Hi [[ session.user.profile.firstName ]]

Application Development

  • 5 Best Practices for App Adoption and Engagement
    5 Best Practices for App Adoption and Engagement Dustin Amrheim, VP Professional Services & Mobile, Pendo & Adam Covati, Sr. Director, Product Management, Bandwidth Recorded: Feb 21 2018 58 mins
    5 Best Practices for Highly Effective Mobile App Adoption and User Engagement
    How does your app stack up? Mobile product teams are challenged to drive app adoption and usage in an environment where most apps don’t last past the first use. Successful mobile teams don’t just drive one-way outreach in their app, they close the loop with customers - offering deep engagement and communication throughout the user journey.

    Why this webinar is worth your 60 minutes:

    * You’ll learn new tactics for user engagement that you can use inside and outside of your app
    * You’ll know how your users want to be contacted and surveyed
    * You’ll see how app owners and product managers can marry customer experience with app engagement
    * You’ll take actionable feedback that you can use immediately, no matter what kind of app you manage
  • Separating Feature Release from Code Deployment at Scale
    Separating Feature Release from Code Deployment at Scale Pete Hodgson, Software Architect and Ed Sawma, VP of Product Marketing, Split Software Recorded: Feb 21 2018 58 mins
    Engineering teams often quickly go from just having a few feature flags, to way too many. Feature flags enable continuous delivery, dark launches, A/B tests, canary releases, kill switches, beta programs, and more.

    It’s not long before the conditional statements littered through a codebase begin to chafe. Luckily there are some simple management techniques which help keep things under control. In this webinar continuous delivery consultant Pete Hodgson will introduce some of them.

    Attend this webinar to learn:
    - How to categorize feature flags
    - How namespacing flags can communicate flag status and ownership
    - Practical tips for keeping the number of flags manageable

    Presenters:
    - Pete Hodgson, Software Delivery Consultant
    - Ed Sawma, VP of Product Marketing, Split Software
  • From VMWare to Canonical OpenStack
    From VMWare to Canonical OpenStack Stephan Fabel, Arturo Suarez Recorded: Feb 21 2018 55 mins
    OpenStack has often been positioned as an alternative to traditional proprietary virtualization environments. Join Arturo Suarez and Stephan Fabel for:
    >A breakdown of differences between OpenStack versus traditional proprietary virtualization and information on identifying when it makes sense to use one or the other
    >Analysis on TCO, best practices and risks
    >A demo on how to migrate from a traditional proprietary environment into an OpenStack cloud
  • Understanding Application Vulnerabilities and How To Fight Them
    Understanding Application Vulnerabilities and How To Fight Them Robert Larkin, CA Veracode Solution Architect Recorded: Feb 21 2018 19 mins
    According to Gartner, the application layer contains 90% of all vulnerabilities. This is why you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise.

    Join this 20-minute webinar to see how Veracode can help your security and development teams identify and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
  • Verizon Threat Research Advisory Center - Cryptocurrency Attacks
    Verizon Threat Research Advisory Center - Cryptocurrency Attacks John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Feb 21 2018 89 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Last Minute Guide to Help Address GDPR Compliance
    The Last Minute Guide to Help Address GDPR Compliance Saab Bharaj, Principal Consultant, Data Protection and Privacy, Verizon Enterprise Solutions Recorded: Feb 21 2018 39 mins
    By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.

    Join our live webinar as a sanity check against best practice and real-life examples whether:
    - All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
    - Functional departments understand their risks and taken the correct steps to mitigate
    - Have sufficient transparency in place
    - Know which third parties are holding data on your behalf
    - Learn the required ongoing governance and testing of your compliance processes
  • How to Unlock the Value of Application Data & Improve Business Continuity
    How to Unlock the Value of Application Data & Improve Business Continuity Alwyn Royall, Solutions Consultant, COBOL, Micro Focus Recorded: Feb 21 2018 43 mins
    Working with COBOL data files, including the creation of reports, often requires specialty tools and developer skills. It’s time to improve business continuity, application availability and to work with COBOL data files in real time, using off-the-shelf analysis and reporting tools.

    Join Micro Focus on 21st February to:

    Discover the real challenges many teams face in working with COBOL data files

    Understand how to work with COBOL data files using familiar tools such as Excel and Crystal Reports

    See how to easily integrate existing COBOL applications with RDBMS technology with minimal code change

    Learn how to leverage open source database platforms, reducing application and infrastructure costs

    Unlock the value of business application data using the latest modernization tools from Micro Focus. Join us on 21st February, 2018 for an exciting webinar discussion, demo and Q&A.
  • How Digital Process Management Enables Business Agility
    How Digital Process Management Enables Business Agility Alan Zimmerman, Mike May Recorded: Feb 20 2018 41 mins
    Discover how creating an agile culture enables you not only to deliver digital solutions fast, but also to make sure that they return results – including huge financial savings and complete project payback in 2 months or less

    Join this webinar hosted by Bizagi Customer Travelport, a travel commerce platform connecting the world’s leading B2B travel providers with pioneering B2B payment solutions. We’ll discuss how agility has radically redefined the way Travelport operates by:

    - Creating a culture of collaboration and experimentation
    - Shining a light on the simplification of critical processes
    - Delivering rapid results that demonstrate digital transformation

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT, Business and Process Professionals.
  • Agility vs Regulatory Compliance: Why You Need Both
    Agility vs Regulatory Compliance: Why You Need Both Marianne Stouten, Marco Van Pijkeren Recorded: Feb 20 2018 31 mins
    For Digital and operational leaders, there’s a tension between the demand for agility and the pressure to maintain compliance with global regulations. How can you reconcile these competing corporate goals?

    Learn from the experience of Cofco International for practical advice on:

    - The critical role of agility in global digital operations
    - Why digital agility is essential to regulatory compliance
    - How to create digital solutions fast in an agile culture

    Who should attend? Digital Technology leaders, Application Development Leaders, IT, Business and Process Professionals.
  • Why Agility Dictates the Success or Failure of Digital Transformation
    Why Agility Dictates the Success or Failure of Digital Transformation Rob Koplowitz, Gustavo Gomez, Rui Dinis Recorded: Feb 20 2018 60 mins
    Gain practical insights from experts on the critical role of agility in digital transformation. In this session, we will discuss how conservative and low risk cultures can be quickly replacing agile methodologies and rapid experimentation.

    But how? Join us hear from a seasoned panel of Digital Agility experts including Rob Koplowitz (Forrester Research - Principal Analyst), Gustavo Gomez (Bizagi - CEO), Rui Dinis (Director of Finance and Administration – Manpower) as we answer questions including:

    •Where should change come from, top down or the ground up?
    •What are the biggest barriers to building agile momentum
    •What results have agile solutions delivered for Manpower Group?

    Who should attend: Digital Technology leaders, Application Development Leaders, IT, Business and Process professionals
  • Building an Agile Enterprise
    Building an Agile Enterprise Andy Jordan, Project Management.com and Elizabeth Schulheisz, CA Technologies Recorded: Feb 20 2018 60 mins
    A lot has been written recently about Agile expansion. That might sound scary when you are still new to Agile and might only have a few teams onboard. However, it is still important to start thinking about how you envision Scaling Agile and incorporating your business strategy.

    Industry expert and ProjectManagement.com SME Andy Jordan believes that even for someone who is early in their agile adoption, it is essential to understand the concept of business agility.
    Join Andy for this high energy, thought provoking webinar to learn:

    -Why business agility matters and why you need to care about it
    -The role of strategic agile models in supporting your agile success
    -The importance of broadening Agile across multiple departments

    In today’s business world every organization has to be able to react quickly and with minimal disruption to the inevitable changes they face. Business agility maximizes your ability to do that. Start improving things right now by signing up for this webinar.
  • How to Craft a Successful API Strategy
    How to Craft a Successful API Strategy Manfred Bortenschlager Director, API Market Development, Red Hat. Recorded: Feb 20 2018 37 mins
    APIs are powerful, and for many teams, very new. A strategy for APIs is complex because it needs to cover many areas. Many teams don't know how to articulate the benefits of APIs to craft a strategy. And defining and using an API strategy involves many roles and teams—not just techies anymore.

    In this webcast, you’ll get a general introduction to ""the API economy"" and winning strategies in that economy. Topics will include:

    - Business drivers for APIs and API management.
    - API strategy models and methodology.
    - Case studies from actual teams.
    - Best practices of successful API teams.
    - Practical checklists.
  • How Amazon AI Can Help You Transform Your Business
    How Amazon AI Can Help You Transform Your Business Julien Simon, AI Evangelist, AWS Recorded: Feb 20 2018 77 mins
    In this webinar, discover how AWS customers are using our AI solutions to transform their companies and their products. We'll look at multiple use cases from different industries (media, finance, travel, retail, consumer applications, security and law enforcement), both in the enterprise and the startup settings. We'll also overview the growing family of Amazon AI services and look at how they can help you bring innovative AI capabilities to your own applications.

    You will hear customer examples, including:

    - How Expedia uses Deep Learning to automatically select the best images to display on hotel pages
    - How CSPAN uses Amazon Rekognition to identify 90,000+ speakers in their video archives
    - How Duolingo uses Amazon Polly to generate lifelike audio clips to help students learn foreign languages
    - How Hotels.com uses Amazon Translate for automatic website translation

    Who Should Attend: Business Directors, Business Leaders, Project Managers, IT Managers, Business Consultants, Heads of Innovation, Data Scientists and Product Marketeers.
  • MondoBrain Introduction Video
    MondoBrain Introduction Video Augustin Huret, CEO & Founder of MondoBrain Recorded: Feb 20 2018 4 mins
    Augustin Huret, CEO & Founder of MondoBrain explains how MondoBrain is a revolutionary decision making and problem solving solution that brings immediate impact on a company’s PNL. According to Augustin, MondoBrain is the "ultimate combination of human intelligence, artificial intelligence, and collective intelligence" that helps craft the "best decision" in an easy to use and intuitive interface. You can learn more about how the solution works in this three-minute piece.
  • Using the Pure Portal to make research more visible: Tomsk Polytechnic U, Russia
    Using the Pure Portal to make research more visible: Tomsk Polytechnic U, Russia Dr. Yulia Falkovich, Tomsk Polytechnic University Research Intelligence and Publications Department, Head Recorded: Feb 20 2018 29 mins
    The global scientific community benefits from having a diverse range of perspectives. As such, Russia is working to make its research more visible. In the same way, science in Russia benefits from a diverse range of global collaborators. The willingness of Russian universities to expand these collaborations and foster the excellence of Russian research is supported by the Russian Ministry of Education and Science. Tomsk Polytechnic University (TPU) is among such universities.

    The aim of this webinar to showcase how TPU uses Pure to make university’s research more globally visible and what the impact of the TPU Portal has been.

    In this session, Dr. Falkovich will cover:
    1)Why TPU research management counts on PURE as it’s research information management system
    2)How has international visibility for TPU research improved since the TPU Pure Portal was launched in September 2015 The statistics of Portal visibility as well as case studies of collaborations started with the help of Pure.

    This webinar will be helpful for the universities of Western Europe and the BRICS countries (Brazil, Russia, India, China and South Africa) that have the same challenges and a similar economic and historical background.
  • Red Hat Middleware goes mobile
    Red Hat Middleware goes mobile Red Hat Recorded: Feb 18 2018 9 mins
    With Red Hat it's easy to create mobile apps for the enterprise that integrate with back-office processes and systems! In this video we demonstrate a mobile app for insurance claims processing, built with Red Hat Mobile Application Platform and Red Hat JBoss BPM Suite.

    Learn more: www.redhat.com/en/technologies/mobile
  • Achieve the benefits of DevOps, containers, and the cloud for your Java apps
    Achieve the benefits of DevOps, containers, and the cloud for your Java apps Red Hat Recorded: Feb 18 2018 5 mins
    Everyone is trying to achieve high quality, fast deployment, and easy maintenance for their applications. Learn to get these benefits for your Java apps with DevOps-enabling technologies, containers, cloud platforms, and central management tools.

    Learn more: www.redhat.com/accelerate
  • Aviva Asia Modernizes its Business with Red Hat JBoss Middleware
    Aviva Asia Modernizes its Business with Red Hat JBoss Middleware Red Hat Recorded: Feb 18 2018 4 mins
    When insurer Aviva Group acquired Friends Provident International, it needed to replace aging proprietary systems that were expensive to maintain, and whose licenses were soon to expire. It chose a new solution based around Red Hat JBoss Middleware, which has reduced costs and improved response time for end users. Red Hat Consulting provided expert help, enabling Aviva to hit a tight six-month deadline.

    Learn more: https://www.redhat.com/en/success-stories
  • Building Mobile Apps on OpenShift Container Platform using Red Hat
    Building Mobile Apps on OpenShift Container Platform using Red Hat Red Hat Recorded: Feb 18 2018 16 mins
    This video provides a walkthrough of the Red Hat Mobile Application Platform running on OpenShift Container Platform, demonstrating how mobile applications can be built quickly and deployed to OpenShift. Red Hat Mobile Application Platform enables developers build enterprise-grade mobile apps that can run on devices but connect securely to enterprise applications and systems in the datacenter.
  • How API Adoption Boosts Profits
    How API Adoption Boosts Profits Marshall Van Alstyne, MIT fellow & Boston University professor; David Berlind, Editor-in-Chief of ProgrammableWeb Recorded: Feb 15 2018 60 mins
    The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.

    In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.

    Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:

    - Why enterprises need APIs and API strategy models
    - The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
    - About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
  • Securing Office 365 | Securing the Enterprise Cloud
    Securing Office 365 | Securing the Enterprise Cloud Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 15 2018 37 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Office 365.

    This hands-on demo will provide examples of the key Office 365 use cases:
    • Zero-day Malware
    • Phishing
    • Data Leakage
    • Account Takeover
    • Auditing and Compliance

    We’ll show you how to:
    • Stop phishing and malware in Office 365 mail
    • Quarantine infected files within One Drive,
    • Control sensitive information and prevent data leakage,
    • Protect against the insider threat, and
    • Monitor and enforce regulatory compliance for all users.
  • A Technical Look At Snaps
    A Technical Look At Snaps Evan Dandrea Recorded: Feb 15 2018 39 mins
    Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
  • The hidden costs of unsupported software in financial services
    The hidden costs of unsupported software in financial services Al Gillen, Software Development and Open Source, IDC. John Marx, Financial Services, Red Hat. Recorded: Feb 15 2018 31 mins
    According to analyst firm IDC, using unsupported software can cost financial institutions in additional support, slower deployment times, more maintenance, and lost developer time.

    Join this webinar as we explore:
    -Hidden costs, which can include additional support, slower deployment times, more maintenance, and lost developer time.
    -How using supported open source software can improve time to market.
    -The benefits of supported software versus unsupported software.
    -How the adoption of supported software versus unsupported software addresses security.
    -A developer’s ability to deliver new features and new applications using supported software versus unsupported software.
  • Container troubleshooting with Sysdig
    Container troubleshooting with Sysdig Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Recorded: Feb 15 2018 45 mins
    SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?

    Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.

    In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:

    -Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
    -Debug a 502 HTTP error on a load-balanced Python app with HAproxy
    -Troubleshoot a Kubernetes CrashLoopBackOff error

    Who should attend?

    If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
  • BPM or RPA: What is the correct choice for digital transformation?
    BPM or RPA: What is the correct choice for digital transformation? Andrew Murphy, K2 VP EMEA Recorded: Feb 14 2018 50 mins
    t is clear that major organisations are starting to integrate RPA solutions into their IT ecosystems and those that haven’t are seriously considering the option, as the number of RPA users is doubling every 6 months.

    In this rapidly developing climate, which platform will help your organisation meet their digital transformation goals? Join Andrew Murphy in this webinar, where he will review the core competencies of modern BPM and RPA. Considering whether you should be using neither or both.

    In this webinar, K2 will cover:

    - Core competencies of Modern BPM
    - Core competencies of RPA
    - Identifying the key stages of the digital transformation journey
    - Where BPM and RPA applies to these stages to help you achieve your short term and long term transformation goals
  • GDPR’s Influence on Security: Best Practices to Support GDPR
    GDPR’s Influence on Security: Best Practices to Support GDPR Adam Brown, Manager, Security Solutions at Synopsys, Daniel Hedley, Partner at Irwin Mitchell LLP Feb 22 2018 12:00 pm UTC 60 mins
    If your organisation competes in the global market, you should expect GDPR to have a critical influence on the software that powers your business. Having a disciplined software security approach will help you not only identify, remediate, and prevent weaknesses in your software but also avoid violating GDPR.

    Listen as experts Adam Brown of Synopsys and legal expert Dan Hedley of Irwin Mitchell, LLP provide insights into what GDPR requirements mean for your security initiative, how your existing security activities can support compliance, and best practices to keep in mind as you look to mature your software security program.

    About the Presenters:

    Adam Brown is Associate Managing Consultant at Synopsys in the software security consulting division. His background is in software security testing focusing on data centric web application security. Currently he specialises in helping organisations set up their software security initiatives, delivers training in software security and takes a keen interest in the GDPR from both data security and data privacy threat perspectives.

    Dan Hedley is a partner at UK law firm Irwin Mitchell LLP. He is a specialist IT lawyer, focusing in particular on software licensing and development, IT service contracts, outsourcing and cloud services. He also advises on open source compliance, data protection, software IP issues and the IT aspects of M&A and IPO transactions. He regularly acts for both established corporates and early-stage and fast growth businesses.”
  • Panel Discussion: The Road to a Data-Driven Business
    Panel Discussion: The Road to a Data-Driven Business Jen Stirrup, Gordon Tredgold, Joanna Schloss, & Lyndsay Wise Feb 22 2018 1:00 pm UTC 60 mins
    Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
  • GDPR: T Minus 3 Months: 6 Steps to Get Ready
    GDPR: T Minus 3 Months: 6 Steps to Get Ready Jan Smets, Certified Data Protection Officer, Gemalto Feb 22 2018 5:00 pm UTC 45 mins
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Feb 22 2018 6:00 pm UTC 60 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • Manage the App on Kubernetes
    Manage the App on Kubernetes Brandon Phillips, CTO of CoreOS Feb 22 2018 7:00 pm UTC 60 mins
    Kubernetes has yet to close the developer gap from source code to app running in a production Kubernetes cluster. Many build bespoke tools. How can the Kubernetes community come together to build decomposable solutions that help people define their app, deploy it, and manage its lifecycle over time? Learn about the progress we are making together to elevate the conversation from container orchestration to application lifecycles management.
  • GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM
    GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM Alex Yakubov (Yubico), Jesper Johansson (Yubico), Baber Amin (Ping Identity) Feb 22 2018 8:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).

    As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.

    One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.

    In this webinar, Yubico and Ping Identity will discuss:
    ● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
    ● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
    ● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement

    Moderator:
    Alex Yakubov, Senior Director - Ecosystem (Yubico)

    Speakers:
    Jesper Johansson, Chief Security Architect (Yubico)
    Baber Amin, Market Leader, Cloud Security Services (Ping Identity)
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • HGST SVR2U24 NVMe Storage Server
    HGST SVR2U24 NVMe Storage Server Manfred Berger, HGST - Sr. Mgr. Business Development Platforms EMEAI Feb 27 2018 10:00 am UTC 45 mins
    In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.

    Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • New Approaches to Creating Modern Business Applications
    New Approaches to Creating Modern Business Applications Phil Simpson, Senior Product Marketing Manager, Red Hat Feb 27 2018 4:00 pm UTC 60 mins
    Today’s businesses require greater responsiveness and agility in meeting fast-paced, user-driven demand for products, services, and information. In turn, applications need to be designed, developed, deployed, and changed quickly when needed and be exposed to multiple channels, including mobile. To get apps to market fast and adapt them on the fly, low-code development tools and approaches are emerging to take the burden off IT and let the business self-serve.

    In this session we'll discuss:
    -How a wide range of technologies are coming together to enable the development of low-code, mobile, cloud-enabled, business automation solutions.
    -Red Hat's approach to building these process-driven, mobile applications.
    - Examples from some of Red Hat's most successful customers.
  • Where’s My Data? Managing the Data Residency Challenge
    Where’s My Data? Managing the Data Residency Challenge Claude Baudoin, owner, cébé IT & Knowledge Management Feb 27 2018 4:00 pm UTC 60 mins
    Introducing the OMG’s Data Residency Maturity Model

    With the rise of managed IT services and cloud computing, sensitive data is regularly moved across countries and jurisdictions, which can be in direct conflict with various international, national or local regulations dictating where certain types of data can be stored (e.g., the European Union’ General Data Protection Regulation, or GDPR). Data residency is also a consideration of data owners responsible for protecting and securing data from unintended access.

    The Object Management Group® (OMG®), a technology standards consortium, launched a working group in 2015 to address the challenges of data residency and define a standards roadmap to help stakeholders manage the location of their data and metadata.

    Given the complexity of the issue, a stepwise improvement plan is necessary. This webinar will introduce a new Data Residency Maturity Model (DRMM) proposed in December 2017. Similar to the Capability Maturity Model (CMM) invented in 1990 at the Software Engineering Institute (SEI), the DRMM contains five maturity levels aimed at helping an organization improve their practices and governance of data residency. The OMG seeks feedback on the DRMM and calls on all interested parties to contribute to this work.
  • What Do Microservices Mean for AppSec?
    What Do Microservices Mean for AppSec? Brian Pitta, Senior Solutions Architect, CA Veracode Feb 27 2018 4:30 pm UTC 45 mins
    Microservices are a mainstay in the development of most modern applications as the shift to developing several small software components versus a single large application has been popular for a while. Yet even the best teams have trouble integrating security into their implementation. While many organizations see the benefits of the microservice architecture, questions continually arise on its impact on application security programs, especially with the rapid development that goes hand-in-hand with microservices.

    Join Brian Pitta, Senior Solutions Architect at CA Veracode who will discuss:

    •The need to keep up with the speed of DevSecOps and how to automate and integrate security testing with rapid feedback loops;
    •How to run and measure an effective AppSec program at scale and maintain a holistic view of all your applications given the shift to a more “decentralized” application environment to which the microservice architecture lends;
    •The importance of staying current with technology trends to equip an agile development team and continually enhance support for additional frameworks, languages and integration points
  • Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing
    Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing John Kowal, Director of Business Development, B&R Industrial Automation Feb 27 2018 6:00 pm UTC 60 mins
    A practical way to get started with IIoT in a brownfield factory is by creating a “Green Patch in your Brownfield.”

    Everyone is talking about deploying IIoT in brownfields to achieve incremental gains in productivity. But in the greenfield, IIoT can deliver a game changer: to change your business model to mass customization through adaptive machines. Batch size of one. Deliver direct from the production line to consumers. Flatten your supply chain, your sales chain. No greenfield in your near future? To get started, get focused. For your next capex, put a 'focused factory' in your existing plant -- a 'green patch' in your brownfield. Learn from a pilot project the full potential of IIoT with today's state of the art automation technologies, not the legacy assets of the brownfield.
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Feb 27 2018 6:00 pm UTC 60 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • AI-powered customer engagement isn’t optional anymore
    AI-powered customer engagement isn’t optional anymore Brian Gross, VP Digital Innovation, Aeromexico Feb 27 2018 6:00 pm UTC 60 mins
    AI isn’t a nice-to-have any more, it’s a must-have. There’s a reason why corporate giants like Google, IBM, Yahoo, Intel, Apple, and Salesforce are competing to snatch up private AI companies. In the first quarter of 2017 alone, 37 AI companies were swallowed whole.

    Companies aren’t just using these AI tools to enable existing marketing strategies; they’re taking those strategies to the next level, going beyond simple retention and delivering active engagement. AI technology offers companies unprecedented insight into customer behaviors, patterns, and beliefs, allowing you to seamlessly anticipate customer needs and serve up hyper-personalized, emotionally resonant campaigns where and when they’re most welcome.

    2018 is the year to seize the AI advantage. To learn more about the technology you need, the opportunities it unlocks, and what it takes to get your ball in the game, don’t miss this VB Live event!

    In this webinar, you'll learn:
    * What’s new in AI for 2018 -- and what’s coming down the pike
    * How businesses are using AI to drive results
    * How to go beyond customer retention and power customer engagement

    Speakers:
    * Brian Gross, VP Digital Innovation, Aeromexico
    * Dan Wulin, Director of Data Science, Wayfair
    * Michael Healey, President, Yeoman Technology Group
    * Rachael Brownell, Moderator, VentureBeat
  • Building a Connected Customer Experience with Former CIO of Lowe’s and L Brands
    Building a Connected Customer Experience with Former CIO of Lowe’s and L Brands Steve Stone, Former CIO at L Brands and Lowe's; Introduction by Ross Mason, Founder & VP Product Strategy Feb 27 2018 6:00 pm UTC 60 mins
    Hear from Steve Stone, former CIO of L Brands and Lowe's, as he reveals his advice in building a compelling customer experience. Learn how he has led major retailers to embrace technology as a strategic enabler and execute key use cases like eCommerce and omnichannel.

    Attendees will learn:

    - How L Brands and Lowe's digitized the in-store experience to better engage with customers
    - How MuleSoft has helped his companies go 3x faster with self-service across the organization through reusable assets
    - Real-life lessons from a seasoned technology leader who has spent 34+ years in the technology space
    - Practical steps to embrace a new IT operating model that focuses on the customer
  • Container Forensics & Troubleshooting with Sysdig Inspect
    Container Forensics & Troubleshooting with Sysdig Inspect Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Feb 28 2018 10:00 am UTC 60 mins
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • CLOUD INNOVATION WEBINAR: The Secret of Traditional Apps Modernisation
    CLOUD INNOVATION WEBINAR: The Secret of Traditional Apps Modernisation Chris Griggs, General Manager, Skytap EMEA Feb 28 2018 2:00 pm UTC 45 mins
    Transform what’s possible in just 30 minutes.

    Most of your core applications weren’t built for the cloud era. But they could do even more for your business if they made the leap. The question is: How?

    Skytap’s cloud experts can help you migrate core workloads into a modern IT portfolio and build a true ‘always on’ business.

    Join us for 30 minutes on 28th February at 2.00PM GMT / 3.00PM CET to learn how we can help you:
    - Optimise IT spend
    - Boost business agility
    - Clone testing environments instantly
    - Drive sustainable cloud innovation

    Unlock the full innovation potential of your core applications in just days – with truly unique Skytap insight.
  • Shift Happens! The power of Performance Testing
    Shift Happens! The power of Performance Testing Jeff Bradley, Pre-Sales Advisor, CA Technologies Feb 28 2018 4:00 pm UTC 60 mins
    Performance testing is more relevant than ever. It’s even more prominent in the software development life cycle than in the past. What’s changed is that development and testing teams now can test component level performance earlier than ever with tools such as Service Virtualization.

    It’s now easier to identify and fix performance-related issues as they are being worked much earlier than before, when performance testing was done during a formal performance testing cycle in the stage environment after multiple code builds have hidden those issues deeper across several application layers.

    This session will cover the basics of how to shift performance testing left so that development and testing teams can test component level performance using CA Service Virtualization and CA BlazeMeter.
  • Introduction To Juju: Automating Cloud Operations
    Introduction To Juju: Automating Cloud Operations Tim Penhey Feb 28 2018 5:00 pm UTC 60 mins
    Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
    >The basics of Juju from Charms to Bundles
    >How to easily deploy solutions and scale up from one simple dashboard
    >How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
    >How you can use Juju to simplify your operations!
  • CMD+CTRL Peek & Play
    CMD+CTRL Peek & Play Roman Garber Feb 28 2018 6:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • How to Overcome Data Challenges When Refactoring Monoliths to Microservices
    How to Overcome Data Challenges When Refactoring Monoliths to Microservices Kenny Bastani, Pivotal and Jason Mimick, MongoDB Feb 28 2018 7:00 pm UTC 60 mins
    When taking existing monoliths and decomposing their components into new microservices, the most critical concerns have much less to do with the application code and more to do with handling data.

    In this webinar, Kenny Bastani from Pivotal and Jason Mimick from MongoDB will focus on various methods of strangling a monolith’s ownership of domain data by transitioning the system of record over time. The new system of record, MongoDB, will fuel rapidly built and deployed microservices which companies can leverage for new revenue streams.

    They will use practices from Martin Fowler’s Strangler Application to slowly strangle domain data away from a legacy system into cloud-native MongoDB clusters using microservices built with Spring Boot and Spring Cloud.


    Speakers:
    Kenny Bastani is a Spring developer advocate at Pivotal. As a passionate blogger and open source contributor, Kenny engages a community of passionate developers on topics ranging from graph databases to microservices. Kenny is a co-author of Cloud Native Java: Designing Resilient Systems with Spring Boot, Spring Cloud, and Cloud Foundry from O’Reilly.

    Jason Mimick is the Technical Director for Partners at MongoDB developing new product and technical innovations with a number of companies. He's been at MongoDB nearly 4 years and previously spent the last 20-odd years in various engineering positions at Intersystems, Microsoft, and other companies.