Hi [[ session.user.profile.firstName ]]

Application Management

  • Tagging for AWS and Azure to Gain Control and Visibility
    Tagging for AWS and Azure to Gain Control and Visibility Dave DeYager, CloudCheckr Support Recorded: Mar 22 2018 28 mins
    Maintaining accountability across an ephemeral IaaS infrastructure can be a challenge for Finance and DevOps teams. With the proper tagging strategy and implementation, organizations can manage cloud costs around their EC2 instances and resources.

    Join CloudCheckr March 22nd at 2 pm Eastern, 11 am Pacific for a live webinar discussing proactive tactics and tips to execute an AWS and Azure tagging strategy as your organization scales, including:

    - Tagging rule guidelines to gain visibility and control over your asset inventory
    - Cost allocation reports and tools to understand cloud expenses and recognize optimization opportunities
    - How CloudCheckr can help enforce tagging policies and reduce cloud costs
  • Open Source Projects That Break Boundaries
    Open Source Projects That Break Boundaries Steven Zimmerman, Product Marketing Manager, Black Duck by Synopsys Recorded: Mar 22 2018 60 mins
    Over the last decade, Black Duck by Synopsys has recognized some of the most innovative and influential open source projects launched during the previous year, as recognition to the success and momentum of these projects, and affirmation of their prospects going forward.
    In this webinar, we'll explore the origins and evolution of this year's most outstanding Open Source Rookies, who are investing their efforts in everything from Autonomous Driving, through Scalable Blockchain, and VNF Orchestration, to Personal Security and Relationship Management.
  • Microsoft Power BI Review: Top 5 New Features
    Microsoft Power BI Review: Top 5 New Features Rodney Landrum, Senior DBA/BI Consulting Services , Ntirety Recorded: Mar 22 2018 47 mins
    Microsoft Power BI is an affordable, powerful data modeling and visualization tool, with widespread adoption and universal appeal for many reasons.

    The main reason everyone loves Power BI is the rapid update schedule and all of the cool, new features regularly added to both the desktop and web versions. With these rapid updates, it can be hard to stay on top of what is available from one release to the next.

    Join Rodney Landrum, Senior DBA/BI Consulting Services at Ntirety, a division of HOSTING, as he demos his top 5 favorite features of the latest Microsoft Power BI including:

    • Anchor Dates for Slicers
    • Drill Through
    • Quick Measures
    • Data Gateways
    • Custom Visual (Power KPI)
  • Amplify customer experience with Oracle Customer Care & Billing 2.6
    Amplify customer experience with Oracle Customer Care & Billing 2.6 Madhu Sudhana Reddy, Consulting Partner; Vijayeswar Malladi, Head - Industry Apps; Shobhit Goyal, Business Manager; Wipro Ltd Recorded: Mar 22 2018 57 mins
    The Utilities sector is under constant pressure caused by raising customer expectations, ever changing regulations and technical complexities. To thrive amid these challenges, Utilities enterprises need to transform with an aim to renew and enrich user experience for their customers, while driving profitability.

    With strong industry expertise, Wipro, as a strategic partner of Oracle, is helping the Utilities enterprises to embrace the latest version of Oracle's Customer Care & Billing applications for a superior experience.

    Join our webinar to know how Wipro ensures a smooth and accelerated upgrade to CC&B 2.6 lowering risk and total cost of ownership.
  • Demystifying the move to MS Azure, how to easily implement a cloud strategy
    Demystifying the move to MS Azure, how to easily implement a cloud strategy Larry Cimbalista, Product Manager, Verizon; Jaime Schmidtke, Cloud Networking Specialist, Microsoft Recorded: Mar 22 2018 49 mins
    Learn how easy it can be to bring up applications in the MS environment simply, securely and reliably.

    In this session you’ll learn how MS Azure is helping large enterprises quickly add cloud connections locally, regionally and globally to drive sales, grow revenue and compete.
  • Why Fast Big Data Apps Are Becoming The New Normal For Business Success
    Why Fast Big Data Apps Are Becoming The New Normal For Business Success Matt Aslett of 451 Research & Nathan Trueblood of DataTorrent Recorded: Mar 22 2018 60 mins
    Join Matt Aslett of 451 Research for a briefing on the current big data analytics trends that are driving customers to utilize fast big data applications for increased customer engagement, reduced risk, and greater operational efficiency. After which, Nathan Trueblood will share DataTorrent's direct experiences working with enterprise organizations who are deploying fast big data apps to accelerate business outcomes TODAY and why they believe their customers' use of these applications will be the difference between success or failure in the future.
  • Securing Continuous Delivery Pipelines
    Securing Continuous Delivery Pipelines Scott Willson Recorded: Mar 22 2018 36 mins
    Is your continuous delivery pipeline vulnerable? How do you bring the control and visibility required to ensure security?

    As the world becomes increasingly interconnected, the opportunities for data breaches have risen proportionately. Privileges are extended to users and bots to perform a specific job and often aren’t revoked upon completion. Administration credentials are being stolen and compromised accounts and unmanaged systems are proving to be real threats to enterprises. It’s clear that user governance isn’t a luxury then, it’s an imperative.

    CA Privileged User Governance (CA-PG) provides the functionality required to safeguard businesses from unauthorized access and breaches. It enables a high level of control, auditability and transparency to be introduced to your organization’s privileges.

    By combining CA-PG and Automic Release Automation, you can automatically provide – and revoke – users and bots with necessary access credentials and privileges as and when needed. Doing so limits the risk of unauthorized access and potential data breaches.

    This Webinar Explores:
    Automic Release Automation – what it is and why it’s the industry-leading solution
    The goals and challenges of continuous delivery
    CA Privileged User Governance
  • Protect Your Network and Apps from Cyber Threats
    Protect Your Network and Apps from Cyber Threats Mike Spanbauer, NSS Labs, George McGregor, Citrix, Darshant Baghat, Citrix, and Lena Yarovaya, Citrix Recorded: Mar 22 2018 44 mins
    Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

    Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

    Join this webinar to learn how Citrix WAF:

    • Has the best price-performance ratio
    • Provides “pay-as-you-grow” capability
    • Is available on a range of appliance, in software, or as a cloud service


    Mike Spanbauer, Vice President of Research Strategy,NSS Labs

    George McGregor, Senior Director, Product Marketing, Citrix

    Darshant Bhagat, Director, Product Manager, Networking & Cloud, Citrix

    Lena Yarovaya, Director, Products, Citrix
  • Deploy Deep Learning rapidly, with IBM GPU Accelerated Systems
    Deploy Deep Learning rapidly, with IBM GPU Accelerated Systems Michael Gschwind, Chief Engineer, Machine Learning and Deep Learning, IBM Corp. Recorded: Mar 22 2018 59 mins
    Rapid Deployment. Flexible Frameworks. Blazing Performance.

    Though much is made of the potential of Deep learning, architecting and deploying a Deep Learning platform is a daunting proposition, especially when trying to leverage the latest GPUs and I/O technologies.

    By attending this webinar, you'll learn about:

    • Implementation Hurdles - We'll provide an overview of avoidable hurdles associated with why Deep Learning initiatives, especially with newer accelerated (GPU) architectures.
    • Comparing Common Frameworks - We'll compare and contrast popular Deep Learning architecture(s) and tools might be useful for your organization, to assist you in choosing the one that's most appropriate.
    • Performance Considerations - Explore the unprecedented Deep Learning performance gains that are possible, utilizing POWER8 with NVLink, along with the NVIDIA P100 GPU.
  • Next Gen Cloud Migration Assurance - Quality Engineering and Testing, Wipro Ltd
    Next Gen Cloud Migration Assurance - Quality Engineering and Testing, Wipro Ltd Arun C Balakrishnan, Head - Cloud Migration and EDAP Wipro Ltd and Jayakrishnan Sasikumar, Head Cloud Migration QA Practice Recorded: Mar 22 2018 64 mins
    An Analyst report predicts that at least half of all enterprise IT spending will be Cloud-based in 2018, reaching 60% of all IT infrastructure spending by 2020. CEO's no longer looks at the Cloud solely as a tool; now the focus has shifted towards finding the right way to use it so they can accomplish their 2018 business goals. When making the move to the cloud, it is important to understand that while cloud providers are largely responsible for provisioning the cloud, enterprises need to make sure, how they use the cloud. Simply “lifting and shifting” an on premise stack to cloud is prone to fail. Cloud Migration Assurance practice at Wipro offers a comprehensive assurance solution for our customers. Join this webinar and hear from the experts on how to ensure a safe and successful cloud migration.
  • How to Unlock the Value of Application Data & Improve Business Continuity
    How to Unlock the Value of Application Data & Improve Business Continuity Alwyn Royall, Solutions Consultant, COBOL, Micro Focus Recorded: Mar 22 2018 43 mins
    Working with COBOL data files, including the creation of reports, often requires specialty tools and developer skills. It’s time to improve business continuity, application availability and to work with COBOL data files in real time, using off-the-shelf analysis and reporting tools.

    Join Micro Focus on 21st February to:

    Discover the real challenges many teams face in working with COBOL data files

    Understand how to work with COBOL data files using familiar tools such as Excel and Crystal Reports

    See how to easily integrate existing COBOL applications with RDBMS technology with minimal code change

    Learn how to leverage open source database platforms, reducing application and infrastructure costs

    Unlock the value of business application data using the latest modernization tools from Micro Focus. Join us on 21st February, 2018 for an exciting webinar discussion, demo and Q&A.
  • Mobility, Agile Development & Continuous Testing
    Mobility, Agile Development & Continuous Testing Christian Schuertz, Business Development Manager, Application Delivery Management Software Recorded: Mar 22 2018 36 mins
    Mobile applications, agile development methods and continuous testing are solidly linked together as fast time to market is key to success. However many development departments struggle today in actually getting this to work due to lack of processes, lack of know-how and lack of integrated, open and automated toolchains.

    In this webinar we will provide a perspective on how to achieve faster time to market without compromising quality and show a live example on how to get it to work. An end to end demo focused on automation and visibility.
  • Actionable Insight in Massively Scalable Environments
    Actionable Insight in Massively Scalable Environments Peter Waterhouse, Sr. Advisor, CA Technologies Recorded: Mar 21 2018 55 mins
    Containers speed development, but the applications they support can exponentially increase the number of alerts and system checks. Asynchronous messaging, more dependencies and API/network centricity all conspire to overload application support teams. Furthermore, old monolithic architectures where failure conditions were known and predictable, now give way to a more complex set of conditions involving more moving parts – making manual root cause determination like trying to ‘find a needle in a haystack of needles’.

    View this on-demand webcast to learn more about the impact of containers on development and support teams and the strategies needed to prevent alert fatigue and burnout. Topics for discussion include:
    -Why traditional and manual alerting methods no longer scale in container environments and the detrimental impact on teams and growth
    -The application of adaptive baselining and proven statistical models to help prevent false positives and detect hidden container performance anomalies
    -The use of advanced analytics to collect, ingest and correlate multiple conditions to a single root-cause.
    -How production container analytics can be used to guide design decisions and identify practices that correlate to higher levels of performance
  • WiFi vs 5G: Is the end of wireless on the horizon?
    WiFi vs 5G: Is the end of wireless on the horizon? Paul Vanderlaan, Technical Manager - Standardization & Technology Recorded: Mar 21 2018 59 mins
    Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
    -The status of 802.11ax and ay
    -An overview of 5G cellular and how it will effect wireless
    -How infrastructure will adapt to support these new developments
  • Three Ways That Operators Can Fix Slowdowns and Improve Cluster Performance
    Three Ways That Operators Can Fix Slowdowns and Improve Cluster Performance Kirk Lewis Recorded: Mar 21 2018 58 mins
    Despite tremendous progress, there remain critically important areas, including multi-tenancy, performance optimization, and workflow monitoring where the DevOps team still requires management help. In this webinar, presenter Kirk lewis discusses the ways that big data clusters slow down, how to fix them, and how to keep them running at an optimal level. He also presents an overview of Pepperdata operation performance management (OPM) solutions. In this online webinar followed by a live Q and A, Field Engineer Kirk Lewis discusses:

    • How Pepperdata Cluster Analyzer helps operators overcome Hadoop and Spark performance limitations by monitoring all facets of cluster performance in real time, including CPU, RAM, disk I/O, and network usage by user, job, and task.

    • How Pepperdata Capacity Optimizer increases capacity utilization by 30-50% without adding new hardware

    • How Pepperdata adaptively and automatically tunes the cluster based on real-time resource utilization with performance improvement results that cannot be achieved through manual tuning.

    Presenter Bio

    Kirk Lewis joined Pepperdata in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
  • Top 7 Docker Vulnerabilities & Threats
    Top 7 Docker Vulnerabilities & Threats Knox Anderson, Product Marketing Manager, Sysdig Recorded: Mar 21 2018 35 mins
    Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.

    There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

    Each section will be divided into:
    -Threat description: Attack vector and why it affects containers in particular.
    -Docker security best practices: What can you do to prevent this kind of security threats.
    -Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
  • Gain Panoramic Perspectives with Product Roadmaps
    Gain Panoramic Perspectives with Product Roadmaps Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Recorded: Mar 21 2018 55 mins
    Organizations create roadmaps to communicate strategy. Roadmaps must have the right level of granularity and connect strategy with implementation to ensure desired outcomes are achieved and value is delivered. Roadmaps provide the benefit of visualizing future business outcomes in order to make better-informed investment decisions.

    Join Andy and CA’s Jim Tisch as they address:
    •Why product roadmaps are more important than ever in an agile operating environment
    •How roadmaps can be leveraged to develop proactive solutions that guide industry trends
    •The importance of integrated product and project portfolio management
    •The need for active roadmap management across the entire product portfolio

    This webinar will not only challenge your assumptions on modern business management, it will provide you a tangible action plan to improve your success through better product roadmap management. Don’t miss out, sign up today.
  • The Anatomy of a 5-Star Employee Experience
    The Anatomy of a 5-Star Employee Experience Stacey Prezel, Meghan Lockwood Recorded: Mar 21 2018 54 mins
    How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.

    - The Big Picture: Why are we all investing in HR?
    - Real World Examples: What's possible in HRSD
    - Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
    - Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
  • Infrastructure Automation with OctoDNS and Terraform
    Infrastructure Automation with OctoDNS and Terraform Devin Bernosky, Lead Solutions Engineer Recorded: Mar 21 2018 34 mins
    As you build your application environment you've undoubtedly thought about utilizing multiple providers at every level of your stack. The benefits to this are obvious - scalability, redundancy, and performance optimization, among others. However, syncing multiple providers can sometimes pose challenges.

    In this webinar we'll focus on synchronization between multiple DNS providers, including:

    - Available toolsets on the market today
    - Example deployment using NS1's OctoDNS integration
    - Example deployment using NS1's Terraform integration
    - Network redundancy using NS1's Dedicated DNS

    OctoDNS: https://github.com/github/octodns
    Terraform: https://www.terraform.io/
  • How to Combat the 7 Common Emergent Threats
    How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 64 mins
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection
  • The emerging role of libraries in research information management
    The emerging role of libraries in research information management Anna Clements, University of St Andrews, Jennifer White, University of St Andrews & Rebecca Bryant, OCLC Research Recorded: Mar 21 2018 64 mins
    Pure, as one of the leading CRIS (or research information management RIM) systems, has facilitated the emergence of exciting opportunities for research organisations to transform their support for researchers, with many research libraries taking an increasingly important role. Broadly defined, RIM is the aggregation, curation, and utilization of information about institutional research activities, and as such, intersects with many aspects of traditional library services in discovery, acquisition, dissemination, and analysis of scholarly activities.

    OCLC Research has been working with members of its international OCLC Research Library Partnership, including the University of St Andrews in Scotland, on a publication to help libraries and other institutional stakeholders to understand developing RIM practices and, in particular, their relevance for service and staff development purposes.

    In this presentation, we will provide an overview of the OCLC position paper and provide a case study from the University of St Andrews.
  • Software Development with Open Source: Securing Applications and IP
    Software Development with Open Source: Securing Applications and IP Tim Mackey, Sr. Technology Evangelist at Black Duck by Synopsys Recorded: Mar 21 2018 59 mins
    Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?

    With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
    - Code contribution and IP management
    - Fork management
    - Release process
    - Security response processes
    - Realities of IP risk and open source
    - Pass through security risk and responsibility
    - Keeping up with scope of impact changes within a single disclosure
    - Automating awareness of security risk from development through integration and delivery to deployment
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Mar 21 2018 77 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • IBM Power Systems simplifies SAP HANA Migration
    IBM Power Systems simplifies SAP HANA Migration Peter Rutten, Analyst, Servers and Compute Platforms Recorded: Mar 21 2018 56 mins
    According to IDC, only IBM Power Systems servers are designed specifically to work with data-intensive workloads such as SAP HANA.

    Organizations that have the most to gain using SAP HANA on IBM Power Systems are:

    • Businesses with SAP HANA appliances due for a refresh
    • Organizations on commodity architecture moving to SAP HANA
    • Businesses with a traditional database and SAP applications on IBM Power Systems
    • Businesses on IBM Power Systems that currently do not have SAP

    This webinar featuring IDC Research Analyst Peter Rutten's details the findings and how using IBM Power Systems can reduce migration risks and broaden your options for a hybrid cloud infrastructure.
  • Benefits of Running SAP HANA on IBM Power Systems
    Benefits of Running SAP HANA on IBM Power Systems Volker Haas, SAP HANA on IBM Power Systems Sales Manager, Europe Mar 26 2018 2:00 pm UTC 45 mins
    Running SAP HANA is undoubtedly a sound business decision, but not enough thought is given to the platform being run on. Most people think of the infrastructure as a box to be added to the hardware pool. But not all platforms are born equal.

    IBM’s Power Systems bring to the table a radically different approach to the way SAP HANA is being used. There are significant benefits in the flexibility, cost of operation and the performance delivered by the IBM solution, as well as future options for growth compared to the traditional x86 servers.

    This free webinar goes in depth, detailing the ways in which the Power architecture delivers benefits across the board.
  • AI: The Future of AppDev
    AI: The Future of AppDev Harriet Jamieson and TBC Mar 26 2018 3:00 pm UTC 60 mins
    Application development is being rapidly transformed by artifical intelligence. To remain relevant, developers need to ensure they understand and get ahead of this trend.

    Hear from two AI AppDev experts, and ask them any questions you have on where the industry is going and the skills you’ll need.
  • Ubuntu Core针对物联网设计的Ubuntu
    Ubuntu Core针对物联网设计的Ubuntu Orange Pi : 夏翡, Ubuntu: Yung Shen Mar 27 2018 5:00 am UTC 60 mins
    Ubuntu Core是基于 Ubuntu 的精简版系统,现在已成为物联网以及边缘(Edge Computing)的首选平台。 本期将由Canonical的技术专家以及特邀嘉宾Orange Pi来为大家介绍Ubuntu Core的最新技术动态以及应用。
  • How to Solve Backup Appliance Sprawl
    How to Solve Backup Appliance Sprawl Vanessa Wilson, CEO, StorReduce; Victor Nemechek, Senior Solutions Marketing Manager, Western Digital Mar 27 2018 2:00 pm UTC 30 mins
    Your first backup appliance was great, but how did you feel about your fifth? As data sets explode into the realm of petabytes, most backup appliances can’t scale to meet the capacity needs of a digital company. The lack of scalability forces companies to buy multiple backup appliances, creating the ‘backup appliance sprawl’. The more backup systems companies have to manage, the more time it takes to balance, monitor and maintain.

    Join members of Western Digital and StorReduce to learn about a scale-out deduplication software that enables primary backups to be stored directly on object storage based private or hybrid cloud, eliminating backup appliance sprawl. In this webinar you’ll learn how this technology allows you to:

    •Save up to 70% or more for backup environment TCO while retaining your existing backup applications
    •Reduce hardware refresh cycle for backup appliances
    •Scale as you need without migrations or rip-n-replace hardware changes
    •Build a “Data Forever” environment with extreme data durability

    Just because Easter is around the corner doesn’t mean your backup appliances should be multiplying like rabbits. Register today!
  • Teaching Elephants to Dance: Transforming Enterprise Applications
    Teaching Elephants to Dance: Transforming Enterprise Applications Burr Sutter Director, Developer Experience, Red Hat Mar 27 2018 3:00 pm UTC 60 mins
    Feeling bludgeoned by bullhorn messaging suggesting your monolithic behemoth should be put down (or sliced up) to make way for microservices? Without question, “unicorn-style” microservices are the super-nova-hot flavor of the day, but what if teaching your tried and true monolith to be a nimble, fast-dancing elephant meant you could deploy every week versus every 6 to 9 months?

    In this session, we’ll look beyond the hype to understand the deployment model your business case actually demands, and if weekly deployments courtesy of a dancing (or flying) elephant fit the bill, love the one you're with as you lead the organization's journey to digital transformation.
  • Application Security: What to Know for 2018
    Application Security: What to Know for 2018 Mike Pittenger, Security Strategist Mar 27 2018 3:00 pm UTC 60 mins
    Application security is quickly becoming a "must have" for security teams. High profile breaches, including Equifax and a multitude of ransomware attacks, have the attention of senior management of company Boards. Knowing where to start can be difficult.

    Not every company has the same needs or organizational maturity to manage a full-blown application security program. This webinar will cover some of the tools and exercises deployed by application security teams to build security into their processes, including:

    - Tools and security tips for each phase of the development lifecycle
    - Which tools to use for different types of code
    - In-house and 3rd party options for starting an application security program
  • Top 10 Ways to Fail at DevOps
    Top 10 Ways to Fail at DevOps Ron Gidron Mar 27 2018 3:00 pm UTC 60 mins
    DevOps is a crucial element of digital transformation, but how do you avoid hidden pitfalls when adopting the practice?

    In today’s application economy, behind every digital transformation success story, there’s the agility facilitated by DevOps. And with agility the key to both success and survival, businesses are rushing to implement DevOps across their organization. But for each successful DevOps story, there’s at least one example of failure. In their haste to achieve agility, organizations the world over are making the same mistakes.

    In this webinar, Automic’s own Product Marketing Director, Ron Gidron discusses the Top 10 Ways to Fail at DevOps as learned from organizations around the globe. But, in taking a look at how to fail at DevOps implementation, Ron has also been able to uncover the successful patterns of DevOps high achievers.

    This Webinar Discusses:
    Lessons learned from companies attempting to adopt DevOps
    The need to recognize and fund DevOps as part of your digital transformation initiative
    Successful patterns demonstrated by DevOps high achievers
  • Is the Traditional Data Warehouse Dead?
    Is the Traditional Data Warehouse Dead? James Serra, Data Platform Solution Architect, Microsoft Mar 27 2018 3:00 pm UTC 60 mins
    With new technologies such as Hive LLAP or Spark SQL, do you still need a data warehouse or can you just put everything in a data lake and report off of that? No! In the presentation, James will discuss why you still need a relational data warehouse and how to use a data lake and an RDBMS data warehouse to get the best of both worlds.

    James will go into detail on the characteristics of a data lake and its benefits and why you still need data governance tasks in a data lake. He'll also discuss using Hadoop as the data lake, data virtualization, and the need for OLAP in a big data solution, and he will put it all together by showing common big data architectures.
  • [Ep 8]: Founders Spotlight: Mik Kersten, Tasktop Technologies
    [Ep 8]: Founders Spotlight: Mik Kersten, Tasktop Technologies Mik Kersten, Founder and CEO, Tasktop and Harriet Jamieson, Content Manager at BrightTALK Mar 27 2018 4:00 pm UTC 60 mins
    This webinar is part of BrightTALK's Founders Spotlight series. In the eighth episode of this series, Harriet Jamieson interviews Dr. Mik Kersten, founder and CEO of Tasktop.

    Mik, who has been voted a JavaOne Rock Star speaker twice and is creator and leader of the Eclipse Mylyn open source project, will share how he founded Tasktop. Holding a PhD in Computer Science from the University of British Columbia, Mik has been an Eclipse committer since 2002, is an elected member of the Eclipse Board of Directors and serves on the Eclipse Architecture and Planning councils.

    Mik will share his expertise and take live audience questions on software development tools, productivity tools, application lifecycle management, Agile, Eclipse, Mylyn and Java.
  • Camping World Improves Customer Experience with Multi-Cloud & Hybrid Integration
    Camping World Improves Customer Experience with Multi-Cloud & Hybrid Integration Terry Britt, Enterprise Architect, Camping World & Ruma Sanyal, Director of Product Marketing, Informatica Mar 27 2018 4:00 pm UTC 60 mins
    If you’re like most companies, Salesforce is one of your most important cloud investments and you’ve likely noticed that it has grown to become one of the most powerful application ecosystems today. With over 10 million customers, Camping World specializes in selling recreational vehicles, recreational vehicle parts and services, and camping supplies.

    Join Terry Britt, Enterprise Architect at Camping World, as he takes you through their journey leveraging Informatica Intelligent Cloud Services to integrate their Salesforce environment with multiple applications running on-premises, such as Oracle EBS, and in the cloud with Heroku.

    During this webinar, learn how Camping World achieved:

    • Real time application integration, eliminated data duplication, and improved data quality, security, and visualization
    • A single view of customer, accurate and real time historical interactions, and multi-channel customer support with a single user interface
    • Significantly improved customer experiences through multi-cloud and hybrid data and application integration
  • Top Ways to Revolutionize Your IT Department: Overcoming the IT M&A Slowdown
    Top Ways to Revolutionize Your IT Department: Overcoming the IT M&A Slowdown Mark Holdsworth, Solutions Architect; Thanh Nguyen, Practice Manager, Data Center Mar 27 2018 4:30 pm UTC 30 mins
    Your IT department has its hands full keeping your day-to-day operations in check while working on new projects. They don’t have the time or often the expertise to integrate a new acquisition into your current IT environment. Ask yourself – could your company’s IT department completely integrate a new acquisition in less than 30 days?

    In this quick 30-minute webinar, you’ll learn Accudata’s proven formula for success – and understand how IT can enable your M&A business goals. We will cover:

    • Why IT departments struggle with business acquisitions
    • How to prioritize IT integration tasks
    • Accudata’s five-step proven process to make M&A less complicated
    • Review a customer example that includes integrating 35 new sites and 600+ users into an existing organization in less than 30 days
  • 5 reasons why containers change PCI compliance
    5 reasons why containers change PCI compliance Knox Anderson, Product Marketing Manager, Sysdig Mar 27 2018 5:00 pm UTC 60 mins
    As more and more containerized applications get moved into production environments security & compliance become greater concerns. In this webinar we'll review PCI compliance initiatives, talk about how containers change your compliance lifecycle, and how to stay compliant while maintaining the benefits of containers.

    Specifically we'll cover
    - Live examples of user activity auditing
    - Managing dynamic network maps of your containerized infrastructure
    - Container Intrusion detection
    - Forensic analysis of unauthorized data access
  • Architecting a Security, Privacy & Compliance Ready Data Science Platform
    Architecting a Security, Privacy & Compliance Ready Data Science Platform David Talby, CTO, Pacific AI Mar 27 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he overviews the security, privacy, and compliance checklist when architecting a data science platform.
  • Migrate to the Cloud and Keep it in Check
    Migrate to the Cloud and Keep it in Check Duane Thorpe, Sales Director, JHC Technologies and Todd Bernhard, CloudCheckr Product Marketing Manager Mar 27 2018 6:00 pm UTC 60 mins
    Moving to the Cloud can be daunting, but it doesn't have to be. With the right team of experts, who have been through countless migrations, you can make the move and not the mistakes.

    In this webinar, attendees will hear from JHC Technologies, a leading Managed Services Provider that specializes in migrating enterprises and public sector organizations' data centers to the public cloud. Additionally, CloudCheckr will discuss tools to automate security and optimize cost once in the cloud.
  • Maintaining Legacy Code Quality: How to Work Effectively with Legacy Code
    Maintaining Legacy Code Quality: How to Work Effectively with Legacy Code Derek Choy, CIO, Rainforest QA and Akhila Iruku, Customer Success Team Lead, Rainforest QA Mar 27 2018 6:00 pm UTC 60 mins
    Development cycles are moving faster than ever, and many teams now design QA processes to keep up with that speed. But what can teams with legacy code and older test databases do to bring their existing features up to speed?

    In this webinar, we’ll discuss QA strategies and tools that teams can use to address the challenges of maintaining legacy features and applications.

    We'll also cover:
    1. How to effectively strategize what types of tests to add to legacy software
    2. What cost-effective tools and testing strategies you can adopt in your organization
    3. Approaches to incorporating testing into your organization’s build pipelines
  • The Data Lake for Agile Ingest, Discovery, & Analytics in Big Data Environments
    The Data Lake for Agile Ingest, Discovery, & Analytics in Big Data Environments Kirk Borne, Principal Data Scientist, Booz Allen Hamilton Mar 27 2018 9:00 pm UTC 60 mins
    As data analytics becomes more embedded within organizations, as an enterprise business practice, the methods and principles of agile processes must also be employed.

    Agile includes DataOps, which refers to the tight coupling of data science model-building and model deployment. Agile can also refer to the rapid integration of new data sets into your big data environment for "zero-day" discovery, insights, and actionable intelligence.

    The Data Lake is an advantageous approach to implementing an agile data environment, primarily because of its focus on "schema-on-read", thereby skipping the laborious, time-consuming, and fragile process of database modeling, refactoring, and re-indexing every time a new data set is ingested.

    Another huge advantage of the data lake approach is the ability to annotate data sets and data granules with intelligent, searchable, reusable, flexible, user-generated, semantic, and contextual metatags. This tag layer makes your data "smart" -- and that makes your agile big data environment smart also!
  • Mobility, Function & Performance
    Mobility, Function & Performance Christian Schuertz, Business Development Manager, Application Delivery Management Software Mar 28 2018 7:00 am UTC 60 mins
    Mobile Users don’t accept bad performance or dysfunctional applications and abandon bad apps with a wipe of their hand. Bad mobile applications are far more complex to test given the fragmentation of devices out there and different network conditions in real life that are difficult to simulate in development labs.

    In this webinar we cover the Micro Focus approach to these issues and provide a live showcase on how to secure a stable app that exactly does what it is supposed to do.
  • Scalable Monitoring for the Growing CERN Infrastructure
    Scalable Monitoring for the Growing CERN Infrastructure Daniel Lanza Garcia, Big Data Engineer, CERN Mar 28 2018 8:00 am UTC 60 mins
    When monitoring an increasing number of machines, the infrastructure and tools need to be rethinked. A new tool, ExDeMon, for detecting anomalies and raising actions, has been developed to perform well on this growing infrastructure. Considerations of the development and implementation will be shared.

    Daniel has been working at CERN for more than 3 years as Big Data developer, he has been implementing different tools for monitoring the computing infrastructure in the organisation.
  • The State of Stream Processing
    The State of Stream Processing Neil Avery, Technologist, Office of the CTO - Confluent Mar 28 2018 9:00 am UTC 60 mins
    Stream processing is now at the forefront of many company strategies. Over the last couple of years we have seen streaming use cases explode and now proliferate the landscape of any modern business.

    Use-cases including digital transformation, IoT, real-time risk, payments microservices and machine learning are all built on the fundamental that they need fast data and they need it at scale.

    Apache Kafka has long been the streaming platform of choice, its origins of being dumb pipes for big data have long since been left behind and now it is the goto-streaming platform of choice.

    Stream processing beckons as being the vehicle for driving those streams, and along with it brings a world of real-time semantics surrounding windowing, joining, correctness, elasticity, and accessibility. The ‘current state of stream processing’ walks through the origins of stream processing, applicable use cases and then dives into the challenges currently facing the world of stream processing as it drives the next data revolution.

    Neil is a Technologist in the Office of the CTO at Confluent, the company founded by the creators of Apache Kafka. He has over 20 years of expertise of working on distributed computing, messaging and stream processing. He has built or redesigned commercial messaging platforms, distributed caching products as well as developed large scale bespoke systems for tier-1 banks. After a period at ThoughtWorks, he went on to build some of the first distributed risk engines in financial services. In 2008 he launched a startup that specialised in distributed data analytics and visualization. Prior to joining Confluent he was the CTO at a fintech consultancy.
  • How to Share State Across Multiple Apache Spark Jobs using Apache Ignite
    How to Share State Across Multiple Apache Spark Jobs using Apache Ignite Akmal Chaudhri, Technology Evangelist, GridGain Systems Mar 28 2018 10:00 am UTC 60 mins
    Attend this session to learn how to easily share state in-memory across multiple Spark jobs, either within the same application or between different Spark applications using an implementation of the Spark RDD abstraction provided in Apache Ignite. During the talk, attendees will learn in detail how IgniteRDD – an implementation of native Spark RDD and DataFrame APIs – shares the state of the RDD across other Spark jobs, applications and workers. Examples will show how IgniteRDD, with its advanced in-memory indexing capabilities, allows execution of SQL queries many times faster than native Spark RDDs or Data Frames.

    Akmal Chaudhri has over 25 years experience in IT and has previously held roles as a developer, consultant, product strategist and technical trainer. He has worked for several blue-chip companies such as Reuters and IBM, and also the Big Data startups Hortonworks (Hadoop) and DataStax (Cassandra NoSQL Database). He holds a BSc (1st Class Hons.) in Computing and Information Systems, MSc in Business Systems Analysis and Design and a PhD in Computer Science. He is a Member of the British Computer Society (MBCS) and a Chartered IT Professional (CITP).
  • DevOps Security in the Cloud with Black Duck by Synopsys and AWS
    DevOps Security in the Cloud with Black Duck by Synopsys and AWS Erin McGill, Partner Solutions Architect, Amazon Web Services; Dave Meurer, Alliances Technical Mgr, Black Duck by Synopsys Mar 28 2018 3:00 pm UTC 60 mins
    Automation and containerization can help you build faster and deliver continuously, but can also make managing security challenging. By integrating Black Duck Hub with the development tools you use in AWS, you can scan images in your container registry, automate build scans in your CI pipeline, and stay notified on any security vulnerabilities or policy violations found in your open source code.

    Join experts from Black Duck by Synopsys and Amazon Web Services as we explore how to build applications and containers safely in the cloud without sacrificing agility, visibility, or control. In this hands-on webinar we’ll demonstrate how to:

    -Get started with Black Duck Hub and AWS
    -Build better solutions through Open Source Intelligence
    -Use open source management automation and integration with AWS

    Plus, we'll feature a real-world example using Apache Struts, as well as the resources you can put to use today to gain the security you need without sacrificing the agility you want.
  • Migrating Applications to Public Cloud Services: Roadmap for Success V2.0
    Migrating Applications to Public Cloud Services: Roadmap for Success V2.0 Cloud Standards Customer Council Mar 28 2018 3:00 pm UTC 60 mins
    As organizations consider migrating applications to the cloud, a business plan and detailed migration plan is critical to success. Version 2.0 covers the key considerations of cloud migration and takes into account the increasing diversity of approaches such as the use of containers, virtual machines and serverless functions, as well as the increasing use of hybrid cloud solutions. In addition, mitigating concerns related to security, privacy and data residency is a major focus of the update.

    In this webinar, authors of the paper will discuss each of the six steps outlined in the migration roadmap:

    1.Assess your applications and workloads
    2.Build a business case
    3.Develop a technical approach
    4.Adopt a flexible integration model
    5.Address compliance, security, privacy and data residency requirements
    6.Manage the migration
  • Transitioning to Modern Business Suites Requires Business Transformation
    Transitioning to Modern Business Suites Requires Business Transformation George Lawrie Vice President, Principal Analyst Forrester Research, Rex Ahlstrom CSO & CTO BackOffice Associates Mar 28 2018 3:00 pm UTC 60 mins
    Businesses looking to move to next-generation enterprise applications, like SAP S/4HANA, must evolve various aspects of their business. A highly important, but often overlooked requirement is the transformation of business data to match the new environment. Getting the data right is critical to ensuring a successful transformation.

    Join our guest speaker George Lawrie, Vice President and Principal Analyst at Forrester Research, and Rex Ahlstrom, Chief Strategy and Technology Officer at BackOffice Associates, in this webinar as they discuss:
    * Observations on the value of transitions to next-gen apps, like SAP S/4HANA
    * The impacts of not getting the data right
    * Recommendations for driving best value from transitions

    George Lawrie
    Vice President, Principal Analyst, Forrester Research
    George serves Application Development & Delivery Professionals. He brings to Forrester more than two decades of experience deploying global enterprise resource planning (ERP) applications in complex multinationals. During his five years with Forrester, George has led research into topics such as SAP deployment best practices, ERP consolidation, IT investment prioritization, global data synchronization, and trade promotion management.

    Rex Ahlstrom
    Chief Strategy and Technology Officer, BackOffice Associates
    Rex has over 28 years of technology industry leadership experience. He specializes in enterprise software within the data integration and information management space. Responsible for BackOffice Associates’ current product strategy, marketing and technology in addition to analyst engagement and partnership development, he previously served as CEO of two software start-ups and held major leadership roles at multiple Fortune 500 organizations, including SAP.
  • AI-Based Anomaly Detection for Proactive Business Monitoring
    AI-Based Anomaly Detection for Proactive Business Monitoring Matt Aslett of 451 Research, Greg Kuzhals of Pandora and Dr. Ira Cohen of Anodot Mar 28 2018 4:00 pm UTC 60 mins
    Businesses are inundated with countless bytes of data in databases, data lakes, business platforms, devices, and more. Discovering negative trends and problems are an issue for every organization because every organization lacks the human resources to monitor data in real time, report on changes, and investigate the root cause relationships between business and performance. Indeed, with so many moving parts in data-driven businesses, it is practically impossible to track all the data and events manually using traditional BI tools like dashboards... you always miss something crucial, which turns into revenue loss, angry customers or brand damage...

    Are you ready to move into the future of BI and AI-driven business monitoring?

    Join our speakers: Matt Aslett, Research Director for the Data Platforms and Analytics Channel at 451 Research, Greg Kurzhals, Product Analyst at Pandora and Dr. Ira Cohen, Chief Data Scientist at Anodot for a discussion on:
    •An overview of best practices for AI analytics and anomaly detection
    •Real-world examples of how Pandora is using anomaly detection to track millions of events per day and investigate potential pitfalls
    •Use cases like churn, data quality and missing data, real-time data deviations, bug fixes, pricing opportunities, and more
    •Approaches and techniques to apply AI to anomaly detection to proactively focus where the business needs your focus