Hi [[ session.user.profile.firstName ]]

Application Development

  • The Best Kept Secrets Of High Performance Development Teams The Best Kept Secrets Of High Performance Development Teams Jeffrey Hammond, Vice President, Principle Analyst, Forrester Richard Seroter, Senior Director Product Marketing, Pivotal Recorded: Mar 22 2017 64 mins
    Ever wondered what separates high-performance development organizations from shops that struggle to maintain productivity? The answer’s not always obvious, but there are recurring best practices that enlightened development managers use to maximize flow, engage developers, and improve results.

    Join Forrester Vice President and Principle Analyst Jeffrey Hammond and Richard Seroter from Pivotal for an interactive discussion about:

    - Best practices culled from high-performance teams;
    - Examination of data and research on how developers spend their days;
    - Cultural practices that lead to higher-performance;
    - Tools and DevOps tactics to unlock high-performance and help teams deliver better software outcomes.
  • Quantifying DevOps Outcomes - Increasing Speed Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Recorded: Mar 22 2017 31 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Shashi Kiran, Chief Marketing Officer at Quali. Recorded: Mar 22 2017 58 mins
    What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
    Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
    Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
  • Design Methods for Better Product Development Design Methods for Better Product Development Andrew Hemans Recorded: Mar 22 2017 56 mins
    Stop developing in the dark. Use design-thinking methods to illuminate the path to better products. Whether you’re on a team that works closely with designers or you work alone, using a design-first approach can help you save time and resources in your development process. As more companies take a design-focused approach to product development, it’s helpful for people in all parts of an organization to become familiar with design. In this session, we’ll discuss basic design principles including design thinking, user experience, visual design, designer-developer communication, and design critique.
  • How to Use Analytics to Extend Your (cold) Storage to the Google Cloud How to Use Analytics to Extend Your (cold) Storage to the Google Cloud Ben Chong, Google Cloud Storage Product Manager, Google; Krishna Subramanian, COO, Komprise Recorded: Mar 22 2017 28 mins
    You know 60%+ of data in your organization is inactive or cold, yet it continues to consume expensive primary storage resources. Cloud offers an opportunity to store this cold data and achieve 70%+ savings – but how do you identify the cold data and who owns it, who is using it, and move it without any disruption to users or applications?

    Join this webinar to learn:

    - How data is growing and being used across your storage (NFS and SMB/CIFS) using software from Komprise, a Google Cloud Technology partner
    - How to project ROI of moving cold data to Google Cloud Storage based on your policies
    - How to move data transparently to Google Cloud Storage without changing file-based access for users and applications

    Webinar attendees will qualify for a special free trial (up to 100TB) to get a customized analysis of your storage environment and ROI of moving to the cloud

    To learn more about Komprise and Google cloud storage, click here: https://www.komprise.com/google/
  • Monitoring and Securing IoT Data and Communications Monitoring and Securing IoT Data and Communications Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Mar 22 2017 61 mins
    In our second class, we will begin at the heart of the Internet of Things – the sending and receiving of data to our “things.” Whether it’s collecting a simple room temperature reading or capturing a video frame for analysis, the IoT enables us to collect huge amounts of data for analysis then send out data in the form of commands or as human-readable data. The diversity of end devices makes this task difficult at best, as it involves myriad data types and protocols. This is key as we want to ensure the safety, security, and integrity of that data from its source to its intended destination. We will look at various methods we can use in our device design to effectively monitor and secure our data flow throughout the entire IoT network. Also, we will look at ways that we can approach communications issues with different protocols and physical layers in our network, which often consist of legacy devices that were not originally designed for the robustness required in the IoT. Day 2 sponsored by Wind River
  • Real-Time Advantages of an In-Memory Data Platform Real-Time Advantages of an In-Memory Data Platform Cojan van Ballegooijen, JBoss technology evangelist, Red Hat; Thomas Qvarnström, JBoss Technology Evangelist, Red Hat Recorded: Mar 21 2017 61 mins
    In today's competitive business environment having fast access to accurate information gives you a competitive edge. In-memory computing provides such access and leads to better and faster decision making, easier identification of competitive opportunities, revenue growth, increased efficiency, and reduced risk.

    Watch this webinar to learn how to take advantage of technical shifts—such as lower computer memory prices and exponential data growth—and the trend toward using analytics to differentiate and transform into a real-time enterprise. We'll cover:

    - Getting started with in-memory computing.
    - How Red Hat® JBoss® Data Grid enhances your middleware investments.
    - In-memory data grid customer use cases.
  • RabbitMQ: What’s New & Changing after 10 Years of Application Messaging? RabbitMQ: What’s New & Changing after 10 Years of Application Messaging? Daniel Carwin, RabbitMQ Development Lead, Pivotal & Greg Chase, Pivotal Recorded: Mar 21 2017 50 mins
    10 years ago, RabbitMQ was first released to open source. Since that time, RabbitMQ has grown to become the most widely deployed open source message broker.

    Whether you’re familiar with RabbitMQ or just learning, you’ll want to tune into this webinar with Daniel Carwin, development manager for the RabbitMQ team. Learn about the latest capabilities of RabbitMQ, and hear the future vision of how it will evolve to meet tomorrow’s application needs.

    We’ll cover the following:
    - Brief history of RabbitMQ
    - Core design principles and how they help today’s applications
    - Common use cases and patterns
    - Your questions answered

    Latest features of RabbitMQ:
    - Messaging
    - Language support
    - Distributed deployment
    - Enterprise & cloud support
    - Management and monitoring
    - Future vision and roadmap for RabbitMQ

    We thank you in advance for joining us.

    The Pivotal Team
  • Digital Transformation: How to Mitigate Risks in your Financial Processes Digital Transformation: How to Mitigate Risks in your Financial Processes Rob Larson, Product Manager - Stone Coast Fund Services and Mike May, Financial Services Lead North America - Bizagi Recorded: Mar 21 2017 49 mins
    Is your data working for you? Or against you?

    Right now organizations across the globe are looking to digitize and automate financial processes in order to save time, reduce risk, ensure regulatory compliance and create competitive advantage.

    Watch this session with Bizagi and Rob Larson of Stone Coast Fund Services to discuss how a growing number of organizations are digitizing core financial processes using process application platforms.

    Watch now to learn about strategies for:

    -Reducing risk and inefficiencies in your financial processes
    -Creating cross-functional digital processes that break down silos
    -Accelerating digital innovation in day-to-day operations
    -Unlocking new insights for competitive advantage

    Who should attend: IT and Business Process Professionals, Digital Transformation Leaders, Application Development Leaders, Digital Product Managers, Financial Process Owners.
  • Digital Transformation & Data Integration in 2017: A Best Practices Case Study Digital Transformation & Data Integration in 2017: A Best Practices Case Study Jason Goodwill, Solutions Architect, Saint-Gobain; Andrew Davey, Solutions Consultant, MuleSoft Recorded: Mar 21 2017 55 mins
    How can you take minutes, not weeks, to develop projects and detect and fix issues? For Saint-Gobain, one of the world’s top 100 companies and a leader in Building Distribution and Construction Products, they achieved success rapidly and effectively by following some key tips.

    Join Jason Goodwill, Solutions Architect at Saint-Gobain Building Distribution Sector, UK, with Andrew Davey, Solutions Consultant, MuleSoft as they share how they began optimizing their data integration strategy and accelerated the abstraction of data from key systems in a matter of minutes, instead of weeks.

    Attendees will learn:

    - How Saint-Gobain quickly transformed its IT operations to relieve operations and drive greater agility by modernizing core processes
    - How Saint-Gobain is spearheading digital transformation by building autonomous skills in-house to enable the wider DevOps integration strategy
    - Top tips and pitfalls to look out for when approaching your integration strategy
  • IoT Overview and the Major Issues IoT Overview and the Major Issues Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Recorded: Mar 21 2017 61 mins
    In this lead-off class, we will briefly review the principles of the IoT and some of the basic configurations that we may encounter (star with gateway, tree, and mesh) and how the devices are best connected to maximize efficiency. We will look at the major issues we face as these networks and associated “things” become more complex, including data issues, communication issues, device monitoring and troubleshooting, and system security. We will identify potential weaknesses in each of these areas and compile a checklist of features that we need in a management system that will carry out these needs. We will also look at ways to prioritize the criticality of the devices and/or their data to help us in assigning levels of security and monitoring capabilities (for example, a temperature sensor used to sense a fire versus a temperature sensor for outside ambient temperature). Day 1 sponsored by Wind River
  • Visual Workforce Analytics: Compensation Clarity Visual Workforce Analytics: Compensation Clarity Brad Peterson, MacroMicro Recorded: Mar 21 2017 50 mins
    Join us for a live webinar on March 21st at 14:00 CET to discover how visualized workforce analytics complements your existing capabilities and enables deep insight into HR data, such as compensation distributions and trends. Learn how you can easily manage, monitor, and understand KPIs across your organization in one interactive view with Macromicro OrgInsight.

    Webinar Agenda:

    • Organizational hierarchy as a foundation for analytic insight
    • Applying data filters to match on-demand workforce inquiries
    • Understand compensation distributions and trends across different employee groups

    Workforce analytics does not have to be complicated nor expensive. See live how Macromicro OrgInsight’s flexibility allows users to address standard use cases and any ad-hoc HR inquiry.
  • How to Get the Best Out Of DevSecOps - From the Ops Perspective How to Get the Best Out Of DevSecOps - From the Ops Perspective Colin Domoney, Sr Product Innovations Manager at Veracode Recorded: Mar 21 2017 43 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Listen to this webinar to learn:

    - How security teams can work with their operations teams to ensure the best pro-active monitoring and logging of applications

    - How to ensure that governance structures allow rapid deployment

    - How to maintain security requirements so that security is an enabler for operations rather than an inhibitor
  • Lifecycle of a Migrated Application Lifecycle of a Migrated Application Brian Stark, Product Manager and Peter-Mark Verwoerd, Solution Architect Recorded: Mar 17 2017 32 mins
    This 31 minute from the Google Next conference provides an overview of cloud Migration through the lens of a single application moving to the cloud.
  • Managing OpenShift at Scale Across the Open Hybrid Cloud Managing OpenShift at Scale Across the Open Hybrid Cloud Geert Jansen, Manager Product Marketing, Red Hat CloudForms, Red Hat Recorded: Mar 16 2017 26 mins
    In this session, we will learn how the hybrid cloud management platform, Red Hat® CloudForms, can help you better understand and manage Red Hat OpenShift Container Platform. Learn how Red Hat CloudForms provides visibility and insight into multiple OpenShift instances and their underlying infrastructure—including container inspection, resource monitoring, reporting, and chargeback of the instances.
  • Peace in Our Time: Bringing Ops and Dev Responsibilities Together Peace in Our Time: Bringing Ops and Dev Responsibilities Together Christopher Goern, Principal Software Engineer, Red Hat Recorded: Mar 16 2017 30 mins
    Everyone wants to use a stable and secure foundation to build applications, but getting one isn't easy. Developers want and need tools that move quickly, operations needs and wants trusted platforms that are up-to-date and stable. You can have it all—if you do it right.

    Join this session to hear about a win-win toolchain that operations and developers can collaborate on.

    You’ll learn how this toolchain:
    - Gives ops everything it needs in terms of stability and security.
    - Allows developers to build on with the most recent tools.
    - Can be fully automated and integrated to trigger an update for the entire stack when an update to the base OS occurs.
  • How machine learning and AI will impact your marketing forever How machine learning and AI will impact your marketing forever Stewart Rogers, Dir. of Marketing Technology, VentureBeat Recorded: Mar 16 2017 60 mins
    Nearly $1.5 billion in funding went into over 200 AI companies in 2016, ads powered by IBM’s Watson tech lets users ask questions about the promoted product via voice or text, Google’s RankBrain is changing the business of SEO, and they’ve just announced not only a new range of machine learning APIs, products and upgrades, but a whole new Cloud Machine Learning group.

    Let’s call it: It’s honest-to-god paradigm shift, not just an excuse for another round of “open the pod bay doors, HAL” jokes—and it’s one that’s going to inevitably, unavoidably revolutionize marketing to the extent that if you’re not on board, you are going to be buried.

    Want to disrupt instead of be disrupted? To learn how to leverage machine learning and artificial intelligence to deliver highly personalized, real-time consumer engagement at a significantly lower cost? Join this interactive VB Live event.

    In this webinar you’ll:
    * Learn how speech recognition impacts the SEO value on your web presence
    * Understand the full ROI of fully automated chat bots for artificial human interaction
    * Integrate deep learning into your marketing strategy to realize unbelievable lift

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Keith Johnson, EVP Strategic Data Solutions, Wunderman
    * Terrilyn Tourangeau, Director of Loyalty Marketing, Choice Hotels
    * Jim D'Arcangelo, VP of Marketing, WhenIWork
    * Wendy Schuchart, Moderator, VentureBeat


    Sponsored by TreasureData
  • Architecture, Process, Platform: A Model for Modern Application Development Architecture, Process, Platform: A Model for Modern Application Development Mike Piech Vice President and General Manager, Red Hat JBoss Middleware Recorded: Mar 16 2017 55 mins
    As organizations move past the hype surrounding digital transformation, they face the complex realities of implementation, from introducing new digital technologies and applications to adapting or replacing core systems, infrastructure, and processes. Enterprise application development has shifted toward a modern development model that rewards speed, flexibility, and open collaboration.

    Watch this webinar to examine why traditional application development methodologies, platforms, and underlying architectures are not sustainable in a competitive environment defined by continuous, rapid change. We'll cover:

    - Why apps are more relevant than ever today and why you should modernize
    - The architecture, process, platform model of modern application development
    - Use cases of the role of new technologies and approaches in application development
    - Modernizing applications the Red Hat® way
  • When Containers and Virtualization Do - and Don't - Work Together When Containers and Virtualization Do - and Don't - Work Together Jeremy Eder, Senior Principal Software Engineer, Performance Engineering, Red Hat Recorded: Mar 16 2017 26 mins
    It’s a common misconception that containers and virtualization are the same thing, and that containers are somehow replacing virtual machines. While there are definitely similarities, there are some big differences. Rather than replacing VMs, containers complement them. Virtual machines deliver compute resources, while containers aid application deployment and management.

    Join this session to learn:

    - The ways in which containers and virtualization compare, contrast, and complement each other.
    - Some of the pros and cons to different deployment targets for their applications.
    - How what works best for one app may be a poor choice for another.
  • Building a Hybrid Cloud Platform with Containers and OpenShift Building a Hybrid Cloud Platform with Containers and OpenShift Joe Fernandes, Senior Director, Product Management, Red Hat Recorded: Mar 16 2017 32 mins
    Organizations are increasingly moving applications to the cloud. They also need the flexibility to run those application workloads in the environment that best suits their business requirements—whether that's public clouds, private clouds, virtualization platforms, or physical servers.


    Join this session to learn how:

    - Containers can help evolve your infrastructure with public or private clouds, virtualization platforms, or physical servers.
    - Containers can help you accelerate development and deployment processes and adopt DevOps, while supporting new and existing application architectures.
    - How Red Hat OpenShift, with an enterprise Kubernetes platform, can support you as you evolve your applications, infrastructure, and process.
  • Delivering OpenShift on OpenStack for Performance and Scale Delivering OpenShift on OpenStack for Performance and Scale Steve Gordon, Principal Product Manager, Red Hat OpenStack Platform, Red Hat Recorded: Mar 16 2017 28 mins
    Imagine being able to stand up thousands of tenants with thousands of apps, running thousands of Docker-formatted container images and routes—all on a self-healing cluster. Now, take that one step further with all of those images being updatable through a single upload to the registry, and with zero downtime.

    Join this session as Steve Gordon, of the Red Hat OpenStack Platform team, shows you just that. He will walk through a recent benchmarking deployment using the Cloud Native Computing Foundation (CNCF) 1,000-node cluster with OpenStack® and Red Hat OpenShift Container Platform, the enterprise-ready Kubernetes for developers.

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • The Difference Between Scrum & Kanban The Difference Between Scrum & Kanban Christen McLemore, Principal Transformation Consultant at CA Technologies Recorded: Mar 16 2017 61 mins
    Have you been wondering: What’s the difference between Scrum and Kanban? Or do you think they are the same thing? In reality, these two ideas are quite different and understanding these differences is key to choosing the path that will work best for your organization.

    Join us on Thursday, March 16, 10am PT / 1pm ET, for our webinar, where Christen McLemore will dig into this topic. During this webinar, we’ll:

    • Explore the key dimensions of Scrum and Kanban through Principles, Artifacts, Ceremonies, Roles and Metrics
    • Understand the key differentiators between the two development styles
    • Gain knowledge to better advise others on when each model is more suited
  • Building a Blueprint for an Insider Threat Program Building a Blueprint for an Insider Threat Program Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator) Recorded: Mar 16 2017 58 mins
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • IoT Device Management IoT Device Management Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 23 2017 3:00 pm UTC 60 mins
    In our final class, we will look at the “Things” of the IoT – our nodes and devices – and how we can effectively commission, monitor, and detect problems in them throughout their lifecycle. We will look at methods for adding device management capabilities in our devices from the design stage as well as ways to add these capabilities in the legacy devices we looked at in the previous class. One topic we will look at is effective commissioning and decommissioning of devices in the network – how can we add or remove a node from the network without adversely impacting the rest of the network? Another area we will look at is security assurance and testing: how can we be sure of the device security – and how can we test it? And lastly we will look at maintenance. What methods can we use for testing devices or paths within the network and how can we effectively and safely perform system updates? To conclude our class, we will review our checklist and see what other issues we may need to be aware of in our IoT design. Day 3 sponsored by Wind River
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Using Elastic as your Analytics Foundation Using Elastic as your Analytics Foundation CA Technologies: Bryan Whitmarsh Sr. Principal Product Manager; Himanshu Pande, Senior Director of Product Management Mar 23 2017 5:00 pm UTC 60 mins
    The collection of performance, usage, and error/crash data is a critical first step in building an application or infrastructure based analytics engine. Once collected, the normalization of this data into a proficient repository, that makes the data available to be analyzed, becomes the foundation of your Analytics initiatives.
    In this interactive webcast, experts from CA Technologies will facilitate some key topics related to using the ELK stack as a basis for their Analytics engine, sharing their lessons learned and best practices. The ELK stack is a set of products (Elasticsearch, Logstash, and Kibana) provided by Elastic used to log, store, and visualize both structured and unstructured data. We’ll answer these questions, and more in this webcast:
    •Why leverage the ELK Stack as part of your analytics strategy?
    •Lessons learned in running Elasticsearch at scale (Master Nodes + Client Nodes + Hot Nodes + Warm Nodes)
    •How to best support multi-tenant SaaS solutions with ELK
    •Elasticsearch is just one component of a Lambda Architecture, what else can/should be used?
    •How you can leverage CA’s new Agile Ops analytics platform to predict performance anomalies, end alert storms and false positives and leverage machine learning for faster root cause analysis.
  • Uniting a global development workforce with Juniper Uniting a global development workforce with Juniper Dave Uebele, Juniper Networks, SCM Engineer and Russ Hill, WANdisco, SCM Specialist Mar 23 2017 5:00 pm UTC 60 mins
    Join us to learn how Juniper Networks relies on WANdisco to unite a globally distributed development workforce within Subversion, delivering results such as:
    - A 24/7 Continuous Integration environment with zero Subversion downtime
    - Increased productivity and maximized valuable engineering time and efficiency
    - Eliminated the effects of network failures and the dependency on legacy backup procedures
  • Stelligent Acquisition Briefing Stelligent Acquisition Briefing Joel Daly, CEO of HOSTING Mar 24 2017 7:00 pm UTC 45 mins
    Join Joel Daly, CEO of HOSTING, as he goes live to discuss HOSTING's acquisition of Stelligent, a technology services company that provides DevOps Automation in the Amazon Web Services (AWS) cloud.

    Bring your questions as there will be a live Q&A during the webinar!
  • How APIs are Shaping FinTech & the Open Banking Value Chain How APIs are Shaping FinTech & the Open Banking Value Chain Jeroen Hölscher, Isabel Viegas and David Chao Mar 28 2017 3:00 pm UTC 60 mins
    The emergence of FinTech represents both an influx of new Financial Services industry entrants as well as a fundamental disruption in the banking and FinServ value chain. In areas as diverse as payments and lending, the digital transformation of financial technology is challenging long-established business processes as global consumers embrace innovative new service conveniences.

    It is not surprising therefore that today’s most savvy banking leaders seek to future proof their business through new customer-centric products and service offerings. And within this hyper-competitive business environment, IT professionals are under increasing pressure to deliver nimble new approaches to meet these requirements more quickly.

    Attend this webinar to learn how leading banks are responding to this challenge by leveraging Open APIs to create new revenue models and realize business benefits.

    Join us and explore:

    - How the financial services value chain has changed, and what that means for information technology and security
    - How can banks leverage compliance obligations, like PSD2, as an opportunity to move towards Open Banking
    - Why existing development and delivery approaches are no longer fit for purpose

    Presented by:
    - David Chao, Head of Industry Solutions, MuleSoft
    - Isabel Viegas, EMEA Financial Services Lead, Amazon Web Services
    - Jeroen Hölscher, Head Global Payments & Cards Practice, Capgemini
  • Micro-Rules and Microservices: Business Rules in Modern Architectures Micro-Rules and Microservices: Business Rules in Modern Architectures Duncan Doyle, Technical Marketing Manager, Red Hat Mar 28 2017 7:00 pm UTC 60 mins
    Being able to create and easily re-define business rules is a competitive advantage in today's quickly-changing environment. Business rules are at the heart of every organization’s operations. They define the laws and regulations to which the organization is bound, they drive business process decisions, and they determine pricing of products and services.

    Microservices modularize monoliths into small services with open and standard interfaces that can be individually implemented, deployed and scaled. Containers provide the environment where microservices operate (OS, runtime, libraries, configuration).

    Join this webinar to see how Red Hat® JBoss® BRMS and Red Hat OpenShift Container Platform:

    - Help you quickly extract documented or implicit business rules and explicitly define them with a standard and centrally managed rules language.
    - Let you package those explicitly defined rules into containers and deploy them as microservices.
  • ASO or GTFO: App store optimization FTW ASO or GTFO: App store optimization FTW Stewart Rogers, Director of Marketing Technology, VentureBeat Mar 29 2017 5:00 pm UTC 60 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • A look at the future of software testing: HPE vision for Continuous Testing A look at the future of software testing: HPE vision for Continuous Testing Clint Sprauve, HPE Mar 29 2017 5:00 pm UTC 45 mins
    Many organizations struggle with the implementation of the engineering practices of DevOps, specifically with continuous testing. What if software development teams had a solution that was 100% cloud based (for distributed teams), provided real-time data analytics (for quick feedback), and supported the activities of build, edit and execution of test scripts in the cloud (nothing on the desktop). Couple that with the ability to test mobile apps on multiple devices (for scale and efficiency), the option to use containers plus existing tools (including open source), and support visual UX testing (for user experience and accessibility) while linking directly to existing continuous delivery infrastructure, and the goal of continuous testing becomes in reach.

    Join Clint Sprauve, Product Marketing Manager for Continuous Testing & Automation, to see the future of continuous testing in action and get a sneak preview of the latest software solutions for test automation. See what HPE is doing to push the envelope and take a key leadership role for the future of DevOps, quality and automation.

    This is part two in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    Taking on Enterprise Agile with HPE, April 26
  • Deconstructing Test Automation of Web Apps for Manual Testers Deconstructing Test Automation of Web Apps for Manual Testers Subu Baskaran, Sr. Product Manager at Sencha Mar 29 2017 5:00 pm UTC 60 mins
    Test Automation is not just for programmers. In this webinar, we will show you how manual testers can create a robust test automation strategy for web applications using APIs. Join us and you will see a live demonstration of how to:

    - Identify elements on a page
    - Construct meaningful tests using just APIs
    - Organize tests using easy to maintain design pattern
    - Create data-driven tests
    - Analyze different reasons for test failures

    This webinar is intended for:

    - Manual blackbox testers who are looking to learn about automated testing
    - Manual testers who are not familiar with using APIs to create test automation
    - Test Automation engineers who write automated tests for applications that are deployed without awareness of underlying code
  • Strategic (Domain Driven) Design with Spring Boot Strategic (Domain Driven) Design with Spring Boot Michael Plöd, Principal Consultant, InnoQ Mar 29 2017 5:00 pm UTC 60 mins
    This talk will focus on one of the most precious parts of Domain Driven Design, the concept of Strategic Design, as well as Bounded Context, the Context Map and the patterns that are being documented in the Context Map.

    An explanation of these principles as well as practical usage scenarios such as migrating a monolithic landscape to microservices is planned for discussion. And, using a hands-on approach, we will demonstrate the concepts surrounding Strategic Design with an application landscape of various Spring Boot Applications.

    We thank you in advance for joining us.

    The Spring Team
  • Harnessing Cloud Applications to Internationalize Your Business in 2017 Harnessing Cloud Applications to Internationalize Your Business in 2017 Adrian Drozd, Research Director, Digital Transformation Mar 30 2017 1:00 pm UTC 60 mins
    Prior to the era of digital transformation, international expansion was largely the domain of very large organizations that were capable of investing in infrastructure across the world. Today, the vast majority of IT solutions that enable innovation are deployed in the cloud; such solutions are opening up new opportunities for business of all sizes. When it comes to international expansion, acting local but delivering consistent and flexible services is essential. Cloud-based solutions allow organizations to internationalize quickly and enable start-ups to be “born global.”
  • Redefining the Link: New Year, New Benefits Redefining the Link: New Year, New Benefits Mike Connaughton, Market Segment Manager, Data Center Mar 30 2017 2:30 pm UTC 30 mins
    “Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.

    * The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
  • Effective Application Security Testing at DevOps Speed: Get Started Effective Application Security Testing at DevOps Speed: Get Started James Rabon, Fortify Product Mgr/Security Specialist, HPE and Poonam Yadav, Fortify Product Mgr/Security Specialist, HPE Mar 30 2017 5:00 pm UTC 60 mins
    Is your business challenged with competing priorities and resources when it comes to application security testing and the need for more rapid application development? Are you impacted by costly and cumbersome remediation of security issues? In a world of competing requirements, how can your application security keep up with the rapid pace of development, and still remain effective?

    Learn how some of the most advanced and innovative application security customers tackle this problem by:

    • Using automation - where modern security tools are being included in the “treat infrastructure as code” mantra

    • Making static and dynamic analysis of applications more efficient and effective

    • Integrating application security throughout the software development lifecycle (using a DevOps toolchain)

    • Gaining visibility and insights into production application behavior and exploits via low-impact Continuous Monitoring

    • Protecting security flaws in production to buy time for true remediation
  • DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility Andrew Davey, Solutions Consultant, MuleSoft; Aaron Landgraf, Sr. Product Marketing Manager, MuleSoft Apr 4 2017 3:00 pm UTC 45 mins
    The mandate for applications to change is nothing new. Pushing those changes from design to production in hours, however, is something traditional software delivery models can't handle. DevOps practices have emerged as a viable approach to enabling this speed with quality for increased application performance and better architectures.

    In this webinar, we will highlight how DevOps practices and tooling can be applied with Anypoint Platform when implementing and managing an API.

    Attendees will learn:

    - How (and why) to create a DevOps pipeline with Anypoint Platform
    - Setting up a Maven project in Anypoint Studio
    - Connecting Mule projects with a Git repository
    - Creating automated tests with MUnit and JUnit
    - Deploying Mule applications automatically with Jenkins
  • Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Kelly Morgan 451 Research and Kevin Leahy Dimension Data Apr 4 2017 3:00 pm UTC 60 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business?

    Join us, along with Dimension Data, as we discuss:

    -The most common challenges faced when managing multiple IT environments
    -The types of challenges enterprises face in different countries
    -Which applications should be hosted in which environment
    -How to manage these environments more easily
  • How to Build a Successful API-Powered Customer and Partner Ecosystem How to Build a Successful API-Powered Customer and Partner Ecosystem Manfred Bortenschlager, Director, API Market Development; Sameer Parulkar, Product Marketing Manager, Red Hat Apr 4 2017 7:00 pm UTC 60 mins
    APIs can improve your collaboration with customers, suppliers, and partners and allow you to engage with them in new ways. Just as open source has energized API development, APIs have energized the pace of finding new and interesting ways of getting products to customers.

    Watch this webcast to learn about:
    - The importance of building a customer and partner ecosystem.
    - How APIs help build that customer and partner ecosystem.
    - Examples of how companies are actually building ecosystems through the use of APIs.
  • Triple Threat:  Protecting Data Throughout its Lifecycle Triple Threat: Protecting Data Throughout its Lifecycle Don Vilen, Joel Rubinson Apr 5 2017 5:00 pm UTC 45 mins
    Marketers have never seen a challenge like this: unprecedented amounts of data, transferred at unprecedented rates, with data breaches doubling in just the past year. Many solutions have protected data in its various states, but no solution has secured data at rest, in use, and in motion – until now.

    In Triple Threat: Protecting Data Throughout its Lifecycle, IIS Chief Data Scientist Don Vilen and Strategic Advisor Joel Rubinson show you how to utilize the most advanced algorithms, format-preserving encryption to protect PII, and tokenization.

    About the presenters:
    Don Vilen - Formerly a Data Scientist at AOL and Chief Data Scientist at Buysight, IIS Chief Data Scientist Don Vilen brings over 30 years of software development and data analytics experience to this webinar. He has worked on some of the most groundbreaking database and web advertising products the industry has seen.

    Joel Rubinson - Joel is an adjunct professor of marketing at New York University. A published author and marketing analytics consultant, Rubinson has allowed IIS to streamline the conversation between its customers’ marketing and IT departments.
  • Quantifying DevOps Outcomes - Efficient Service Stability Quantifying DevOps Outcomes - Efficient Service Stability George Miranda, Technical Strategy Apr 5 2017 5:00 pm UTC 30 mins
    This webinar is part four of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to decrease change failure rates.

    High-performing organizations that have undergone digital transformation have very low rates of failure when introducing changes. Key to this resiliency is that these organizations focus on improving how quickly they recover from failures rather than trying to prevent failures from happening. By emphasizing recovery over prevention, they achieve a substantially higher rate of service resiliency. Industry metrics prove that this capability is part of an overall approach to outperforming your competitors.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore how to achieve resiliency by optimizing for failure recovery
    - Learn which industry metrics demonstrate that resiliency
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • OpenStack Deployments and LBaaS: A Customer Case Study OpenStack Deployments and LBaaS: A Customer Case Study Nate Baechtold, Enterprise Architect, EBSCO Information Services Apr 6 2017 5:00 pm UTC 60 mins
    Many enterprises embarking on OpenStack deployments are not aware of potential pitfalls during their implementation. Networking and application services represent one such area that can trip up even the most experienced network and cloud teams.

    In this webinar, Nate Baechtold, Enterprise Architect at EBSCO Information Services - a pioneer and successful early adopter of OpenStack - will share his experience and information that he wishes he had before he started his OpenStack journey.

    You will learn:
    - Best practices and lessons learned from EBSCO’s successful OpenStack deployment
    - Load balancing (LBaaS) and self-service considerations within the OpenStack environment and how to meet performance and availability requirements
    - Building a CI/CD delivery model with blue-green deployments on top of OpenStack and software-defined load balancers
  • Security Briefings Part 2: Top 5 Cloud Security Threats Security Briefings Part 2: Top 5 Cloud Security Threats Scott Boda, Solutions Engineer, Bitglass; (ISC)2; Brandon Dunlap, Moderator Apr 6 2017 5:00 pm UTC 75 mins
    Cloud apps offer several advantages over premises-based apps, from lower costs to easy deployment. In fact, 59% of organizations have already deployed apps like Office 365, Box, and Salesforce. As data moves to the cloud, security is of utmost importance. On April 6, 2017 at 1:00PM Eastern, join Bitglass and (ISC)2 for Part 2 of our Briefings series where we will discuss security threats such as external sharing, compromised credentials, lost/stolen devices and how you can best mitigate these threats. Learn how Cloud Access Security Brokers (CASBs) can provide end-to-end data protection, in the cloud and on any device.