The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
According to Gartner, the application layer contains 90% of all vulnerabilities.
Despite this alarming trend, many organizations are struggling to adopt application security best practices for protecting software, data and users. However, with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- a clear path toward adoption of application security best practices is within reach!
Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
With the rise of digital and mobile technologies across the financial services industry, traditional services are becoming commoditized. As a result, businesses must provide customers with seamless digital experiences in order to maintain customer loyalty and gain market share. Companies also need a clear line of sight into how application performance and customer experience are impacting revenue in real time.
Register for the webinar and find out how to:
- Analyze and optimize customer experience for your most critical customer journeys
- Gain insight into key customer segments and answer questions in real time
- Measure business KPIs like conversions and abandonment and understand the impact application performance is having on your bottom line
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
As products and organizations mature, testing and QA become more critical to the overall success of a business. The ideal QA strategy should be fast, reliable, and fit right into a modern continuous integration pipeline. This leads many technical leaders to conclude that everything should be automated.
In reality, not everything can, or should, be automated. Leaders must make difficult, high-impact decisions on behalf of their teams by asking: What should be automated? When should investments in automation be made? Is automation the most cost-effective solution to delivering quality?
Join this web seminar to learn:
1. How to mitigate risk and create a plan to proactively manage the biggest automated testing threats
2. Ways to identify gaps in your current testing strategy and address them with solutions that complement CI/CD practices
3. How to deliver working solutions to customers quickly to achieve business objectives in a crowded market
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Attendees will learn:
- Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
- How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
- How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
This is an expanded version of what was presented at the KubeCon Lightning Talk
An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.
In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.
You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
Securing a portfolio of applications can be a practice in extremes. On one hand, you have a small team of security experts trying to help a multitude of developers, testers, and other engineers meet security requirements. At the same time, you have to support all the microservices that the Agile and DevOps teams are building and pushing to production anywhere from once a month to several times a day. Even if you have a fully staffed security team, there still are not enough experts in this area to go around, which means creating a guild of Security Champions is more important than ever.
Join Ryan O’Boyle, Manager of Product Security at CA Veracode and Ronda Kiser Oakes, Director DevOps Consulting at Perficient, who will examine the value of the Security Champion role within the development team. They will discuss which groups need to commit for the program to succeed, how to find good champions, and the benefits for all stakeholders. Based on lessons learned from building a successful Security Champion program over the past five years, you will come away with detail actionable steps to bootstrap, monitor, and maintain a customized program that fosters these champions in your organization and scales your security program.
New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.
Attendees will learn how to:
- Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
- Reduce incident response and remediation time with automation.
- Find products that use automation to minimize their dependency on skilled security personnel.
Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
Please join Onica and AWS for a webinar focused on migrating Windows workloads to AWS and running .NET applications in the cloud. Whether you're running Microsoft Windows, SQL Server, Exchange, SharePoint, or custom .NET applications, you can rely on the secure global infrastructure of Amazon Web Services to easily run any Microsoft Windows Server application in the cloud. We’ll discuss the various benefits running Windows workloads on AWS bring such as cost savings & reliability as well as how to reinvent your business with accelerated innovation through Windows automation & faster .NET application release cycles.
What we'll cover:
•Why AWS is the chosen platform for Windows Workloads: more secure, more cost effective & higher performance
•Enhance your Windows applications and accelerate innovation by utilizing the AWS platform for serverless .NET development
•Demo on how to seamlessly integrate & automate your .NET development & deployment onto AWS
•Customer success story: Learn how Onica enabled a leading provider of technology-enabled financial solutions to deploy & re-deploy their 150+ Windows applications within minutes, greatly contrasting with an average pre-migration release window of 8.5 hours.
The year 2020 is approaching faster that you imagined. And the paradigm is shifting rapidly, with go, no go decisions being made in seconds and the battle for customer loyalty becoming an everyday reality. As companies across the board are moving towards DevOps and a shift-left approach, defining clear goals and making the right decisions, right now, is critical to success. The enterprises that most espouse shared responsibility, empowered autonomous teams, and continuous learning environment allow DevOps to thrive in their organization, in the truest sense.
Join Zephyr Product Manager, Ankita Bhargava as she covers the four critical components to test management in a DevOps ecosystem and why it is integral to achieving continuous software delivery.
In this session Ankita addresses:
- Why your organization needs to focus NOW on Continuous Testing Agility
- Actions your organization can take to get ahead in the race
- How Zephyr is accelerating the global adoption of DevOps with the launch of Zephyr DevOps
Presenter Bio: Ankita Bhargava brings over 7 years of product, engineering, and networking technology experience. Prior to Zephyr, Ankita has worked in product and marketing roles in companies such as Godrej, Aadtech and Loadstar. She holds an MBA in Product Management & Marketing and a Bachelor’s degree in Computer Science. Outside of work, Ankita enjoys playing tennis, scuba diving, hiking and travelling and experiencing new cultures.
Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.
Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:
- The pros and cons to modernizing your monolithic applications
- Trends and technologies in application security
- The security risks associated with open source and cloud native applications
- How containers and microservice architectures can increase security and modernize your IT infrastructure
This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.
Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.
Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.
Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:
The who, what, where, why, when, and how’s of encryption
The difference between proprietary and open source encryption
Encrypting data at rest
Encrypting data in motion
Mobile devices and encryption
Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:
- A significantly more productive IDE for Serverless computing
- How to develop an end-to-end Serverless application in a few minutes
- How to build, test and deploy applications without leaving the IDE
- Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
- Learn about upcoming features - Serverless security and monitoring
While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.
Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters
Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation
Jeff Snyder: CTO at Cloud Constellation Corporation
Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?
See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?
Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.
Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.
Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?
Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:
-What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
-How container-native storage lets you dynamically provision storage for your modern applications.
-How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
MongoDB 4.0, scheduled for release in Summer 2018, will add support for multi-document ACID transactions. Through snapshot isolation, transactions will provide a consistent view of data, and enforce all-or-nothing execution to maintain data integrity. Transactions in MongoDB will feel just like transactions developers are familiar with from relational databases, and will be easy to add to any application that needs them.
The addition of multi-document transactions will make it easier than ever for developers to address a complete range of use cases with MongoDB, although for many, simply knowing that they are available will provide critical peace of mind. The latest MongoDB 3.6 server release already ships with the main building block for those, client sessions.
The Spring Data team has implemented synchronous and reactive transaction support in preparation for the MongoDB 4.0 release, built on top of MongoDB sessions. Learn more about Spring Data MongoDB, and many new capabilities in the forthcoming Spring Data Lovelace release!
Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
This webinar will focus on the issues surrounding the “Total Installed Cost” (TIC) of Backbone/Riser fiber cabling. We will explore the contributing factors to variability of TIC, focusing on field termination skill and the impact of permanent link testing on the individual connector PASS/FAIL decision making process (via a mathematical model).
We will also review the development of new tools and novel methods to mitigate errors that estimate Insertion Loss (IL) in field terminated connectors, including new “expert system” technology deployed to test connector IL during the termination sequence.
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.
In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.
- What social enhancements are available in the latest release of Sitefinity
- Some useful ideas to increase the social savviness of your website
- How to integrate a social platform into Sitefinty using OAuth
Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.
Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.
In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.
In this webinar, we’ll discuss:
-How Amazon EKS makes it easy to run Kubernetes on AWS
-How to leverage additional AWS services with EKS
-Optimizing costs on EKS
-Demo on how to setup your cluster to run on Amazon EKS
-Customer success story
Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.
Megan is a Customer Data Scientist at H2O. Prior to working at H2O, she worked as a Data Scientist building products driven by machine learning for B2B customers. She has experience working with customers across multiple industries, identifying common problems, and designing robust and automated solutions. Megan is based in New York City and holds a degree in Applied Mathematics. In her free time, she enjoys hiking and yoga.
Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.
Learn more about building and monetizing mobile cloud-based applications built on SAP Cloud Platform. With the SAP Cloud Platform SDK for iOS you have the tools needed to create, deploy, and manage powerful mobile apps combining the latest features from the iPhone and iPad with enterprise grade requirements like secure access to business systems and offline synchronization.
Please join us to learn about this exciting opportunity. SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
* Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
* Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
* Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
* Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
* Leverage SAP Digital Channels and the SAP ParnterEdge program to market your packaged solution to over 380,000 SAP customers
Hear from SAP executives as they discuss the benefits of the Build engagement model of the SAP PartnerEdge program, SAP Cloud Platform, and the latest SAP Cloud Platform mobile tools and technology.
Discover the opportunity and let us help you speed your time-to-market, mobilize your customers and grow your business.
Date: Tuesday, June 26th 2018
Time: 11 AM EDT
• Krishna Sunkammurali, Sr Director, Product Management, SAP Cloud Platform
• David Sacks, Senior Director, Platform Partner Ecosystem, SAP
What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?
Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.
Lance Ball, principal software engineer, Red Hat
Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.
Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.
Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:
· Master digital’s new rules of business
· Embrace the role that technology plays in business success
· Invest in modern application architecture to accelerate business development
· Work better with IT to bring your digital initiatives to market faster
All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.
Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.
This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
Jordan Schuetz, Developer Relations Manager at PubNub, will demonstrate the powerful impact that Arduino micro-controllers can have on smart home devices. As well as, talk about how IoT devices are evolving in the current market space and how they are the future of electronics.
According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.
Attend this webinar if you want to learn about:
- The evolution of the fiber backbone
- Wireless requirements for up to 40G in new construction
- The distances you can reach with different multimode fibers
- A unique Berk-Tek solution for indoor/outdoor applications
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
The traditional service desk is manual and reactive, primarily addressing large volumes of tickets and user requests. A 2017 Help Desk Institute survey identified that 55% of organizations saw an increase in ticket volumes. The cost of resolving those issues also increased—with the cost per ticket rising from $18 in 2016 to $25 in 2017.
In this webinar, we will demonstrate why machine learning and built in analytics are not just a nice to have add on feature, but are essential native components of any modern Service Management solution.
This webinar will cover:
1.The value of machine learning in accelerating the ticketing process.
2.How to empower Problem Management with analytic capabilities that can help agents identify patterns across structured and unstructured data sources.
3.How to take key performance indicator (KPI) goals and measurements to the next level by providing actionable insights to drive process improvement.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.
APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.
In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
• Describing digital transformation and how it is used to create competitive advantage
• Identifying the critical technology enablers needed for execution
• Defining the role of APIs as accelerants to new ways of doing business
* Planning for rapid delivery of new application experiences in response to digital transformation
* Understanding backend requirements for web and mobile app delivery beyond API Management
AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
Behavior Driven Development (BDD) has many benefits, including quicker development cycles, increased automation, better collaboration between departments and reduced siloed communication. But for all the benefits, organizations are still hesitant to transition to BDD because of the changes on their people, processes and tools.
In this webinar, we’ll explain a successful framework for evaluating your readiness for BDD, considering your potential roadblocks and making a seamless transition.