Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!
Join us and you will:
- See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
- Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
- See real examples of:
-->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
-->Visualization tools – Charts, D3 Visualizations
-->Prebuilt packages - Calendar, Forms, Tabs, Menus
Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.
There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.
In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
Implementing a more strategic approach to testing can have a huge impact on product quality, but measuring exactly how your QA strategy has made a difference can be challenging. The long-term success of any QA strategy depends on measuring change and communicating that change to the team at large, so it’s important to measure the right metrics.
In this webinar, discover...
1. Five essential metrics that QA teams should track
2. How to avoid common pitfalls when it comes to measuring the success of a QA strategy
3. Techniques to level-up product quality by taking a data-driven approach to software testing
Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.
This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.
Discover how Datera’s self-managing software-defined storage uniquely solves challenges:
-Making storage invisible for Containers
Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
If your organization says it too large or has too many legacy systems to take on an agile transformation, this webinar may change your mind. We’ll dig into how the Mainframe Business at CA Technologies, the founding product of our 40 year old company, embraced the Scaled Agile Framework (SAFe®) to help improve product quality, drive innovation, and create a culture of empowered teams.
Join Dean Leffingwell, Founder of Scaled Agile, Inc and creator of SAFe®, and Ashok Reddy, General Manager of the Mainframe Business Unit at CA Technologies, to discuss how traditional, mission critical systems, with little room for risk, can push the boundaries of scaling agile and be the leaders for transformation across an organization.
Since aligning 74 teams to the Scaled Agile Framework over the past eight quarters, the Mainframe Business Unit has:
•Shipped 56 new product releases with zero defects
•Reduced the defect backlog by 45%
•Reduced the support backlog by 44%
•Deployed 3 new, organically-driven products
SAFe® is a registered trademark of Scaled Agile, Inc
The key to your enterprise's success lies in leveraging data, AI and analytics to improve processes and optimize your business. But what technologies and techniques should you use and what sorts of problems can AI solve for you? Join us to hear Nick Patience, Principal Analyst at 451 Research, discuss AI and explore how machine learning-based analytics benefits organizations across a variety of use cases. The session will include an overview of Magellan - OpenText's new AI and analytics platform - and will feature live demos and a customer case study. Attend to learn how Magellan can provide a powerful, cost effective, flexible option for implementing AI in your organization.
RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.
RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.
Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.
The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.
The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.
Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
Responding to the need for an application delivery controller to be fully dynamic, HAProxy Technologies invested a lot of resources into developing HAProxy’s Runtime API and the LB-update module. In this webinar, we will demonstrate the abilities of the Runtime API which enables you to change the behavior of your application delivery controller on-the-fly.
What you'll learn:
How to dynamically scale your server farms
How to perform maintenance on your servers
How to change routing policies
How the LB-update module can be used to dynamically update ACLs and maps by pulling a file from one central place
IT operations teams are now deploying and running hundreds or even thousands of containers at any given time. This rapid deployment surfaces challenges in validating the contents and security of container images being deployed. In this session, Black Duck container and virtualization expert Tim Mackey will provide an overview of technologies and solutions such as Red Hat OpenShift that enable organizations to deploy containers at scale securely.
In this webinar, Tim Mackey explores this new era of large scale container deployments and how to manage and secure them.
Attend and you'll learn:
- How to maintain visibility and control for the open source deployed in hundreds of containers
- How to help your development and operations teams work together to maintain the security of containers in production
- How to build security into your deployment of container orchestration platforms
- Measures you can take to proactively identify risks and remediate risks on containers in production
- How you can use Black Duck OpsSight to scan containers being created, updated or deployed through their container orchestration platforms
2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.
Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:
•Continued political tension in the region
•Mixed security maturity
•The effect of new compliance and data protection laws
Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
Big Data has a big reputation. But for many organizations, it hasn’t lived up to the hype delivering real-world outcomes. That’s because Big Data can’t deliver value unless it’s accessible and analyzed in the right way. Qlik and Cloudera technology executives will be cutting through the hype to discuss Big Data technology that is available today and being utilized by customers around the world including the real-world customer examples.
Qlik® is the leading visual analytics platform and the pioneer of user-driven business intelligence. Its portfolio of cloud-based and on-premise solutions meets customers’ growing needs from reporting and self-service visual analytics to guided, embedded and custom analytics, regardless of where data is located. Customers using Qlik Sense®, QlikView® and Qlik® Cloud, gain meaning out of information from multiple sources, exploring the hidden relationships within data that lead to insights that ignite good ideas. For more information please visit: www.qlik.com
Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.
In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.
Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?
If you answered yes to any of these questions, then this webinar is for you!
Join this webinar and learn:
• Why customers are not convinced that F5 is the right choice for them
• Common enterprise application delivery use cases
• Why Citrix NetScaler is gaining popularity amongst former F5 customers
For more than 25 years IT organizations have spent many cycles building enterprise data warehouses, but both speed to market and high cost has left people continually searching for a better way. Over the last 10 years, many found an answer with Hadoop, but the inability to recruit skilled resources, combined with common enterprise necessities such as ANSI compliant SQL, security and the overall complexity has Hadoop relegated to an inexpensive, but scalable data repository.
Join Noel Yuhanna from Forrester and Pivotal’s Jacque Istok for an interactive discussion about the most recent data architecture evolution; the Big Data Fabric. During this webinar you will learn:
What a Big Data Fabric is
- How does it leverage your existing investments in enterprise data warehouses, data marts, cloud analytics, and Hadoop clusters?
How to leverage your team’s expertise to build a Big Data Fabric
- What skills should you be investing in to continue evolving with the market?
When is it appropriate for an organization to move to a Big Data Fabric
- Can you afford to divert from your existing path? Can you afford not to?
The skills and technologies that will ease the move to this new architecture
- What bets can you place that will keep you moving forward?
Strategic Project Management or SPM shouldn’t be difficult. At the most basic level it’s about ensuring the projects we deliver help our organization to achieve its strategic goals and objectives. Yet consistently SPM fails to deliver consistent results. In this thought provoking webinar industry, expert Andy Jordan joins CA’s Jim Tisch to discuss SPM and understand some of the things that go wrong:
•Setting ourselves up for failure with the prong projects
•The focus on what instead of why
•Short term thinking in project execution
•Failure to ensure commitments are actually met
As 2017 draws to a close and organizations the world over commit to do things better in 2018 this is a webinar you simply can’t afford to miss. Sign up today and let Andy give you the tools you need to deliver on next year’s strategic objectives.
The days of relying on a single Content Delivery Network (CDN) are far behind us. With a wide range of CDN providers available, each with unique regional strengths and weaknesses, using more than one CDN is now virtually required of any business that cares about providing its users with an optimal experience. But with multiple CDNs comes unique traffic steering and management challenges. Learn what these are, and how best to solve them so you’re able to maximize the performance of your multi-CDN strategy.
Kubernetes deployments running on OpenStack clusters require a full OpenStack instance including Keystone, Nova, and Cinder services.
This talk presents a more pervasive and simplified deployment architecture by integrating Containerized standalone Cinder services with baremetal Kubernetes. Cinder services offer many storage features that are still missing in Kubernetes. Cinder is supported by many storage vendors, with over 70 storage drivers in its repository. A Containerized standalone Cinder service makes these features and extensive storage products available to Kubernetes clusters, quickly and easily.
Key to this architecture is an external Kubernetes volume provisioner that provisions Cinder volumes transparently and converts Cinder volumes to Kubernetes supported storage types, such as iSCSI, Fibre Channel, NFS, or Ceph RBD.
We'll show you how the combination of the services above with a true Next Generation Data Center Storage Solution like NetApp SolidFire simplifies and accelerates your ability to leverage persistence in a bare metal Kubernetes cluster while delivering advanced features like multi-tenancy, automation and guaranteed Quality of Service.
Customers around the world are embracing the CloverETL platform to eliminate clumsy hand-coded scripts and legacy data management solutions. Learn how to leverage CloverETL to simplify and automate data integration within your enterprise.
In our 20 minute high-level overview, discover how to efficiently develop, orchestrate and automate data transformations, from file-to-database loads to automating complex data movement between databases, files and Web Service APIs. See real-life examples of how some of our customers deploy CloverETL for reporting, migration, warehousing and BI and how your organisation could too.
Finally, we end with a live Q&A session, offering advice on your challenges and how to deliver your use case using CloverETL.
The live session will close with a Q&A session, where we can walk through your specific concerns and use cases.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.
APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.
Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.
Register today to gain deeper insights into this threat group!
Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.
With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.
Discussions will include:
• Recommendations for scaling for a growing user base
Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
- Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
- Ways to assess the risk associated with a disclosed open source vulnerability
- Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
Attendees will earn 1 BICSI CEC.
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
Explore Tectonic's new Open Cloud Services and learn how etcd, Prometheus and Vault can be effortlessly installed, operated, scaled and handle failover. Unlike proprietary cloud services, Open Cloud Services are first-class, fully automated Kubernetes resources running on the CoreOS Tectonic platform, leveraging the Operator pattern.
Join this webinar to learn about these unique capabilities and a live demo of the Vault Open Cloud Service.
Recent public breaches highlight the importance of a security strategy that extends beyond the network perimeter. As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.
In this webcast, you'll learn how Red Hat OpenShift Container Platform can be used to:
- Integrate security monitoring software into CI/CD pipelines for containerized applications.
- Know what's in your containers and where they come from, which is vital to secure and quickly remediate workloads.
- Enhance open source library security, in true DevSecOps fashion, and establish a security-first mindset for application development.
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
"What is cloud-native development?” And, “How do I transition from a traditional application development approach?” These two questions are often top of mind for developers and IT strategists tasked with aligning existing IT applications and investments more closely with current digital business needs.
In this webcast get answers to these questions and learn about considerations for choosing a cloud-native platform, how to plan for a successful transition, and Red Hat’s approach to cloud-native services.
Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments. .
During this webcast, you will learn:
-How to make application deployment and operations at scale simple and reliable
-How to make it easy to create “cloud-native” applications in the first place
-Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
Seems like there’s a lot of talk and no action when it comes to organizations implementing “proactive ITSM”. With “agile this” and “agile that” pervading IT organizations, one would think “proactive” would be embraced as by definition it provides what’s needed before it’s needed. Well, proactive ITSM isn’t as farfetched as you might think. This webcast explores how infrastructure monitoring, process automation and technology integrations can play a huge role in enabling ITSM to become truly proactive. The result is more time for IT to focus on things that really matter to the business other than just keeping the lights on or resolving problems.
Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.
CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.
In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
Call it Younger Sibling Syndrome: You study the successes and failures of those who came before. You replicate the wins. You limit the failures. You capitalize on the experience of pioneers and trailblazers.
Digital transformation is no different. Over half of the Fortune 500 is already using Cloud Foundry® as part of their digital transformation strategy. Where have they succeeded? How can you replicate? What will you need?
Wherever you are on your digital transformation journey, learn from your predecessors. In this talk, Dormain Drewitz distills the experiences of Fortune 500 companies using Cloud Foundry. Attend this session to learn more about the patterns around strategies, processes, and team-level tactics.
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
Every organization undergoes different pain points during their agile transformation.
We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join CA's Senior Director of Agile Management, Doug Dockery, agile coach and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, January 16, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
DDS Technical Overview Series - Part IV: The OMG Data Distribution Service provides a diverse set of Quality of Service policies. Strategic use of these QoS policies enables intelligent behavior in middleware and allows the application developer to focus on the domain. In this webinar, we examine one application in detail and explore how it uses DDS QoS policies to address several non-functional requirements. We'll also cover the trade-offs involved in different design choices involving DDS QoS and other DDS features. This webinar builds on the Part I and Part II webinars by examining certain QoS policies in more depth and taking a deep dive into a single application as it evolves from simple data transfer to taking full advantage of the Data-Centric Publish/Subscribe model of DDS.
Gain insights into these important legal developments from two of the leading open source legal experts, Karen Copenhaver, Partner at Choate Hall & Stewart and Counsel for the Linux Foundation, and Mark Radcliffe, Partner at DLA Piper and General Counsel for the Open Source Initiative. This annual review will highlight the most significant legal developments related to open source software in 2017, including:
- Current litigation
- An open source security update
- Blockchain and its forks
- Software Package Data Exchange (SPDX) and OpenChain
- And more
Live attendees will be receiving a CLE credit for this webinar.
Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.