Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
In 2017, the industry standardized on Kubernetes on the defacto container scheduler. So what does Kubernetes deliver, and how much more is needed to operate and maintain a container application platform? Learn from Red Hat’s leadership in the Kubernetes community, and many years of OpenShift customer deployments, how to enable an application platform that is built to optimize developer productivity, security and multi-cloud deployments.
SAP modernization presents a combination of business challenges and technical challenges, both of which must be overcome in order to achieve a successful transformation. For best results, the business experts and the technical experts must work together on the transformation, and in particular, when testing updates to the SAP system. Scriptless testing is the most effective way to bridge the gap between those with an intimate understanding of the business processes, and those more at home with the technical details of SAP.
This webinar will explore some of the challenges of testing SAP systems, and explain how scriptless test automation, using Micro Focus Business Process Testing (BPT), allows business users to define the processes, flows and data to be tested, while automation engineers implement the automated components that form each test’s building blocks.
• Understand the challenges of testing of critical systems such as SAP
• Discover how scriptless testing can bring technical and business experts together to create effective automated tests
• Understand how the components underlying scriptless test can be reused across different tests, and maintained with ease
Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.
Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.
Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
Jevons paradox states that when a resource is used more efficiently, the consumption of that resource actually rises due to the lower prices and/or increased availability of the product. Nowhere in the data center is that more true than when you look at server performance. Storage has always been a bottleneck in compute systems because of the vast performance difference between the storage subsystem and CPU and memory. Together Lenovo, Intel and VMware address the bottleneck of storage performance in Hyperconverged systems with the introduction of Intel Optane technology to Lenovo vSAN ReadyNodes. Join us to hear how these new ReadyNodes from Lenovo will help you to increase the performance of your applications, increase VM density and still improve end-user response times.
FISMA is the all-embracing legislative framework for protecting the security, integrity, and availability of federal information and information systems. To meet FISMA compliance requirements, governmental agencies and private contractors that handle federal data must maintain full visibility over their information system inventory.
Attendees will learn:
- How to leverage existing documentation
- Shared responsibility
- Gaining an ATO without FedRAMP assessed infrastructure
Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
Businesses deal with the impacts of data quality issues on a constant basis, yet the understanding of what data quality means is still improperly understood. In this webinar we’ll explore some of these impacts and how new approaches to data quality are changing the way organisations utilise data. We’ll also be exploring how new technology solutions are helping organisations investigate and diagnose the causes of various data quality problems and how fixing these issues makes a material impact to the health of the organisation. Data quality has become critical to the success of many business initiatives, so we’ll help you understand what items your detective toolkit needs to contain
This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
Attendees will learn how you can:
•Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
•Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
•Minimise Total Cost of Ownership and increase ROI by an average of 153%
Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
Pepperdata Application Spotlight analyzes all Hadoop and Spark jobs running on the cluster and provides developers with technical insights on how each job performed. Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar demonstrates how Application Spotlight helps developers quickly improve application performance, reduce resource usage, and understand application failures.
Learn how developers can:
– Maximize performance, improve productivity, guarantee reliability, and improve ROI
– Generate application-specific recommendations to improve application performance
– Highlight applications that need attention
– Automatically identify bottlenecks, and alert on duration, failure conditions, and resource usage
– Search for any applications running on the cluster, compare current and previous runs
– Visualize Spark applications and its stages for easy root cause failure analysis and performance tuning
Presenter Bio: Field Engineer, Kirk Lewis
Kirk Lewis joined the Pepperdata team in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.
With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.
In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT
Financial Services and GDPR: The next 60 days….
In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
As today’s midmarket organizations start to tackle modernization, it cannot be done in a vacuum. There are many considerations outside of a specific application or workload that impact the data that powers a business. Data no longer lives in one location (data center) as it did in the past, as it’s now in varying clouds, and in some cases like IoT, on the edge close to end users. So it’s critical to take a holistic approach that considers data’s role and flow in and out of each application and workload.
The use of open source has surpassed the occasional and solidified itself as the standard. In fact, the Black Duck by Synopsys 2018 Open Source Security and Risk Analysis found that 96% of the applications we scanned last year contained open source components.
It’s increasingly difficult to properly manage open source in an organization to ensure compliance with the over 2,000 different licenses in use today and defend against new vulnerabilities, which surface frequently.
Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and general counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss best practices for managing open source in an organization and throughout an M&A transaction:
- How do you conduct an open source / third-party software audit?
- How do you get the most out of your Black Duck code scan?
i.e. Handling license compliance issues and managing security vulnerabilities
- What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
- What are key success factors for effectively releasing code as open source?
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Cloud architectures, microservices, and infrastructure scale have exposed unmet needs in DNS that now hamper modernization efforts, including the need for flexible traffic management, service discovery, rapid propagation, and comprehensive API support.
In this webinar, we introduce Private DNS, NS1's next-generation DNS software product providing authoritative and recursive DNS services. Private DNS is designed primarily for deployment within enterprise intranets to meet the needs of user to user, user to device/application and application to application communication.
- Current challenges managing DNS systems
- How NS1 is different
- Use cases
- Deployment and best practices
In case you missed it, Java EE was given a new home at the Eclipse Foundation and on 26th February Jakarta EE was chosen as the new name for Java™ EE. Join this session to gain an understanding where Jakarta EE is heading and how customers and communities can help drive the future of enterprise Java.
Java EE has been the dominant enterprise Java standard for well over a decade. However, in recent years there has been confusion and concern around its future promoting new efforts such as Eclipse MicroProfile to take just enough Java EE into the world of cloud and microservices. But all of that changed in 2017 when Oracle announced that, working with Red Hat and IBM, they were donating all of Java EE to the Eclipse Foundation and to be rebranded as Jakarta EE. What does this mean for the future of enterprise Java and traditional Java application servers?
Dr. Mark Little, vice president, Enjgineering, Red Hat
Mark Little leads the technical direction, research, and development for Red Hat® JBoss® Middleware. Prior to 2008, Mark served as the SOA technical development manager and director of standards. Additionally, he was a chief architect and co-founder at Arjuna Technologies, a spin-off from HP, where he was distinguished engineer. Mark has worked in the area of reliable distributed systems for more than 30 years.
Leverage Threat Intelligence where it matters most.
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.
This month's theme: Insider and Privilege Misuse
Our Verizon Threat Research Advisory Center presenters will be:
• John Rudolph, Principal Consultant, Identity and Access Management
• Steve Atnip, Senior Analyst, Threat Intelligence
• David Kennedy, Managing Principal, Open Source Intelligence
• Laurance Dine, Managing Principal, Investigative Response – EMEA
For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:
Magic words alone are not enough to deliver the return on investment and cyber security out of your AWS cloud. Join N2WS for a great Webinar Magic Show. We will dispel your business’s fears of cloud migration, demystify cloud compliance and escape from the dunk tank of complexity – especially when it comes to managing backup and ensuring uptime.
Hosted by cybersecurity expert Ian Thornton-Trump, N2WS System Engineer, Laurent Mombel, and CloudCheckr Product Specialist Todd Bernhard, we will spend an hour brewing up a cauldron of information for you - using the recipe for AWS success:
- Rapid Recovery
- Flexible Backup
- Shrink Downtime
- Why hybrid is dangerous
- Benefits for small, medium and large companies
- Maintain Compliance
- Ease Auditing
It’s Time to Embrace Hybrid Cloud VDI with Nutanix InstantON for Citrix Cloud
Nutanix and Citrix have partnered to create a tightly integrated hybrid cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.
In this webinar, you will learn how Nutanix and Citrix allow you to:
· Take advantage of enterprise-class VDI benefits without any complexity
· Simplify desktop management and operations while increasing security and compliance
· Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
· Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.
In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.
This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.
This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
In this session, IDC will share insights into the IT spending patterns of some of the world’s largest companies. These firms are often among the first to embrace transformative, innovative technologies in an effort to delight customers and reinforce their position at the top of the pack. The web conference will showcase findings from IDC’s Worldwide Wallet IT research program, which estimates budgets and forecasts spending by region for more than 4,000 of the world’s largest enterprises. Join us for this webinar to see how IDC creates these data, and why the largest domestic and international IT vendors use IT wallet research to gather tactical data enabling more effective sales operations and marketing analytics.
-Full understanding of breadth/depth of IDC’s IT Wallet database
-Companies with largest anticipated increases in spending
-Understanding of how top WW firms dominate WW IT spending
-Top IT Spender Highlight
Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.
Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :
* Augmenter la disponibilité du réseau tout en simplifiant la connectivité des outils grâce à une solution de module bypass
* Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés tout en réduisant la complexité de leur exploitation
* Diminuer les coûts OPEX et CAPEX via un ROI très court-termisme
Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
Cloud security has come full circle - back to the user. Early cloud vendors promised complete security only to find the truth more nuanced - there’s a shared responsibility. Both infrastructure and applications in the cloud need attention to stay clear of security vulnerabilities old and cloud new. Security testing has evolved to meet the needs of hybrid, public, and private cloud deployments. Attendees of this webinar can expect to learn:
The shared model for cloud security
What cloud providers protect...and what they don’t
How to migrate securely to the cloud
What penetration testing for cloud environments does differently
While ITSM is often delivered via software as a service (SaaS), businesses today are looking for different deployment options. The world is in flux, and strategies evolve. Businesses using SaaS today may need to migrate to a private cloud in the future. Similarly, some companies have strict security and compliance policies around data sovereignty, making on-premises deployment mandatory. That’s why it’s important to factor deployment flexibility into your evaluation of modern ITSM solutions.
This webinar will cover:
1.How Flexible Container Technology provides Portability, Faster Time to Value, and Lower TCO
2.How seamless upgrades can be achieved in conjunction with Codeless Configuration
3.How you can now consume new and innovative capabilities with equal speed, whether the solution is on premise, in a SaaS model, or in the public cloud.
AI and machine learning technologies are rapidly maturing and becoming more enterprise ready — but 83% of organisations don't yet know how to leverage AI/ML in their business.
Join us to learn how the new Box Skills makes all your business-critical unstructured content easier to find, organise, manage and protect by automating mundane processes to get to your most impactful work faster.
During this live webinar you'll learn how you can:
- Use Box Skills to manage and tap the potential inside unstructured content like videos, photos, audio and more
- Reap the value from your unstructured content — without recruiting a team of data scientists to build AI/ML from scratch
- Apply ML to your content to increase employee productivity, improve customer experience, accelerate or automate business processes, and mitigate risks
No matter the industry – telco, financial services, medical devices – companies depend on applications to deliver services and/or to connect with customers. In this digital age, companies must accelerate application delivery to keep up with ever-changing customer demands and market pressures.
Modern application architectures and infrastructure - including microservices and containers - have emerged to deliver the application agility needed to propel digital transformation projects forward. However, traditional database architectures are guilty of anchoring both data and applications, forcing organizations to contend with heavyweight processes and development models. Monolithic relational databases simply weren’t meant to scale dynamically and can’t deliver the agility businesses and applications need. NoSQL databases scale, but force existing applications to go through a redesign process that is time intensive, expensive, and risky - requiring new technology training and support.
What is needed is a modern container-native SQL database - a flexible, distributed system that delivers the benefits of a typical SQL database (transactional consistency and ACID compliance) and is built to address the data and application demands of an agile, rapid development container environment.
In this webinar we will:
• Discuss the drivers for Digital Transformation initiatives
• Review how microservices and containers provide development agility
• Describe database options and what it means to be "container-native"
• Provide an overview and benefits of NuoDB's container-native SQL database
The more you understand the numerous cloud migration considerations, the more likely your enterprise will take advantage of its scalability, agility, and cost reduction benefits.
Register for this 30-minute webinar to learn how to minimize the risks and set yourself up for success.
You’ll also learn:
- Which applications to migrate first
- How to monitor and minimize the impact on users before, during, and after
- What training your IT staff needs to effectively build and operate cloud environments
(ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
Portfolio management has become more important in recent years, but for most organizations it’s still a tool they use to support other strategic processes. Industry expert Andy Jordan doesn’t think that’s enough, and in this webinar he explains the concept of a portfolio driven organization. This puts portfolio management at the heart of everything the organization does including:
- Investment planning and management
- HR and development strategies
- Technology strategy
- Organizational capacity and capability planning
In Andy’s usual upbeat and thought-provoking style, he’ll explain why portfolio management needs to be the hub of all strategic work in progressive organizations, and he’ll provide attendees with practical tools to start evolving their organization. Don’t miss out, register now.
Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:
-Who performs the services?
-How often do they run in a network environment?
-What’s covered in their data output and reporting?
-What’s their value?
Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.
BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
Many government agencies struggle to drive change, move beyond legacy applications and modernize. In this IT Roundtable, a panel of experts discusses how government agencies can harness the power of DevOps, microservices, containers, and more to modernize their platforms and improve their operations.
When choosing a Cloud Management Platform (CMP), enterprises should be looking for Security and Compliance capabilities in addition to Cost Management and Cloud Governance. CloudCheckr is a full-service CMP that delivers "all of the above".
Additionally, enterprises need to understand their role in the Shared Responsibility Model, in order to fully meet security standards like FedRAMP, HIPAA, PCI and more. CloudCheckr's new Total Compliance module can now automatically and continuously monitor your infrastructure for compliance with 37 different standards, such as HIPAA, PCI, and NIST 800-53.
Join us for a hands-on demonstration of some of the popular security and compliance features CloudCheckr offers.
Attendees will learn:
- Best Practice Checks as it relates to cloud usage
- Our *New* Total Compliance module
- Automated "Fix Now" capabilities that can save time and effort
Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.
With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.
For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:
•Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
•Windows 10 application incompatibilities
•Mobile security risks with running Exchange on-prem
•Network latency from running O365 in the cloud
•Managing multiple file hosting services including OneDrive
Today's PLM programs are helping companies build new capabilities to improve product portfolio management, sku-level profitability, customer service levels, and regulatory compliance. Data management, migration, and governance are a critical foundation for success, but have added complexity for PLM since much of the data is in "unstructured" sources like PDFs.
Please join this webinar to hear Chris Knerr, BackOffice Associate's Global Big Data & Analytics Leader, share Life Sciences and CPG best practices for PLM programs.
Whether for private clouds, public clouds or a multi-user environment, IT operators require an infrastructure solution that can instantly spin-up data-intensive workloads and that can scale to support multiple big data workloads or tenants. Attala Systems and Intel have partnered to create a solution that delivers composable storage with local NVMe performance for big data workloads like Apache Hadoop and Spark. The performance available to direct-attached PCIe flash is welcome, but cloud total cost of ownership (TCO) is better when storage is shared to many hosts while offering the elasticity to meet dynamic tenant demands. The maturing of the NVMe over Fabrics (NVMe-oF) specification enables local NVMe performance over a network. With remote direct memory access (RDMA), NVMe actions and data can be transported over a fabric such as Ethernet. This brief illustrates how a complex big data analytics workload is well served by Attala Composable Storage with Intel® 3D NAND SSDs. This workload—which once struggled to scale to support concurrent customers when serviced by an iSCSI appliance or enterprise storage area network (SAN), is shown to match local NVMe performance and scale independently for two customers with no degradation in application runtime when using the NVMe-oF target.
It’s been more than six months since the major design flaw in computer chips labeled Spectre became public. And, as predicted, it is still haunting the world of information technology. The CPU (central processing unit) is, after all, the “brain” of any computer, phone, tablet, modern TV, or other “smart” device.
Since then, we’ve all learned a bit about terms some of us had never heard before—“speculative execution,” anyone? We’ve also been told that you can’t just patch a chip the way you can patch bugs in software. But you can create work-arounds with software patches.
In this webinar, Taylor Armerding, senior security strategist for Synopsys Software Integrity Group, will address some of the questions that “regular”—i.e., nontechnical—users may have about Spectre:
- What is it?
- How does it work?
- Why does it work?
- Why didn’t chip makers catch a flaw of this magnitude during the design phase?
- Why is a tool called static analysis the best way to work around Spectre without causing intolerable performance slowdowns?
Legacy applications, disparate platforms and processes, and outdated technology have caused organizations to amass technical debt that’s dragging down modernization initiatives. According to Forrester Research, maintaining older applications and technology typically consumes 70% or more of the technology budget – and ignoring it drags down modernization efforts.
In this webinar, we explore ways to reduce technical debt and how you can use DNS as a shortcut to eliminating decades of technical debt in your organization.
- Our development teams have a massive security backlog and can’t fix everything in code
- We need to protect legacy applications with no build pipeline or no dev team support them
- Struts 2 made us realize we need better production controls and faster zero-day response
- Our SOC has alert fatigue and has no visibility or context regarding production applications
- RASP is interesting technology – we are curious to see how we would use it
At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.
Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:
- Intelligent, multi-technique detection
- Advanced attack response that goes beyond monitoring and blocking
- Language agnostic protection
- Simple deployment
DevOps accelerates more than application delivery. It transforms business ideas into customer value by automating and orchestrating continuous delivery pipelines, to securely deliver quality software and services faster. Teams are often spread across the globe supporting both traditional and hybrid IT environments. How do you streamline the delivery pipeline while ensuring collaboration? Join us to hear ways to successfully improve your delivery pipelines across large enterprise organizations, from our experts Julian Fish and Mark Levy.
This webinar will cover how to:
• Map and manage value streams
• Address common constraints in the delivery pipeline flow
• Accelerate and improve the delivery pipeline flow across the entire value stream
Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
Organizations are looking to access services in a completely different way. In the past, technology leaders have had to deal with multiple softwares or solutions for individual lines of business, now they have the opportunity to take all of the services within an organization and measure them through one service platform. In this panel discussion, we’ll go through the tenants of customer service and how those are now applied through IT service management best practices to make this the era of employee services.