, test and deploy applications without leaving the IDE
    - Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
    - Learn about upcoming features - Serverless security and monitoring
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Jun 20 2018 4:00 pm UTC 90 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • Do We Trust Software?
    Do We Trust Software? Chris Clark, Principal Security Engineer – Strategic Initiatives, Synopsys Jun 20 2018 5:00 pm UTC 60 mins
    Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?

    See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
  • Collaborative Defense—Bringing Business & Security Together for Resiliency
    Collaborative Defense—Bringing Business & Security Together for Resiliency Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRIC Jun 20 2018 5:00 pm UTC 60 mins
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • Container-native storage for the OpenShift masses
    Container-native storage for the OpenShift masses Jamie Duncan, cloud solutions architect, Red Hat Jun 20 2018 5:00 pm UTC 60 mins
    Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?

    Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:

    -What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
    -How container-native storage lets you dynamically provision storage for your modern applications.
    -How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
  • Next-Generation Spring Data and MongoDB
    Next-Generation Spring Data and MongoDB Christoph Strobl, Pivotal and Mat Keep, MongoDB Jun 20 2018 5:00 pm UTC 75 mins
    MongoDB 4.0, scheduled for release in Summer 2018, will add support for multi-document ACID transactions. Through snapshot isolation, transactions will provide a consistent view of data, and enforce all-or-nothing execution to maintain data integrity. Transactions in MongoDB will feel just like transactions developers are familiar with from relational databases, and will be easy to add to any application that needs them.

    The addition of multi-document transactions will make it easier than ever for developers to address a complete range of use cases with MongoDB, although for many, simply knowing that they are available will provide critical peace of mind. The latest MongoDB 3.6 server release already ships with the main building block for those, client sessions.

    The Spring Data team has implemented synchronous and reactive transaction support in preparation for the MongoDB 4.0 release, built on top of MongoDB sessions. Learn more about Spring Data MongoDB, and many new capabilities in the forthcoming Spring Data Lovelace release!
  • Box + Microsoft: How Digital Transformation Unlocks Innovation & Business Value
    Box + Microsoft: How Digital Transformation Unlocks Innovation & Business Value Vibhor Kapoor, VP Platform Marketing @ Box & Jason Short, Sr. Software Engineer @Microsoft Jun 21 2018 3:00 pm UTC 60 mins
    Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
  • Minimizing Total Installed Cost of Field Installed Fiber Connectors
    Minimizing Total Installed Cost of Field Installed Fiber Connectors Robert Reid & Seamus Hamrin, Panduit Jun 21 2018 3:00 pm UTC 75 mins
    This webinar will focus on the issues surrounding the “Total Installed Cost” (TIC) of Backbone/Riser fiber cabling. We will explore the contributing factors to variability of TIC, focusing on field termination skill and the impact of permanent link testing on the individual connector PASS/FAIL decision making process (via a mathematical model).

    We will also review the development of new tools and novel methods to mitigate errors that estimate Insertion Loss (IL) in field terminated connectors, including new “expert system” technology deployed to test connector IL during the termination sequence.
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Jun 21 2018 5:00 pm UTC 60 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Transform Your CMS Into a Social Powerhouse
    Transform Your CMS Into a Social Powerhouse Seth Cleaver, Sitefinity Technical Engineer at Progress Jun 21 2018 5:00 pm UTC 60 mins
    Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.

    In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.

    You’ll learn:

    - What social enhancements are available in the latest release of Sitefinity
    - Some useful ideas to increase the social savviness of your website
    - How to integrate a social platform into Sitefinty using OAuth

    Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
  • Intro to EKS: Amazon's Elastic Compute Service for Kubernetes
    Intro to EKS: Amazon's Elastic Compute Service for Kubernetes Nate Fox, Director of Engineering at Onica & Curtis Rissi, Solutions Architect at AWS Jun 21 2018 5:00 pm UTC 60 mins
    For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.

    Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.

    In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.

    In this webinar, we’ll discuss:
    -How Amazon EKS makes it easy to run Kubernetes on AWS 
    -How to leverage additional AWS services with EKS
    -Optimizing costs on EKS
    -Demo on how to setup your cluster to run on Amazon EKS  
    -Customer success story
  • Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless
    Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless Emil Lundberg, Luke Walker Jun 21 2018 6:00 pm UTC 60 mins
    Watch this webinar for a technical overview of WebAuthn for web applications. This session is led by Emil Lundberg, a key contributor and one of the nine editors of the W3C WebAuthn specification.

    Join us for a deep dive into the core concepts required to integrate WebAuthn into your web application, including what happens behind the scenes during registration and authentication.

    Key topics include:
    - FIDO Authentication, CTAP, and WebAuthn
    - Registration Walkthrough
    - What is Attestation?
    - Resident Keys
    - Second-Factor Authentication
    - Password-less Authentication

    This webinar is intended for software engineers, developers, software architects, and product managers, though it is open to anyone interested on the topic.
  • What's new with H2O Driverless AI?
    What's new with H2O Driverless AI? Megan Kurka Jun 21 2018 6:00 pm UTC 45 mins
    Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.

    Speaker's Bio:
    Megan is a Customer Data Scientist at H2O. Prior to working at H2O, she worked as a Data Scientist building products driven by machine learning for B2B customers. She has experience working with customers across multiple industries, identifying common problems, and designing robust and automated solutions. Megan is based in New York City and holds a degree in Applied Mathematics. In her free time, she enjoys hiking and yoga.
  • Building Your Application Security Toolkit: A Holistic Approach
    Building Your Application Security Toolkit: A Holistic Approach Stephen Giguere, Solution Engineer, Synopsys Jun 22 2018 4:00 pm UTC 60 mins
    Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
  • Accelerate Mobilizing your Customers with the SAP Cloud Platform SDK for iOS
    Accelerate Mobilizing your Customers with the SAP Cloud Platform SDK for iOS SAP Jun 26 2018 3:00 pm UTC 60 mins
    For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.

    Learn more about building and monetizing mobile cloud-based applications built on SAP Cloud Platform. With the SAP Cloud Platform SDK for iOS you have the tools needed to create, deploy, and manage powerful mobile apps combining the latest features from the iPhone and iPad with enterprise grade requirements like secure access to business systems and offline synchronization.

    Please join us to learn about this exciting opportunity. SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:

    * Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
    * Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
    * Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
    * Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
    * Leverage SAP Digital Channels and the SAP ParnterEdge program to market your packaged solution to over 380,000 SAP customers

    Hear from SAP executives as they discuss the benefits of the Build engagement model of the SAP PartnerEdge program, SAP Cloud Platform, and the latest SAP Cloud Platform mobile tools and technology.

    Discover the opportunity and let us help you speed your time-to-market, mobilize your customers and grow your business.

    Webinar Details:
    Date: Tuesday, June 26th 2018
    Time: 11 AM EDT

    • Krishna Sunkammurali, Sr Director, Product Management, SAP Cloud Platform
    • David Sacks, Senior Director, Platform Partner Ecosystem, SAP
  • Enterprise Node.js on OpenShift
    Enterprise Node.js on OpenShift Lance Ball, Principal Software Engineer, Red Hat Jun 26 2018 3:00 pm UTC 60 mins
    JavaScript has always played an important role in the browser, and now it’s use in enterprise server-side development has exploded with Node.js. It’s reactive architecture and lightweight makes it an ideal technology for containerized microservices architectures you’ve been hearing so much about.

    What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?

    Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.

    Lance Ball, principal software engineer, Red Hat
    Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.

  • Embrace an Application Architecture to Succeed at Digital Transformation
    Embrace an Application Architecture to Succeed at Digital Transformation Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research Jun 26 2018 3:00 pm UTC 75 mins
    Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.

    Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:

    · Master digital’s new rules of business
    · Embrace the role that technology plays in business success
    · Invest in modern application architecture to accelerate business development
    · Work better with IT to bring your digital initiatives to market faster

    All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.

    Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
  • The Buzz Around Cognitive Computing in Energy & Utilities
    The Buzz Around Cognitive Computing in Energy & Utilities Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM Jun 26 2018 4:00 pm UTC 60 mins
    Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

    This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • Arduino Microcontroller and the Future of IoT
    Arduino Microcontroller and the Future of IoT Jordan Schuetz, Developer Relations Manager at PubNub Jun 26 2018 5:00 pm UTC 60 mins
    Jordan Schuetz, Developer Relations Manager at PubNub, will demonstrate the powerful impact that Arduino micro-controllers can have on smart home devices. As well as, talk about how IoT devices are evolving in the current market space and how they are the future of electronics.
  • Going the Distance: Innovative Ways to Extend Your Network
    Going the Distance: Innovative Ways to Extend Your Network Teresa Hoffman, Fiber Product Business Manager Jun 26 2018 6:00 pm UTC 30 mins
    According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.

    Attend this webinar if you want to learn about:
    - The evolution of the fiber backbone
    - Wireless requirements for up to 40G in new construction
    - The distances you can reach with different multimode fibers
    - A unique Berk-Tek solution for indoor/outdoor applications
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Boost Efficiency & Agent Productivity with Built-In Analytics & Machine Learning
    Boost Efficiency & Agent Productivity with Built-In Analytics & Machine Learning Nev Ward and Noel Hopkinson, Senior Solutions Architects Jun 27 2018 10:00 am UTC 60 mins
    The traditional service desk is manual and reactive, primarily addressing large volumes of tickets and user requests. A 2017 Help Desk Institute survey identified that 55% of organizations saw an increase in ticket volumes. The cost of resolving those issues also increased—with the cost per ticket rising from $18 in 2016 to $25 in 2017.
    In this webinar, we will demonstrate why machine learning and built in analytics are not just a nice to have add on feature, but are essential native components of any modern Service Management solution.

    This webinar will cover:
    1.The value of machine learning in accelerating the ticketing process.
    2.How to empower Problem Management with analytic capabilities that can help agents identify patterns across structured and unstructured data sources.
    3.How to take key performance indicator (KPI) goals and measurements to the next level by providing actionable insights to drive process improvement.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Advisory, Ensono Kevin Stoodley, CTO IBM Z Series, IBM Alex Hilton, CEO, CIF (Introduc Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • The Role of API Management in Digital App Strategies
    The Role of API Management in Digital App Strategies Carl Lehmann of 451 Research & Sumit Sarkar of Progress Software Jun 27 2018 3:00 pm UTC 60 mins
    Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.

    APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.

    In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
    • Describing digital transformation and how it is used to create competitive advantage
    • Identifying the critical technology enablers needed for execution
    • Defining the role of APIs as accelerants to new ways of doing business
    * Planning for rapid delivery of new application experiences in response to digital transformation
    * Understanding backend requirements for web and mobile app delivery beyond API Management

    AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
  • How to Make the Move to Behavior Driven Development: A framework
    How to Make the Move to Behavior Driven Development: A framework Ryan Yackel, Director of Product, QASymphony Jun 27 2018 4:00 pm UTC 60 mins
    Behavior Driven Development (BDD) has many benefits, including quicker development cycles, increased automation, better collaboration between departments and reduced siloed communication. But for all the benefits, organizations are still hesitant to transition to BDD because of the changes on their people, processes and tools.

    In this webinar, we’ll explain a successful framework for evaluating your readiness for BDD, considering your potential roadblocks and making a seamless transition.