Hi [[ session.user.profile.firstName ]]

Application Management

  • A look at the future of software testing: HPE vision for Continuous Testing
    A look at the future of software testing: HPE vision for Continuous Testing Clint Sprauve, HPE Recorded: Mar 29 2017 33 mins
    Many organizations struggle with the implementation of the engineering practices of DevOps, specifically with continuous testing. What if software development teams had a solution that was 100% cloud based (for distributed teams), provided real-time data analytics (for quick feedback), and supported the activities of build, edit and execution of test scripts in the cloud (nothing on the desktop). Couple that with the ability to test mobile apps on multiple devices (for scale and efficiency), the option to use containers plus existing tools (including open source), and support visual UX testing (for user experience and accessibility) while linking directly to existing continuous delivery infrastructure, and the goal of continuous testing becomes in reach.

    Join Clint Sprauve, Product Marketing Manager for Continuous Testing & Automation, to see the future of continuous testing in action and get a sneak preview of the latest software solutions for test automation. See what HPE is doing to push the envelope and take a key leadership role for the future of DevOps, quality and automation.

    This is part two in a three-part DevOps webinar series. Join us also for:
    Pattern your DevOps success & avoid the anti-pattern landmines: best practices, March 1
    Taking on Enterprise Agile with HPE, April 26
  • Deconstructing Test Automation of Web Apps for Manual Testers
    Deconstructing Test Automation of Web Apps for Manual Testers Subu Baskaran, Sr. Product Manager at Sencha Recorded: Mar 29 2017 61 mins
    Test Automation is not just for programmers. In this webinar, we will show you how manual testers can create a robust test automation strategy for web applications using APIs. Join us and you will see a live demonstration of how to:

    - Identify elements on a page
    - Construct meaningful tests using just APIs
    - Organize tests using easy to maintain design pattern
    - Create data-driven tests
    - Analyze different reasons for test failures

    This webinar is intended for:

    - Manual blackbox testers who are looking to learn about automated testing
    - Manual testers who are not familiar with using APIs to create test automation
    - Test Automation engineers who write automated tests for applications that are deployed without awareness of underlying code
  • Strategic (Domain Driven) Design with Spring Boot
    Strategic (Domain Driven) Design with Spring Boot Michael Plöd, Principal Consultant, InnoQ Recorded: Mar 29 2017 64 mins
    This talk will focus on one of the most precious parts of Domain Driven Design, the concept of Strategic Design, as well as Bounded Context, the Context Map and the patterns that are being documented in the Context Map.

    An explanation of these principles as well as practical usage scenarios such as migrating a monolithic landscape to microservices is planned for discussion. And, using a hands-on approach, we will demonstrate the concepts surrounding Strategic Design with an application landscape of various Spring Boot Applications.

    We thank you in advance for joining us.

    The Spring by Pivotal Team
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation
    All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Recorded: Mar 29 2017 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • Upwork CEO’s journey from PM to CEO of a $Bn-marketplace
    Upwork CEO’s journey from PM to CEO of a $Bn-marketplace Stephane Kasriel Recorded: Mar 28 2017 55 mins
    How do you go from building products to running a marketplace that creates thousands of jobs and is valued at over $1Bn? Upwork CEO Stephane Kasriel shares what he learned along the way, from product manager at Paypal, to SVP of product and then CEO at Upwork. “Getting to product-market fit is only the beginning,” he says “From there, there are even bigger hills to climb, like building a sustainable growth engine, maintaining trust in the platform, expanding to new verticals, and securing funding along the way.”

    As CEO of Upwork, the world’s largest freelancing website, Stephane Kasriel is driving the company’s vision of connecting businesses with talent faster than ever. At Upwork (formerly Elance-oDesk), he built and led a distributed team of more than 300 engineers, product managers and designers located around the world as SVP of Product & Engineering before ascending to be CEO of the company. Stephane applies his learnings to help people build their own teams so that they can overcome talent gaps, create more job opportunities, and give rise to a flexible work future. He holds an MBA from INSEAD, Master’s from Stanford in Computer Science and a BS from Ecole Polytechnique in France.
  • Micro-Rules and Microservices: Business Rules in Modern Architectures
    Micro-Rules and Microservices: Business Rules in Modern Architectures Duncan Doyle, Technical Marketing Manager, Red Hat Recorded: Mar 28 2017 57 mins
    Being able to create and easily re-define business rules is a competitive advantage in today's quickly-changing environment. Business rules are at the heart of every organization’s operations. They define the laws and regulations to which the organization is bound, they drive business process decisions, and they determine pricing of products and services.

    Microservices modularize monoliths into small services with open and standard interfaces that can be individually implemented, deployed and scaled. Containers provide the environment where microservices operate (OS, runtime, libraries, configuration).

    Join this webinar to see how Red Hat® JBoss® BRMS and Red Hat OpenShift Container Platform:

    - Help you quickly extract documented or implicit business rules and explicitly define them with a standard and centrally managed rules language.
    - Let you package those explicitly defined rules into containers and deploy them as microservices.
  • Celent & INETCO: Is Real Time Data Necessary in Retail Banking?
    Celent & INETCO: Is Real Time Data Necessary in Retail Banking? Daniel Latimore, Senior Vice President - CELENT and Stacy Gorkoff - INETCO Recorded: Mar 28 2017 60 mins
    Real time is rapidly becoming more important to retail banks. Payments, customer responsiveness, and fraud detection must all become faster. Powering them all is data in its many facets.

    Join banking analyst firm Celent, and real time transaction monitoring and analytics company INETCO, as they explore real time’s current progress, its implications for financial institutions, and how banks should respond.
  • How APIs are Shaping FinTech & the Open Banking Value Chain
    How APIs are Shaping FinTech & the Open Banking Value Chain Jeroen Hölscher, Isabel Viegas and David Chao Recorded: Mar 28 2017 57 mins
    The emergence of FinTech represents both an influx of new Financial Services industry entrants as well as a fundamental disruption in the banking and FinServ value chain. In areas as diverse as payments and lending, the digital transformation of financial technology is challenging long-established business processes as global consumers embrace innovative new service conveniences.

    It is not surprising therefore that today’s most savvy banking leaders seek to future proof their business through new customer-centric products and service offerings. And within this hyper-competitive business environment, IT professionals are under increasing pressure to deliver nimble new approaches to meet these requirements more quickly.

    Attend this webinar to learn how leading banks are responding to this challenge by leveraging Open APIs to create new revenue models and realize business benefits.

    Join us and explore:

    - How the financial services value chain has changed, and what that means for information technology and security
    - How can banks leverage compliance obligations, like PSD2, as an opportunity to move towards Open Banking
    - Why existing development and delivery approaches are no longer fit for purpose

    Presented by:
    - David Chao, Head of Industry Solutions, MuleSoft
    - Isabel Viegas, EMEA Financial Services Lead, Amazon Web Services
    - Jeroen Hölscher, Head Global Payments & Cards Practice, Capgemini
  • ICC - Making SharePoint® useful again with HPE ControlPoint
    ICC - Making SharePoint® useful again with HPE ControlPoint Jones Lukose, Information Management Officer, International Criminal Court Recorded: Mar 28 2017 42 mins
    Microsoft® SharePoint sites have become a dumping ground for enterprise and customer information. This practice, compounded over time, compromises your investment in SharePoint, minimizes productivity and can even result in the risk of failing to comply with internal and external regulations (GDPR). Join us to learn how HPE
    ControlPoint can help you clean up your SharePoint sites and regain control of your data.
  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace
    7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Recorded: Mar 28 2017 39 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Bénéfices d’une meilleure gestion de vos licences logicielles
    Bénéfices d’une meilleure gestion de vos licences logicielles Florian Jorno Recorded: Mar 28 2017 47 mins
    Les directions informatiques se sont longtemps consacrées à l’optimisation de leur parc informatique d’un point de vue matériel. Cependant, un nouvel axe d’optimisation sous-estimé par de nombreuses entreprises doit être mis en lumière, la considération du logiciel en tant qu’actif.

    Snow Software, spécialisé dans la gestion des actifs logiciels, a su se positionner en tant qu’acteur de référence sur les problématiques de Software Asset Management (SAM) rencontrées par les entreprises.
    Différents leviers d’optimisation et de maîtrise des risques financiers vous seront illustrés d’une manière pratique, sous la forme de « Quick Wins », à travers notre solution Snow License Manager (SLM), au cours de ce webinar.
  • Top Building Blocks to Combat Cyber Crime
    Top Building Blocks to Combat Cyber Crime Mike Smith (Sungard AS) & Richard Cassidy (Alert Logic) Recorded: Mar 27 2017 54 mins
    Today's cyber attackers are fast, well-funded and organised, and they are using all the latest techniques to stay one step ahead of your security. Traditional approaches to cyber security that focus on technology alone are not providing companies with enough resilience to protect against threats across their infrastructure and business critical applications.

    Join Sungard AS and Alert logic for a live webinar as we discuss security-in-depth strategies and review how technology, people and processes need to be in place to support and secure business infrastructure and set the foundation of your security strategy.

    Key Considerations in a Cyber Security Strategy:

    • What would the impact be on your business if you were the victim of a cyber-attack?
    • What security vulnerabilities are you exposed to throughout your infrastructure?
    • How are you going to identify and remediate a cyber-attack - especially as cyber crime is a24x7 business?
    • Who do you have protecting your critical applications and data from attacks, and do they have the right skills?
  • Stelligent Acquisition Briefing
    Stelligent Acquisition Briefing Joel Daly, CEO of HOSTING Recorded: Mar 24 2017 21 mins
    Join Joel Daly, CEO of HOSTING, as he goes live to discuss HOSTING's acquisition of Stelligent, a technology services company that provides DevOps Automation in the Amazon Web Services (AWS) cloud.

    Bring your questions as there will be a live Q&A during the webinar!
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud
    Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study
    Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Michel Gahard, General Counsel, Nancy Gillespie, Solution Specialist, Microsoft, Niranjan Umarane, GM Product, Icertis Recorded: Mar 23 2017 59 mins
    Join us for this upcoming live webinar to find out how your Contract Lifecycle Management system could be working harder for you. The webinar details Microsoft’s experience in moving from a ‘patchwork’ of third-party and internal solutions, to a scalable, streamlined solution from Icertis.

    About the speakers and what you will learn:

    Michel Gahard, Associate General Counsel & General Manager, Microsoft

    Hear first-hand from Michel about the challenges Microsoft faced and the solutions and implementation best practices they followed for a successful adoption of a NexGen Contract Management system and how implementing the Icertis Contract Management platform resulted in:

    - Increased contract compliance
    - 60% increase in contract speed
    - About 40% decrease in cost

    Niranjan Umarane, General Manager of Product Management, Icertis

    Niranjan will highlight implementation best practices for a large enterprise-wide initiative and discuss what is so unique about the Icertis Contract Management platform, including:

    - Configurable Business Rules Management for a globally dynamic environment
    - NextGen, easy-to-use interface
    - Quickly get up-and-running in 4-5 months
    - Scalability and flexibility based on the cloud-native architecture
  • Top Reasons Why Your Antivirus Isn’t Working Anymore
    Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Using Elastic as your Analytics Foundation
    Using Elastic as your Analytics Foundation CA Technologies: Bryan Whitmarsh Sr. Principal Product Manager; Himanshu Pande, Senior Director of Product Management Recorded: Mar 23 2017 59 mins
    The collection of performance, usage, and error/crash data is a critical first step in building an application or infrastructure based analytics engine. Once collected, the normalization of this data into a proficient repository, that makes the data available to be analyzed, becomes the foundation of your Analytics initiatives.
    In this interactive webcast, experts from CA Technologies will facilitate some key topics related to using the ELK stack as a basis for their Analytics engine, sharing their lessons learned and best practices. The ELK stack is a set of products (Elasticsearch, Logstash, and Kibana) provided by Elastic used to log, store, and visualize both structured and unstructured data. We’ll answer these questions, and more in this webcast:
    •Why leverage the ELK Stack as part of your analytics strategy?
    •Lessons learned in running Elasticsearch at scale (Master Nodes + Client Nodes + Hot Nodes + Warm Nodes)
    •How to best support multi-tenant SaaS solutions with ELK
    •Elasticsearch is just one component of a Lambda Architecture, what else can/should be used?
    •How you can leverage CA’s new Agile Ops analytics platform to predict performance anomalies, end alert storms and false positives and leverage machine learning for faster root cause analysis.
  • Real Time, Predictive analytics to ensure customer experience for 1B subscribers
    Real Time, Predictive analytics to ensure customer experience for 1B subscribers Emon Haque, Anritsu, Product Manager - Analytics & Big Data and Carlo Arioli, EMEA Big Data Marketing Manager, HPE Recorded: Mar 23 2017 58 mins
    In the last few years, telecommunications networks have experienced exponential increase in data volume, while the expected response time for analysis on those data volumes have experienced a similarly exponential decrease. Within half a decade or so, telecommunication networks have gone from Gigabytes of data and sub-minute response time to Exabytes of data and sub-second response time! At Anritsu, with the help of HPE Vertica, real time, predictive, multi-dimensional analytics solutions have been designed which are ensuring customer experience and service assurance for over 1 billion telecommunication subscribers world-wide. Join us to find out more about this innovative solution from Anritsu which utilizes the field proven, extensive analytics capabilities of HPE Vertica.
  • Réussir une gestion de configuration ITSM (CMDB) efficace
    Réussir une gestion de configuration ITSM (CMDB) efficace Karim Maadi Recorded: Mar 23 2017 47 mins
    La mise en place d'une gestion de configuration (CMDB) ITSM efficace est essentielle pour les organisations qui souhaitent comprendre et maitriser les différents composants de leur système informatique afin de :

    - fournir aux utilisateurs les services et logiciels dont ils ont besoin
    - automatiser et rationnaliser leur processus IT

    Cependant, d'après le Gartner :

    " D'ici 2018, 75 % des organisations IT verront leurs efforts de gestion de configuration échouer en raison du manque de standardisation "

    Le défi est donc majeur et ne consiste pas seulement à construire une base de données de gestion de configuration (CMDB) mais surtout à garantir que le référentiel des actifs IT (matériels et logiciels), les utilisateurs et les relations entre eux, soient standardisés, utilisables et constamment à jour. Les changements de configuration et d'infrastructure peuvent rapidement rendre ce référentiel erroné.
  • Self-service is the biggest lie in BI
    Self-service is the biggest lie in BI Glen Rabie, CEO, Yellowfin Recorded: Mar 22 2017 2 mins
    Why does BI have such low adoption rates? Simple: vendors have been selling the wrong product to the wrong audience.

    Don’t get me wrong. The modern generation of BI delivers a fantastic experience for the data analyst. The problem is that the business user has no real interest in BI, other than the end insights that help them do their job better. Data preparation, discovery and report building are not “self-service” activities, and they never will be.
  • The Best Kept Secrets Of High Performance Development Teams
    The Best Kept Secrets Of High Performance Development Teams Jeffrey Hammond, Vice President, Principle Analyst, Forrester Richard Seroter, Senior Director Product Marketing, Pivotal Recorded: Mar 22 2017 64 mins
    Ever wondered what separates high-performance development organizations from shops that struggle to maintain productivity? The answer’s not always obvious, but there are recurring best practices that enlightened development managers use to maximize flow, engage developers, and improve results.

    Join Forrester Vice President and Principle Analyst Jeffrey Hammond and Richard Seroter from Pivotal for an interactive discussion about:

    - Best practices culled from high-performance teams;
    - Examination of data and research on how developers spend their days;
    - Cultural practices that lead to higher-performance;
    - Tools and DevOps tactics to unlock high-performance and help teams deliver better software outcomes.
  • How to Use Analytics to Extend Your (cold) Storage to the Google Cloud
    How to Use Analytics to Extend Your (cold) Storage to the Google Cloud Ben Chong, Google Cloud Storage Product Manager, Google; Krishna Subramanian, COO, Komprise Recorded: Mar 22 2017 28 mins
    You know 60%+ of data in your organization is inactive or cold, yet it continues to consume expensive primary storage resources. Cloud offers an opportunity to store this cold data and achieve 70%+ savings – but how do you identify the cold data and who owns it, who is using it, and move it without any disruption to users or applications?

    Join this webinar to learn:

    - How data is growing and being used across your storage (NFS and SMB/CIFS) using software from Komprise, a Google Cloud Technology partner
    - How to project ROI of moving cold data to Google Cloud Storage based on your policies
    - How to move data transparently to Google Cloud Storage without changing file-based access for users and applications

    Webinar attendees will qualify for a special free trial (up to 100TB) to get a customized analysis of your storage environment and ROI of moving to the cloud

    To learn more about Komprise and Google cloud storage, click here: https://www.komprise.com/google/
  • Design Methods for Better Product Development
    Design Methods for Better Product Development Andrew Hemans Recorded: Mar 22 2017 56 mins
    Stop developing in the dark. Use design-thinking methods to illuminate the path to better products. Whether you’re on a team that works closely with designers or you work alone, using a design-first approach can help you save time and resources in your development process. As more companies take a design-focused approach to product development, it’s helpful for people in all parts of an organization to become familiar with design. In this session, we’ll discuss basic design principles including design thinking, user experience, visual design, designer-developer communication, and design critique.
  • Redefining the Link: New Year, New Benefits
    Redefining the Link: New Year, New Benefits Mike Connaughton, Market Segment Manager, Data Center Mar 30 2017 2:30 pm UTC 30 mins
    “Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.

    * The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
  • Stroke of genius; The only known way to fully protect against keystroke loggers
    Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • FireEye in 2017
    FireEye in 2017 Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO, as he describes how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • Machine Learning and Time Sensitive Networking in the Smart Factory
    Machine Learning and Time Sensitive Networking in the Smart Factory Paul Didier, Internet of Things Solutions Architect at Cisco; Dan Isaacs, Director Connected Systems at Xilinx Mar 30 2017 4:00 pm UTC 60 mins
    Machine Learning and Time Sensitive Networking in the Smart Factory: How the IIoT makes critical data available when & where it is needed.

    In today’s digital age, the rapid emergence of IoT is changing operations throughout the manufacturing domain. Machines and systems have become more intelligent and more connected, and the proliferation of sensors generates a non-stop flow of data. This wealth of actionable information provides the key to unlocking higher efficiency and increased reliability of machines and systems. The opportunity lies in harvesting the data.

    Join IIoT experts from the Industrial Internet Consortium to discover exciting developments in the field of machine learning -- products and systems taking action on their own -- and how this self-optimization will play a pivotal role in enhancing the intelligence of the factory. We will also showcase the Time Sensitive Networking (TSN) testbed and the technology used to support real-time control and synchronization of high performance machines over a single, standard Ethernet network.

    What you will learn:
    -How IIoT connectivity has enabled data from the operational domain (OT), to become more accessible to the information technology (IT) domain.

    -How Machine Learning will lead to real-time, self-optimization of Industrial Systems and help reduce downtime via predictive and preventative maintenance.

    -How TSN capabilities are extending standard Ethernet (IEEE 802.1 & 802.3) to enable more devices, applications, and deterministic potential to manufacturing networks.
  • Elevating Patient Support: Embracing Digital Disruption
    Elevating Patient Support: Embracing Digital Disruption Tony Romito, Managing Director, Accenture Life Sciences | Rich Sherman, Managing Director, Accenture Cloud First Mar 30 2017 4:00 pm UTC 60 mins
    Set yourself apart in the emerging healthcare IT ecosystem. Today, life sciences companies need to go above and beyond to stand out. This means clarifying your market positioning regarding patient outcomes and value to the healthcare system, defining the differentiating capabilities necessary to deliver on those goals and creating a high-performance enterprise of partners, collaborators and talent.

    Join life sciences and cloud industry leaders, Thursday, March 30 to learn:

    - The state of life sciences and healthcare today, trends and challenges
    - How to differentiate patient services offerings and add value to the healthcare system
    - How to create a high-performance enterprise of partners, collaborators and talent
    - What your peers are doing to elevate their patient support
  • Relational Search: Architecting the Next Generation Analytics Platform
    Relational Search: Architecting the Next Generation Analytics Platform Vijay Ganesan, Co-Founder, Principal Engineer, Andrew Yeung, Lisa Kant, Senior Director's Product Marketing Mar 30 2017 5:00 pm UTC 60 mins
    ThoughtSpot has built the world’s first relational search engine for data analytics - powered by the world’s most advanced, yet easy-to-use, number crunching machine. ThoughtSpot’s search-driven analytics lets business people analyze their company data in seconds, but bringing together search and enterprise analytics is no easy task.

    Come get a behind-the-scenes look at how we’ve architected our next generation analytics platform from the ground up to make it easy to analyze billions of rows of data across multiple data sources, while delivering sub-second performance and enterprise-wide governance. Hear how our customers across industries are using ThoughtSpot to give everyone in their organization access to analytics.
  • The Race to Innovation in Insurance
    The Race to Innovation in Insurance Jamie Macgregor, SVP, Celent, and Kim Gray, Senior Consultant, NTT DATA Apr 4 2017 1:00 pm UTC 60 mins
    In the last 10 years, digital and new engagement models have completely transformed the consumer and buying experience. And yet, the insurance industry continues to operate almost exactly the same; from the annual quote and buying or renewal process to the contact centre and an online experience designed 15 to 20 years ago.

    Celent and NTT DATA would like to invite you to attend a series of three one-hour online BrightTALK video events during April starting with “The Race to Innovation in Insurance.” Hosted by Jamie Macgregor, senior vice president of Celent’s Insurance practice, with a panel of guest speakers from leading insurance innovators including Aviva, Legal & General, NTT DATA and Ingenin, this video series will feature a panel discussion on what’s new and at the cutting edge, and how to truly create new markets, improve profitability for insurers and deliver value for the end customer.

    The event will focus on five technology innovations that insurers have ultimately no choice embracing. It will explore what continues to hold back insurers in their innovation ambition and what green shoots are emerging to change all of that:

    The panel will discuss topics such as:
    •Is agile proof-of-concept planning being strangled within insurance corporations?
    •How can you leverage connected environments? Does the connected environment improve customer service and/or enhance underwriting decisions?
    •What new, differentiated and transformative digital approaches/models are out there to help you improve customer experience?
    •How you should be using application/cloud deployment to significantly reducing CIO cost of ownership and responsiveness to innovation demand.
    •Are technologies beyond digital, such as artificial intelligence and machine learning, able to transform routine risk appraisal and process execution?
    •What will the new transformations using blockchain and the Internet of Things do to allow automation and straight-though processing?
  • LAN Standards, News & Trends: 2017 Update
    LAN Standards, News & Trends: 2017 Update Cindy Montstream, Legrand Apr 4 2017 3:00 pm UTC 90 mins
    Get the latest information about Cabling Standards from FOTC Standards Chair Cindy Montstream.

    Attendees will earn one BICSI CEC for attending.
  • DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility
    DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility Andrew Davey, Solutions Consultant, MuleSoft; Aaron Landgraf, Sr. Product Marketing Manager, MuleSoft Apr 4 2017 3:00 pm UTC 45 mins
    The mandate for applications to change is nothing new. Pushing those changes from design to production in hours, however, is something traditional software delivery models can't handle. DevOps practices have emerged as a viable approach to enabling this speed with quality for increased application performance and better architectures.

    In this webinar, we will highlight how DevOps practices and tooling can be applied with Anypoint Platform when implementing and managing an API.

    Attendees will learn:

    - How (and why) to create a DevOps pipeline with Anypoint Platform
    - Setting up a Maven project in Anypoint Studio
    - Connecting Mule projects with a Git repository
    - Creating automated tests with MUnit and JUnit
    - Deploying Mule applications automatically with Jenkins
  • Cloud Customer Architecture for API Management
    Cloud Customer Architecture for API Management Cloud Standards Customer Council Apr 4 2017 3:00 pm UTC 60 mins
    The CSCC has published an API Management reference architecture that describes how to build and maintain an effective API Management platform that drives digital transformation. APIs allow companies to open up data and services to external third party developers, business partners, and internal departments within the company to create innovative channel applications and new business opportunities.

    An effective API management platform provides a layer of controlled and secure self-service access to core business assets for reuse. In this webinar, the authors of the reference architecture will cover the architectural components and capabilities that make up a superior API Management Platform and will also cover important runtime characteristics and deployment considerations.
  • Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments
    Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Kelly Morgan 451 Research and Kevin Leahy Dimension Data Apr 4 2017 3:00 pm UTC 60 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business?

    Join us, along with Dimension Data, as we discuss:

    -The most common challenges faced when managing multiple IT environments
    -The types of challenges enterprises face in different countries
    -Which applications should be hosted in which environment
    -How to manage these environments more easily
  • Zero breach Tolerance: Earliest protection across the attack lifecycle
    Zero breach Tolerance: Earliest protection across the attack lifecycle Adrian Sanabria, Senior Analyst at 451 Research, & Mike Nichols, Director of Products at Endgame Apr 4 2017 5:00 pm UTC 60 mins
    Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.

    Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest protection can change the shape and outcome of an enterprise security program.
    This talk will outline strategies for:
    •Prioritizing the alerts and events that really matter
    •Identifying parts of the investigation workflow that can be automated
    •Building a detection methodology that creates confidence and continuously improves defenses
  • Protecting your all-flash FlashStack Converged Infrastructure platform
    Protecting your all-flash FlashStack Converged Infrastructure platform Mayur Dewaikar, Product Management: Solutions & Integrations, Pure Storage Sunil Polepalli, Head of Cisco Alliance, Commvault Apr 4 2017 6:00 pm UTC 60 mins
    Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.

    According to IDC, Commvault Data protection software delivers:

    1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance

    2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts

    3. 15–30% reduction in data management point solutions

    4. 55% reduction in annual unplanned downtime

    Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:

    1 How FlashStack compares to other converged infrastructure platforms.

    2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
  • How to Build a Successful API-Powered Customer and Partner Ecosystem
    How to Build a Successful API-Powered Customer and Partner Ecosystem Manfred Bortenschlager, Director, API Market Development; Sameer Parulkar, Product Marketing Manager, Red Hat Apr 4 2017 7:00 pm UTC 60 mins
    APIs can improve your collaboration with customers, suppliers, and partners and allow you to engage with them in new ways. Just as open source has energized API development, APIs have energized the pace of finding new and interesting ways of getting products to customers.

    Watch this webcast to learn about:
    - The importance of building a customer and partner ecosystem.
    - How APIs help build that customer and partner ecosystem.
    - Examples of how companies are actually building ecosystems through the use of APIs.
  • Simplify Persistent Storage for Red Hat OpenShift with NetApp
    Simplify Persistent Storage for Red Hat OpenShift with NetApp Andrew Sullivan, Technical Marketing Engineer at NetApp and Chris Morgan, Product Management Director at Red Hat Apr 5 2017 5:00 pm UTC 60 mins
    Red Hat® OpenShift Container Platform is a complete container application platform that provides all aspects of the application development process in one consistent solution that can span across multiple infrastructure footprints. OpenShift integrates all the architecture, processes, platforms, and services needed to help development and operations teams traverse traditional siloed structures and produce applications that help businesses to succeed.

    Using OpenShift with Project Trident, NetApp’s open-source dynamic storage provisioner, extends this experience to simplify and automate persistent storage volumes. Trident's integration with OpenShift allows infrastructure teams to define storage capabilities while simultaneously enabling application teams to consume storage based on their needs - when they need it, where they need it, and how they need it.

    Learn how OpenShift and NetApp Project Trident can empower the development and deployment of applications in an environment which meets customers’ needs with simplicity and ease.
  • Triple Threat:  Protecting Data Throughout its Lifecycle
    Triple Threat: Protecting Data Throughout its Lifecycle Don Vilen, Joel Rubinson Apr 5 2017 5:00 pm UTC 45 mins
    Marketers have never seen a challenge like this: unprecedented amounts of data, transferred at unprecedented rates, with data breaches doubling in just the past year. Many solutions have protected data in its various states, but no solution has secured data at rest, in use, and in motion – until now.

    In Triple Threat: Protecting Data Throughout its Lifecycle, IIS Chief Data Scientist Don Vilen and Strategic Advisor Joel Rubinson show you how to utilize the most advanced algorithms, format-preserving encryption to protect PII, and tokenization.

    About the presenters:
    Don Vilen - Formerly a Data Scientist at AOL and Chief Data Scientist at Buysight, IIS Chief Data Scientist Don Vilen brings over 30 years of software development and data analytics experience to this webinar. He has worked on some of the most groundbreaking database and web advertising products the industry has seen.

    Joel Rubinson - Joel is an adjunct professor of marketing at New York University. A published author and marketing analytics consultant, Rubinson has allowed IIS to streamline the conversation between its customers’ marketing and IT departments.
  • Quantifying DevOps Outcomes - Efficient Service Stability
    Quantifying DevOps Outcomes - Efficient Service Stability George Miranda, Technical Strategy Apr 5 2017 5:00 pm UTC 30 mins
    This webinar is part four of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to decrease change failure rates.

    High-performing organizations that have undergone digital transformation have very low rates of failure when introducing changes. Key to this resiliency is that these organizations focus on improving how quickly they recover from failures rather than trying to prevent failures from happening. By emphasizing recovery over prevention, they achieve a substantially higher rate of service resiliency. Industry metrics prove that this capability is part of an overall approach to outperforming your competitors.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore how to achieve resiliency by optimizing for failure recovery
    - Learn which industry metrics demonstrate that resiliency
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Connectivity: The Key to IIoT Data Communications
    Connectivity: The Key to IIoT Data Communications Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc. Apr 5 2017 5:00 pm UTC 60 mins
    Connectivity: The Key to IoT Data Communications
    Unlocking Interoperability via the Industrial Internet Connectivity Framework

    From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

    The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.

    John this webinar to learn:
    -What is the importance of an Industrial internet connectivity framework and how it can be used by systems developers to select the best-fit technology for new and existing applications.

    -Why enhanced connectivity accelerates the development of new IIoT applications across industries.

    -How the IICF provides an architecture to enable data sharing and interoperability between previously closed components and subsystems.
  • Trends Behind Today's Breaches & Cyber Attacks in EMEA
    Trends Behind Today's Breaches & Cyber Attacks in EMEA Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Apr 6 2017 12:30 pm UTC 45 mins
    Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
    Register today and get insights into:
    •New phishing trends breaching today’s companies
    •Changes in modern attack telemetry and methodology
    •Intelligence-led insights into emerging global threats
    •Modern defensive strategies to better protect your organisation
    •How GDPR is changing business in EMEA
  • Simplify how your app gets the edge with Text, Video, and Speech Analytics
    Simplify how your app gets the edge with Text, Video, and Speech Analytics Joe Leung, Product Marketing Manager, HPE Apr 6 2017 3:00 pm UTC 30 mins
    IDG estimates that unstructured data is growing at 62% per year and that 93% of all data in the digital universe will be unstructured. This is not surprising considering that there are over 600 million Instagrammers with over 100 million of them joining during the 2nd half of 2016 alone!

    Does your app need to connect to unstructured data sources, process and analyze massive amount of such data fast? Do you need to accelerate the release of a competitive and reliable app by embedding proven analytics from an established technology vendor? Trying to control R&D expenses? Wondering how to evaluate an OEM option? Please join us in this webinar to learn about:

    · The key criteria for evaluating an OEM partner
    · How HPE IDOL addresses those criteria
    · Resources for developers

    Joe Leung has over 13 years of experience in technology marketing and is currently focused on the analytics solution portfolio. Prior to this role, he was responsible for product marketing of the enterprise application data management solution.
  • OpenStack Deployments and LBaaS: A Customer Case Study
    OpenStack Deployments and LBaaS: A Customer Case Study Nate Baechtold, Enterprise Architect, EBSCO Information Services Apr 6 2017 5:00 pm UTC 60 mins
    Many enterprises embarking on OpenStack projects or data center automation initiatives are not aware of potential pitfalls during their implementation. Networking and application services represent one such area that can trip up even the most experienced network and cloud teams.

    In this webinar, Nate Baechtold, Enterprise Architect at EBSCO Information Services - a pioneer and successful early adopter of OpenStack - will share his experience and information that he wishes he had before he started his OpenStack journey.

    You will learn:
    - Best practices and lessons learned from EBSCO’s successful Red Hat OpenStack deployment
    - Load balancing (LBaaS) and self-service considerations within the OpenStack environment and how to meet performance and availability requirements
    - Building a CI/CD delivery model with blue-green deployments on top of OpenStack and software-defined load balancers
  • The InfoGov Playbook: How a Modern Workforce Needs to Handle Data
    The InfoGov Playbook: How a Modern Workforce Needs to Handle Data Sean Doherty Apr 6 2017 5:00 pm UTC 60 mins
    Information governance (IG) is a hard nut to crack in organizations, where it often lacks proper definition and eludes common user interfaces. As organizations pursue digital transformation and create, collect and use data to determine strategy and command performances, IG makes playbooks for how a modern workforce should appropriately use and consume data assets. This webinar discusses IG as a discipline, framework and collection of technologies to identify, assess and protect information assets and respond to regulatory and litigation risks and global privacy concerns.
  • Security Briefings Part 2: Top 5 Cloud Security Threats
    Security Briefings Part 2: Top 5 Cloud Security Threats Scott Boda, Solutions Engineer, Bitglass; (ISC)2; Brandon Dunlap, Moderator Apr 6 2017 5:00 pm UTC 75 mins
    Cloud apps offer several advantages over premises-based apps, from lower costs to easy deployment. In fact, 59% of organizations have already deployed apps like Office 365, Box, and Salesforce. As data moves to the cloud, security is of utmost importance. On April 6, 2017 at 1:00PM Eastern, join Bitglass and (ISC)2 for Part 2 of our Briefings series where we will discuss security threats such as external sharing, compromised credentials, lost/stolen devices and how you can best mitigate these threats. Learn how Cloud Access Security Brokers (CASBs) can provide end-to-end data protection, in the cloud and on any device.
  • Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights
    Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights Andrew Bartels, VP and Principal Analyst at Forrester and Samir Bodas, CEO of Icertis Apr 7 2017 5:00 pm UTC 45 mins
    Webcast with guest speaker Andrew Bartels from Forrester Research: Next Generation Contract Lifecycle Management (CLM) – An Analyst’s Insights.

    Our special guest, Andrew Bartels, VP and Principal Analyst at Forrester and Samir Bodas, CEO of Icertis discuss how CLM software has today become a strategic asset, not just a transaction module.

    In the webcast, Andrew and Samir discuss:

    - Evolution of CLM products from departmental tools to enterprise platforms
    - The new decision making process and changing evaluation criteria
    - How to get the most out of any enterprise CLM implementation – do’s and don’ts
    - New buzz words – cloud, machine learning, big data, etc. – if and how they matter
    - Implications of the change on enterprise user adoption and usage