The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
Increasingly, companies have turned to customer data platforms (CDPs) to help them run more relevant marketing campaigns using the large volume of customer data at their fingertips. Customer-focused software company Atlassian will discuss how they made that decision and the types of complex marketing campaigns that they can now run as a result. Research analyst David Raab will also be on hand to discuss how other companies can use CDPs to harness customer data to increase sales and loyalty.
In this webinar, you will learn:
* Key considerations when deciding to build versus buy a customer data platform
* How companies are taking advantage of CDPs for more relevant communications
* How data science can improve marketing efficacy
* The trends and market factors driving the need for customer data platforms
* Jeff Sinclair, Product Manager, Engagement Platform, Atlassian
* David Raab, Analyst and Founder at The Customer Data Platform Institute
* Jeff Hardison, VP of Marketing at Lytics
* Stewart Rogers, Analyst-at-Large, VentureBeat
“Digital transformation” isn’t necessarily a quantum leap in technology or even a linear progression—it’s a change that takes place across a spectrum. In fact, you’re likely already in the midst of some form of it. A recent IDC survey reveals that companies across all sectors are applying connected digital technologies—mobile apps, social networks, cloud services, big data and analytics, etc.—to achieve cost reductions, revenue increases, and service improvements.
Clearly, digital transformation is well underway. The question is, how far along the continuum are you and what does it take to fully realize digital transformation? In “Taking Digital Transformation Beyond the Buzz”, a webinar from Comcast Business, our knowledgeable panelists will discuss how rapid changes in technology and culture have impacted changing infrastructure needs; how mobility, analytics, social media, IoT, and future AI workloads are driving greater digitalization and the need for scalable, agile systems; the need to eliminate siloed environments to enable growth; and the ways to assess where your company is on the path to change.
Our panelists are:
•John Burke, principal research analyst, Nemertes Research. John advises key enterprise and vendor clients, conducts and analyzes primary research, and writes thought-leadership pieces across a wide variety of topics.
•John Keller, director, Product Management Data Center/Cloud Connectivity for Comcast Business. John is responsible for solutions and services focused on enabling customers to leverage multi-tenant data centers and cloud providers through private, direct connections.
Key takeaways include:
•Digital Transformation Drivers and Challenges
•Key Components and Priorities
•Additional Considerations and Tools
Register now for this webinar broadcast on October 18th at Noon EST, today!
The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.
We will discuss:
- How agile integration can benefit your organization and make it more responsive to market demands
- Successful agile application integration approaches
- Best practices for implementing an agile application integration environment
The webcast is intended for system architects and application developers.
In this webinar we will talk about practical steps that will help you:
- Reap the benefits of hybrid cloud by adapting to cloud devops
- Deal with the technical and operational pitfalls involved in migrating to native cloud
- Make the right choices for your cloud architectural to achieve lean devops
If you want to deploy your workloads without the burden of managing servers or operating systems, this webinar is for you. During the session, we will explore four re-usable serverless architectural patterns for supporting web apps, stream processing apps, batch processing apps, and automation apps. For each pattern, we provide a TCO analysis and comparison with the server-based equivalent. We also discuss the considerations and nuances associated with each pattern, with AWS customers sharing their experiences of deploying them. The information covered in the webinar is relevant for architects, system operators, and anyone looking for a better understanding of how serverless architectures can help them save money and improve agility.
As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
Agile transformations are about people. Frameworks and practices can help, but a successful transformation starts and ends with the individuals, teams and leaders who bring the change to life. One of the most powerful tools you already have for facilitating change is your vocabulary and your word choice. eBay exec and Agile Alliance board member Paul Hammond reveals how to create strong foundations for a strong agile transformation through careful consideration and selection of your team or organizational agile vocabulary.
Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.
Learn how Avi Networks delivers flexible application services beyond load balancing, including:
• Application analytics and visibility
• Predictive autoscaling
• Automation in private data centers or the public cloud.
Writing software is hard, with projects easily reaching hundreds of thousands of lines of text. Source control allows developers to manage these giant corpuses, tracking who made what changes and when. In this webinar we’ll talk about how you can use the same source control systems to manage tests and their results, so you always have a record of what happened and when.
In this webinar, learn about:
1. The basics of source code management (SCM) tools
2. How to use SCM to manage your test suite
3. The advantages of storing tests alongside your source code
Hybrid cloud is becoming an increasingly common deployment model, where companies utilize both internal cloud environments, as well as public cloud environments (Amazon AWS, Microsoft Azure, Google Cloud, etc). There are many advantages to such an approach, including flexibility, data privacy, and cost.
Avi Networks helps hybrid cloud deployments with cloudbursting via multicloud support and application AutoScale. Avi Vantage has native support for multiple cloud environments from the same controller cluster, allowing for a true single pane of glass view into your load balancing environment, regardless where it lives.
Join Avi Networks in this webinar to learn about:
• Multicloud support
• Application autoscale
In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.
Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.
Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
In our first two classes, we have looked at the needs of a cloud-based IoT solution and how to design and build it. In this final class our expert instructor will cover the critical aspects of how to test and deploy our IoT solution, and more importantly, how to keep it secure and operational through ongoing monitoring and maintenance. We will look at how Device Cloud enables ongoing monitoring and maintenance for the devices through the entire life cycle of the IoT solution from design through end-of life. Particular elements to be covered will include Device Cloud functionality such as edge management and data management. Still in its relative infancy, the IoT is already being hacked at an alarming rate. We need to include the tools and the platform to stay one step ahead, keep our devices secure and up-to-date, and maintain a vigilant ‘eye’ on the system throughout its life. Sponsored by Wind River.
This is the first of a five-part webinar series about Domain-Driven Design. Part One provides you with a brief overview of Domain-Driven Design. You will learn that Domain-Driven Design is not just limited to a technical way of modeling and structuring your software.
Domain-Driven Design is so much more because it also delivers a set of core values for your project work. Some of those values are around the way we integrate technical people and domain experts in projects, others are about agility and refactoring and one of the most important constructs of Domain-Driven Design is the so called Ubiquitous Language. The latter aims at establishing a common language which is mandatory in a team context or project.
In part one of this webinar series, you will learn how to identify and establish an Ubiquitous Language. We will also look into ways of documenting this language.
The webinar series will consist of five parts:
Part One - Overview and Core Values of Domain-Driven Design
Part Two - Strategic Design: Domains, Subdomains, Bounded Contexts and Context Maps
Part Three - Tactical Design: Aggregates, Entities, Value Objects, and more
Part Four - Domain Events, Event Storming and Event Sourcing
Part Five - Implementing "Domain-Driven Microservices" with Spring Boot, Data and Cloud
The evolution of connectivity, Big Data management, analytics, and the cloud is enabling organizations to converge operational and information technologies – IT leaders are looking to leverage this through responsive applications for line-of-business and industry-specific end-to-end processes.
This expectation is driving new business opportunities for software vendors who can now integrate edge sensor data with real-time data processing and analytics, to go from sensor to business outcome.
Find out how, as an SAP partner in the “build” engagement model, you can pursue this business opportunity by building and distributing rich IoT applications based on the SAP Cloud Platform Internet of Things service and Cloud Foundry services.
Join our Webcast and learn about:
- The new opportunities to create IoT-related software and business models
- The capabilities of the SAP Cloud Platform Internet of Things service and Cloud Foundry services
- The benefits of our open development platforms and technologies
- How software vendors can take advantage of the SAP PartnerEdge program
- How to drive end-to-end digital transformation for your customers
Register now to begin exploring a partnership with SAP, creating new business models, and driving end-to-end digital transformation for your customers.
Relevant SAP partner program: Build engagement model from SAP PartnerEdge
Christian Baader, VP Strategy & Marcom, SAP Global Channels & Platform GTM Ecosystem
Sujit Hemachandran, Product Manager, SAP Cloud Platform, Integration & IoT
Date: Thursday, October 12, 2017
Time: 10:00 a.m. EST
Tectonic Sandbox makes it easy to try, develop, and deploy applications to a Tectonic cluster locally. In this webinar, we'll discuss the differences between Tectonic Sandbox and other local Kubernetes environments. We'll cover what kinds of tasks a local cluster is better suited for. And, we'll use this local setup to look under the hood at some of the features that make Tectonic special.
Experience Rainforest in a much cleaner and easier to use interface. We redesigned the entire platform from the ground up and will be giving a live demo on Rainforest 2.0. We will also introduce a new set of tools that make it easier to organize your test suite and view your test coverage. The session will conclude with a live Q&A.
What’s in a cloud platform? Turns out, often several clouds! Companies automate operations in a cloud by treating all components as commodities. However, at enterprise- scale, different business requirements dictate deploying multiple clouds including:
- Hybrid infrastructures and multiple cloud providers
- Compliance with country privacy laws and different security standards
- Specialization requests
The most advanced Pivotal Cloud Foundry (PCF) customers engineer their entire cloud platform, including their multitude of PCF instances, as a product. They create pervasive automation, treat their infrastructure as code, and continuously test and update their platform with delivery pipelines.
In this webinar we’ll discuss how companies are scaling operations of their multi-cloud platforms with Pivotal Cloud Foundry.
- Why enterprises deploy multiple clouds
- What operational challenges this causes
- How PCF customers are applying DevOps techniques and tools to platform automation
- An idealized tool stack for a engineering a multi-cloud platform at scale
- How to improve your platform engineering
We thank you in advance for joining us.
The Pivotal Team
In this 30 minute webinar, Jonathan Lewis, VP Product Marketing, will cover some of the difficulties of delivering applications in mainland China and how NS1’s Managed DNS for China can deliver superior manageability, reliability, and performance for your .CN and global domains.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
A successful application security program takes more than powerful technology.
Join this 20 minute webinar to get your application security program off the ground with Veracode’s Services offerings. Learn how Veracode can lend its expertise to help your security teams and developers work together to rapidly identify, understand and remediate critical vulnerabilities — and help transform decentralized, ad hoc application security processes into ongoing, policy-based governance. Hear one of Veracode’s experts provide an overview of Services offerings such as:
•Program Management: implement enterprise-wide governance models and day-to-day tactics to systematically reduce risk from application-layer attacks, based on best practices
•Developer Coaching: work with developers to understand assessment results, prioritize remediation efforts and integrate with existing SDLC tools and processes
•Developer Training: empower developers, testers and security leads to develop secure applications, providing the critical skills they need to identify and address potential vulnerabilities
As we learned in our first class, we need a cohesive platform of tools and various ‘building blocks’ to build a robust cloud-based IoT solution to meet the needs of even high-reliability IIoT applications. In this second class on cloud-based design for the IoT, our expert instructor will discuss how a combination of Industrial Internet of Things (IIoT) technologies and software-defined architecture (SDA) from Wind River® is ushering in a new era of IoT innovation. Some of the topics to be covered include development tools and example pre-build platforms for many popular targets, connectivity and control APIs, and network and infrastructure platforms and services. Our instructor will also cover the topics of how to assure our communications and data are secure and properly communicated, filtered, collected, and safely stored. Current industry estimates are that only 10-25% of data is actually collected and stored – when this data increases by perhaps two orders of magnitude in the next five years, how can we assure that we can indeed collecting, communicating, using, and saving the data we need? We will look at some of the answers to that question in this class. Sponsored by Wind River.
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
Companies that embrace DevOps in the cloud develop apps faster, reduce overhead and can decrease downtime by 60% or even more. In this webinar, Glenn Mate, Solution Architect at 10th Magnitude, will share several use cases around how to integrate your DevOps processes into Azure. He will also emphasize CALMS:
* The framework that integrates the DevOps teams
* Functions and systems within an organization around culture
* Automation, lean, metrics, and sharing.
By distilling the philosophy behind DevOps in the cloud, you’ll find automation and optimization at the core.
Not everyone can write code – but nearly anyone can solve a problem. Today's businesses are facing an ever increasing set of problems that require innovative digital solutions. Learn how to safely enable a new army of application developers: the citizen developer.
This webinar will examine the use of citizen developers to meet the ever increasing demand for new applications. We will discuss:
• The current challenges with citizen developers and the gap between them and corporate IT
• An new approach to the application development lifecycle to reduce the complexity of software development and empower this new army of developers
• The concept of gadgets and their role in providing functionality in a secure and compliant manner
• Potential areas where citizen developers can quickly build their own applications
As your organization embraces cloud infrastructure, DevOps technologies, and other modern assets, you have new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security you need to rethink how you do things. For example, containers have become the defacto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover how DevOps and modern assets have turned the six steps of the vulnerability management life cycle on their head. During this webinar we’ll cover:
- Where vulnerability management for today’s assets needs to start (and it’s not where it used to)
- Why prioritization should not be based on scan results
- Why assessments and network scans are no longer synonymous
- Why reports and PDFs are no longer the answer
- What the new face of remediation looks like
- How DevOps can be convinced to incorporate security (without name calling and threatening!)
The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
Now is the time to move from hype to reality.
This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
Telecommunications Industry Association TR-41 committee developed the TIA-4953 (amplified telephones) and TIA-1083 (HAC performance for telephones) standards.
TIA has logos to provide the hearing-impaired community a simple and clear solution to identify telephones that meet hearing audio amplification and HAC performance needs per these standards.
This webcast will review the process to receive and use the logos, and additionally cover what standards work is underway at TIA for mobile telephone audio performance.
>> Jessica Trentman, Marketing Director, CaptionCall
>> Jeff Strickland, Director of R&D, Clarity Products
>> Jonathan Gray, Director of Sales, Clarity Products
>> Linda Kozma-Spytek, Research Audiologist, Technology Access Program, Gallaudet University
>> Stephanie Montgomery, VP Technology and Standards, TIA
According to Gartner, by 2021, IDaaS will be the majority access management delivery model for new purchases of access management solutions, up from less than 20% today. High maintenance costs and operational overheads as well as a shortage of skilled professionals are turning organizations to the cloud in an effort to outsource commodity IT services such as storage, content delivery, multi-factor authentication, cloud SSO and access management.
As some organizations hesitate to change the status quo of their access management and MFA infrastructure, others have already managed to migrate their users and resources to realize significant savings and better utilize their existing budgets.
In this webinar you’ll learn how to:
•Reap cloud efficiencies from as-a-service delivery of a cloud single sign-on solution
•Maintain your current investments while migrating to cloud-based access management
•Leverage automation to drastically lower day-to-day operational overheads
•Start global and go granular as you set up access management and cloud SSO policies
•Accommodate diverse user groups such as administrators, partners, C-suites and mobile users
Expand your static analysis capabilities and begin scanning earlier in the software testing phase.
Join this 20 minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and Virtual Scan Appliance (VSA). With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities before cyber criminals can find and exploit them.
These technologies can help you ensure ongoing security assessments as an automated cloud-based service — backed by Veracode’s world-class application security experts. Enable your teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). Specifically you’ll see how you can:
•Start Scanning Immediately: Easy to deploy: cloud-based and no hardware to purchase
•Integrate with Central Cloud Platform: Uploads all test results to our cloud platform that can be aggregated and evaluated using a single set of centralized policies and reports
•Generate Verified and Actionable Results: Our security experts examine results to distinguish real problems from false positives and helps you deliver complete threat information to help development and QA teams remediate flaws
With less than a year before the EU General Data Protection Regulation (EU GDPR) goes into effect, many companies are scrambling to figure out how to be compliant with yet another regulation. A better way to approach this (or any) compliance initiative is to understand its basic requirements then search for solutions that will not only help you to meet compliance, but improve your business.
Don’t just become compliant, become better! The EU GDPR is not only an opportunity to evaluate how your teams use personal data for testing, but how those teams can build better data from scratch with faster and better results.
Join our expert, Nathan Devoll from CA Technologies, as he clearly explains the EU GDPR and builds the case for generating new data more quickly without the compliance headaches. You’ll come away with a clear understanding how you can become EU GDPR compliant and build better data, at the same time!
Concourse is an open source continuous integration (CI) system designed for agile development teams. It supports developers that practice test-driven development and continuous delivery (CD) by automating a teams build-to-release process inclusive of all automated testing.
Concourse provides dependable results for each build run. It allows agile development teams to deliver business value at a much higher velocity. It allows teams to treat every code commit as if it’s about to be deployed to production.
In this webinar, we’ll talk about how teams’ practice agile development in relation to developing, testing and deploying apps in Cloud Foundry. We’ll also cover the role that Concourse plays in aiding high velocity delivery of applications.
Our agenda includes:
- What is CI / CD and how do these practices fit into Pivotal's development practices
- Overview of Concourse and how it differs from other CI / CD systems
- Why Pipelines are useful for continuously delivering apps to Pivotal Cloud Foundry
- Why containers are useful for continuously delivering apps to Pivotal Cloud Foundry
- Examples of how these concepts work in practice
- How to get started using Concourse to continuously deliver value
We thank you in advance for joining us.
The Pivotal Team
The Avanan Cloud Security Platform is the next-generation cloud security platform that offers the industry's top-rated solutions for malware, phishing, data leakage, encryption, anomaly detection, shadow SaaS and more.
In this webinar, we will discuss why phishing has become the most pervasive threat to cloud security, spreading from cloud-based email like Office 365 and Gmail to other communication products like Slack and Skype.
We will will see why most phishing attacks are now specifically targeting SaaS customers and how SaaS-targeted attacks are both more dangerous and harder to detect.
Solace é líder global em mensageria e provê uma plataforma que interconecta empresas de ponta-a-ponta usando padrões de mercado. A plataforma de mensageria da Solace é o sistema nervoso para vários casos de uso onde existe o movimento de dados: nuvem híbrida, microserviços, arquiteturas orientadas a eventos, Big Data, Internet das Coisas entre outros. A Solace é uma solução que suporta múltiplos protocolos, linguagens de programação e padrões de troca de mensagens e que funciona tanto em nuvem pública e privada, como também localmente. Essa abrangência torna possível o que chamamos de Open Data Movement.
Intelligence is the rocket fuel to all Process Automation projects, whether the task is low-level (RPA) or high-level complex processes. In this session, you will hear a holistic but pragmatic approach to implementing intelligence as part of a company’s digital transformation journey.
Join this webinar to hear Frank Beyer and Bizagi as they discuss:
- How to structure your approach to RPA and to higher-level process automation
- Identifying processes that require a higher level of cognitive skills
- How to digitize cognitive work such as analysis, synthesis and evaluation
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals
Join us for a discussion on a modern capitalization framework to comply with the requirements of SOP 98.1. We will discuss a common-sense, risk-aware approach that works with any software development method for project-oriented work. Once capitalization starts, the PMO will need to be able to show evidence of appropriate financial controls over the project. In this webinar, seasoned PPM and strategy execution expert Donna Fitzgerald explains in detail a framework for modern capitalization. Join Donna to learn:
•Why the Modern PMO should be deeply involved in the portfolio process
•Why project managers need to understand what value their software project is designed to deliver.
•How to eliminate confusion around SOP-98.1
•How to understand capitalization from an accounting perspective
Gain key takeaways to apply in your organization today when applying best practices to software capitalization. Don’t miss this opportunity to learn best practices and recommendations to ensure your organization receives the highest possible value in the new world of digital business.
Developers choose RabbitMQ for messaging between scalable microservices. It acts as a bridge to facilitate communication between replatformed or migrated applications and other legacy systems. In this webinar, we’ll review these common use cases and patterns.
We’ll then introduce the new features of RabbitMQ and RabbitMQ for Pivotal Cloud Foundry (PCF), and explain how they can add scale and resiliency. Finally we’ll discuss the roadmap for both RabbitMQ and RabbitMQ for PCF.
Our agenda includes:
- Introduction of RabbitMQ and RabbitMQ for PCF
- RabbitMQ patterns for microservices messaging
- RabbitMQ patterns for application replatforming and migration
- New features of RabbitMQ and RabbitMQ for PCF
- How to use on-demand clusters of RabbitMQ for PCF
- Roadmap for RabbitMQ and RabbitMQ for PCF
We thank you in advance for joining us.
The Pivotal Team
This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.
Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.
This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.
David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.
Many teams are now “shifting left,” and starting their QA process earlier in the development cycle. But in most cases shift left testing was confined to unit testing alone. While unit testing is a core component of a continuous testing strategy, teams that want to optimize for speed and quality should shift functional testing left, too.
In this webinar, learn how to:
1. Adopt a shift left strategy for functional testing
2. Optimize your testing strategy to get comprehensive results more frequently
3. Develop and ship features faster with minimal risk of bugs in production
How does Robotic Process Automation (RPA) fit into the Digital Transformation roadmap? Join this webinar to understand how RPA can jumpstart your automation projects and to learn how it works seamlessly with BPM. These two complementary tools can show quick ROI to help turn the skeptics in your organization into believers.
Register and join us for answers to questions such as:
• What is the business case for RPA?
• What types of processes/projects are the best fit for RPA?
• How can you manage and monitor your RPA program as it scales?
• How can you use RPA as a first step toward full adoption of BPM?
• How can you achieve effective ROI from RPA?
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
Why is there a such gap between what senior-level executives believe about business agility, and what their companies actually embrace? Join us for a webinar to find out why and learn how to help close the gap.
A recent CA-sponsored study on Business Agility throughout the Enterprise revealed that only 12 percent of organizations can claim their whole organization is on the path to business agility --- though more than two-thirds of survey participants agreed that agile organizations are better able to quickly respond to dynamic business conditions.
The survey also finds that improved Business Agility is expected to deliver:
•Better competitive advantage
•Higher customer satisfaction and retention
•Increased employee productivity and retention
•Faster time to act on new opportunities
Yet only 1 in 10 executives said they are leveraging the benefits of agile across their whole organization to achieve speed and responsiveness.
In this webinar, Doug Barth, founder of Gatepoint Research, will walk us through survey to share the following. Where has agility taken hold across organizations and what results can be expected? What departments are on the horizon to adopt agility and why? What are the biggest deterrents to adoption?
To help demystify some of the findings and provide guidance over potential hurdles on the path to business agility, he’ll be joined by Deema Dajani, a Senior Transformation Consultant from CA Technologies. Deema thrives on taking Fortune 500 companies through successful, large-scale agile transformations, and is on the business agility front lines every day working to close the gap.
“The traditional mindset of ‘lift & shift’ is sub-optimal. Perimeter security controls don’t need to go away, but organizations need to utilize Cloud-Native controls for micro-segmentation and stronger security of cloud resources” Source: 451 Research
In this webinar, Fernando Montenegro, Information Security Analyst of 451 Research and Richard Eisenberg, VP Client Development of Cloudvisory will outline how companies can successfully transition to optimal Micro-segmentation and Security Orchestration in cloud, hybrid cloud, and multi-cloud environments. Done correctly, this will speed up dev-ops, greatly improve security and lower operational costs.
1. Understand network security concepts in cloud environments, including difference between perimeter and workload controls.
2. Learn the benefits of integration between workload security controls and DevOps processes.
3. See Cloudvisory's approach to workload security with a demo covering key use cases such as discovery, orchestration, micro-segmentation, and auto-remediation.
Cloudvisory continuously discovers and visualizes multi-cloud infrastructures across providers like AWS, Azure, OpenStack...in real-time. It orchestrates and provisions immutable security policies with 24x7 audit and compliance.
Do you really know your customers? Today’s consumers expect nothing less than a highly personalized and contextualized experience but many organizations are not able to offer it. AI is the critical enabling technology, but how can you use it in practice, and where should you start?
Join this webinar to hear Craig Le Clair of Forrester research explaining how to use applied cognitive intelligence to transform and redefine customer experiences.
Join us for new expert insights on:
- Why intelligence is the cornerstone of the customer experience
- How contextualization can help improve customer experience
- How AI is being used to augment, not replace human intelligence
- Where applied cognitive intelligence is becoming the new normal
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
What does "enterprise Kubernetes" mean? How is it different from a DIY install of Kubernetes? Paul aims to answer these questions and detail common pitfalls you're likely to encounter when trying to deploy your own Kubernetes environment. Avoid the Not-Invented-Here (NIH) philosophy, and make your developers productive from Day 1 by learning about authorization, authentication, secure defaults, and other critical features required for an enterprise-ready Kubernetes cluster.
Companies today who are investing in digital transformation initiatives are focusing on finding new ways to interact with their existing customers, and experimenting with creative approaches to acquiring new ones. Often times this involves the creation of new routes to market and a multi-channel approach to marketing and sales.
If you work in an IT or line-of-business organization tasked with building this new class of digital services, you should attend this webinar, where the following important topics will be covered:
- What multichannel digital services are, and why they matter
- Why microservices are critical for successful multi-channel digital initiatives
- Synergies and benefits of combining API Management & microservices
- Practical advice on how to get started