Hi [[ session.user.profile.firstName ]]

Application Development

  • Building Your Application Security Toolkit: A Holistic Approach
    Building Your Application Security Toolkit: A Holistic Approach Stephen Giguere, Solution Engineer, Synopsys Recorded: Jun 22 2018 59 mins
    Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
  • Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless
    Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless Emil Lundberg, Luke Walker Recorded: Jun 21 2018 32 mins
    Watch this webinar for a technical overview of WebAuthn for web applications. This session is led by Emil Lundberg, a key contributor and one of the nine editors of the W3C WebAuthn specification.

    Join us for a deep dive into the core concepts required to integrate WebAuthn into your web application, including what happens behind the scenes during registration and authentication.

    Key topics include:
    - FIDO Authentication, CTAP, and WebAuthn
    - Registration Walkthrough
    - What is Attestation?
    - Resident Keys
    - Second-Factor Authentication
    - Password-less Authentication

    This webinar is intended for software engineers, developers, software architects, and product managers, though it is open to anyone interested on the topic.
  • What's new with H2O Driverless AI?
    What's new with H2O Driverless AI? Arno Candel Recorded: Jun 21 2018 48 mins
    Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.

    Speaker's Bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Intro to EKS: Amazon's Elastic Compute Service for Kubernetes
    Intro to EKS: Amazon's Elastic Compute Service for Kubernetes Nate Fox, Director of Engineering at Onica & Curtis Rissi, Solutions Architect at AWS Recorded: Jun 21 2018 63 mins
    For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.

    Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.

    In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.

    In this webinar, we’ll discuss:
    -How Amazon EKS makes it easy to run Kubernetes on AWS 
    -How to leverage additional AWS services with EKS
    -Optimizing costs on EKS
    -Demo on how to setup your cluster to run on Amazon EKS  
    -Customer success story
  • Transform Your CMS Into a Social Powerhouse
    Transform Your CMS Into a Social Powerhouse Seth Cleaver, Sitefinity Technical Engineer at Progress Recorded: Jun 21 2018 53 mins
    Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.

    In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.

    You’ll learn:

    - What social enhancements are available in the latest release of Sitefinity
    - Some useful ideas to increase the social savviness of your website
    - How to integrate a social platform into Sitefinty using OAuth

    Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Box + Microsoft: How Digital Transformation Unlocks Innovation & Business Value
    Box + Microsoft: How Digital Transformation Unlocks Innovation & Business Value Vibhor Kapoor, VP Platform Marketing @ Box & Jason Short, Sr. Software Engineer @Microsoft Recorded: Jun 21 2018 21 mins
    Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
  • Tech Talks with Chris Bradbury - Director of Technology, reed.co.uk
    Tech Talks with Chris Bradbury - Director of Technology, reed.co.uk David Savage & Jack Pearce Recorded: Jun 21 2018 38 mins
    Chris is responsible for technology at reed.co.uk, the UK's largest job board. In this week's podcast he talks about the challenges of being asked to make a business move quicker, why he took this role and the importance of purpose to him, as well as innovation in the sector.

    Also on this week's show, two articles. One on being a startup working with enterprise, and one on IBM's Watson AI.
  • Container-native storage for the OpenShift masses
    Container-native storage for the OpenShift masses Jamie Duncan, cloud solutions architect, Red Hat Recorded: Jun 20 2018 61 mins
    Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?

    Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:

    -What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
    -How container-native storage lets you dynamically provision storage for your modern applications.
    -How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
  • Collaborative Defense—Bringing Business & Security Together for Resiliency
    Collaborative Defense—Bringing Business & Security Together for Resiliency Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRIC Recorded: Jun 20 2018 39 mins
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • Next-Generation Spring Data and MongoDB
    Next-Generation Spring Data and MongoDB Christoph Strobl, Pivotal and Mat Keep, MongoDB Recorded: Jun 20 2018 70 mins
    MongoDB 4.0, scheduled for release in Summer 2018, will add support for multi-document ACID transactions. Through snapshot isolation, transactions will provide a consistent view of data, and enforce all-or-nothing execution to maintain data integrity. Transactions in MongoDB will feel just like transactions developers are familiar with from relational databases, and will be easy to add to any application that needs them.

    The addition of multi-document transactions will make it easier than ever for developers to address a complete range of use cases with MongoDB, although for many, simply knowing that they are available will provide critical peace of mind. The latest MongoDB 3.6 server release already ships with the main building block for those, client sessions.

    The Spring Data team has implemented synchronous and reactive transaction support in preparation for the MongoDB 4.0 release, built on top of MongoDB sessions. Learn more about Spring Data MongoDB, and many new capabilities in the forthcoming Spring Data Lovelace release!
  • Do We Trust Software?
    Do We Trust Software? Chris Clark, Principal Security Engineer – Strategic Initiatives, Synopsys Recorded: Jun 20 2018 46 mins
    Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?

    See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
  • Part 3: Streaming Transformations - Putting the T in Streaming ETL
    Part 3: Streaming Transformations - Putting the T in Streaming ETL Nick Dearden, Director of Engineering, Confluent Recorded: Jun 20 2018 60 mins
    We’ll discuss how to leverage some of the more advanced transformation capabilities available in both KSQL and Kafka Connect, including how to chain them together into powerful combinations for handling tasks such as data-masking, restructuring and aggregations. Using KSQL, you can deliver the streaming transformation capability easily and quickly.

    This is part 3 of 3 in Streaming ETL - The New Data Integration series.
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Recorded: Jun 20 2018 81 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • Chart Your Path to Application Security Best Practices
    Chart Your Path to Application Security Best Practices Christian Dalomba, CA Veracode Solution Architect Recorded: Jun 20 2018 28 mins
    According to Gartner, the application layer contains 90% of all vulnerabilities.

    Despite this alarming trend, many organizations are struggling to adopt application security best practices for protecting software, data and users. However, with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- a clear path toward adoption of application security best practices is within reach!

    Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
  • How to Create Seamless Digital Experiences in Financial Services
    How to Create Seamless Digital Experiences in Financial Services Rick Kickert, Global Sr. Director of Business iQ, AppDynamics and Amod Gupta, Director Product Management, AppDynamics Recorded: Jun 20 2018 44 mins
    With the rise of digital and mobile technologies across the financial services industry, traditional services are becoming commoditized. As a result, businesses must provide customers with seamless digital experiences in order to maintain customer loyalty and gain market share. Companies also need a clear line of sight into how application performance and customer experience are impacting revenue in real time.

    Register for the webinar and find out how to:

    - Analyze and optimize customer experience for your most critical customer journeys
    - Gain insight into key customer segments and answer questions in real time
    - Measure business KPIs like conversions and abandonment and understand the impact application performance is having on your bottom line
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Why Cloud Adoption is Different in Europe?
    Why Cloud Adoption is Different in Europe? Carla Arend and Angela Vacca Recorded: Jun 20 2018 41 mins
    The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
    IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
  • Der IT Brennpunkt: GDPR/DSGVO
    Der IT Brennpunkt: GDPR/DSGVO Oliver Stöeckl - Solution Strategist Recorded: Jun 20 2018 43 mins
    Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
  • Powering the Connected Campus Through Integration and APIs
    Powering the Connected Campus Through Integration and APIs Richard Kao, Director of Product Marketing, Jitterbit Recorded: Jun 20 2018 25 mins
    Colleges and universities are designed for teaching, not technology. But they still need to accurately manage student, staff, and faculty information, from class schedules to tuition bills to paychecks. Too often, legacy systems can create cumbersome data silos and redundancies, slowing down adoption of the new technologies and tools that students and faculty are excited to use. And for schools using Salesforce, Jitterbit is the only HEDA certified integration vendor for the new data standard.
  • Digging In: Preparing for IoT in Mining
    Digging In: Preparing for IoT in Mining Peter Klement, XMPro and Mikey Kalis, Unearthed Recorded: Jun 19 2018 61 mins
    Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
  • What Technical Leaders Should Know about Automation Before Biting the Bullet
    What Technical Leaders Should Know about Automation Before Biting the Bullet Derek Choy, CIO, Rainforest QA & Russ Smith, CTO and Co-founder, Rainforest QA Recorded: Jun 19 2018 55 mins
    As products and organizations mature, testing and QA become more critical to the overall success of a business. The ideal QA strategy should be fast, reliable, and fit right into a modern continuous integration pipeline. This leads many technical leaders to conclude that everything should be automated.

    In reality, not everything can, or should, be automated. Leaders must make difficult, high-impact decisions on behalf of their teams by asking: What should be automated? When should investments in automation be made? Is automation the most cost-effective solution to delivering quality?

    Join this web seminar to learn:

    1. How to mitigate risk and create a plan to proactively manage the biggest automated testing threats
    2. Ways to identify gaps in your current testing strategy and address them with solutions that complement CI/CD practices
    3. How to deliver working solutions to customers quickly to achieve business objectives in a crowded market
  • Building a production-grade robot on Ubuntu Core
    Building a production-grade robot on Ubuntu Core Kyle Fazzari Recorded: Jun 19 2018 30 mins
    In this video from Canonical's in-house roboticist, get an in-depth runthrough of the steps needed to build your first production-grade robot from prototype to production. You'll learn everything you need to know from Ubuntu Core to ROS to Snaps!
  • Connecting Clinical and Non-Clinical Systems Using Anypoint Platform
    Connecting Clinical and Non-Clinical Systems Using Anypoint Platform Matt Serna, Healthcare Marketing Manager; Gregg Prothero, Solution Consulting; Maxim Abrams, Product Management Recorded: Jun 19 2018 34 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Attendees will learn:

    - Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
    - How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
    - How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
  • Kubernetes – How to Prevent Attacks with Admission Controllers
    Kubernetes – How to Prevent Attacks with Admission Controllers Benjy Portnoy, CISSP, CISA, and Rani Osnat, VP Product Marketing at Aqua Security Recorded: Jun 19 2018 34 mins
    This is an expanded version of what was presented at the KubeCon Lightning Talk

    An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.

    In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.

    You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
  • Bringing hope to young refugees with AI-powered education applications: Paz.ai
    Bringing hope to young refugees with AI-powered education applications: Paz.ai Aida Martinez, AI Education Program Lead at Google, Alvaro Sanmartin, Head of Growth at Skills Matter and CEO Leticia Galdon Jun 25 2018 4:30 pm UTC 60 mins
    Paz.ai is an AI-powered multiplayer online gaming platform that teaches block-based programming to refugees.

    Using Google’s CS First curriculum as a guide to follow a structured educational plan, the AI-powered application was co-founded by Aida Martinez, AI Education Program Lead at Google, Alvaro Sanmartin, Head of Growth at Skills Matter and CEO Leticia Galdon, international social worker.

    Created and backed by leading entrepreneurs, Paz.ai is working with refugee camps to ensure that every young person escaping from violence and war can have a future through technology.

    Learn more about the application, the technology behind it and the story of Paz in this exclusive session with the founders.

    To support the project on Kickstarter, please go to:
    https://www.kickstarter.com/projects/1781579443/paz-never-plays-alone
  • Embrace an Application Architecture to Succeed at Digital Transformation
    Embrace an Application Architecture to Succeed at Digital Transformation Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research Jun 26 2018 3:00 pm UTC 75 mins
    Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.

    Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:

    · Master digital’s new rules of business
    · Embrace the role that technology plays in business success
    · Invest in modern application architecture to accelerate business development
    · Work better with IT to bring your digital initiatives to market faster

    All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.

    Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
  • Enterprise Node.js on OpenShift
    Enterprise Node.js on OpenShift Lance Ball, Principal Software Engineer, Red Hat Jun 26 2018 3:00 pm UTC 60 mins
    JavaScript has always played an important role in the browser, and now it’s use in enterprise server-side development has exploded with Node.js. It’s reactive architecture and lightweight makes it an ideal technology for containerized microservices architectures you’ve been hearing so much about.

    What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?

    Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.

    Lance Ball, principal software engineer, Red Hat
    Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.

    https://twitter.com/lanceball
  • Accelerate Mobilizing your Customers with the SAP Cloud Platform SDK for iOS
    Accelerate Mobilizing your Customers with the SAP Cloud Platform SDK for iOS SAP Jun 26 2018 3:00 pm UTC 60 mins
    For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.

    Learn more about building and monetizing mobile cloud-based applications built on SAP Cloud Platform. With the SAP Cloud Platform SDK for iOS you have the tools needed to create, deploy, and manage powerful mobile apps combining the latest features from the iPhone and iPad with enterprise grade requirements like secure access to business systems and offline synchronization.

    Please join us to learn about this exciting opportunity. SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:

    * Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
    * Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
    * Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
    * Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
    * Leverage SAP Digital Channels and the SAP ParnterEdge program to market your packaged solution to over 380,000 SAP customers

    Hear from SAP executives as they discuss the benefits of the Build engagement model of the SAP PartnerEdge program, SAP Cloud Platform, and the latest SAP Cloud Platform mobile tools and technology.

    Discover the opportunity and let us help you speed your time-to-market, mobilize your customers and grow your business.

    Webinar Details:
    Date: Tuesday, June 26th 2018
    Time: 11 AM EDT

    Presenters:
    • Krishna Sunkammurali, Sr Director, Product Management, SAP Cloud Platform
    • David Sacks, Senior Director, Platform Partner Ecosystem, SAP
  • The Buzz Around Cognitive Computing in Energy & Utilities
    The Buzz Around Cognitive Computing in Energy & Utilities Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM Jun 26 2018 4:00 pm UTC 60 mins
    Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

    This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • Arduino Microcontroller and the Future of IoT
    Arduino Microcontroller and the Future of IoT Jordan Schuetz, Developer Relations Manager at PubNub Jun 26 2018 5:00 pm UTC 60 mins
    Jordan Schuetz, Developer Relations Manager at PubNub, will demonstrate the powerful impact that Arduino micro-controllers can have on smart home devices. As well as, talk about how IoT devices are evolving in the current market space and how they are the future of electronics.
  • Going the Distance: Innovative Ways to Extend Your Network
    Going the Distance: Innovative Ways to Extend Your Network Teresa Hoffman, Fiber Product Business Manager Jun 26 2018 6:00 pm UTC 30 mins
    According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.

    Attend this webinar if you want to learn about:
    - The evolution of the fiber backbone
    - Wireless requirements for up to 40G in new construction
    - The distances you can reach with different multimode fibers
    - A unique Berk-Tek solution for indoor/outdoor applications
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Boost Efficiency & Agent Productivity with Built-In Analytics & Machine Learning
    Boost Efficiency & Agent Productivity with Built-In Analytics & Machine Learning Nev Ward and Noel Hopkinson, Senior Solutions Architects Jun 27 2018 10:00 am UTC 60 mins
    The traditional service desk is manual and reactive, primarily addressing large volumes of tickets and user requests. A 2017 Help Desk Institute survey identified that 55% of organizations saw an increase in ticket volumes. The cost of resolving those issues also increased—with the cost per ticket rising from $18 in 2016 to $25 in 2017.
    In this webinar, we will demonstrate why machine learning and built in analytics are not just a nice to have add on feature, but are essential native components of any modern Service Management solution.

    This webinar will cover:
    1.The value of machine learning in accelerating the ticketing process.
    2.How to empower Problem Management with analytic capabilities that can help agents identify patterns across structured and unstructured data sources.
    3.How to take key performance indicator (KPI) goals and measurements to the next level by providing actionable insights to drive process improvement.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • The Role of API Management in Digital App Strategies
    The Role of API Management in Digital App Strategies Carl Lehmann of 451 Research & Sumit Sarkar of Progress Software Jun 27 2018 3:00 pm UTC 60 mins
    Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.

    APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.

    In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
    • Describing digital transformation and how it is used to create competitive advantage
    • Identifying the critical technology enablers needed for execution
    • Defining the role of APIs as accelerants to new ways of doing business
    * Planning for rapid delivery of new application experiences in response to digital transformation
    * Understanding backend requirements for web and mobile app delivery beyond API Management

    AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
  • Global Server Load Balancing (GSLB) in Minutes
    Global Server Load Balancing (GSLB) in Minutes Nate Frisella, Solutions Engineer Jun 27 2018 4:00 pm UTC 30 mins
    Regardless of how well your applications are designed, real time factors such as network conditions, user demand, local outages, and capacity affect the quality of experience for each individual user.

    Global Server Load Balancing (GSLB) is the intelligent distribution of traffic across server resources located in multiple geographies. With GSLB, traffic management decisions that leverage the current state of the application delivery network result in better application performance.

    Join us to see how the NS1 platform allows you to easily implement a GSLB strategy using the ubiquitous protocol, DNS.
  • How to Drive Better SAP Performance with ABAP Visibility
    How to Drive Better SAP Performance with ABAP Visibility Jonah Kowall, VP Market Development and Insights, AppDynamics and Paul Urfi, Sr Sales Enablement, AppDynamics Jun 27 2018 4:00 pm UTC 45 mins
    When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.

    See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:

    * Visualizes SAP components and dependencies in real time
    * Establishes dynamic baselines for key SAP transactions
    * Diagnoses SAP issues down to a single ABAP statement
    * Assists with cloud migrations and SAP S/4HANA transitions
  • A framework for making the move to Behavior Driven Development
    A framework for making the move to Behavior Driven Development Ryan Yackel, Director of Product, QASymphony Jun 27 2018 4:00 pm UTC 60 mins
    Behavior Driven Development (BDD) has many benefits, including quicker development cycles, increased automation, better collaboration between departments and reduced siloed communication. But for all the benefits, organizations are still hesitant to transition to BDD because of the changes on their people, processes and tools.

    In this webinar, we’ll explain a successful framework for evaluating your readiness for BDD, considering your potential roadblocks and making a seamless transition.
  • The Benefit of Securing Industrial IoT Endpoints
    The Benefit of Securing Industrial IoT Endpoints Steve Hanna, Senior Principal, Infineon & Dean Weber, CTO, Mocana Jun 27 2018 4:00 pm UTC 60 mins
    The beginning of a security strategy starts at the end – securing your IoT endpoints. Endpoints are everywhere in the Industrial Internet of Things (IIoT) landscape. Without proper endpoint security, IIoT systems may put your organization or the greater public at increased risk. Plus, the viability of the IIoT depends on proper implementation of an endpoint security strategy to counter the growing and ever-changing threats.

    During this webinar, the editors of the Endpoint Security Best Practices Whitepaper will discuss this important document, customer use-cases, and the core components of a comprehensive, IIoT solution.
  • [Webinar] Migrate an on-premise application to AWS Public Cloud
    [Webinar] Migrate an on-premise application to AWS Public Cloud Pascal Joly, Dir Technology Partnership, Quali, Dos Dosanjh Sr. Solution Engineer, Quali Jun 27 2018 5:00 pm UTC 60 mins
    A step by step process using cloud sandboxes.
    Modernizing and migrating an on-premise application to the AWS cloud can be a daunting task
    without the right strategy and enablement tools. The challenges that organizations face as they
    modernize their legacy on-premise applications include a combination of factors pertaining to
    technology, personnel skills and operational tools to ensure a successful application migration.
    This webinar provides a step by step approach on how to address these challenges for
    application migration and enablement to the AWS cloud using the Quali CloudShell solution.
    You will learn how to re-platform a Drupal CMS application into AWS using self-service cloud
    sandboxes.
  • Pivotal Cloud Foundry 2.2: Accelerating Development
    Pivotal Cloud Foundry 2.2: Accelerating Development Sameer Advani, Jared Ruckle, and Pieter Humphrey, Pivotal Jun 27 2018 5:00 pm UTC 75 mins
    During this webinar, we'll discuss the new capabilities in Pivotal Cloud Foundry 2.2. Hear about the latest updates to PAS, PAS for Windows, and PKS. Plus, we'll also showcase new features for Operations Manager, CredHub, and PCF Healthwatch.
  • CMD+CTRL Cyber Range Peek & Play
    CMD+CTRL Cyber Range Peek & Play Roman Garber, Security Engineer and Program Manager Jun 27 2018 5:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • Can Hybrid Cloud Security Posture be Monitored by a “FICO-like” Score?
    Can Hybrid Cloud Security Posture be Monitored by a “FICO-like” Score? Anupam Sahai (VP Product Management) & Bashyam Anant (Sr. Director, Product Management) Jun 27 2018 5:00 pm UTC 45 mins
    FICO pioneered the use of a single score to represent consumer credit risk. While easy to understand, a FICO score incorporates several signals of consumer credit risk. We believe hybrid cloud infrastructures will benefit from an easily-understood “CyberPosture Score” that provides a meaningful, comprehensive, defensible and extensible view of Security and Compliance risk.

    Join us on June 27th, as Cavirin experts will discuss what’s required to obtain a CyberPosture Score—Learn about Cavirin’s breakthrough approach to Security Posture assessment and scoring including:

    >> Verify where your risks are coming from

    >> Identify the differences and correlations of risk and compliance

    >> Determine the criticality of your assets, using the CIA (confidentiality, integrity, and availability) framework across your hybrid infrastructure

    >> Remediate risks utilizing actionable intelligence

    >> Manage configuration drift and maintain golden posture
  • Migrating to Azure SQL DB or Amazon RDS
    Migrating to Azure SQL DB or Amazon RDS Rodney Landrum, Senior DBA/BI Consulting Services, Ntirety Jun 27 2018 5:00 pm UTC 60 mins
    In this webinar, learn the benefits of moving your workload to a Database-as-a-Service (DBaaS) environment and the key differentiators between Amazon RDS and Azure SQL Database.

    Join Rodney Landrum, Senior DBA/BI Consulting Services at Ntirety, a division of HOSTING, and learn:

    • The benefits of moving your workload to a DBaas Environment
    • How to assess if your workload is compatible with a DBaaS Environment
    • How you can optimize your workload for a DBaaS Environment

    In addition, Rodney will give a full comparison of Amazon RDS verse Azure SQL Database to help you make the right decision for your business. Including:

    • Security
    • Cost
    • Performance
    • Migration strategies

    See Rodney's Amazon Author Page Here: http://bit.ly/RodneyLandrum-Amazon
  • COBOL in the Java World
    COBOL in the Java World Alwyn Royall Jun 28 2018 8:00 am UTC 45 mins
    Discover how Micro Focus COBOL is quickly reused in the Java World and blended into new hybrid applications.
    It's quick, flexible and minimal risk. Why re-write when you can re-use?
  • Protéger vos applications conteneurisées du développement à la produ
    Protéger vos applications conteneurisées du développement à la produ Webinaire Devoteam + Aqua Security Jun 28 2018 8:00 am UTC 60 mins
    Ce webinaire va se concentrer sur la manière de sécuriser les conteneurs dans n’importe quel environnement IT tout en maintenant une haute disponibilité des services. Nous aborderons les défis en terme de sécurité de tels environnements et comment protéger les applications dans les conteneurs, de leur développement à la production en utilisant des contrôles de sécurité, des secrets et des accès en se référant aux standards de sécurité et de compliance (CIS, NIST… ).

    Ce webinaire est principalement destiné à :
    -Les administrateurs de la sécurité et les architectes qui veulent en savoir plus sur les risques et les avantages de l'utilisation des conteneurs, et comment les sécuriser efficacement
    -Les équipes de développement d'applications et les équipes DevOps qui souhaitent proposer des applications plus sécurisées