The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Christian Nicoll, Generali Switzerland + Kai Waehner, Confluent + Christopher Knauf, AttunityRecorded: Dec 13 201852 mins
Speakers: Christian Nicoll, Director of Platform Engineering & Operations, Generali Switzerland + Kai Waehner, Technology Evangelist, Confluent + Christopher Knauf, DACH Sales Director, Attunity
Insurance companies are facing similar challenges like all other disrupted market segments like the change of customer expectations and hence the need of differentiating itself new as a brand in a challenging market environment. But at the same time, it underlies a very strict regulatory pressure.
Generali Switzerland, as many market leaders in every industry, have understood the power of data to reimagine their markets, customers, products, and business model and managed this change by building their Connection Platform within one year.
Christian Nicoll, Director of Platform Engineering & Operations at Generali Switzerland guides us through their journey of setting up an event-driven architecture to support their digital transformation project.
Attend this online talk and learn more about:
-How Generali managed it to assemble various parts to one platform
-The architecture of the Generali Connection Platform, including Confluent, Kafka, and Attunity.
-Their challenges, best practices, and lessons learned
-Generali’s plans of expanding and scaling the Connection Platform
-Additional Use Cases in regulated markets like retail banking
Matt van Zanten, DevOps Engineer, OnicaRecorded: Dec 13 201826 mins
Didn't make it to re:Invent 2018? Missed some of the key announcements? We got you! Join us for our 60 minutes webinar which will take you through key new AWS announcements including AWS RoboMaker, AWS Timestream and AWS IoT Events hosted by Onica's Matt van Zanten, DevOps Engineer.
Here's what we will cover:
-Net New Industry Services to AWS like AWS RoboMaker and AWS Ground Station
-New Windows improvements and services such as Amazon FSX for Windows File Server
-Additions and expansions to Serverless computing including Firecracker and AWS Lambda Layers
-AWS IoT events and Onica’s involvement as a launch partner leveraging IoTanium
-New management & governance services like the AWS Well-Architected Tool, AWS Control Tower and AWS Security Hub that make it easier for users to take on AWS on their own.
Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartineRecorded: Dec 13 201857 mins
In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.
One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.
There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.
Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, KongRecorded: Dec 13 201849 mins
With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.
As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.
In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.
- Learn about the three forces leading us towards cloud-native first architectures
- Understand how we got here – the milestones marking the maturity of Kong
- Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
- Why you need a solution that can support all of your deployment patterns.
Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.
Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
How are market-leading products born? What conditions set the stage for successful innovation?
By definition, successful innovations reach a mainstream audience. But they never start off that way. That’s the paradox of innovation: the “typical” people in your market are not the same ones you need to “woo” when bringing your idea to life.
That’s where Game Thinking comes in. Game Thinking is a proven system for accelerating innovation and creating products that people love...and keep loving. Game Thinking empowers product leaders, designers and entrepreneurs to engage customers deeply over time - using design techniques from hit games. Learn how to create products that empower your customers to get better at something they care about -- like playing an instrument or leading a team. Building on the principles of lean/agile design and design thinking, Game Thinking delivers powerful strategies that help you:
Keep customers engaged with a coherent, compelling journey to mastery
Build a product customers love using insights from high-need Superfans
Rapidly improve your product concept by testing and tuning the core experience
Build the right MVP for your product using the Game Thinking roadmap
If you want actionable insights that will help you innovate faster & smarter, you won’t want to miss this fast-paced, informative talk.
Rajesh Krishnan, Product Marketing, SynackRecorded: Dec 13 201822 mins
Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.
Join this webinar to learn:
- Why crowdsourcing hackers and bug bounty is trending
- Who these crowdsourced hackers are and what they do
- Where crowdsourced security programs differ
- How to decide what crowdsourced programs best fit your organization
- Where the future of crowdsourced security is heading
Vinod Iyengar, Sr. Director, Alliances, H2O.ai; Nanda Vijaydev, Sr. Director, Solutions, BlueDataRecorded: Dec 13 201859 mins
Join this webinar to learn about deploying H2O in large-scale distributed environments using containers.
Artificial intelligence and machine learning are now a top priority for most enterprises. But it can be challenging to implement multi-node AI / ML environments for data science teams in large-scale enterprise deployments.
Together, BlueData and H2O.ai deliver a game-changing solution for AI / ML in the enterprise. In this webinar, discover how you can:
-Quickly spin up containerized H2O and Driverless AI environments whether on dev/test or production
-Ensure seamless support for H2O running on CPUs or GPUs, and provide a secure connection to your data lake
-Operationalize your distributed machine learning pipelines and deliver faster time-to-value for your AI initiative
Find out how to run AI / ML on containers while ensuring enterprise-grade security, performance, and scalability.
Adam Satterfield, Technology Program Director at Anthem and Ryan Yackel, Director of Product at QASymphonyRecorded: Dec 13 201856 mins
In today’s hyper-competitive software market, companies are ever pressing to deliver products more quickly and efficiently. As a result, it is imperative for organizations to implement a more strategic approach to quality. A strategic approach requires QA teams to gather more comprehensive data on the value of quality tasks in the delivery pipeline. And it often requires a different approach to reporting, and a focus on metrics that help the business measure release readiness and assess overall application quality.
Join us as Adam Satterfield shares the key metrics today’s software QA teams should be collecting, how to tell the story of your data and how to better understand different audiences within your organization to deliver insights that matter. Ryan Yackel will also dive into how some of these insights can be applied in qTest Insights.
In this webinar, you will learn how to gather the metrics for 3 key areas to demonstrate business value, including:
- The cost of a defect
- Efficiency gains from test automation
- Risk identification through coverage metrics
Russ Miles, Benjamin Wilms, CodecentricRecorded: Dec 13 201862 mins
As developers, one of our primary goals is to develop stable, secure, and bug-free software that will not deprive us of sleep or keep us away from new and exciting topics. To accomplish these and other goals, we write unit and integration tests that alert us to unexpected behavior and ensure the patterns we test don’t lead to errors. However, today’s architectures contain many components that can’t be fully covered with unit and integration tests. Thus, servers and components we’re not aware of still manage to drag our entire system into the abyss.
This issue led to the birth of the Chaos Monkey for Spring Boot. The inspiration was Netflix’s Chaos Monkey and the culture of Chaos Engineering. On an application level, we want the possibility to cause specific stress and error situations.
This session will detail the possibilities and deployment scenarios of the Chaos Monkey for Spring Boot. You will also learn how well the ChaosToolkit works together with the Chaos Monkey for Spring Boot.
Ed Adams, CEO and Roman Garber, Development & Security ManagerRecorded: Dec 13 201863 mins
DevOps continues to be a buzzword in the software development and operations world, but is it really a paradigm shift? It depends on what lens you view it through.
Roman Garber, an active software security engineering and software team lead thinks so. Ed Adams, Security Innovation CEO, a 20-year software quality veteran and former mechanical engineer, curmudgeonly disagrees.
Watch our on-demand session to decide which side of the fence you're on.
Yaacov Ben-Yaacov, CEO, Catch MediaRecorded: Dec 13 201859 mins
In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.
Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.
On this webcast you’ll learn:
• Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
• 4 steps needed to engage consumers, drive lifetime value and increase revenue
• Why Catch Media chose Vertica for scale, performance, and flexibility
• How businesses that embed Vertica can deliver higher value to customers
Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS)Recorded: Dec 13 201858 mins
Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS
Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.
In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.
In this online talk we will cover:
•How to take the first step in migrating to AWS
•How to reliably sync your on premises applications using a persistent bridge to cloud
•Learn how Confluent Cloud can make this daunting task simple, reliable and performant
•See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
Brian Simmons, Copper Product ManagerRecorded: Dec 12 201852 mins
AV technologies are advancing rapidly, and the amount of video traffic crossing IP networks is growing at a rate of 25% every year. By 2021, it’s expected that one million minutes of video traffic will cross global IP networks every single second. With that kind of demand, it’s more important than ever to install an AV system that not only delivers flawless image quality with low latency but also delivers the scalability and flexibility needed to expand your system. Attend this webinar to learn best practices for enterprise AV systems.
This webinar will cover:
-AV technologies available today and on the horizon
-Benefits of migrating your AV system to the IP network
-How to select the right solution to avoid potential pitfalls.
Eamon McCormick manager, Emerging Technologies, Red Hat & Boris Bulanov vice president, Technology, NuoDBRecorded: Dec 12 201860 mins
This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:
Seamlessly deploy and manage applications in a modern architecture.
Maintain the benefits of SQL and gain on-demand, horizontal scalability.
Deploy a technology stack that facilitates efficiency and a DevOps structure.
Darren Chinen, Senior Director Data & AI, Malwarebytes and Priya Balakrishnan, Sr. Director of Product Marketing, Redis LabsRecorded: Dec 12 201856 mins
Malwarebytes, the industry-leading anti-malware, and internet security software company, also leads in innovative threat intelligence. One such tool is the interactive remediation map, a worldwide security vulnerability.
Join us to learn how Malwarebytes uses Redis Enterprise at the heart of their data streams to centralize and visualize data in real-time, providing global information on threats detected, how a virus is conceived and the eventual spread through the world. In this talk, Darren Chinen, Sr. Director, Data and AI at Malwarebytes, will illustrate their use of Redis Enterprise. In this webinar, you will learn to:
- Drive analytics for heat maps and their threat intelligence tool
- Capture global malware records and real-time streams and drive stateful transformation
- Efficiently cache large amounts of data for interactive exploration of malware
Alan Wendt, Micro FocusRecorded: Dec 12 201859 mins
DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.
Join us to hear more about:
• How lean thinking helps to meet changing business demands and speed up the decision-making
• The limitations of annual-only portfolio planning cycles
• The incredible power of aligning the work to the organization’s intended outcomes
Jerry Kuch, Senior Principal Software Engineer & Wayne Lund, Advisory Data Engineer, PivotalRecorded: Dec 12 201864 mins
RabbitMQ is the most popular open-source message broker. It’s a de facto standard for message-based architectures. And yet, despite the abundant documentation and usage, developers and operators can still get tripped up on configuration and usage patterns.
Let’s face it: some of these best practices are hard to capture in docs. There’s a subtle difference between what RabbitMQ *can* do, and *how* you should use it in different scenarios. Now is your chance to hear from seasoned RabbitMQ whisperers, Jerry Kuch and Wayne Lund.
Join Pivotal’s Jerry, Senior Principal Software Engineer, and Wayne, Advisory Data Engineer, as they share their top ten RabbitMQ best practices. You’ll learn:
- How and when—and when *not*—to cluster RabbitMQ
- How to optimize resource consumption for better performance
- When and how to persist messages
- How to do performance testing
- And much more!
Jonathan Sullivan, CTORecorded: Dec 12 201845 mins
At NS1, we see DevOps as helping improve scalability and the application delivery process as a whole. Despite its benefits, moving to DevOps can be a challenging undertaking, especially for organizations riddled with legacy applications and technology. Many companies fail to reap the benefits because making the shift requires substantial changes to culture, processes and the resulting toolset.
As we move into 2019, the emergence of DevOps continues to be a part of a growing number of global enterprises. With the rise of this methodology, what new DevOps trends have yet to appear?
In this panel we will cover:
- What DevOps looks like at NS1
- What has the evolution of DevOps looked like?
- What are some of the remaining challenges left for DevOps to solve?
- What we still see as lacking from the DevOps tool belt?
- What is the future of DevOps?
Kevin Prouty, Vice President, IDC Energy InsightsRecorded: Dec 12 201846 mins
In this IDC FutureScape presentation, the IDC Worldwide Oil & Gas team discusses the key predictions that will impact CIOs and IT professionals in the worldwide oil & gas industry over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.
About IDC FutureScape
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
Ally Cancino, DataMotionRecorded: Dec 12 20186 mins
Are you considering implementing a secure message center in your business client portal? If you're in the insurance, healthcare, or financial services industry, this is definitely a good choice. In this video/slideshow learn about how secure message centers improve your customer service, increase customer satisfaction, make it easier for your employees to track and maintain message strings, and of course-- stay compliant! If you'd like more detailed information on implementing a secure message center, check out our whitepaper at: http://info.datamotion.com/implementing-secure-message-center-white-paper-1-0
Gary Moore, Vice President, Sogeti UK, Malcolm Isaacs, Sr. Solution Marketing Manager, Micro FocusRecorded: Dec 12 201847 mins
The latest edition of the World Quality Report 2018-19 analyses responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discussed the trends shaping QA and testing today, along with recommendation for addressing tomorrow’s challenges.
In this webinar, we will explore the findings for the UK and the capabilities required for:
-Complex integration testing
-Test automation across decentralized teams
-Virtualization and the rise of containerized test environments
Put your questions to our experts during the live Q&A and leave with a better understanding of what is top of mind for QA and testing professionals in the UK.
Tim Jarrett, Senior Director of Enterprise Security Strategy, VeracodeRecorded: Dec 12 201848 mins
How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.
Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
Victoria Oiknine, Project Manager at WhiteSourceRecorded: Dec 12 20186 mins
Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!
WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.
Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
Adrian Lane, Analysis, SecurosisRecorded: Dec 12 201843 mins
When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.
The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
Александр Аверин, технический консультант по управлению информацией Micro Focus в России и СНГDec 17 20188:00 amUTC60 mins
В рамках вебинара мы расскажем вам о новом функционале программных решений Micro Focus по резервному копированию и восстановлению данных (Data Protector) и аналитике систем резервированя данных (Backup Navigator)
In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.
Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.
Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.
Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACHDec 17 20189:00 amUTC27 mins
Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
Bashyam Anant, Vice President Product Management, CavirinDec 17 20186:00 pmUTC60 mins
As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.
In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.
Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.
Aria Naderi; Zbigniew SkurczynskiDec 18 20189:00 amUTC60 mins
IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
Sammeln und verwalten Sie alle relevanten Informationen zentral.
Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.
In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
Julian Totzek-Hallhuber, Principal Solutions Architect at VeracodeDec 18 201810:00 amUTC45 mins
Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.
Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
Limor Schafman, Mario Blandini, John ToomajonDec 18 20184:00 pmUTC75 mins
Smart buildings are the building blocks that will enable society’s digital transformation. This revolution will leverage data from myriad devices to bring new insights and enable new products and services. Around the globe, the smart buildings technology market will explode 16.1% over the next five years from a 2018 market size of $30.5 billion. In this webinar we will look at the changes inherent in the digital evolution as well as the infrastructure solutions that will support them.
Kevins Dunne, SVP of Global Channels, QASymphony and Mike Scott, Principal Consultant, MagenTysDec 18 20186:00 pmUTC58 mins
In this webinar, we'll highlight a popular testing methodology for DevOps: behavior driven development (BDD). We’ll discuss the history of BDD and its roots in test-driven development, its key principles and benefits for DevOps, and best practices for getting started with BDD and scaling the practice.
In this webinar, you will learn:
- How BDD enhances collaboration to streamline DevOps workflows
- The key principles of BDD: Collaborate, record, automate
- Tips for scaling BDD to drive business value in your organization
David Shonk, SVP EIS Enterprise Solutions Delivery Manager, SunTrustDec 18 20186:00 pmUTC55 mins
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up?
The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge.
Marcelo da Cruz Pinto, Principal Engineer, McAfee; Paul Dickens, Product Manager, KongDec 18 20186:00 pmUTC45 mins
Almost four years ago, McAfee embarked in the transition towards microservices. They needed an API platform that could integrate with a very complex infrastructure built using multiple languages and methodologies. Additionally, they required this solution to be able to scale or contract with services, and the team to be able to integrate and build custom capabilities on top of it.
Kong is now a critical element of McAfee’s infrastructure, enabling its microservices journey and supporting it as it becomes the largest cyber security solutions provider across the globe.
During its journey, the team at McAfee identified three challenges that are common to microservices architectures. Marcelo da Cruz Pinto, Principal Engineer at McAfee, shares the strategies he implemented to manage and minimize these challenges.
Join Marcelo, and Paul Dickens, Principal Product Manager at Kong while they discuss McAfee’s journey and strategies to manage the challenges that arise with microservices architectures.
- Insights into the microservices journey at McAfee
- Three strategies to manage challenges that typically arise when deploying microservices architectures
- The true benefits of microservices
Argin Wong, Data Privacy and Compliance, Box | Vaishnav Gorur, Product Marketing, BoxDec 18 20186:00 pmUTC21 mins
GDPR has been in effect for a few months now and we are starting to see hefty fines being levied for non-compliance.
In a recent survey, 80% of companies said they are still in the early stages of planning and initial implementation. Where are you in your GDPR journey?
Join this session to learn how to show that you are processing data in accordance to the GDPR, how Box helps you address critical GDPR requirements and how to easily execute your self-serve Data Processing Addendum (DPA).
Mike Larmie, Federal Solutions Architect, SynackDec 18 20187:00 pmUTC53 mins
Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:
-Who performs the services?
-How often do they run in a network environment?
-What’s covered in their data output and reporting?
-What’s their value?
Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.
BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
Brad Smith, Principal Security Program Manager, VeracodeDec 19 20185:00 pmUTC45 mins
Hear from one of our customer-facing Services experts to learn how you can leverage the Veracode platform to optimize your application security program. You will start with assessing and managing security risk across your entire application portfolio and gain additional insights into how Veracode can help you adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, you will come away practical guidance to integrating testing into the software development lifecycle- all the way to scaling an application security program using the Veracode cloud-based platform.
Roshan Kumar, Sr Product Marketing Manager, Redis LabsDec 19 20185:00 pmUTC57 mins
If your application stores data in MySQL or any other relational database, you’ll benefit by inserting Redis in between your application and the database. By using Redis as a front-end database you can:
1. Boost your application’s performance with minimal code changes
2. Innovate faster; introduce new features and functions faster than ever before
3. Scale your application with fewer additional resources
4. Perform real-time analytics using built-in data structures of Redis
Join this webinar to learn how you can:
- Complement MySQL with Redis. Get tips for designing look-aside and write-through caching solutions, session stores, and rate-limiters.
- Perform real-time analytics using built-in data structures of Redis
- Scale your application with fewer additional resources
Mike Cooper, Sr. Security EngineerDec 19 20186:00 pmUTC30 mins
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability. Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do. We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately. Sign up to test drive CMD+CTRL!
In this episode of the Enterprise-Wide Kubernetes series, we will show
how Nirmata makes it easy to integrate your Kubernetes clusters and
workloads with Vault for enterprise grade secrets management.
What to expect:
1. Learn best practices for managing secrets in Kubernetes.
2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
3. Discover Nirmata integrations with Vault.
Jai Karve – Principal Solutions Engineer & Sebastian Witalec – Senior Developer AdvocateJan 3 20194:00 pmUTC49 mins
Demand for new apps keeps increasing, but integration challenges often slow the development process to a crawl. Developers are often left waiting for external teams to integrate with expanding numbers of disparate data sources and implement a variety of authentication schemes. Meanwhile, end users of mobile, web or chat don’t care about enterprise information architecture—they just want a seamless, connected experience.
The Progress Kinvey platform helps developers deliver the experiences that customers demand faster using the tools and frameworks they already trust, while also:
- Simplifying integration by providing a layer of abstraction for data virtualization
- Providing enterprise authentication
- Delivering mobile-specific features such as notifications and offline data access
- Allowing developers want to use their standard and open frameworks and tools without having to learn a new or proprietary development stack
Join us as we explore tackling complex data integrations for modern enterprise apps.
Nick Jones, VP Software Delivery Acceleration and Test Engineering & Elise Carmichael, Vice President of Product, QASymphonyJan 3 20195:00 pmUTC44 mins
During this webinar, Nick Jones, Vice-President of Software Delivery Acceleration and Test Engineering at a leading payment processor, will share how the Test Engineering team led the organization's first DevOps initiative, gaining buy-in from stakeholders across the business to modernize software development, testing and delivery practices, ultimately reducing deployment time from 14 hours to 4 minutes. During the initiative's early days, the team established a Center of Excellence and a grassroots Community Practice to build trust and reinforce partnerships with development, senior leadership and business stakeholders. Both initiatives have helped improve collaboration and spread new ideas, tools and methods across the business. The result is DevOps pipelines that have significantly reduced delivery timelines and improved production quality, which successfully processes and settles millions of payment transactions daily.
In this webinar, you will learn:
- How the test engineering teams initiated the organization's first DevOps project
- How establishing a Center of Excellence and Community Practice fostered a collaborative approach to transformation
- How the test engineering teams have significantly reduced performance issues to achieve zero critical production defects
Daud Qazen storage specialist, , Red Hat & Ricky Nelson senior solution architect, Red HatJan 3 20197:00 pmUTC47 mins
In this webinar, we'll discuss a high-performing, cost-competitive hyperconverged infrastructure solution. Red Hat® Hyperconverged Infrastructure is the only open, integrated virtualization and software-defined storage solution. We'll cover:
What it is and how it can help you.
How it's different than what's currently in the market.
A live demo creating a virtual machine (VM) from a GUI and with Ansible®, creating templates of VMs, and migrating a VM to a different host.
Christian Paulus, Head Produkt Marketing, CloudflareJan 7 20199:00 amUTC68 mins
Durch die rapide Akzeptanz der Cloud werden Internetanwendungen immer komplexeren DDoS-Angriffen, versuchtem Datendiebstahl und böswilligem Bot-Traffic ausgesetzt. Der Schutz von Anwendungen gegen Attacken führt von Natur aus zu zusätzlichen Performanceeinbußen, während gleichzeitig die Erwartungen an eine schnelle Performance und eine herausragende User Experience stetig steigen. Durch den Wandel hin zur öffentlichen Cloud erweisen sich hardwarebasierte Lösungen immer häufiger als ineffizient und Kunden wenden sich Content Delivery Networks und cloudbasierten Sicherheitsdiensten zu, um damit ihre Anforderungen erfüllt zu sehen.
Theresa Payne, Senior Manager Digital, ASXJan 7 20194:00 pmUTC19 mins
Discover how the Australian Securities Exchange (ASX) improved reliability and costs for its digital platform. The organization needed to operate with high stability, security, and performance, but its legacy application server platform was becoming increasingly inconsistent, unstable, and expensive.
With its new platform, ASX gained greater stability—and faster, more effective recovery for its web applications, allowing them to deliver an improved digital experience to their customers.
Jeff Michael, Senior Product Manager for Black Duck by SynopsysJan 7 20195:00 pmUTC60 mins
Black Duck Security Advisories (BDSA) has been receiving great reviews from customers. Come learn about the great advantages of BDSA, migrating to BDSA, and have all your questions answered by Jeff Micheal.
Adam Hoover, Director of Digital Solutions, BCBS NCJan 8 20194:00 pmUTC14 mins
Blue Cross Blue Shield NC recognized a business need: to better engage users in their coverage and claims process through an application called BlueConnect. However, the Blue Cross Blue Shield NC team faced a few challenges: How to align different teams within IT and across IT to build a new application? What kinds of methods and practices should the team utilize to ensure shared understanding across the business? What kind of cultural changes are needed for this team to work together effectively? How can we scale new ways of working in the business?
In this session, Adam Hoover with Blue Cross Blue Shield NC will walk through his organization’s journey with Red Hat Open Innovation Labs to deliver innovation to market. He will discuss:
• How to align disparate teams around a shared goal.
• The importance of practices and culture to introduce a new way of working.
• How to scale new ways of working in the business.