Hi [[ session.user.profile.firstName ]]

Application Development

  • Stream Video to Your Global Users Securely and Confidently
    Stream Video to Your Global Users Securely and Confidently
    Derek Yee, PMM, Cloudflare | Cavin Kindsvogel, Stream Product Specialist, Cloudflare | Jon Levine, Stream PM, Cloudflare Recorded: Dec 11 2018 31 mins
    CDNs have played a significant role in successful video delivery, especially across OTT services, publishing, ad tech, gaming, and sporting sites. Cloudflare is building a better Internet, which includes delivering a fast, secure and reliable video experience for consumers anywhere in the world. Cloudflare offers a high performing distribution network that can meet the evolving needs of companies delivering video.

    Join us for this 45-minute webinar where we cover the following:

    - The foundations of building a resilient network to support high traffic video content
    - Advances in Cloudflare’s caching infrastructure for better streaming performance
    - How Cloudflare Workers provides video providers increased control of content distribution and visibility to user analytics
  • Accelerating the path to the shopping cart
    Accelerating the path to the shopping cart
    Emily Hayman, Solutions Engineer at Algolia Recorded: Dec 11 2018 40 mins
    How e-commerce leaders think about product discovery

    Today’s consumers come to your site for experiences, and it is experiences that compel them to buy—and return for more.

    Join Emily Hayman, Algolia’s Senior Solutions Engineer and search expert, to learn about innovative user experiences that turn browsers into shoppers and move the needle with e-comm KPIs.

    In this 30-minute webinar, you’ll learn to :

    - Avoid simplistic views of the e-comm customer journey
    - Define and apply key elements of successful product discovery
    - Use concrete tips to improve your site’s user experience today
  • IDC FutureScape: Worldwide Smart Cities and Communities 2019 Predictions
    IDC FutureScape: Worldwide Smart Cities and Communities 2019 Predictions
    Ruthbea Yesner, Vice President, Adelaide O'Brien, and Mark Zannoni, IDC Government Insights Recorded: Dec 11 2018 46 mins
    In this IDC FutureScape presentation, the IDC Worldwide Smart Cities team discusses the key predictions that will impact CIOs and IT professionals in the worldwide utilities industry over the one three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Field testing MPO/MTP connectors to support 100Gig and beyond
    Field testing MPO/MTP connectors to support 100Gig and beyond
    Jim Davis, Fluke Networks Recorded: Dec 11 2018 60 mins
    This webinar, presented by Jim Davis of Fluke Networks, will start with a basic review of the need for cleaning fiber and the differences between singlemode and multimode fibers. It will then cover the inspection and cleaning of fibers, the loss length and reflectance requirements, measuring loss, Tier 1 testing of MPO/MPT Connectors, Tier 2 testing for troubleshooting, and reading a test report.
  • Siemens | Leveraging cognitive technologies to drive RPA innovation
    Siemens | Leveraging cognitive technologies to drive RPA innovation
    Nikolas Barth, Head of Innovation & Digitalization & Andrea Martschink, IT Strategy & Business Development Robotics, Siemens Recorded: Dec 11 2018 62 mins
    Innovation has always been at the heart of Siemens. In addition to being the largest manufacturing company in Europe, the German conglomerate continues to innovate in a startup fashion and has embraced Digital Transformation and has won their CIO Award based on the work they are doing with RPA.

    In this episode of our Blue Prism Café, discover how Siemens has been leveraging Robotic Process Automation as part of this Digital Transformation journey, and how their global RPA service, run jointly by the Shared Services and IT department, has enabled their lines of business in realizing true efficiency and quality gains along end-to-end processes. You will also get insight as and how they are leveraging some of the latest intelligent automation technologies such as IBM Watson, Celonis and MSFT Azure Chatbot Technology with their Blue Prism Digital Workforce.

    Key takeaways will include:
    • How Siemens built their RPA Centre of Excellence to future proof their RPA and Intelligent Automation Growth
    • Real-life scaled examples of automated processes across various lines of businesses
    • An overview of Siemens' use of Cognitive Automation leveraging RPA
    • Achievements and results from their service delivery model

    Speakers:
    • Nikolas Barth, Head of Innovation & Digitalization in Siemens Shared Services
    • Andrea Martschink, IT Strategy & Business Development Robotics
  • Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Matt Runkle, Application Security Consultant, Veracode Recorded: Dec 11 2018 49 mins
    It’s no secret that open source security is a hotly debated topic. However it’s important to keep in mind that commercially licensed third-party software carries much of the same risk as open source software. While helping a customer attain a Verified certification, one of Veracode’s application security consultants uncovered a cross-site scripting flaw in the popular Telerik Reporting project. The flaw has since been patched but it’s these types of unknown risks that organizations take when introducing third party code into their environment.

    During this talk, you’ll hear from Matt Runkle, the AppSec Consultant who uncovered the XSS flaw, to get insight into the mind of a hacker and hear how vulnerabilities like XSS are commonly exploited in third party software and how you can take action to prevent attacks like this in your own environment.
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, Veracode Recorded: Dec 11 2018 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Veracode CTO Chris Wysopal talks about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them. Attendees will also learn about why an application security program is imperative to data protection, how to mitigate open source risk and ensure secure coding practices are in place to prove that security is a top priority for your organisation.
  • Trends in the Industry: Setting the Stage on Open Source Trends
    Trends in the Industry: Setting the Stage on Open Source Trends
    Mark Curphey, VP of Strategy, Veracode Recorded: Dec 11 2018 42 mins
    Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. In a recent study by Veracode, a whopping 88% of Java applications had at least one flaw in an open-source library, leaving application security managers faced with the challenging question: how can we keep innovating quickly without introducing vulnerabilities into our code base?

    The solution is multi-faceted – part education, part technology, part process change. Join us for our Virtual Summit, The Open Source Conundrum: Managing your Risk, as we dig into all the pieces of this solution.
  • Digital transformation from industry leaders' eyes: Harvard Business Review
    Digital transformation from industry leaders' eyes: Harvard Business Review
    Marty Wesley, Portfolio Marketing Manager, Red Hat Recorded: Dec 10 2018 25 mins
    Digital transformation may be a trite catch-all phrase for customers of varying sizes and challenges, but its implications are real. In a recent Harvard Business Review report (published Aug 2018), only 13% of respondents rated their ability to confront digital transformation as very effective. The vast majority of respondents understand its implications and relate to the importance of addressing technology, process, and culture in parallel, but struggle to implement strategies to address it, with culture as the leading inhibitor.

    In this session, we’ll discuss what industry leaders consider critical digital transformation capabilities, where organizations are struggling with adoption, what success looks like, and how many organizations are measuring the efficacy of efforts.
  • Secure By Design: Ensuring That Security Is Built In
    Secure By Design: Ensuring That Security Is Built In
    Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode Recorded: Dec 10 2018 45 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it is no exaggeration to say that every company is becoming a software company that is competing with software.

    Companies are pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, developers more often assemble software than create it from scratch, as they are more frequently incorporating open source libraries to speed up time-to-market. However, as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode discusses what it means to build software secure by design. He will describe how to build a software development process that has continuous security, is measurable, and is transparent.
  • The 2019 Security Strategy from the former CSO of Facebook and Uber
    The 2019 Security Strategy from the former CSO of Facebook and Uber
    Joe Sullivan, Chief Security Officer of Cloudflare & Tim Fong, Head of Security Solutions Recorded: Dec 10 2018 42 mins
    How are you planning to secure your employees, your company, and your customers in 2019?

    Prior to joining Cloudflare as its Chief Security Officer (CSO) in 2018, Joe Sullivan spent 5+ years as CSO for Facebook and 2.5 years as CSO for Uber. He also previously held security and legal roles at PayPal and eBay and served on the Obama Administration as a member of the Commission on Enhancing National Cybersecurity.

    With over a decade of experience from some of the world’s most influential companies, Joe will share the core strategies he is taking to help protect Cloudflare and, as a result, its 12M domains who rely on its services for security and performance.


    Register now to learn:

    - Major security risks to prepare for in 2019
    - The three areas Cloudflare is using its own products to secure the company
    - The plan to improve internal discipline around “incident response”
    - The critical shift in thinking and strategy around the world becoming “borderless”
    - The “security maturity model” to evaluate and plan the security roadmap

    If you and your team are in the middle of planning how to maintain and improve your security posture for 2019, sign up to attend now. Registrants will also get a copy of the actual Security Maturity Model you can use with your own team.
  • Demystifying Service Mesh: New Pattern or New Technology?
    Demystifying Service Mesh: New Pattern or New Technology?
    Marco Palladino, CTO & Co-Founder, Kong Recorded: Dec 7 2018 64 mins
    In a short period of time, service APIs went from being primarily an edge interface connecting developers outside of the organization with internal systems to the glue that binds those internal systems (microservices) into a functioning whole. Consequently, one of the unavoidable results of microservice-oriented architectures is that internal communication within the data center will increase. Service mesh arose as a potential solution to the challenges that arise from increased East-West traffic by providing a different framework for deploying existing technology.

    However, most of what service mesh introduces has been provided for many years by API Management products. Features such as observability, network error handling, health-checks, etc. are hallmarks of API management. These features don’t constitute anything novel in themselves, but as a pattern, service mesh introduces a new way of deploying those features within our architecture.

    Join Kong CTO and Co-Founder Marco Palladino as he walks attendees through the architectural changes that have led to the rise of service mesh and why legacy API management solutions born before the advent of containers can’t keep up.

    Webinar takeaways:

    - Service mesh as an architecture pattern, not a technology
    - The implications of adopting microservices-oriented architectures
    - Why traditional API management solutions can’t keep up
  • RSA #3 - Transforming Secure Access to be Intelligent
    RSA #3 - Transforming Secure Access to be Intelligent
    Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSA Recorded: Dec 7 2018 54 mins
    When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
  • Business Architecture and Architecture Driven Modernization
    Business Architecture and Architecture Driven Modernization
    William Ulirch, President, Business Architecture Guild and Co-Chair, OMG Architecture-Driven Modernization Task Force Recorded: Dec 7 2018 31 mins
    Architecture Driven Modernization involves taking a holistic approach to transforming application, data and technical architectures, which includes applying a business-driven approach through business architecture. The OMG Architecture Driven Modernization Task Force has been developing industry standards for the past 15 years for assessing, representing and measuring software systems from a variety of perspectives. The presentation will cover:
    *Business-driven IT architecture transformation
    *Architecture transformation challenges, expectations and realities
    *Architecture-driven modernization case studies and reference points
    *A discussion of standards supported by the OMG Architecture-Driven Modernization Task Force (ADM TF)
  • Обзор портфеля решений Secure Content Management от Micro Focus
    Обзор портфеля решений Secure Content Management от Micro Focus
    Максим Луганский, технический консультант Recorded: Dec 7 2018 54 mins
    Обзор связки программных решений Micro Focus - Control Point, Structured Data Manager, Content Manager для автоматизации работы с критической информацией (как структурированной, так и неструктурированной).
  • Unified Architecture Framework® (UAF®)
    Unified Architecture Framework® (UAF®)
    OMG UAF Co-Chairs: Matthew Hause, PTC; Graham Bleakley, IBM; Aurelijus Morkevicius, No Magic Recorded: Dec 6 2018 55 mins
    The Unified Architecture Framework® (UAF®) specification is used for modeling systems of systems. UAF was developed by a diverse group of tool vendors, end users, academia, and government representatives at the OMG. It has the full support of the US Department of Defense (DOD) and the UK Ministry of Defence (MOD). It is a DOD mandated standard. Its foundation in UML/SysML improves the integration between architectural framework modeling and system modeling to support post-acquisition lifecycle design and implementation.

    This presentation provides an overview of SysML, a brief introduction to how UAF will provide a standard means of expressing DoDAF, NAF and MODAF using SysML, an overview of the UAF views and viewpoints and language concepts, and selected sample problems to demonstrate how the language can be used.

    This presentation will cover the topics of:
    •UAF modeling as part of the systems engineering process
    •Using capability and systems models to avoid the problems of stovepipe development
    •Using strategic, acquisition and systems modeling to ensure that systems deployment is in line with capability deployment requirements
    •Transitioning from a system of systems to systems development
    •Integrating requirements management into architecture modeling and the development lifecycle
    •The future of architecture development
  • Tips for Developing a Testing Strategy for DevOps Success
    Tips for Developing a Testing Strategy for DevOps Success
    Ryan Yackel, Director of Product, QASymphony Recorded: Dec 6 2018 56 mins
    To achieve rapid time-to-market, businesses have embraced DevOps, which places a premium on speed and efficiency. But speed is not the only measure of DevOps success. To release better software faster, enterprises must optimize testing strategy and embed a culture of quality within their DevOps processes.

    In this webinar, you will learn:

    - How BDD can transform QA from a bottleneck to a speed enabler
    - How to integrate quality and increase visibility throughout the SDLC
    - How to help your VPs and Directors gauge the success of their current quality initiatives
  • Halt! Who Goes There? Improving the Intersection of Identity & Security
    Halt! Who Goes There? Improving the Intersection of Identity & Security
    John MacInnis, Prd Mktg Mgr, IAMS, HID Global; Tariq Shaikh, Sr. Security Adv., IAM, Aetna; Erik Von Geldern, CISO, FXCM Recorded: Dec 6 2018 61 mins
    With the multiple points of access to an organization, both internal and external, as well as physical and electronic, identity and access control is a critical security concern. Practitioners need to constantly monitor and assess the organization’s security posture, access provisioning and even the on boarding of employees, partners and customers. Join HID Global and (ISC)2 at 1:00pm Eastern Thursday, December 6, 2018 for a discussion on why identity has become the center of security and how to better manage identity, access management and authentication in your enterprise.
  • End-to-End Reactive Data Access Using R2DBC with RSocket and Proteus
    End-to-End Reactive Data Access Using R2DBC with RSocket and Proteus
    Ryland Degnan, co-founder and CTO of Netifi and Dan Baskette, Pivotal host Recorded: Dec 6 2018 61 mins
    Lack of asynchronous relational database drivers in Java has been a barrier to writing scalable, data-driven applications for many. R2DBC is seeking to change this with a new API designed from the ground up for reactive programming against relational databases—its intent ito support reactive data access built on natively asynchronous, non-blocking SQL database drivers.

    How does this change the game for data access in the cloud? Used in conjunction with RSocket and Proteus, it is now possible to write applications benefiting from reactive streaming end-to-end, from the browser all the way to the database. No more fiddling with paging APIs, polling for updates, or writing complex logic to merge data from multiple sources--reactive streams can handle this all for you!

    RSocket is an open-source, reactive networking protocol that is a collaborative development initiative of Netifi with Pivotal, Facebook, and others. Proteus is a freely available broker for RSocket that is designed to handle the challenges of communication between complex networks of services—both within the data center and over the internet—extending to mobile devices and browsers.

    Attend this webinar to learn how to use Pivotal Cloud Foundry with R2DBC and Proteus to build reactive microservices that return large amounts of data in a streaming fashion over RSocket.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Netifi Privacy Statement:
    https://www.netifi.com/privacy

    This webinar:
    https://content.pivotal.io/webinars/dec-6-end-to-end-reactive-data-access-using-r2dbc-with-rsocket-and-proteus-webinar
  • IDC Canada Predictions 2019
    IDC Canada Predictions 2019
    Lars Goransson and Tony Olvet Recorded: Dec 6 2018 51 mins
    IDC Canada's Lars Goransson and Tony Olvet present our key technology predictions for Canada that will impact every enterprise's ability to grow and compete over the next 18-36 months.

    This 45-minute webcast will unveil 10 key predictions across three main themes: business innovation, accelerated infrastructure, and the future of work. From artificial intelligence (AI) and the Internet of Things (IoT), to cybersecurity and digital identities, technology continues to shape business in every sector of the economy. How will these IT trends impact your organization and your customers?

    IDC’s predictions web conferences provide the vision and insight needed to navigate the rapidly changing landscape. We will draw on IDC’s industry-defining research as a foundation of our outlook and guidance to business and technology leaders in Canada.
  • The Advent of Serverless Technologies
    The Advent of Serverless Technologies
    Derek Yee & Remy Guercio, Product Marketing, Cloudflare | Arnal Dayaratna, Research Director, Software Development, IDC Recorded: Dec 6 2018 45 mins
    Over the past decades we’ve seen advances in application deployment evolve from bare metal, virtual machines to the cloud and containerized services. While the cloud is the defacto infrastructure platform for the modern enterprise, shifts are already beginning to take place that offer hints towards the next evolution in deployment services. Developers are increasingly influencing infrastructure decisions, in need of faster deployment times and leaner capacity investments.

    Join Cloudflare and a guest speaker from IDC in this 45-minute webinar to learn about:

    -The current role of network service providers
    -Challenges facing IT in the current cloud environment
    -What is serverless and how it’s changing application development landscape
    -How Cloudflare is working to help push the boundaries with serverless
  • The Future of IT Infrastructure: 2020 and Beyond
    The Future of IT Infrastructure: 2020 and Beyond
    Jeanne Morain, Srikanth Balusani, Don Cox, Scott Goessling, Rob Whiteley Recorded: Dec 6 2018 45 mins
    When it comes to your infrastructure, the buzzwords and technologies are abundant: IaaS, software-defined, composable, cloud, and more. What does the future hold for the cloud infrastructure market and for IT Ops and DevOps teams? How will digital transformation and security continue to play a key role?

    Join this live panel discussion to answer these questions and more, and learn what should be top of mind for IT teams going into 2019 and beyond.

    Topics include:
    - Containers, Kubernetes and serverless - the next wave of IaaS?
    - What is composable infrastructure and what does it mean for your data center, on-prem and in the cloud?
    - Should software-defined infrastructures and SDDC's still be top of mind for your tech teams? Why or why not?
    - Best practices for securing your network infrastructure

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Srikanth Balusani, CTO, MST Solutions, Don Cox, CISO, MEDNAX, Scott Goessling, CTO, Burstorm, and Rob Whiteley, CMO, NGINX
  • IDC FutureScape: Worldwide Future of Work 2019 Predictions
    IDC FutureScape: Worldwide Future of Work 2019 Predictions
    Roberta Bigliani, Vice President, Avinav Trigunait, Research Director, Holly Muscolino, Vice President Recorded: Dec 6 2018 59 mins
    In this IDC FutureScape presentation, analysts discuss key predictions that will impact CIOs and IT professionals in the future of work over the next one to five years.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • How to Get Your Business Digital Ready
    How to Get Your Business Digital Ready
    Ghassan Abdo, Research VP, IDC and Danny Johnson, Director of Product Marketing, Verizon Recorded: Dec 6 2018 61 mins
    Join Verizon and Ghassan Abdo, Research VP, Worldwide Telecom Cloud, & Virtualization Services, IDC for an engaging discussion about digital transformation and what organizations should consider as they take the next step in their digital journey. Get more insight into the key findings from the recent IDC MarketScape: Worldwide Communication SP SD-WAN
    Managed Services 2018 Vendor Assessment as well as the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment. Plus, find out what your organization needs to do to become a digital leader and improve business outcomes. Participants will be able to download a complimentary copy of the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment, and a Verizon authored decision-maker’s guide.

    About the speakers:
    Ghassan Abdo, Research VP, WW Telecom Cloud, & Virtualization Services, IDC
    Mr. Abdo, Research Vice President in the Telecommunications group, covers the evolution of the Telco Cloud Ecosystem as well as the emerging Virtualized Enterprise Networking services. His primary focus areas include Service Provider SD WAN and Managed Services, and emerging NFV-based Virtual Networking Services as well as other Managed WAN Services. In the Hosting & Cloud segment, Ghassan covers Service Provider Managed Hosting services, including Hybrid Managed Private/Public Cloud Services, Colocation Services, Secure Cloud Connect and CDN services.

    The session will be moderated by Danny Johnson, 20+ year veteran in the technology industry. He is a seasoned executive possessing experience in software development, engineering, sales, consulting, product development, and marketing. Danny has started and launched innovative products and solutions within multi-billion dollar markets and is currently the head of product marketing for Verizon where he shares responsibility for the profitable growth of Verizon’s Strategic Network Portfolio.
  • Expert Talk am 6. Dezember: Die agile Transformation & DevOps
    Expert Talk am 6. Dezember: Die agile Transformation & DevOps
    Moderation: Helge Sanden, IT-Onlinemagazin / Experten: Oliver Bergius, PwC & Peter Vollmer, Micro Focus Recorded: Dec 6 2018 59 mins
    Expert Talk am 6. Dezember 2018, 10 Uhr -
    in Kooperation mit PwC und Micro Focus, moderiert von Helge Sanden, IT-Onlinemagazin

    Die agile Transformation und DevOps - Unternehmen auf der Reise zur besseren Anpassungsfähigkeit

    In einer Zeit mit kontinuierlichen und grundlegenden Veränderungen brauchen Unternehmen ein hohes Maß an Flexibilität, um ihre Strategie und dessen Umsetzung schnell adaptieren und optimieren zu können. Nur wenn man eine unternehmensweite agile Transformation schafft, können die für agileres Arbeiten hinderlichen „Silos“ verschwinden. Doch derartig weitreichende Veränderungsprojekte bergen ein hohes Risiko des Scheiterns.

    Wie Unternehmen ihre agile Transformation geschafft haben, worauf dabei zu achten ist und welche Erfolgsfaktoren es gibt, soll in einem ExpertTalk mit Oliver Bergius (PwC) und Peter Vollmer (Micro Focus) diskutiert werden. Beide Experten haben in Summe bereits mehrere hundert Unternehmen auf ihrem Weg in eine agile Organisation begleitet.

    In einem weiteren Diskussionsschwerpunkt wird es um die DevOps-Transformation gehen. Hieran wird aktuell in vielen IT-Bereichen gearbeitet, um Anwendungsentwicklung und Betrieb enger zu verzahnen, damit man zeitnah und flexibler auf Marktanforderungen, Fachbereichsbedarfe und technologische Veränderungen reagieren kann.

    Wenn Sie im Vorfeld Fragen an die Teilnehmer haben, senden Sie diese vorab gerne an redaktion@it-onlinemagazin.de, damit wir diese im Gespräch berücksichtigen können.

    Wir freuen uns auf Ihre Teilnahme!
  • Why Is Open Source Use Risky?
    Why Is Open Source Use Risky?
    Adrian Lane, Analysis, Securosis Dec 12 2018 10:30 am UTC 43 mins
    When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.

    The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
  • Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Victoria Oiknine, Project Manager at WhiteSource Dec 12 2018 11:00 am UTC 15 mins
    Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!

    WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.

    Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
  • Illustrating the Systemic Risk Caused by Open Source Library Use
    Illustrating the Systemic Risk Caused by Open Source Library Use
    Tim Jarrett, Senior Director of Enterprise Security Strategy, Veracode Dec 12 2018 11:30 am UTC 48 mins
    How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.

    Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
  • Latest UK trends in Quality Assurance and Software Testing
    Latest UK trends in Quality Assurance and Software Testing
    Gary Moore, Vice President, Sogeti UK, Malcolm Isaacs, Sr. Solution Marketing Manager, Micro Focus Dec 12 2018 2:00 pm UTC 45 mins
    The latest edition of the World Quality Report 2018-19 analyses responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discussed the trends shaping QA and testing today, along with recommendation for addressing tomorrow’s challenges.

    In this webinar, we will explore the findings for the UK and the capabilities required for:
    -Complex integration testing
    -Test automation across decentralized teams
    -Virtualization and the rise of containerized test environments

    Put your questions to our experts during the live Q&A and leave with a better understanding of what is top of mind for QA and testing professionals in the UK.
  • IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    Kevin Prouty, Vice President, IDC Energy Insights Dec 12 2018 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Oil & Gas team discusses the key predictions that will impact CIOs and IT professionals in the worldwide oil & gas industry over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • The Evolution and Future of DevOps
    The Evolution and Future of DevOps
    Jonathan Sullivan, CTO Dec 12 2018 5:00 pm UTC 45 mins
    At NS1, we see DevOps as helping improve scalability and the application delivery process as a whole. Despite its benefits, moving to DevOps can be a challenging undertaking, especially for organizations riddled with legacy applications and technology. Many companies fail to reap the benefits because making the shift requires substantial changes to culture, processes and the resulting toolset.

    As we move into 2019, the emergence of DevOps continues to be a part of a growing number of global enterprises. With the rise of this methodology, what new DevOps trends have yet to appear?

    In this panel we will cover:

    - What DevOps looks like at NS1
    - What has the evolution of DevOps looked like?
    - What are some of the remaining challenges left for DevOps to solve?
    - What we still see as lacking from the DevOps tool belt?
    - What is the future of DevOps?
  • 10 Things Every Developer Using RabbitMQ Should Know
    10 Things Every Developer Using RabbitMQ Should Know
    Jerry Kuch, Senior Principal Software Engineer & Wayne Lund, Advisory Data Engineer, Pivotal Dec 12 2018 6:00 pm UTC 60 mins
    RabbitMQ is the most popular open-source message broker. It’s a de facto standard for message-based architectures. And yet, despite the abundant documentation and usage, developers and operators can still get tripped up on configuration and usage patterns.

    Let’s face it: some of these best practices are hard to capture in docs. There’s a subtle difference between what RabbitMQ *can* do, and *how* you should use it in different scenarios. Now is your chance to hear from seasoned RabbitMQ whisperers, Jerry Kuch and Wayne Lund.

    Join Pivotal’s Jerry, Senior Principal Software Engineer, and Wayne, Advisory Data Engineer, as they share their top ten RabbitMQ best practices. You’ll learn:

    - How and when—and when *not*—to cluster RabbitMQ
    - How to optimize resource consumption for better performance
    - When and how to persist messages
    - How to do performance testing
    - And much more!
  • Real Life Secrets and Best Practices of Processing Real-Time Data
    Real Life Secrets and Best Practices of Processing Real-Time Data
    Darren Chinen, Senior Director Data & AI, Malwarebytes and Priya Balakrishnan, Sr. Director of Product Marketing, Redis Labs Dec 12 2018 6:00 pm UTC 56 mins
    Malwarebytes, the industry-leading anti-malware, and internet security software company, also leads in innovative threat intelligence. One such tool is the interactive remediation map, a worldwide security vulnerability.

    Join us to learn how Malwarebytes uses Redis Enterprise at the heart of their data streams to centralize and visualize data in real-time, providing global information on threats detected, how a virus is conceived and the eventual spread through the world. In this talk, Darren Chinen, Sr. Director, Data and AI at Malwarebytes, will illustrate their use of Redis Enterprise. In this webinar, you will learn to:

    - Drive analytics for heat maps and their threat intelligence tool
    - Capture global malware records and real-time streams and drive stateful transformation
    - Efficiently cache large amounts of data for interactive exploration of malware
  • Agile Portfolio Management: Three best practices
    Agile Portfolio Management: Three best practices
    Alan Wendt, Micro Focus Dec 12 2018 6:00 pm UTC 60 mins
    DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.

    Join us to hear more about:
    • How lean thinking helps to meet changing business demands and speed up the decision-making
    • The limitations of annual-only portfolio planning cycles
    • The incredible power of aligning the work to the organization’s intended outcomes
  • Building cloud-native applications with a container-native SQL database in the p
    Building cloud-native applications with a container-native SQL database in the p
    Eamon McCormick manager, Emerging Technologies, Red Hat & Boris Bulanov vice president, Technology, NuoDB Dec 12 2018 7:00 pm UTC 60 mins
    This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:

    Seamlessly deploy and manage applications in a modern architecture.
    Maintain the benefits of SQL and gain on-demand, horizontal scalability.
    Deploy a technology stack that facilitates efficiency and a DevOps structure.
  • 3 Key Essentials for Moving AV to the LAN
    3 Key Essentials for Moving AV to the LAN
    Brian Simmons, Copper Product Manager Dec 12 2018 7:00 pm UTC 60 mins
    AV technologies are advancing rapidly, and the amount of video traffic crossing IP networks is growing at a rate of 25% every year. By 2021, it’s expected that one million minutes of video traffic will cross global IP networks every single second. With that kind of demand, it’s more important than ever to install an AV system that not only delivers flawless image quality with low latency but also delivers the scalability and flexibility needed to expand your system. Attend this webinar to learn best practices for enterprise AV systems.

    This webinar will cover:
    -AV technologies available today and on the horizon
    -Benefits of migrating your AV system to the IP network
    -How to select the right solution to avoid potential pitfalls.
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Dec 13 2018 10:00 am UTC 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • 4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    Yaacov Ben-Yaacov, CEO, Catch Media Dec 13 2018 4:00 pm UTC 60 mins
    In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.

    Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.

    On this webcast you’ll learn:
    • Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
    • 4 steps needed to engage consumers, drive lifetime value and increase revenue
    • Why Catch Media chose Vertica for scale, performance, and flexibility
    • How businesses that embed Vertica can deliver higher value to customers
  • The Future of Backup Isn't Backup
    The Future of Backup Isn't Backup
    Steve Blow Dec 13 2018 6:00 pm UTC 34 mins
    Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.

    Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
  • Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, Kong Dec 13 2018 6:00 pm UTC 49 mins
    With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.

    As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.

    In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.

    Webinar takeaways:

    - Learn about the three forces leading us towards cloud-native first architectures
    - Understand how we got here – the milestones marking the maturity of Kong
    - Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
    - Why you need a solution that can support all of your deployment patterns.
  • The Complete Guide to Crowdsourced Security Testing
    The Complete Guide to Crowdsourced Security Testing
    Rajesh Krishnan, Product Marketing, Synack Dec 13 2018 6:00 pm UTC 22 mins
    Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.

    Join this webinar to learn:
    - Why crowdsourcing hackers and bug bounty is trending
    - Who these crowdsourced hackers are and what they do
    - Where crowdsourced security programs differ
    - How to decide what crowdsourced programs best fit your organization
    - Where the future of crowdsourced security is heading
  • Game Thinking for Rapid Innovation
    Game Thinking for Rapid Innovation
    Amy Jo Kim Dec 13 2018 6:00 pm UTC 60 mins
    How are market-leading products born? What conditions set the stage for successful innovation?

    By definition, successful innovations reach a mainstream audience. But they never start off that way. That’s the paradox of innovation: the “typical” people in your market are not the same ones you need to “woo” when bringing your idea to life.

    That’s where Game Thinking comes in. Game Thinking is a proven system for accelerating innovation and creating products that people love...and keep loving. Game Thinking empowers product leaders, designers and entrepreneurs to engage customers deeply over time - using design techniques from hit games. Learn how to create products that empower your customers to get better at something they care about -- like playing an instrument or leading a team. Building on the principles of lean/agile design and design thinking, Game Thinking delivers powerful strategies that help you:
    Keep customers engaged with a coherent, compelling journey to mastery
    Build a product customers love using insights from high-need Superfans
    Rapidly improve your product concept by testing and tuning the core experience
    Build the right MVP for your product using the Game Thinking roadmap

    If you want actionable insights that will help you innovate faster & smarter, you won’t want to miss this fast-paced, informative talk.
  • Distributed Machine Learning with H2O on Containers
    Distributed Machine Learning with H2O on Containers
    Vinod Iyengar, Sr. Director, Alliances, H2O.ai; Nanda Vijaydev, Sr. Director, Solutions, BlueData Dec 13 2018 6:00 pm UTC 60 mins
    Join this webinar to learn about deploying H2O in large-scale distributed environments using containers.

    Artificial intelligence and machine learning are now a top priority for most enterprises. But it can be challenging to implement multi-node AI / ML environments for data science teams in large-scale enterprise deployments.

    Together, BlueData and H2O.ai deliver a game-changing solution for AI / ML in the enterprise. In this webinar, discover how you can:

    -Quickly spin up containerized H2O and Driverless AI environments whether on dev/test or production
    -Ensure seamless support for H2O running on CPUs or GPUs, and provide a secure connection to your data lake
    -Operationalize your distributed machine learning pipelines and deliver faster time-to-value for your AI initiative

    Find out how to run AI / ML on containers while ensuring enterprise-grade security, performance, and scalability.
  • Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics
    Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics
    Adam Satterfield, Technology Program Director at Anthem and Ryan Yackel, Director of Product at QASymphony Dec 13 2018 6:00 pm UTC 56 mins
    In today’s hyper-competitive software market, companies are ever pressing to deliver products more quickly and efficiently. As a result, it is imperative for organizations to implement a more strategic approach to quality. A strategic approach requires QA teams to gather more comprehensive data on the value of quality tasks in the delivery pipeline. And it often requires a different approach to reporting, and a focus on metrics that help the business measure release readiness and assess overall application quality.

    Join us as Adam Satterfield shares the key metrics today’s software QA teams should be collecting, how to tell the story of your data and how to better understand different audiences within your organization to deliver insights that matter. Ryan Yackel will also dive into how some of these insights can be applied in qTest Insights.

    In this webinar, you will learn how to gather the metrics for 3 key areas to demonstrate business value, including:

    - The cost of a defect
    - Efficiency gains from test automation
    - Risk identification through coverage metrics
  • Chaos Engineering in a World of Distributed Spring Boot Apps
    Chaos Engineering in a World of Distributed Spring Boot Apps
    Russ Miles, Benjamin Wilms, Codecentric Dec 13 2018 6:00 pm UTC 60 mins
    As developers, one of our primary goals is to develop stable, secure, and bug-free software that will not deprive us of sleep or keep us away from new and exciting topics. To accomplish these and other goals, we write unit and integration tests that alert us to unexpected behavior and ensure the patterns we test don’t lead to errors. However, today’s architectures contain many components that can’t be fully covered with unit and integration tests. Thus, servers and components we’re not aware of still manage to drag our entire system into the abyss.

    This issue led to the birth of the Chaos Monkey for Spring Boot. The inspiration was Netflix’s Chaos Monkey and the culture of Chaos Engineering. On an application level, we want the possibility to cause specific stress and error situations.

    This session will detail the possibilities and deployment scenarios of the Chaos Monkey for Spring Boot. You will also learn how well the ChaosToolkit works together with the Chaos Monkey for Spring Boot.


    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Codecentric Privacy Statement:
    https://www.codecentric.de/privacy-policy/

    This webinar:
    https://content.pivotal.io/webinars/dec-13-chaos-engineering-in-a-world-of-distributed-spring-boot-apps-webinar
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Dec 13 2018 8:00 pm UTC 60 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • A Recap of re:Invent 2018: NEW AWS Services and Announcements
    A Recap of re:Invent 2018: NEW AWS Services and Announcements
    Matt van Zanten, DevOps Engineer, Onica Dec 13 2018 9:00 pm UTC 60 mins
    Didn't make it to re:Invent 2018? Missed some of the key announcements? We got you! Join us for our 60 minutes webinar which will take you through key new AWS announcements including AWS RoboMaker, AWS Timestream and AWS IoT Events hosted by Onica's Matt van Zanten, DevOps Engineer.

    Here's what we will cover:
    -Net New Industry Services to AWS like AWS RoboMaker and AWS Ground Station
    -New Windows improvements and services such as Amazon FSX for Windows File Server
    -Additions and expansions to Serverless computing including Firecracker and AWS Lambda Layers
    -AWS IoT events and Onica’s involvement as a launch partner leveraging IoTanium
    -New management & governance services like the AWS Well-Architected Tool, AWS Control Tower and AWS Security Hub that make it easier for users to take on AWS on their own.
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Dec 17 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Александр Аверин, технический консультант по управлению информацией Micro Focus в России и СНГ Dec 17 2018 8:00 am UTC 60 mins
    В рамках вебинара мы расскажем вам о новом функционале программных решений Micro Focus по резервному копированию и восстановлению данных (Data Protector) и аналитике систем резервированя данных (Backup Navigator)
  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Dec 17 2018 9:00 am UTC 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.