Hi [[ session.user.profile.firstName ]]

Application Development

  • Inside Server Evolution and Spending: Insights from 451 Research
    Inside Server Evolution and Spending: Insights from 451 Research Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure Recorded: Apr 27 2017 60 mins
    As workload migration to public cloud continues, IT organizations face a wealth of challenges as they determine the most effective compute ecosystem for their needs. Server technologies are evolving quickly—from converged to hyperconverged to composable—and finding the right fit for on-premises workloads is now a critical component of infrastructure strategies. This webinar will explore the drivers behind enterprise server purchases and how they are planning for the future.

    Join Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure, for this interactive webinar highlighting analysis of customer spending and adoption trends from 451 Research’s latest survey of IT buyers.

    During the webinar, learn:

    -Drivers of today’s purchases of servers and converged infrastructure
    -Key customer pain points and objectives for servers and converged infrastructure
    -How cloud migration is impacting spending on servers and converged infrastructure
    -Where hyperconverged fits into new infrastructure deployments
    -How vendors are positioning themselves to win in this evolving compute market
  • Machine Learning and Malware: What You Need to Know
    Machine Learning and Malware: What You Need to Know Robert Leong, Dir, Prod Mgmt., McAfee Labs; Raf Los, Optiv; Dr. Paulo Shakarian; Brandon Dunlap (Moderator) Recorded: Apr 27 2017 59 mins
    The seismic jolt in the Threat Landscape caused by the success of threats like ransomware combined with the geometric rise of so-called zero-day malware (i.e. malware for which no AV signature defenses exist) has given rise to all manner of innovation in the Cybersecurity industry. But a lot of what is being said and presented in the market is really confusing and that’s a problem for practitioners. One of the most-frequently-used phrases in security today is “Machine Learning” or “Math-Based” and “Artificial Intelligence” or “AI”. These phrases are entering the security conversation to describe capabilities, approaches, and strategies, but in reality, they are confusing a great many people. Which begs the question: “What on Earth does it mean?” and “How can Machine Learning be used in Enterprise Security?” Join McAfee and (ISC)2 on April 27, 2017 at 1:00PM Eastern as we clear the confusion, explore the answers to these questions and discuss what this means for dealing with threats.
  • PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems
    PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems Paul Vanderlaan Recorded: Apr 27 2017 62 mins
    As more devices are made to support PoE, and as applications for PoE continue to emerge, what you know about PoE can help ensure your designers and installers are poised to respond to customer demand, and have the expertise to install best in class systems
  • Cloud Migration with a Microservice Architecture: A Coca Cola Case Study
    Cloud Migration with a Microservice Architecture: A Coca Cola Case Study Danny Eng, Enterprise Integration Architect, Coca-Cola; Jag Ramaswamy, Enterprise Integration Lead, Coca-Cola Recorded: Apr 27 2017 39 mins
    Just a few years ago, The Coca-Cola Company (TCCC) was completely on-premises, looking for a way to move toward their cloud-first strategy. Watch TCCC’s presentation from MuleSoft’s Atlanta Summit to learn Coke’s journey with MuleSoft starting from evaluation to how they are currently taking an API-led approach to integration. With this, Coke is now creating great customer experiences and enabling their sales force to continue to lead through innovation.

    Attendees will learn how TCCC is using MuleSoft to:

    - Implement a microservices architecture
    - Automate release management to accelerate time to production
    - Move from a COE to a Center for Enablement (C4E) to maximize reuse
  • Design as Strategy: Thoughts on User Experience and Virtual Reality
    Design as Strategy: Thoughts on User Experience and Virtual Reality David Mullett, VR Thought Leader Recorded: Apr 27 2017 49 mins
    As the digital experience proliferates in everyday life and we begin to migrate into the new virtual reality medium, how do we create the most human and organic digital experience?

    Moving forward, digital devices not only grow smaller and closer to the body, but daily use time explodes. The challenge is using design strategies around user experience to mitigate consumer pain points to allow for seamless immersion in your experience or VR product.

    We will talk about how about how design must be incorporated as a process and strategy in VR builds for success.
  • EMEA Software Customer Forums 2017 – Preview
    EMEA Software Customer Forums 2017 – Preview Toby Marsden, Kevin Leslie, Danny Cavion and Gopal Ramachandra, EMEA Directors, ADM and ITOM Portfolios, HPE Recorded: Apr 27 2017 31 mins
    Join the hosts of the EMEA Software Customer Forums 2017 for a sneak peek of the exciting customer presentations and product news from our strategy and best practice-sharing event.

    The EMEA Software Customer Forums are a great opportunity for IT Operations Management and Application Delivery Management practitioners to learn how their peers are utilizing HPE solutions to successfully reach technology and business objectives. Delegates will also get a preview of some new product developments from HPE Product Management and executives.

    Don’t miss out – join us on this webinar for a preview of the great content we’ll be sharing in-depth at the EMEA Customer Forum in Dublin from 15-19 May, more info and registration at www.hpe-customerforums2017.com.
  • [Live Panel] How to Put the Human First When Creating for Virtual Reality
    [Live Panel] How to Put the Human First When Creating for Virtual Reality Amandine Flachs, Realities Centre; Tom Evans, Trojan VR; Komal Sable, Tengio & Doug North Cook, Decoder Recorded: Apr 27 2017 60 mins
    Join us April 27th for a panel discussion on how to put the human first while creating for Virtual Reality. Part of the VR/AR BrightTALK Summit, our panelists will exchange on how to take user and audience in consideration during the Virtual Reality creation process.

    As Virtual Reality is getting more and more exposure, it is time to highlight the right practices of designing a Virtual Reality project and see what we can do to put the human first.

    - Do Virtual Reality creators consider the audience they address before/while developing their projects? Why is this crucial? How and when to do so?

    - Are we more careful today to offer more accessible VR experiences than a year ago?

    - How is this evolving? Do studios and creators tend to integrate more the human in the creation process?

    The panel will be led by Amandine Flachs, Events and Communication manager at the Realities Centre. She will be joined by a variety of Virtual Reality leaders, including creators, game developers, agency and B/B professionals.

    --------

    Panelists:

    - Amandine Flachs, Events & Comms Manager, Realities Centre

    - Tom Evans - CEO and co-founder at Trojan VR

    - Komal Sable - COO at Tengio

    - Doug North Cook - Creative director and co-founder at Decoder.
  • Introducing Microservices to Your Organization
    Introducing Microservices to Your Organization Matt McLarty, VP API Academy - CA Technologies Recorded: Apr 26 2017 45 mins
    Technologists in all industries are excited about the potential benefits offered by microservice architecture. However, many implementers struggle to identify a firm starting point on the road to microservice success. Join this discussion to learn the areas and techniques that will help you lead your organization on a practical path that will introduce microservice architecture and its associated practices in the right way.
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Recorded: Apr 26 2017 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • Virtual Reality Therapy for Pain and Anxiety during Procedures
    Virtual Reality Therapy for Pain and Anxiety during Procedures Brandon Birckhead is a physician who founded Immergence Technologies, LLC Recorded: Apr 26 2017 33 mins
    Webinar synopsis
    -Summarize the Studies on Non-immersive Virtual Reality Therapy
    -Summarize the Studies on Immersive Virtual Reality Therapy
    -Discuss Current uses of Technology
    -Discuss the Future of the Field
    -Q & A

    Brandon Birckhead is a physician who founded Immergence Technologies, LLC, a company to help dentists use virtual reality in their practice and collaborate with developers to create tailored content. He is also the coordinator of the VRARA Digital Health Committee. Current research focus has been on exploring the immersive effect of different VR applications. He graduated from Mayo Clinic Medical School in 2016.
  • Using Caching in Microservices Architectures: Session I
    Using Caching in Microservices Architectures: Session I Jagdish Mirani is a Product Marketing Manager in charge of Pivotal’s in-memory products Recorded: Apr 26 2017 54 mins
    In this 60 minute webinar, we will cover the key areas of consideration for data layer decisions in a microservices architecture, and how a caching layer, satisfies these requirements. You’ll walk away from this webinar with a better understanding of the following concepts:

    - How microservices are easy to scale up and down, so both the service layer and the data layer need to support this elasticity.
    - Why microservices simplify and accelerate the software delivery lifecycle by splitting up effort into smaller isolated pieces that autonomous teams can work on independently. Event-driven systems promote autonomy.
    - Where microservices can be distributed across availability zones and data centers for addressing performance and availability requirements. Similarly, the data layer should support this distribution of workload.
    - How microservices can be part of an evolution that includes your legacy applications. Similarly, the data layer must accommodate this graceful on-ramp to microservices.
  • Taking on Enterprise Agile with HPE
    Taking on Enterprise Agile with HPE Tye Davis, HPE Recorded: Apr 26 2017 41 mins
    One of the largest challenges that we see organizations faced with when adopting agile methodologies and practices, is to deliver fast with quality at scale. Agile and scaling Agile in the enterprise is a core part of HPE’s strategy as we continuously learn from our own R&D and HPE IT efforts, as well as our customers and partners to implement scaled Agile. This learning is applied to our software solutions that help enable Agile development, testing and scaled Agile including the Scaled Agile Framework. ALM Octane acts as the communication hub and decision support system to organize, plan, and deliver Agile projects on teams and scaled up in the enterprise. The tools empower programs and teams to manage their backlog with visibility into development and testing data, and with analytics/insights for release forecasting, tasks completion and resource allocation.

    Join Tye Davis, Product Marketing Manager for Enterprise Agile, to see enterprise agile in action and get a preview of the latest software solution for application lifecycle management. See what HPE is doing to help organizations implement scaled agile.

    This is part three in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    A look at the future of software testing: HPE vision for Continuous Testing, March 29
  • Making Augmented, Mixed & Virtual Reality a Profitable Endeavor
    Making Augmented, Mixed & Virtual Reality a Profitable Endeavor Jay Samit, Disruptor, Author (Disrupt You!), Speaker, Serial Entrepreneur & Professor Recorded: Apr 26 2017 46 mins
    Augmented, mixed, and virtual reality compose a spectrum for next-gen computing that is disrupting or accelerating the business objectives of companies across almost every industry. With an ever growing number of pilots and available solutions, it is imperative that businesses develop a strategy of where to play and how to win, while avoiding technology for technology’s sake, in order to create new value.

    Jiten Dajee is a subject matter expert on digital reality technology spanning the entire value chain of augmented, mixed, and virtual reality. Jiten has been involved with Digital Reality technology since his first joint-venture in healthcare wearables in 2011. He joined Deloitte Consulting Innovation to lead the rapid commercialization of digital reality across industrial and commercial sectors. He brings an end-to-end understanding of how optics, networks, semiconductors, platforms, products, and will interact in the next-gen computing medium. Jiten specializes in market intelligence, technology adoption, solution integration, and strategic growth planning of digital reality in enterprise.
  • Technical Introduction to Ubuntu Core
    Technical Introduction to Ubuntu Core Oliver Grawert, Software Engineer (Canonical) Recorded: Apr 26 2017 61 mins
    A webinar diving in the technology inside Ubuntu Core, the version of Ubuntu dedicated to IoT Hosted by Oliver Grawert, the Engineer behind the Ubuntu Core images for Raspberry Pi and DragonBoard,

    What will you learn?
    * Ubuntu Core in depth technical coverage
    * Building an Ubuntu Core device image
    * Packaging apps as snaps for IoT deployment
  • VR/AR For Enterprise: Building a Practical Roadmap for Success
    VR/AR For Enterprise: Building a Practical Roadmap for Success Amy Peck, Founder, endeavorVR Recorded: Apr 26 2017 31 mins
    While many companies and institutions understand the need to investigate AR and VR, the path to success is a long one. Often, there are several teams at a single company looking at ways to leverage this technology, for internal processes as well as customer- and consumer-facing solutions.
    This panel will explore ways to effectively bring this vision to fruition:
    • Identifying the right use cases
    • Getting internal buy-in and budget
    • Finding development resources
    • Rolling out new AR/VR processes and products
  • RGPD, LPM, DSP2 : Comment résoudre le paradoxe de la nécessité d'ouvrir son SI e
    RGPD, LPM, DSP2 : Comment résoudre le paradoxe de la nécessité d'ouvrir son SI e Marie-Benoîte Chesnay, Senior Principal Consultant chez CA Technologies Apr 28 2017 11:00 am UTC 60 mins
    Les nouveaux usages de consommation et les nouvelles pratiques marketing favorisent la multiplication des données renseignées, collectées, analysées, et utilisées. Où sont ces données ? Comment les récupérer ? Peut-on les effacer ? Sont-elles exposées ?

    Le contrôle de leurs données échappe aux citoyens.

    Les entreprises font face à un paradoxe : nécessité d’ouvrir leur système d'information pour répondre aux besoins du marché et obligation de protéger les données exposées.

    Les différentes réglementations (RGPD, DSP2, Loi de Programmation Militaire) imposent aux entreprises de mettre en place les mesures nécessaires pour :
    •Protéger de manière proactive l'accès aux données personnelles,
    •Être en mesure de détecter les fuites de données et réagir rapidement.

    Pour renforcer la sécurité de son SI, et également se mettre en conformité, il est indispensable d'identifier, gérer et contrôler les accédants aux SI. Il est également indispensable pour les entreprises que ces obligations de sécurité n’impactent pas les efforts déployés pour optimiser et fluidifier l’expérience utilisateur.

    Dans ce webcast, nous vous proposons d’aborder les points suivants :

    1.Focus sur les différentes réglementations en lien avec les données personnelles : RGPD, LPM, DSP2

    2.Impact de ces réglementations sur les DSI

    3.Identification et contrôle des portes d'entrées aux données critiques
    Quelles sont les différentes portes d’entrées au SI
    Quels sont les risques associés à chacune d’entre elles
    Comment répondre à ces risques
  • The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps
    The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management; Mark Daly, Client Architect, MuleSoft May 2 2017 3:00 pm UTC 60 mins
    With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.

    Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:

    - A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
    - A view of Enterprise Architecture and DevOps from a leader in the field
    - What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
  • Virtual Load Balancer Challenges and How to Conquer Them
    Virtual Load Balancer Challenges and How to Conquer Them Ashish Shah May 2 2017 5:00 pm UTC 45 mins
    While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.

    Join us for this 30 minute webinar with Q&A to learn how to overcome the challenges of using virtual load balancers.
  • Making Container Orchestration Easy
    Making Container Orchestration Easy Bich Le - Chief Architect, Co-founder May 2 2017 5:30 pm UTC 45 mins
    Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
  • Women in Cyber: Why Can’t We Attract Them?
    Women in Cyber: Why Can’t We Attract Them? Jarad Carleton, Dr. Richard Horne, Vicki Gavin, Dr. Sue Black, Lynn Terwoerds, Jill Slay May 3 2017 12:00 pm UTC 60 mins
    Cybersecurity is one of the most important, yet misunderstood and underappreciated professions in the world. It has near-zero unemployment and a worker shortfall that grows every year—a gap projected to reach 1.8 million by 2022. Given the talent shortfall, and the apparent attention, it is difficult to understand why more women are not attracted to the field. If they were, the workforce gap could be reversed.

    A panel of thought leaders will discuss concrete steps to close the workforce gap, the role that women should play in achieving that goal, the equality challenges facing women in the profession, and quantitative key performance indicators that organizations must implement to create a gender-balanced workforce that offers equal opportunities for all professionals.
  • Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps
    Strategies on how to Overcome Security Challenges Unique to Cloud-Native Apps Zane Lackey, Signal Sciences and Kamala Dasika, Pivotal May 3 2017 4:00 pm UTC 60 mins
    As IT organizations build and release software continuously, how do security teams become enablers of this pace? How can you ensure that the higher rate of change is not leading to lesser security?

    Join our webinar to learn how Pivotal and Signal Sciences work together to make app deployments faster *and* safer in cloud-native environments.

    This webinar will cover:
    - Best practices for implementing new security programs and incentivizing their adoption
    - How to simplify application layer security deployments across a variety of apps, teams and cloud infrastructures
    - How threat visibility and real time attack telemetry brings security context into DevOps teams, and improves response times.
  • Purpose-built In-Memory NoSQL Database for IoT – GridDB
    Purpose-built In-Memory NoSQL Database for IoT – GridDB Basavaraj Soppannavar, Sr. Strategist IoT, Toshiba America Research Inc. May 3 2017 5:00 pm UTC 60 mins
    Toshiba's GridDB is an open source specialized data store purpose-built for handling enormous amounts of data generated by the Internet of Things (IoT). GridDB offers in-memory processing to boost performance, time-series functionalities for IoT data, excellent scale-out on commodity hardware for increasing data needs and great reliability for mission-critical applications.

    Toshiba has been building large scale IoT projects even before IoT was known as IoT. GridDB was conceived at Toshiba in 2013 to solve growing data needs and time-series data related problems that its customers faced. Since 2014 Toshiba’s customers in Japan spanning industries such as utilities, manufacturing, building management etc. have been harnessing the power of GridDB.

    Join us to know more about:
    1. Properties of IoT data and database requirements for handling it
    2. Overview of GridDB
    3. Technical details of GridDB including data models, performance, scalability, and reliability
    4. Real world IoT use cases powered by GridDB
    5. Programming Demo - modeling sample Wind Mill farm data using GridDB
  • Accelerate Mobilizing your Customers with SAP Cloud Platform
    Accelerate Mobilizing your Customers with SAP Cloud Platform David Sacks, Senior Director, Platform Partner Ecosystem, SAP, and Holger Fritznger, SAP May 4 2017 2:00 pm UTC 60 mins
    For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.

    Join us on May 4 to find out about the recently released SAP Cloud Platform SDK for iOS, the latest mobile tools for SAP Cloud Platform, and how extending your SAP partnership to include the Build engagement model of the SAP PartnerEdge program can help you monetize your software efforts.

    SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
    • Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
    • Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
    • Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
    • Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
    • Leverage SAP Digital Channels and flexible license options to market your packaged solution to approximately 300,000 SAP customers
  • Briefings Part 3: The Future of BYOD Security
    Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator May 4 2017 5:00 pm UTC 75 mins
    Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
  • Empowering Government Agencies with Secure Data Exchange Services
    Empowering Government Agencies with Secure Data Exchange Services Pete Cafarchio and Bud Walder May 4 2017 5:00 pm UTC 30 mins
    Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.

    In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:

    •Digital technology accelerators
    •Security and compliance brakes
    •Secure data exchange services solutions

    We'll take a look at some real world success stories including:

    •Turning a costly background check workflow into a profit center
    •Simplified statewide financial reporting workflows
    •Secure data collection for sensitive population health reporting
  • How Cylance Prevents Ransomware Attacks
    How Cylance Prevents Ransomware Attacks Brian Robison, Senior Director, Technical Marketing at Cylance® May 4 2017 6:00 pm UTC 60 mins
    Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.

    Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:

    •Different ransomware types
    •Delivery methods, including drive-by downloads and fileless malware
    •Why launching attacks is cheap and easy with ransomware-as-a service
    •How Cylance prevents both file-level and disk-level encryption
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto May 9 2017 3:00 pm UTC 45 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the enterprise
    •What cloud access management is
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • Real World Deployments of the oneM2M Standard
    Real World Deployments of the oneM2M Standard Ken Figueredo, Sookhun Jeon, JaeSeung Song, David Wollman May 10 2017 3:00 pm UTC 75 mins
    As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.

    Now in its second published release, it is being deployed in a number of projects.

    Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:

    • 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
    • In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
    • Overview of oneM2M certification(including background of the need for oneM2M certification program).
    • Introduction of Certified Product (Target service and use cases are included per each company).
    • An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.

    Speakers:
    -- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
    -- Sookhun Jeon, Telecommunications Technology Association (TTC)
    -- JaeSeung Song, Assistant Professor, Software Engineering and Security group (SESlab), Computer and Information Security Department, Sejong University
    -- Dr. David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST

    To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at vmitchell@tiaonline.org.

    To learn more about oneM2M, visit: http://www.onem2m.org/
    To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
  • The API Economy in Banking what is the impact of GDPR
    The API Economy in Banking what is the impact of GDPR David Harvey, Senior Principal Banking Practice, NTT DATA Services, Richard Price Sales Director, FSI UK & Ireland, TIBCO May 11 2017 1:00 pm UTC 210 mins
    Regulatory conditions are preventing many banks from consolidating in the market, and there is evidence to support those financial institutions will need to re-engineer their own businesses, and customer propositions, and transform current models to remain relevant, nurture and grow their customer bases.

    As part of this process, developing differentiating capabilities will be key in highly competitive markets and innovation through the adoption of the new ‘Fintech ecosystem’ or “fintegration” (i.e. the marrying up of banks and Fintechs) will be pivotal in the banking industry’s fight to maintain their current business and grow. Join David Harvey, Senior Principal Banking Practice, NTT Data Services, and guest speaker Richard Price Sales Director – FSI UK & Ireland, TIBCO
    Banking Sector to be announced to learn about:
    Trends, Implications, Challenges and Proposed Solutions

    - The drive to open up APIs in the new Digital banking Economy
    - Approaches on how to better leverage new technologies through Open APIs
    - Best Practice in how to go about partnering
    - How to achieve Data Governance and Security whilst opening up
    APIs to third parties
    - What technologies can we leveraged (Robotics, Machine Based learning, Big Data Analytics and the Digital sixth sense)
  • Data Residency: Challenges and the Need for Standards
    Data Residency: Challenges and the Need for Standards Andrew Watson, Vice President and Technical Director, OMG; Claude Baudoin, owner, cébé IT & Knowledge Management May 11 2017 2:30 pm UTC 60 mins
    As data is increasingly accessed and shared across geographic boundaries, a growing web of conflicting laws and regulations dictate where data can be transferred, stored, and shared, and how it is protected. The Object Management Group® (OMG®) and the Cloud Standards Customer Council (CSCC) recently completed a significant effort to analyze and document the challenges posed by data residency.
    Data residency issues result from the storage and movement of data and metadata across geographies and jurisdictions. Attend this webinar to learn more about data residency:

    •How it may impact users and providers of IT services (including but not limited to the cloud)
    •The complex web of laws and regulations that govern this area
    •The relevant aspects – and limitations -- of current standards and potential areas of improvement
    •How to contribute to future work
  • An Intro to Kubernetes Concepts
    An Intro to Kubernetes Concepts Ryan Jarvinen May 11 2017 5:00 pm UTC 60 mins
    Join Carter Morgan, Developer Programs Engineer at Google and Ryan Jarvinen, Developer Advocate at CoreOS, for an introduction to Kubernetes concepts, including:
    - A general overview of Kubernetes
    - What it means for the industry overall
    - General concepts you need to be familiar with to jump start your way into using and seeing the benefits of a Kubernetes world
  • Passing the Audit: What you need to know to be CJIS compliant
    Passing the Audit: What you need to know to be CJIS compliant Eric Avigdor, Director of Product Management at Gemalto May 15 2017 6:00 pm UTC 60 mins
    Did you know if your organization receives criminal history information as part of licensing or a background checks, you are required to comply with the FBI CJIS Security Policy (CSP)? State agencies are also authorized to conduct formal audits to make sure compliance is met.
    Compliance is just one benefit. Advanced authentication is also required when remotely accessing the FBI’s CJIS repository. Putting in place this technology helps law enforcement in the field have secure and timely access to important information when they need it.

    Join us for an informative webinar where you will learn the basics to secure your devices, networks and users and become compliant with the FBI mandate.
    Key attendee takeaways:
    •Overview of CJIS mandate and Advanced Authentication
    •Use case – our experience from the field
    •Comprehensive solutions that meet the stringent requirements of the CJIS mandate
    •Mapping solutions to the needs of your department
  • Journey to Cloud-Native: Making Sense of Your Service Interactions
    Journey to Cloud-Native: Making Sense of Your Service Interactions Kamala Dasika, Pivotal and Mike Villiger, Dynatrace May 16 2017 4:00 pm UTC 45 mins
    Environments running microservices are highly dynamic and could present a level of complexity in their operational data that makes root cause analysis particularly challenging and time consuming. Join Kamala Dasika from Pivotal and Michael Villiger from Dynatrace, to learn about how teams are overcoming this to manage services at scale by taking advantage of:
    - Automatic application-environment discovery
    - Service and process flows integrated with platform visibility, and
    - Self healing platforms

    This is the third webinar in the series presented by Pivotal and Dynatrace on modernizing your application portfolio to cloud-native.

    Webinars in this series are searchable by title:
    - Journey to Cloud-Native: Where to start in your app modernization process
    - Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
    - Journey to Cloud-Native: Making Sense of Your Service Interactions
    - Journey to Cloud-Native: Reducing Production Risks at Scale

    Thank you in advance for joining us.

    About the Speakers:
    Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.

    Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.
  • Connectivity: The Key to Powering IoT Healthcare Innovation
    Connectivity: The Key to Powering IoT Healthcare Innovation Tom Rose, Director of Business Development, IoT Solutions, KORE May 16 2017 5:00 pm UTC 60 mins
    Without connectivity, healthcare innovation powered by IoT is more idea than actuality. Drivers of healthcare innovation include increased public health expenditures, growing aging population and the prevalence of chronic disease, and the challenges of lack of funding and patient retention. Healthcare innovation can address these challenges with IoT such as the instrumentation of things, the instrumentation of places, patient monitoring and remote healthcare delivery.

    In this webinar, experts in the field of healthcare IoT will discuss:

    * The benefits of IoT in healthcare
    * Example use cases demonstrating this innovation
    * How to implement connected solutions to power innovation
    * How data flow between devices, to the cloud, and to enterprise systems can be achieved
    * How Kore powers mHealth Solutions

    Sign up for this 60-minute webinar today and gain valuable insights into building an effective IoT strategy within healthcare

    Guests:
    Tom Rose, Director of Business Development, IoT Solutions, KORE

    Moderator:
    Cory Anderson, Customer Marketing and Sales Enablement Manager, KORE
  • European Utilities: The Digital Transformation Journey
    European Utilities: The Digital Transformation Journey Yiru Zhong and Jonathan Robinson May 17 2017 1:00 pm UTC 60 mins
    As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
  • DevSecOps - It Can Change Your Life (Cycle)
    DevSecOps - It Can Change Your Life (Cycle) Colin Domoney, Consultant Solutions Architect (Veracode) & Daniel Geater, Senior Test Consultant (QualiTest Group) May 17 2017 3:00 pm UTC 60 mins
    Join us as we explain how a secured DevOps (DevSecOps) delivery process can be achieved using automated code scan, enabling significant shift left of issues detection and minimizing the time to fix.

    Whether you are considering DevSecOps, on the path, or already there, this webinar is designed to address your DevSecOps concerns.

    In this webinar, you can expect to learn:
    • The need for Application Security in today's digital economy
    • An understanding of the principles of DevOps
    • The challenges building security into DevOps (moving to DevSecOps)
  • Data Protection for IoT – Securing Enterprise Business Intelligence
    Data Protection for IoT – Securing Enterprise Business Intelligence Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security May 17 2017 3:00 pm UTC 60 mins
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942
    Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942 Henry Franc - Belden Canada, Jonathan Jew - J&M, Glenn Sexton - NIS, Limor Schafman - TIA May 17 2017 5:30 pm UTC 60 mins
    Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.

    Speakers:
     Henry Franc, RCDD OSP CDCDP, Belden Canada
     Jonathan Jew, J&M Consultants
     Glenn Sexton, President and Principal Consultant, NIS

    About TR-42 Telecommunications Cabling Systems Committee:
    The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.

    The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further information.

    Participate in TR-42: Contact Germaine Palangdao, gpalangdao@tiaonline.org