The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.
Attendees will learn how to:
- Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
- Reduce incident response and remediation time with automation.
- Find products that use automation to minimize their dependency on skilled security personnel.
Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
Please join Onica and AWS for a webinar focused on migrating Windows workloads to AWS and running .NET applications in the cloud. Whether you're running Microsoft Windows, SQL Server, Exchange, SharePoint, or custom .NET applications, you can rely on the secure global infrastructure of Amazon Web Services to easily run any Microsoft Windows Server application in the cloud. We’ll discuss the various benefits running Windows workloads on AWS bring such as cost savings & reliability as well as how to reinvent your business with accelerated innovation through Windows automation & faster .NET application release cycles.
What we'll cover:
•Why AWS is the chosen platform for Windows Workloads: more secure, more cost effective & higher performance
•Enhance your Windows applications and accelerate innovation by utilizing the AWS platform for serverless .NET development
•Demo on how to seamlessly integrate & automate your .NET development & deployment onto AWS
•Customer success story: Learn how Onica enabled a leading provider of technology-enabled financial solutions to deploy & re-deploy their 150+ Windows applications within minutes, greatly contrasting with an average pre-migration release window of 8.5 hours.
Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.
Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:
- The pros and cons to modernizing your monolithic applications
- Trends and technologies in application security
- The security risks associated with open source and cloud native applications
- How containers and microservice architectures can increase security and modernize your IT infrastructure
This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.
Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
The year 2020 is approaching faster that you imagined. And the paradigm is shifting rapidly, with go, no go decisions being made in seconds and the battle for customer loyalty becoming an everyday reality. As companies across the board are moving towards DevOps and a shift-left approach, defining clear goals and making the right decisions, right now, is critical to success. The enterprises that most espouse shared responsibility, empowered autonomous teams, and continuous learning environment allow DevOps to thrive in their organization, in the truest sense.
Join Zephyr Product Manager, Ankita Bhargava as she covers the four critical components to test management in a DevOps ecosystem and why it is integral to achieving continuous software delivery.
In this session Ankita addresses:
- Why your organization needs to focus NOW on Continuous Testing Agility
- Actions your organization can take to get ahead in the race
- How Zephyr is accelerating the global adoption of DevOps with the launch of Zephyr DevOps
Presenter Bio: Ankita Bhargava brings over 7 years of product, engineering, and networking technology experience. Prior to Zephyr, Ankita has worked in product and marketing roles in companies such as Godrej, Aadtech and Loadstar. She holds an MBA in Product Management & Marketing and a Bachelor’s degree in Computer Science. Outside of work, Ankita enjoys playing tennis, scuba diving, hiking and travelling and experiencing new cultures.
The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.
Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.
Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:
The who, what, where, why, when, and how’s of encryption
The difference between proprietary and open source encryption
Encrypting data at rest
Encrypting data in motion
Mobile devices and encryption
Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:
- A significantly more productive IDE for Serverless computing
- How to develop an end-to-end Serverless application in a few minutes
- How to build, test and deploy applications without leaving the IDE
- Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
- Learn about upcoming features - Serverless security and monitoring
Join this live Q&A with Amit Gupta, VP Product Management at Tigera, as he provides tips, advice, best practices and industry insights into going cloud native.
He will answer all of your questions live from DockerCon and help your organization discover why Kubernetes is the #1 container orchestration tool, how it plays a vital role in application security, and how clout native architectures help solve application connectivity problems.
Join this live panel discussion with experts at DockerCon to learn why Kubernetes is the most popular container orchestration tool and why application security is key to your cloud native journey.
Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:
- How are open source systems like Kubernetes changing the way we deploy, scale and manage applications?
- How does Kubernetes enable the cloud-native journey?
- Security best practices for Kubernetes deployment
- The major tenets of Kubernetes security
And much more!
This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.
Moderated by: Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies
Panelists: Amit Gupta, VP Product Management, Tigera, Omar Lari, Business Development Manager - Container Services, AWS and Susmitha Kanakamedala, Sr. Software Engineer, Box
Watch this important presentation by Jonathan Schabowsky, Senior Architect at Solace, for a fresh perspective on what your IT/OT organization can do to enable seamless and performant data movement across your hybrid cloud.
Gain new insights into:
-The forces driving ever great distribution of your enterprise data.
-The challenges that growing data distribution pose to your IT agility.
-The enterprise and future proofing requirements that you’ll want keep in mind as you navigate data distribution challenges .
Watch this webinar to learn what FIDO2 Authentication is, and how to architect FIDO2 Authentication within applications. This session is led by Derek Hanson, Yubico Senior Director of Solutions Architecture and Standards.
Key topics include:
- What is FIDO2
- Passwordless Login Demystified
- Making sense of FIDO2, WebAuthn, CTAP and U2F
This webinar is intended for Product managers and developers, though it is open to anyone interested.
Employee and customer experiences are key to business success. Whether you are in IT, Security, HR, or Customer Service, it’s critical to provide an experience that is specific to the individual’s needs.
ServiceNow eases this burden and enhances those experiences. However, IT leaders need to figure out how to quickly scale their business and bring data together by integrating dozens, if not hundreds of systems to ServiceNow, such as Workday, Jira, and Salesforce, to build that ultimate employee and customer experience.
Join Jitterbit for this webinar, “Creating Amazing Employee and Customer Experiences with ServiceNow through APIs and Integration,” to learn how APIs and integration enable the enterprise to combine all their valuable business data from disparate systems with ServiceNow to:
-Provide tailored employee and customer experiences
-Create new revenue-generating solutions faster and with fewer resources than you ever thought possible
-Quickly bring disruptive new ideas to market using the transformative power of APIs
-Instantly infuse intelligence such as real-time language translation and sentiment analysis to drive the customer experience
-Enable IT to focus more on higher value initiatives and leverage technology for the plumbing
Learn what keeps CISOs up at night when it comes to threats coming from the IoT. This session will cover:
Do I know what IoT devices are internal to my company? Do I know what IoT devices are externally entering my company via my employees, contractors and vendors?
Do I know what threats and vulnerabilities these IoT devices represent to my company?
Moderator: David Morris
Juanita Koilpillai, Chief Technology Advisor - Digital Risk Management Institute
Dick Morell, Managing Director and Group CTO - Falanx Group / Falanx Cyber Defense
Barak Engel, Chief Geek at EAmmune, CISO at Amplitude Analytics
The Sonatype 2018 DevSecOps community survey results are in. Hear how 2,076 professionals revealed mature DevOps organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale. Explore changing mindsets, technology investments, and breach patterns.
Attend this webinar to gain a new perspective on peer benchmarks surrounding DevSecOps adoption.
Internal DNS, has been a huge pain for network engineers for decades. Until now, the two choices for providing internal DNS have been to either “build your own” using complex, open-source platforms, or to buy expensive, proprietary appliances. Each option presents its own significant challenges and still faces limitations in reporting, auditing, and trouble shooting.
Join us to learn about modern challenges facing enterprise IT and how NS1's take on internal DNS can help.
According to the World Quality 2017-2018 report, 96% of respondents have adopted Agile, but a large percentage of them are also still using waterfall.
One of the challenges is how to bring these two platforms together and choose the best scaled agile that fits your organization, to continuously deliver quality applications.
In this webinar, Peter Vollmer (SPCT), Sridar Aladhi Venkatakrishnaiah (SPC) and Silvia Davis (SPC) will share their knowledge of the most common Scaled Agile frameworks, their nuances and tips on how to choose the right one for your needs.
Your organization cannot afford to let potential system flaws or weaknesses in your software applications be exploited. That is why knowing the distinct differences between these weaknesses is critical in successfully addressing them. During this webinar, one of CA Veracode’s security implementation experts will discuss how to identify these risk factors within your application landscape, and to:
•Learn a practical approach to helping security and development teams address these factors
•Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise
•Learn from examples of how organizations rely on application security technology and services to gain visibility into their overall landscape – and act upon it in the right way
Are your processes compliant by design? Watch this webinar hosted by AgFirst, the largest agricultural lending organization in the United States.
Watch now or block some time later today to hear Kevin Backus and Chris Miller explain how they use Bizagi to design and automate critical processes with compliance in mind.
You’ll learn how automated workflows redefined their operations by:
-Using processes as a common language for companywide transparency
-Easily staying compliant by adopting a compliance-first approach
-Creating agile processes for reacting to changing compliance requirements
Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.
Tune in for an interactive Q&A panel with industry experts as they discuss:
- What are the biggest threats to security in 2018?
- Key steps to take today to better secure your critical data assets
- Top technological advancements powering security
- CISO strategy in the age of breaches
Securing a portfolio of applications can be a practice in extremes. On one hand, you have a small team of security experts trying to help a multitude of developers, testers, and other engineers meet security requirements. At the same time, you have to support all the microservices that the Agile and DevOps teams are building and pushing to production anywhere from once a month to several times a day. Even if you have a fully staffed security team, there still are not enough experts in this area to go around, which means creating a guild of Security Champions is more important than ever.
Join Ryan O’Boyle, Manager of Product Security at CA Veracode and Ronda Kiser Oakes, Director DevOps Consulting at Perficient, who will examine the value of the Security Champion role within the development team. They will discuss which groups need to commit for the program to succeed, how to find good champions, and the benefits for all stakeholders. Based on lessons learned from building a successful Security Champion program over the past five years, you will come away with detail actionable steps to bootstrap, monitor, and maintain a customized program that fosters these champions in your organization and scales your security program.
This is an expanded version of what was presented at the KubeCon Lightning Talk
An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.
In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.
You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Attendees will learn:
- Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
- How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
- How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
With the rise of digital and mobile technologies across the financial services industry, traditional services are becoming commoditized. As a result, businesses must provide customers with seamless digital experiences in order to maintain customer loyalty and gain market share. Companies also need a clear line of sight into how application performance and customer experience are impacting revenue in real time.
Register for the webinar and find out how to:
- Analyze and optimize customer experience for your most critical customer journeys
- Gain insight into key customer segments and answer questions in real time
- Measure business KPIs like conversions and abandonment and understand the impact application performance is having on your bottom line
According to Gartner, the application layer contains 90% of all vulnerabilities.
Despite this alarming trend, many organizations are struggling to adopt application security best practices for protecting software, data and users. However, with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- a clear path toward adoption of application security best practices is within reach!
Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.
Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters
Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation
Jeff Snyder: CTO at Cloud Constellation Corporation
MongoDB 4.0, scheduled for release in Summer 2018, will add support for multi-document ACID transactions. Through snapshot isolation, transactions will provide a consistent view of data, and enforce all-or-nothing execution to maintain data integrity. Transactions in MongoDB will feel just like transactions developers are familiar with from relational databases, and will be easy to add to any application that needs them.
The addition of multi-document transactions will make it easier than ever for developers to address a complete range of use cases with MongoDB, although for many, simply knowing that they are available will provide critical peace of mind. The latest MongoDB 3.6 server release already ships with the main building block for those, client sessions.
The Spring Data team has implemented synchronous and reactive transaction support in preparation for the MongoDB 4.0 release, built on top of MongoDB sessions. Learn more about Spring Data MongoDB, and many new capabilities in the forthcoming Spring Data Lovelace release!
Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?
See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?
Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:
-What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
-How container-native storage lets you dynamically provision storage for your modern applications.
-How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?
Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.
Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.
Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
This webinar will focus on the issues surrounding the “Total Installed Cost” (TIC) of Backbone/Riser fiber cabling. We will explore the contributing factors to variability of TIC, focusing on field termination skill and the impact of permanent link testing on the individual connector PASS/FAIL decision making process (via a mathematical model).
We will also review the development of new tools and novel methods to mitigate errors that estimate Insertion Loss (IL) in field terminated connectors, including new “expert system” technology deployed to test connector IL during the termination sequence.
For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.
Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.
In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.
In this webinar, we’ll discuss:
-How Amazon EKS makes it easy to run Kubernetes on AWS
-How to leverage additional AWS services with EKS
-Optimizing costs on EKS
-Demo on how to move your cluster to run on Amazon EKS
-Customer success story
Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.
In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.
- What social enhancements are available in the latest release of Sitefinity
- Some useful ideas to increase the social savviness of your website
- How to integrate a social platform into Sitefinty using OAuth
Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.
Megan is a Customer Data Scientist at H2O. Prior to working at H2O, she worked as a Data Scientist building products driven by machine learning for B2B customers. She has experience working with customers across multiple industries, identifying common problems, and designing robust and automated solutions. Megan is based in New York City and holds a degree in Applied Mathematics. In her free time, she enjoys hiking and yoga.
Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.
Learn more about building and monetizing mobile cloud-based applications built on SAP Cloud Platform. With the SAP Cloud Platform SDK for iOS you have the tools needed to create, deploy, and manage powerful mobile apps combining the latest features from the iPhone and iPad with enterprise grade requirements like secure access to business systems and offline synchronization.
Please join us to learn about this exciting opportunity. SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
* Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
* Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
* Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
* Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
* Leverage SAP Digital Channels and the SAP ParnterEdge program to market your packaged solution to over 380,000 SAP customers
Hear from SAP executives as they discuss the benefits of the Build engagement model of the SAP PartnerEdge program, SAP Cloud Platform, and the latest SAP Cloud Platform mobile tools and technology.
Discover the opportunity and let us help you speed your time-to-market, mobilize your customers and grow your business.
Date: Tuesday, June 26th 2018
Time: 11 AM EDT
• Krishna Sunkammurali, Sr Director, Product Management, SAP Cloud Platform
• David Sacks, Senior Director, Platform Partner Ecosystem, SAP
What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?
Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.
Lance Ball, principal software engineer, Red Hat
Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.
Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.
Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:
· Master digital’s new rules of business
· Embrace the role that technology plays in business success
· Invest in modern application architecture to accelerate business development
· Work better with IT to bring your digital initiatives to market faster
All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.
Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research