Hi [[ session.user.profile.firstName ]]

Application Development

  • Look Before You Leap: Migrating On-Premises Hadoop to AWS
    Look Before You Leap: Migrating On-Premises Hadoop to AWS
    Jason Baick, Senior Director of Product Marketing, Unravel; Javier Ramirez, Senior Developer Associate, AWS Recorded: Jan 17 2020 55 mins
    Lack of agility, excessive costs, and administrative overhead are convincing on-premises Spark and Hadoop customers to migrate to cloud native services on AWS. As you’re migrating these applications to the cloud, Unravel helps ensure you won’t be flying blind.

    Join AWS and Unravel as we discuss:

    Top reasons customers choose AWS for their cloud migration journey,
    Advantages of planning out your Hadoop migration to AWS,
    Demo: Migration assessment capabilities to ensure risk-free migration.
  • Focus on Digital Experiences, Not the Infrastructure
    Focus on Digital Experiences, Not the Infrastructure
    Gregg Shupe & Sergei Sokolov, Progress Recorded: Jan 16 2020 61 mins
    The pace of business is accelerating, as are the demands of today’s digital consumer. Does your organization have the agility, scalability and infrastructure necessary to deliver great customer experiences and stay competitive in an omnichannel landscape?

    With digital experiences as a key competitive differentiator for modern businesses, the underlying architecture has never been more important. The best digital experiences demand a content management system coupled with an architecture that facilitates agility, extensibility and scalability.

    This webinar recording covers:
    * Why the industry is moving content operations to the cloud and what it means to your business
    * How to make an impact with your global experiences fast to support corporate growth initiatives and drivers
    * How a move to the cloud can address performance, security and the development process

    Sitefinity Cloud empowers companies to easily develop and deploy powerful, unique digital experiences at the speed of business. Learn more by watching our webinar.
  • Productionalizing H2O Driverless AI Models
    Productionalizing H2O Driverless AI Models
    Nicholas Png, H2O.ai Recorded: Jan 16 2020 57 mins
    Training a good machine learning model is an extremely difficult process. Good data science practitioners must first determine if the data they have is useful at all. Next, do they have to cleanse or munge the data to put it into the proper format for the machine learning algorithm they are planning to use? Then, you might need to create new features based off the original data that provide better signal for predicting the target value, and consider what hyperparameters to use when training the algorithm. To name a few steps.

    However, this is only the first step in creating a useful model. The next step, and one that is arguably just as important is productionalizing a model. In many cases, companies have strict rules about how a model must behave or in what kind of infrastructure a model must run in production. As an example, some companies require only Java models, and data scientists who produced the model in R or Python must then pass their code to a data engineer who will take a month or two to translate the model from the original to Java. This kind of restriction is often times the major barrier to entry when it comes to pushing new machine learning models to production.
    Join our webinar to learn about common approaches to productionalizing models, and how to apply these practices to models produced by H2O Driverless AI.

    Join our webinar to learn:
    • Some common challenges associated with productionalizing models in different infrastructures
    • Good practices when productionalizing models, specifically related to models produced by Driverless AI
    • Some generic examples of how to productionalize a model
    • Time permitting: a live coding exercise to productionalize a Driverless AI Mojo
  • How Flywheel Uses Sitefinity Digital Experience Cloud (DEC) to Drive Results
    How Flywheel Uses Sitefinity Digital Experience Cloud (DEC) to Drive Results
    Scott Snowden, Progress Sitefinity Partner, Flywheel Strategic Recorded: Jan 16 2020 41 mins
    Today’s digital marketers are more directly accountable for business results than ever before. But with data growing increasingly complex and fragmented, connecting marketing strategy to bottom-line results is a formidable challenge.

    Progress Sitefinity Digital Experience Cloud (DEC) enables marketers to drive demonstrable growth by understanding and optimizing every customer’s individual journey. Join us to see how Progress Sitefinity partner Flywheel Strategic uses DEC to make actionable decisions that drive real results—and how you can too.

    This webinar will discuss:
    * The basics of DEC and the importance of turning anonymous visitors to known contacts
    * Personas and why you need to know your audience
    * Conversions and touchpoints
    * Lead scoring and journey timelines

    Learn from the experts that use Sitefinity DEC daily to make smarter marketing decisions.
  • Exposing GraphQLs as Managed APIs
    Exposing GraphQLs as Managed APIs
    Fazlan Nazeem, Associate Technical Lead, WSO2 and Hiranya Abeyrathne, Software Engineer, WSO2 Recorded: Jan 16 2020 48 mins
    GraphQL is an emerging API standard that provides a more flexible and alternative approach for data intensive operations. It is particularly good for querying and retrieving data in optimized forms that make applications more efficient and optimal. While GraphQL focuses on what it does best, we still need to ensure that our GraphQL services are exposed in a secure, controlled, monitored, and sometimes even in a monetized environment. This is where the inclusion of an API gateway that understands GraphQL queries, mutations, and subscriptions can add significant value.
    Join our webinar to learn more about the following:
    * Introduction to GraphQL
    * Exposing GraphQL services as managed APIs
    * Authentication
    * Authorization
    * Rate limiting
    * Invoking GraphQL APIs exposed via WSO2 API Manager
  • Microservices Essentials: Getting Started with Spring Cloud Gateway
    Microservices Essentials: Getting Started with Spring Cloud Gateway
    Chris Sterling, Pivotal Product Manager, Brian McClain, Pivotal Technical Marketer Recorded: Jan 16 2020 44 mins
    Folks are eager to adopt microservices in order to scale and iterate code faster. Microservices architectures offer a means to safely decouple parts of an application into smaller, more independent units. But adopting a microservices architecture means increasing the number of services communicating via API calls. This introduces the need for API gateways.

    API gateways aren’t new, but as cloud-native infrastructure evolves, the requirements for API gateways have changed, too. Today, developers are looking for a gateway that runs close to their application to minimize latency, supports reversions to earlier versions, and operates like any other Spring Boot application. Spring Cloud Gateway deploys independently as a Spring Boot app, integrates with Spring Cloud Service Discovery and Spring Cloud Security, and uses familiar tools for observability and resilience.

    Join Chris Sterling, Pivotal Product Manager, and Brian McClain, Pivotal Tech Marketer, to learn:

    ● How to set up a basic route using Spring Cloud Gateway
    ● How to expose the gateway on the network without exposing the services
    ● How to use Spring Cloud Security to authenticate users at the gateway
    ● How Pivotal Spring Cloud Gateway makes it easier to operate, upgrade, dynamically configure with no downtime, and more

    We look forward to you joining us.
  • Hijacked! The Perils of Business Email Compromise
    Hijacked! The Perils of Business Email Compromise
    Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator) Recorded: Jan 16 2020 59 mins
    According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
  • Actian Avalanche Live TechTALK
    Actian Avalanche Live TechTALK
    Mary Schulte - Senior Systems Engineer Recorded: Jan 16 2020 30 mins
    Mary, one of our top data warehouse experts, will present a short overview of Actian Avalanche Multi-Cloud Data Warehouse service. This live webinar will include a demo of setting up the data warehouse and connecting Looker. It will include a live Q&A.
  • Enabling Value Based Care with Boomi
    Enabling Value Based Care with Boomi
    John Reeves and Brian Stadnik Recorded: Jan 16 2020 43 mins
    Delivering on the promise of value based care is driving change in the Health Care ecosystem today. It requires efforts of digital transformation to act on many different groups and in different ways depending on your provider organization. Solutions are more than just about implementing one care record or relying on legacy models and their existing enterprise architectures.

    Many health care organizations are examining their enterprise architectures (EA) and assessing how their respective EAs are able to best partner and support a Hospital or Integrated Delivery Network’s (IDN) core business initiatives.
  • Predictions 2020: IoT, Cloud and AI Tilt the Digital Industry Playing Field
    Predictions 2020: IoT, Cloud and AI Tilt the Digital Industry Playing Field
    Leif Eriksen, Insights Partner, Momenta Partners Recorded: Jan 16 2020 61 mins
    Digital Industry is fundamentally altering the dynamics of the industrial and infrastructure sectors. The rapid development of digital innovations – most notably the Internet of Things (IoT), cloud, and artificial intelligence (AI) – is radically redefining what is operationally possible while creating a great deal of organizational uncertainty and stress. Becoming defensive in the face of digital disruption will only delay the reckoning. The best strategy is to get ahead of the curve by creating a Digital Industry strategy that reflects the changes coming to your industry.

    Join leading Digital Industry practitioners as they help you understand the latest digital innovations and what they mean for organizations in the energy, manufacturing, transportation, and infrastructure arenas.

    Insights Partner Leif Eriksen will be moderating a roundtable discussion with other thought leaders including David Lafferty, President at Scientific Technical Services and Doug Harp, PE, Managing Partner at Momenta Partners.

    2020 will be a pivotal year for Digital Industry and understanding what it means for you, your organization, and your industry is critical to success.

    Are you ready?
  • Mainframe into the Cloud: Was ist möglich, was ist sinnvoll? - Webinar 1
    Mainframe into the Cloud: Was ist möglich, was ist sinnvoll? - Webinar 1
    Ingo Pieper, Solution Architect AMC, Micro Focus Recorded: Jan 16 2020 46 mins
    Live Webinarreihe: Mainframe into the Cloud
    Termine: 16. Januar | 29. Januar | 30. Januar 2020

    Eine Vielzahl transaktionsintensiver Geschäftsmodelle laufen nach wie vor auf dem Mainframe. Denn in Puncto Zuverlässigkeit, Stabilität und Leistungsfähigkeit ist und bleibt der Mainframe einfach überragend. Wie aber können Sie Ihre bewährten Systeme zukunftsfähig mit neuen Technologien und Innovationen verbinden?

    Erfahren Sie in unserer Webinarreihe „Mainframe into the Cloud“, wie Sie die Vorzüge Ihrer Mainframe-Anwendungen bewahren,gleichzeitig von der Einbindung in eine moderne Cloud-Umgebung profitieren und Ihr Modernisierungsziel dank agiler DevOps Prozesse schnell und effizient erreichen.

    Im 1. Webinar dieser Reihe: "Mainframe into the Cloud: Was ist möglich, was ist sinnvoll?" geben wir Ihnen einen Überblick, wie Sie die Vorteile von Cloud-Welten für Ihre Mainframe-Landschaft effektiv nutzen können.

    Im Live Webinar 2 "Mainframe into the Cloud: Mainframe Anwendungen sicher, schnell und flexibel in die Cloud verlagern" am 29. Januar 2020 um 10:00 Uhr erfahren Sie, wie Sie Ihre bestehenden Mainframe-Anwendungen sicher, schnell und flexibel in die Cloud verlagern.
    Anmeldung zu Webinar 2 unter: https://www.brighttalk.com/webcast/14087/375226

    In Live Webinar 3 "Mainframe into the Cloud: Flexible Testumgebungen für Mainframe-DevOps" am 30. Januar 2020 um 10:00 Uhr lernen Sie, wie Sie mittels Cloud-Technologien Ihre Mainframe-Testumgebungen DevOps-ready in die Cloud verlagern können.
    Anmeldung zu Webinar 3 unter: https://www.brighttalk.com/webcast/14087/375228

    Alle Webinare sind nach dem Termin on-demand für Sie verfügbar, sollten Sie den Live-Termin nicht wahrnehmen können.

    Wir freuen uns auf Ihre Teilnahme!
    Ihr Micro Focus-Team
  • Google fmr Product Leader on Building Product Teams, not Products
    Google fmr Product Leader on Building Product Teams, not Products
    Alex Diaz Recorded: Jan 16 2020 55 mins
    We’re excited to kick off our 2020 Speaker Series in NYC with Google fmr Product Lead Alex Diaz who says that 'Product Manager' might be the most misleading title in tech. Diaz believes that it actually has little to do with managing or the product! Instead, great Product Managers often focus on making their teams more effective — often through better communication and process — which in turn leads to better products. This talk explores what building and managing product teams means in different environments and how it can lead to more successful products.

    Alex Diaz has more than a decade of experience in Product Management, with some of the biggest names around on his resume. He recently served as the VP of Product at Jetty, which is a new financial services company for everyday renters. Alex has also worked with several early-stage companies helping to clarify their product vision, improve internal processes, mentor junior PMs, interview candidates and more. He also put in time as the VP of Product Management for Yahoo and served as a Senior Product Manager at Google.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Jan 16 2020 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Exploring Citrix Workspace - Episode 1: SSO
    Exploring Citrix Workspace - Episode 1: SSO
    Jiun Hong, Product Marketing @ Citrix Recorded: Jan 15 2020 4 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • Take Personalization to the Next Level with Hyper-Personalization
    Take Personalization to the Next Level with Hyper-Personalization
    Gregg Shupe, Digital ExperienceThought Leader, Progress Recorded: Jan 15 2020 52 mins
    In today’s omnichannel world, combining all your touchpoints across web, mobile, email, ads, etc. is becoming critical for better engagement and conversions. That combination of touchpoints is hyper-personalization, which requires a company to have a deep understanding of its own products and a 360-degree view of the customer to devise a customized marketing strategy.

    Watch this webinar featuring, Progress and HGS Digital to learn about big data and hyper-personalization. In it, you’ll learn:

    *Why digital experiences are so important to businesses
    *How businesses are using big data and hyper-personalization to yield better engagement and conversion rates
    *How a U.S. specialty retailer is transforming its business from intuition-based decisions to data-driven decisions and significantly improving the customer experience
  • Top 10 Security Changes in Red Hat Enterprise Linux 8
    Top 10 Security Changes in Red Hat Enterprise Linux 8
    Sebastian Dunne - Solutions Architect, Red Hat Recorded: Jan 15 2020 36 mins
    RHEL 8 is the latest version of our flagship operating system and was designed to satisfy key customer demands and requirements. Image Builder makes building hybrid cloud architectures easier than ever. Application Streams and new container management tools improve the developer experience and a new Web Console and other features continue to help IT operations. Somewhat lost among the new features are some remarkable changes and improvements in security.

    Get ready for discussion and demos of the coolest new security features in RHEL 8.
  • Ansible - A Sight for SOAR Eyes
    Ansible - A Sight for SOAR Eyes
    Brad Scalio - Solutions Architect, Red Hat Recorded: Jan 15 2020 37 mins
    Security Orchestration, Automation, and Response (SOAR) refers to a collection of software solutions and tools that enable organizations to streamline security operations in typically three key areas: threat and vulnerability management, incident response, and security operations automation. Red Hat's Ansible Security Automation provides a supported set of Ansible modules, roles, and playbooks designed to unify security teams in a new way by orchestrating the activity of multiple classes of security solutions that wouldn't normally integrate with each other.

    Learn how security teams are addressing multiple use cases within the SOAR space including detection and triage of suspicious activities, threat hunting, incident response using Red Hat's Ansible Automation Platform and how to extend Ansible automation to the orchestration of security information and events management, creating a closed-loop incident response and remediation, system of record.
  • Ep. 5: Never Alone On Call
    Ep. 5: Never Alone On Call
    Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, Engineer Recorded: Jan 15 2020 44 mins
    Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.

    In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.

    In this webinar, we’ll discuss and show how:

    * Honeycomb's Query History gives rich meaningful context
    * Honeycomb’ers dogfood and learn from each others' compound wisdom
    * Benefits span engineering cycles and use-cases when debugging and maintaining
    * To build a culture of observability and why you should do it now
  • Security Automation on the Edge
    Security Automation on the Edge
    Kevin Jones - Domain Architect, Red Hat Recorded: Jan 15 2020 36 mins
    Within US Public Sector, the need for tactical field kits is abundant. This applies to disaster response, cyber response, remote computing locations, etc. The field kits need to be rugged, portable, and fully capable to run all the applications and tools that run back in the central data center.

    During this presentation, we will demonstrate a cloudlet that our team has been utilizing to solve the same problems as our customers. Repeatable and Automated infrastructure in a small form factor that can run the same workloads that will run in our customers data centers.

    Join us for use cases and live demo of a fully automated stack of Red Hat Cloud Suite powered by Ansible.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 15 2020 40 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Securing IoT Solutions by Design
    Securing IoT Solutions by Design
    David Rogers, CEO Copper Horse Recorded: Jan 15 2020 44 mins
    Most system Architects, Operational Executives, Product Managers and Developers understand that a device management platform has a role to play in ensuring a secure IoT device ecosystem. But few understand 'why' it's so important and 'how' to adopt this approach in a secure, streamlined and scalable fashion.

    Device hacks are becoming increasingly frequent, but you'd be surprised by the simplicity of some attacks. Conversely, the protection of diverse device types is no easy task, especially when an enterprise's duty of care lasts not just to the point of sale, but for the device's entire life cycle.

    In this session, we will begin by detailing why a diverse and secure device management ecosystem is so important and how to make that transition.

    To download the White Paper 'IoT-Securing by Design' please follow this URL: https://learn.arm.com/securingiotbydesign.html This can also be found in the attachments section of the webinar
  • SecOps - Moving Beyond the Developer
    SecOps - Moving Beyond the Developer
    Chris Grimm - Solutions Architect, Red Hat Recorded: Jan 15 2020 49 mins
    Configuration Drift, Manual Validation, Human Error; these are all words we often associate with our system security posture. Utilizing today’s automation technologies, these can all be things of the past by taking proven CI/CD concepts and jumping into the world of SecOps.
  • Running an API program. A customer journey into the world of API’s
    Running an API program. A customer journey into the world of API’s
    Pim Gaemers System integration specialist, Red Hat Recorded: Jan 15 2020 24 mins
    In this presentation we will take you into the customer Journey of an API program. The motives and business drivers behind the API program. The initial MVP stage and the scale-out to a fully production ready setup. Along the journey the implementation of the API Program with various Red Hat technologies is explained as well as the details of moving from an on-premise solution to a hybrid cloud solution to enable a public scale API program.
  • Automating security and compliance for hybrid environments
    Automating security and compliance for hybrid environments
    Lucy Kerner - Senior Principal Security Global Technical Evangelist and Strategist, Red Hat Recorded: Jan 15 2020 51 mins
    In this session, we’ll discuss how you can improve security and compliance with automation. We'll look at how a combination of Red Hat technologies can help you with security and compliance challenges in the infrastructure, operations, application, and security operations center across a hybrid environment with automation.

    Specifically, in your hybrid infrastructure, you’ll learn how Red Hat’s management and automation solutions, Red Hat OpenShift Container Platform, and OpenSCAP can help you.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Dave Kennedy, Managing Principal, Open Source Intelligence Recorded: Jan 15 2020 78 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This webinar will cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Citrix Intelligent Workspace - RU
    Citrix Intelligent Workspace - RU
    Sergey Khalyapin, Mg System Engineers EE and RU Jan 21 2020 9:00 am UTC 105 mins
    Сегодня многие компании уже используют в корпоративной среде решения для удалённой работы. Многие - согласны с тем, что "работа - это не место", так как уже сейчас сотрудники могут работать откуда угодно.

    Компания Citrix в своих решениях всегда старалась обеспечить для сотрудников своих заказчиков максимально комфортную и безопасную работу при использовании любого подключения, устройства и площадки.

    В ходе нашего вебинара мы расскажем и покажем, в чём отличие хорошо известных решений терминального доступа (Citrix Virtual Apps) и виртуальных десктопов (Citrix Virtual Desktops) от нового комплексного решения Citrix Intelligent Workspace; в чём заключается его "Интеллектуальность" и какое место занимают в рабочей среде "микроприложения".
  • 10 Años - El Estado de la Seguridad del Software
    10 Años - El Estado de la Seguridad del Software
    Antonio Reche, Solution Architect at Veracode Jan 21 2020 10:00 am UTC 45 mins
    Durante diez años, Veracode ha estado siguiendo el estado de la seguridad del software. En nuestro estudio en el décimo aniversario, confirmamos que los equipos están haciendo especial énfasis en la reducción de la deuda de seguridad. Este seminario web analiza algunos de los desafíos más comunes que afrontan los desarrolladores, y ofrece razones reales para el optimismo. Comenzamos Veracode con la misión de asegurar el software del mundo. Hoy, esa misión permanece, con el enfoque adicional de permitirle crear, innovar y "cambiar el mundo" con software, sin ser frenado por preocupaciones de seguridad.

    En este seminario web:
    - Conozca la realidad de seguridad que enfrentan los responsables de aplicaciones: la mayoría de las aplicaciones no cumplen con los estándares de la industria
    - Vea qué lenguajes son los peores infractores de seguridad
    - Observe qué fallos son las más frecuentes, con qué frecuencia se corrigen, cómo se explotan y qué categorías conducen a la mayor cantidad de incidentes.
    - Comprenda cómo los equipos pueden alcanzar una reducción de 5 veces en la deuda de seguridad
    - Obtenga información sobre cómo los desarrolladores pueden reducir el "tiempo medio de remediación" (MTTR) en más del 70%
  • API Security in a Cloud Native Era
    API Security in a Cloud Native Era
    Malintha Amarasinghe, Associate Technical Lead, WSO2 and Thilini Shanika, Associate Technical Lead, WSO2 Jan 21 2020 11:30 am UTC 56 mins
    The cloud is rapidly becoming the de-facto standard for deploying enterprise applications. Microservices are at the core of building cloud-native applications due to its proven advantages such as granularity, cloud-native deployment, and scalability. With the exponential growth of the consumer base of these service offerings, enforcing microservice/API security has become one of the biggest challenges to overcome.
    In this webinar, we will discuss:
    * The need for API/Microservices Security
    * The importance of delegating security enforcement to an API Gateway
    * API Authentication and Authorization methodologies
    * OAuth2 - The de-facto standard of API Authentication
    * Protection against cyber attacks and anomalies
    * Security aspects to consider when designing Single Page Applications (SPAs)
  • Digital Transformation of Manufacturing: From Reactive to Proactive Management
    Digital Transformation of Manufacturing: From Reactive to Proactive Management
    Mike Alperin, Manufacturing Industry Consultant, TIBCO Software Data Science team Jan 21 2020 2:00 pm UTC 49 mins
    A major transformation is taking place in manufacturing. New capabilities for processing streaming sensor data—along with big data, machine learning, and edge technologies—are driving the industry from reactive problem-solving towards increasingly proactive management of equipment, processes, products, and factories. It is now becoming possible to aggregate, analyze, and rapidly act on vast quantities of data being generated.

    In this webinar, discover how we are enabling customers with solutions such as predictive maintenance, automated pattern classification, anomaly detection, and product and process digital twins.
  • Automating Enterprise Meraki SD-WAN Deployments with Python and REST APIs
    Automating Enterprise Meraki SD-WAN Deployments with Python and REST APIs
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Jan 21 2020 4:00 pm UTC 45 mins
    Most familiar with Meraki know about its usefulness in building enterprise level networks, some have even taken the step of automating those deployments through Meraki’s robust APIs and code. What users may not be as knowledgeable about is Meraki’s capability to move beyond the individual site and support the WAN. In this session, the building blocks of the automating the network will be expanded to include multiple secure sites allowing organizations to range office to office and even into the home workspace.
  • The Future of Edge Data Management
    The Future of Edge Data Management
    Lewis Carr, Senior Director, Product Marketing and Management Jan 21 2020 5:00 pm UTC 60 mins
    Modern Edge Data Management for Mobile and IoT environments can no longer rely on Flat Files, SQLite, or best-of-breed database sprawl. Join this webinar to hear how you can modernize on a single simple, scalable, and secure architecture that is performant and eliminated ETL between devices, gateways, branch servers, and the Cloud.
  • Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Beck Power Jan 21 2020 5:00 pm UTC 60 mins
    Ready to grow your impact, influence and income through speaking? In this webinar, Beck will show you how to be more prolific with your speaking outreach - so you can "be everywhere" your clients are.

    There are three sections we'll cover
    1. Strategy: Who you want to get in front of, how you'll do it and what will happen as a result
    2. Application: Actually doing the outreach and doing the gigs
    3. Leveraging the gigs into content, clients, and collaborations

    Bring your questions, and your speaking goals for 2020 - you don't want to miss this.

    You'll learn:

    · Being prolific with applications and using tools like Innovation Women to secure gigs
    · Email outreach strategies and tools to help keep you from being overwhelmed
    · The art of leverage - importance of lead tracking and making money from speaking gigs
  • Best Practices for DevSecOps at Scale
    Best Practices for DevSecOps at Scale
    Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting​, Synopsys Jan 21 2020 6:00 pm UTC 60 mins
    Today’s security professionals and software developers not only have to do more in less time; they have to do it securely. This means mitigating risk and addressing compliance requirements in an environment where:
    - The threat landscape continues to evolve.
    - Application portfolios and their risk profiles continue to shift.
    - Security tools are difficult to deploy, configure, and integrate into workflows.
    - Consumption models continue to change.
    How can your internal resources keep pace in this dynamic environment? Managed application security testing can be just the relief valve your organization needs. In this webinar, we’ll discuss the need for managed application security testing, the sweet spots where it offers maximum value, what you should look for in a managed application security testing provider, and highlights from Synopsys’ Managed Services offering.
  • Enhanced Log Analytics with Application Insight: Splunk and Avi Networks
    Enhanced Log Analytics with Application Insight: Splunk and Avi Networks
    Matt Karnowski, Solutions Architect, VMware Jan 21 2020 6:00 pm UTC 48 mins
    Analytics and data are at the root of better decision-making and automation. Today's agile application environments require IT to troubleshoot issues fast and automate common application delivery tasks. Splunk helps enterprises all over the world make better decisions with their machine data. Avi Networks delivers an analytics-driven platform for highly-automatable application networking services.

    Learn how to:
    •Analyze and troubleshoot networking issues in real time
    •Record and replay traffic events to identify latency issues
    •Generate rich application insights through Avi's integration with Splunk
    •Try out Avi Networks on the Splunk Marketplace
  • Tackling the Container Iceberg: How to Approach Open Source Security
    Tackling the Container Iceberg: How to Approach Open Source Security
    Jeffrey Martin (Director of Product) and Dan Garfield (Chief Technology Evangelist at Codefresh) Jan 21 2020 6:00 pm UTC 60 mins
    Container images are based on many direct and indirect open source dependencies, which most developers are not aware of. What are the security implications of only seeing the tip of the iceberg? What are the challenges one faces when relying so heavily on open source? And how can teams overcome these?

    Join Codefresh and WhiteSource, as they embark on a journey to tackle:

    *The container iceberg - learn what are your blind spots
    *The main security challenges when using open source in containerized applications
    *The role of automation in open source security in containers
    *A live demo showing how WhiteSource & Codefresh can allow you to automate open source security in containers throughout the DevOps pipeline
  • The Next Wave of Digital Automation
    The Next Wave of Digital Automation
    Jesse McHargue and Stowe Boyd Jan 21 2020 7:00 pm UTC 59 mins
    Between paper-based processes, manual approvals over emails, and excel sheets being passed around things get lost, missed or bottlenecks are created. Automating these processes eliminates that. It’s time to adopt a modern framework of digital processes and forms.

    Join GigaOm Research and expert in digital transformation analyst Stowe Boyd and special guest from Nintex, Jesse McHargue.

    Learn a step-by-step approach to transitioning through process mapping and information capture, to process automation, data management and process intelligence.

    Watch the webinar to learn:
    - The six pitfalls of paper
    - Six degrees of digital transformation
    - Best practices for digital processes and forms
  • Aligning Application Security & Compliance
    Aligning Application Security & Compliance
    Ed Adams, President and CEO, Security Innovation Jan 21 2020 8:00 pm UTC 45 mins
    Regulatory compliance mandates have historically focused on IT & endpoint security as the primary means to protect data. However, as our digital economy has increasingly become software dependent, standards bodies have dutifully added requirements as they relate to development and deployment practices. Enterprise applications and cloud-based services constantly store and transmit data; yet, they are often difficult to understand and assess for compliance.

    This webcast will present a practical approach towards mapping application security practices to common compliance frameworks. It will discuss how to define and enact a secure, repeatable software development lifecycle (SDLC) and highlight activities that can be leveraged across multiple compliance controls. Topics include:

    * Consolidating security and compliance controls
    * Creating application security standards for development and operations teams
    * Identifying and remediating gaps between current practices and industry accepted "best practices”
  • Data Warehouse Testing—The Next Opportunity for QA Leaders
    Data Warehouse Testing—The Next Opportunity for QA Leaders
    Raj Kanuparthi, Founder, Narwal, Inc; Wayne Yaddow, Testing Consultant, Coach & Mentor Jan 22 2020 2:00 am UTC 63 mins
    Your testing expertise is great preparation for data warehouse and big data testing—which is fast-becoming a new opportunity for testers. If your organization isn’t already recruiting traditional testers to safeguard data quality, they probably will soon. Are you up for the challenge?

    If so, watch two data warehouse testing leaders for the webinar Data Warehouse Testing—The Next Opportunity for QA Leaders. Wayne Yaddow is a data warehouse testing consultant who literally wrote the book on data warehouse. Raj Kanuparthi is a senior quality leader who drove the big data testing initiative at one the world’s leading financial service companies. Tricentis has gotten them together to give you a realistic look at why quality leaders are making data testing an integral part of their quality process, and the role that Tricentis Tosca experts are playing in these transformations.

    We’ll cover:

    - Why data testing is important
    - How it compares to “traditional” software testing
    - Where data warehouse testing fits into the broader quality strategy
    - How leading enterprises got started with data warehouse testing
    - The top challenges they faced
    - The importance of automation—and how Tricentis helps
  • How to build a rock-solid hybrid cloud infrastructure
    How to build a rock-solid hybrid cloud infrastructure
    Joseph Offenberg, US Technical Director Jan 22 2020 2:00 pm UTC 30 mins
    Whether you like it or not, you will probably be asked about using a cloud and a microservices based architecture sooner or later.

    If it's viable for you, this transition has to be smooth, bullet-proof and rock-solid. And as a tech leader, you'll be looking for ways to make this transition as stable, robust and trouble-free as possible. 

    And, part of a cloud infrastructure strategy that's often missed is how to manage the configuration data in a cloud environment. 

    That's why we've created this unique webcast to discuss cloud infrastructure and config data management.

    In this webinar we'll cover: 

    - The role of config data in a microservices architecture 
    - The gotchas and challenges that often get overlooked
    - The blue-print for managing config in a cloud environment 
    - How all of this creates a rock-solid cloud infrastructure 
  • Interoperability across Blockchain Ecosystems
    Interoperability across Blockchain Ecosystems
    Mike Bennett, co-chair, OMG Blockchain Platform Special Interest Group Jan 22 2020 4:00 pm UTC 60 mins
    The Object Management Group is exploring potential issues and opportunities for standardization across the world of distributed ledger or Blockchain ecosystems. Many of our members have expressed concerns about the challenges in managing complex information flows that interact with different Blockchain-based technologies, for example in supply chain management. The OMG believes that some of these issues may be mitigated by the development of one or more standards in this area, and has put out a ‘Request for Information’ (RFI) to gather more information on the challenges people are facing, concerns and potential solutions to interoperability questions – see https://www.omg.org/news/releases/pr2019/10-28-19.htm

    The date for comments to be received on this is 1 February 2020.

    At this webinar we will present the insights we have gained so far and will describe what we believe are the dimensions of the interoperability problem. We believe the range of interoperability issues and potential solutions is quite broad, ranging from common semantics to technical infrastructure solutions, and we anticipate issuing at least one and possibly more ‘Requests for Proposals’ (RFPs) later in the year to capture best practice for solutions in this area. If you own part of the problem or any solutions in this area please come to this webinar and be prepared to share your insights and requirements.
  • DevOps Transformation: End-to-End lifecycle management
    DevOps Transformation: End-to-End lifecycle management
    Julian Fish, Director of Product Management, Micro Focus Jan 22 2020 4:00 pm UTC 60 mins
    The fifth episode of the DevOps Transformation series will expand on the topics covered earlier in the DevOps Transformation series (Pipeline Automation, Release Orchestration, Value Stream Management and Continuous Code Inspection) explaining how all elements can be brought together to provide an end-to-end lifecycle management approach.

    Join us as we cover all aspects of product delivery, from demand capture, requirements management, application development support, Continuous Inspection, Continuous Integration, Continuous Delivery, Test Case Management, Release Orchestration and Value Stream Insight.

    This webinar will explain how:
    • Demand capture and prioritization drives significant organizational value
    • Rapid development and delivery improves response rates and quality
    • Insight and control across the entire product lifecycle can be easily achieved

    View all of the DevOps Transformation webinars:
    • Pipeline Automation: https://www.brighttalk.com/webcast/8653/365947
    • Release Orchestration: https://www.brighttalk.com/webcast/8653/369037
    • Value Stream Management: https://www.brighttalk.com/webcast/8653/370561
    • Continuous Code Inspection: https://www.brighttalk.com/webcast/8653/377798
  • 5 steps to take your IoT device to market
    5 steps to take your IoT device to market
    Rhys Davies & Nilay Patel - Ubuntu Product Managers Jan 22 2020 5:00 pm UTC 60 mins
    IoT businesses are notoriously difficult to get off the ground. No matter how good your product is or how good your team is, some of the biggest problems you will face are just in getting to market and maintaining your devices once they're in the field. The webinar will take a look at how Canonical's Brand Store product allows you to get to market while catering for long term problems and the need to keep your product up to date in the future.

    More specifically, this webinar will look at the common problems we see organisations facing on their way to getting an IoT device to market, and cover five key steps to solve these problems. Along the way we will dig a little into serval case studies Canonical has done with various customers and partners to show you what has already been achieved with these solutions. For more information on anything Rhys talks about in this webinar, please see the attachment section or head over to our website to get in touch.
  • Honeycomb Presents: Framework for Observability Maturity
    Honeycomb Presents: Framework for Observability Maturity
    Charity Majors, CTO & co-founder; Liz Fong-Jones, Developer Advocate Jan 22 2020 6:00 pm UTC 60 mins
    Everyone is talking about "observability", but mapping out a game plan to get there has not yet been clearly defined. We have a great new starting point: Honeycomb’s observability experts, CTO and co-founder Charity Majors and developer advocate Liz Fong-Jones, recently combined their knowledge to create an initial framework that focuses on goals instead of tools for achieving observability. The framework asks orgs to honestly look at "how well are we doing?" in key areas that affect observability -- and ultimately customer and dev happiness.

    In this webinar, the authors of this framework will cover the importance of these 5 key areas for assessment, including:

    * Resilience in responding to system failures
    * Quality of code
    * Cadence of releasing code
    * Management of complexity and technical debt
    * Understanding user behavior


    The authors will also share their intent for the framework to be a living, evolving guidepost that incorporates input from the dev and engineering community over time. Attendees can learn how they can get involved and provide feedback too.
  • Guide to Application Security: What to Look For and Why
    Guide to Application Security: What to Look For and Why
    Utsav Sanghani, Senior Product Manager, Staff, Synopsys; Anna Chiang, Product Marketing Manager, Senior Staff, Synopsys Jan 22 2020 6:00 pm UTC 60 mins
    If your organization does software development in-house, there are many development workflows and processes to choose from. With all the different AppSec tools available (e.g., SAST, DAST, IAST), how do developers stay productive while ensuring that their code is secure?
    Register for this webinar to learn more about application security and how to leverage it in enterprise application development. You’ll learn:
    - About development workflows and the tools developers need to stay productive
    - How to evaluate different AppSec tools
    - What features to look for in an AppSec tool
  • Exploring Citrix Workspace - Episode 2: Content Collaboration
    Exploring Citrix Workspace - Episode 2: Content Collaboration
    Nathan Mote, Product Marketing @ Citrix Jan 22 2020 7:00 pm UTC 11 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • AI + Environment Automation = the PB + J of Observability
    AI + Environment Automation = the PB + J of Observability
    Maya Ber Lerner, CTO, Quali and Dror Mann, VP Product, Loom Systems Jan 22 2020 8:00 pm UTC 28 mins
    Monitoring is a core Ops/SRE responsibility. If you operate an environment, you need to monitor it—this is Ops 101. But when releasing faster, monitoring the continuous output of code and infrastructure changes grows more challenging.

    Emerging technologies in AIOps and environment automation make it possible for Ops Engineers/SREs to take the practice to the next level; when paired together, they efficiently connect observability with DevOps—increasing speed without losing control.

    Join Maya Ber Lerner, CTO at Quali, and Dror Mann, VP Product at Loom Systems, in this fireside chat and demo as they reveal strategies for:

    -Connecting monitoring data to continuous delivery through Environment as a Service
    -Using AI to intelligently interpret data
    -Achieving stronger product reliability and accountability without slowing down innovation
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 23 2020 3:00 am UTC 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Micro Focus PAM  - решение для управления привилегированными учетными записями
    Micro Focus PAM - решение для управления привилегированными учетными записями
    Максим Луганский, технический консультант, Micro Focus в России Jan 23 2020 8:00 am UTC 60 mins
    Обнаружение привилегированных учетных записей на различных устройствах в ИТ-окружении, безопасное предоставление привилегированного доступа, аудит команд и запись сессий, автоматическая ротация паролей и многое другое.
  • The Next Wave of Digital Automation
    The Next Wave of Digital Automation
    Jesse McHargue and Stowe Boyd Jan 23 2020 10:00 am UTC 59 mins
    Between paper-based processes, manual approvals over emails, and excel sheets being passed around things get lost, missed or bottlenecks are created. Automating these processes eliminates that. It’s time to adopt a modern framework of digital processes and forms.

    Join GigaOm Research and expert in digital transformation analyst Stowe Boyd and special guest from Nintex, Jesse McHargue.

    Learn a step-by-step approach to transitioning through process mapping and information capture, to process automation, data management and process intelligence.

    Watch the webinar to learn:
    - The six pitfalls of paper
    - Six degrees of digital transformation
    - Best practices for digital processes and forms
  • 10 Jahre State of Software Security
    10 Jahre State of Software Security
    Julian Totzek - Hallhuber, Solution Architect at Veracode Jan 23 2020 10:00 am UTC 45 mins
    Für 10 Jahre verfolgt Veracode bereits den Status zur Softwaresicherheit. In unserer 10. Jubiläumsausgabe bestätigen wir das Teams einen großen Unterschied bei der Reduzierung von Sicherheitsfehlern machen können. Dieses Webinar befasst sich mit den bekannten Herausforderungen, denen Entwickler gegenüberstehen, bietet jedoch auch echte Gründe für Optimismus. Wir haben Veracode mit der Mission gegründet, die Software der Welt sichern zu machen. Diese Mission ist auch heute noch gültig, mit dem zusätzlichen Fokus, es Ihnen zu ermöglichen, mit Software, Innovationen zu entwickeln und die Welt zu verändern, ohne von Sicherheitsbedenken zurückgehalten zu werden.

    In diesem Webinar
    Informieren Sie sich über die Sicherheitsrealität von Anwendungsanbietern - die meisten Anwendungen entsprechen nicht den Industriestandards
    Sehen Sie, welche Sprachen die schlimmsten Sicherheitsverstöße aufweist
    Erfahren Sie, welche Fehler am häufigsten auftreten, wie häufig sie behoben werden, wie sie ausgenutzt werden und welche Kategorien zu den meisten Vorfällen führen
    Verstehen Sie, wie Teams in der Lage sind, die Sicherheitsfehler um das Fünffache zu senken
    Gewinnen Sie Einblicke darüber, wie Entwickler die durchschnittliche Zeit bis zur Fehlerbehebung (MTTR) um über 70% reduzieren können.