Hi [[ session.user.profile.firstName ]]

Application Management

  • Combining Mobile and Web App Technologies to Get Supercharged Agility Combining Mobile and Web App Technologies to Get Supercharged Agility Ken Spokas Technical Director & BPM/BRMS Practice Lead, Vizuri Maggie Hu Senior Solution Architect, Red Hat Recorded: Jan 19 2017 56 mins
    Taking a fully dynamic web application driven by rules and creating a native mobile app out of it may sound time-consuming. Learn how to do it in no time, with a minimum amount of code.

    Watch this webcast to see a quick survey app modified on the fly. You'll learn:
    • How straight-forward rules can create complex interactions in the app.
    • How processes in business process management (BPM) can add order.
    • Some great insights into how these technologies play together.
    • Get ideas on how they could be a great solution to your next mobile application development challenge.
  • Helping flydubai Takeoff with APIs and Digital Transformation Integration Helping flydubai Takeoff with APIs and Digital Transformation Integration Mohammed Ahteshamuddin, Vice President IT, flydubai & Paul Crerand, Director Solution Consulting, MuleSoft Recorded: Jan 18 2017 60 mins
    IATA estimates that by 2034 there will be 7.3 billion air passengers globally, which is twice more than what we have today. Alongside economic forces and passenger demands, pressure on the aviation and travel industry remains as intense as ever.

    Since launching in 2009, flydubai has strived to remove barriers to travel and enhance connectivity between different cultures. With 90 destinations in 44 countries, flydubai has embarked on a digital transformation journey to help enhance business agility, flexibility and the customer experience. Connecting and integrating your SaaS platforms, APIs and application networks is critical in today's digital world, regardless of industry.

    Join Mohammed Ahteshamuddin, Vice President IT – Customer Experience & Passenger Services System, flydubai, and Paul Crerand, Director Solution Consulting, MuleSoft, on Thursday, December 8 at 10am (GMT) for a live webinar as they share their story and best practices.
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Recorded: Jan 18 2017 57 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • Solving IoT & BYOD Challenges: The Answers are in your Network Solving IoT & BYOD Challenges: The Answers are in your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Jan 18 2017 20 mins
    Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.
  • Ext JS Reactor: Adding Powerful Ext JS Components to React Apps Ext JS Reactor: Adding Powerful Ext JS Components to React Apps Mark Brocato Recorded: Jan 18 2017 52 mins
    React is a popular JavaScript framework for building user interfaces (UIs), but React developers have to provide the components to build the UI. Building a component library is time consuming, has integration and maintenance risks, and gets in the way of actually building the app. Fortunately, there’s a better way. Learn how you can use Sencha’s powerful Ext JS component library within your React apps to deliver a great user experience using the new Ext JS Reactor.

    Join our webinar to learn the many advantages of using Ext JS components with React, including how:

    -You can build a data-intensive, cross-platform web app leveraging the Ext JS component library and React
    -To manage data and respond to events using React while rendering UI controls using Ext JS with React's tag-based JSX syntax
    -You can lower your project risk and accelerate time to market
  • 2017 Trends in Services 2017 Trends in Services Kelly Morgan, Research Vice President - Services Recorded: Jan 18 2017 32 mins
    The next wave of cloud computing is coming, and it is going to take the shape of serving distinct enterprise needs in an on-demand fashion. It is normal for enterprise IT departments to provision or procure IaaS, PaaS or SaaS services now. That in turn means that a larger galaxy of business needs and operational complexities will be tackled as the next way to monetize cloud infrastructure. The trickle of specialized providers doing boutique services such as disaster recovery as a service, compliance as a service and database as a service could well become a flood.

    Join Kelly Morgan, Research Vice President for Services as she uncovers what service providers will need to change in order to gain a competitive advantage in 2017, and what the sources of demand for multi-tenant datacenters will be in the coming year.
  • How Process Automation Works Within the NOC & Infrastructure How Process Automation Works Within the NOC & Infrastructure Jeremy Axmacher, Platform Engineer Recorded: Jan 17 2017 45 mins
    To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.

    You will learn:
    How CA Technologies’ internal IT team saves time automating triage and remediation
    How workflows can be easily adapted to detect issues quickly
    How new servers are now deployed within a matter of minutes with standardized builds and security protocols
  • How to Fine-Tune a Microservice Architecture with API Management How to Fine-Tune a Microservice Architecture with API Management Keith Babo Product Manager, Red Hat Manfred Bortenschlager Director, API Marketing Development, Red Hat Recorded: Jan 17 2017 36 mins
    With the increased speed of business and the transitory nature of apps and services, agility is paramount. To meet this need, successful organizations have turned to DevOps philosophies and solutions based on microservices architectures (MSAs).

    Application programming interfaces (APIs) are crucial in every MSA (Microservice Architecture) to link the various microservices. Solutions based on MSAs and DevOps are effective, but bring some challenges. While microservices allow flexible, agile deployments, they can be harder to manage and can create complex scenarios.

    Watch and learn:
    • How to establish effective continuous integration and delivery pipelines using Red Hat® OpenShift, Docker, and Kubernetes.
    • How to get security, control, and visibility of the microservice APIs using the 3scale by Red Hat API management platform and the 3scale nginx-based API gateway running on Docker.
  • Hot topics in containers, OpenStack, and Hadoop Hot topics in containers, OpenStack, and Hadoop Krishna Mayuram, Duane DeCapite Recorded: Jan 17 2017 47 mins
    Containers, OpenStack, and Hadoop are three of the most talked about topics in the industry today. This session will highlight some of the hot topics related to the convergence of containers and OpenStack including projects Magnum, Kolla and Calico. Join us and learn about new communities and products including Open Container Initiative (OCI), Cloud Native Computing Foundation (CNCF), Cisco NFVI and Mantl/Shipped. This session will also feature a deep-dive on how Hadoop can be deployed on OpenStack with the Hadoop-as-a-Service (HaaS) Cisco Validated Designs (CVD).
  • 2017 Trends in Mobility 2017 Trends in Mobility Brian Partridge, Research Vice President - Mobility Recorded: Jan 17 2017 57 mins
    Mobility in 2017 is all about 5G, which is not just another “G” – its scope is far larger. Previous G’s focused on increasing bandwidth and latency to support Mobile Internet consumption patterns accelerated by universal adoption of smart devices. The revolutionary attributes of 5G converge the latest innovations in network, cloud, and devices in a way that has never been done before. 5G’s impact will be far reaching across industries generating massive value not possible in previous technology shifts. Ultra-broadband communication and computing power will combine and extend across networks and devices such that information and computing power will be instantaneously available.

    Join Brian Partridge, Research Vice President for Mobility, as he explores how this will catalyze a wave of innovation in applications, services and functions built to run on the new 5G infrastructure.
  • Evolving your Java Applications to Benefit from DevOps, Cloud & Containers Evolving your Java Applications to Benefit from DevOps, Cloud & Containers Bilge Ozpeynirci Senior product manager, Red Hat James Falkner JBoss technology evangelist, Red Hat Recorded: Jan 12 2017 67 mins
    You want to evolve your application development strategies to benefit from DevOps processes, cloud and container platforms, and microservices architectures. However, if you've built your core application infrastructure around traditional Java™ EE development approaches, the path forward might not be so clear.

    Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) 7 allows you to re-imagine your Java applications and take full advantage of these new application approaches.

    In this webcast you’ll learn:

    • Trends and priorities in application development today
    • What’s new with JBoss EAP 7
    • How to move your Java EE applications into the cloud with Red Hat OpenShift Container Platform
  • Gabe Knuth Talks Storage With Vaughn Stewart aka "The Storage Guy" (Podcast) Gabe Knuth Talks Storage With Vaughn Stewart aka "The Storage Guy" (Podcast) Gabe Knuth, Independent Analyst & Blogger; Vaughn Steward, VP and Chief Architect, Pure Storage Recorded: Jan 12 2017 52 mins
    Join independent analyst and blogger, Gabe Knuth, as he discusses the current state of storage, how we got there and the benefits of flash storage with the VP and Chief Architect at Pure Storage, Vaughn Stewart. Tune in now and learn what sets one storage vendor apart from its competitors.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner Recorded: Jan 12 2017 49 mins
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • CA Briefings Part 5: Annual Trends/Predictions CA Briefings Part 5: Annual Trends/Predictions Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator Recorded: Jan 12 2017 58 mins
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017
  • 2017 Trends in Information Security 2017 Trends in Information Security Scott Crawford, Research Director, Information Security Recorded: Jan 12 2017 57 mins
    Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?

    Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
  • Why Agile Seemed Like a Good Idea at the Time - 1 PMI PMP PDU Credit Why Agile Seemed Like a Good Idea at the Time - 1 PMI PMP PDU Credit Andy Jordan, ProjectManagement.com Recorded: Jan 12 2017 60 mins
    Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced.  As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences.  Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.

    This session is approved for 1 Project Management Institute (PMI) PMP Credit.
  • Maximize Test Coverage and Software Security Maximize Test Coverage and Software Security Arif Muhammad and Abhijit Mugali CA Technologies Recorded: Jan 11 2017 55 mins
    Traditionally, test data management has involved copying, masking, and subsetting production data. While masking data does offer production-like data, it’s also slow, complex, and often error-prone, increasing the risk of sensitive information making it to less secure test environments.

    View this event to discover how synthetic data generation can create realistic test data that contains no sensitive information. What’s more, this test data will contain the negative paths, future scenarios, and outliers not typically found in production, providing the data needed to maximize test coverage.

    You will also learn:

    -The drawbacks of using production data in testing, from compliance to provisioning time and quality

    -How data visualization can be used to identify any data missing from production needed for rigorous testing

    -How masking can be combined with synthetic data generation to plug any gaps in test data
  • How Process Automation Helps CA Technologies Create a Disaster Recovery Strategy How Process Automation Helps CA Technologies Create a Disaster Recovery Strategy Jeremy Axmacher, Platform Engineer Recorded: Jan 11 2017 40 mins
    When disaster strikes, your number one priority is fast recovery. But trying to determine the root cause of the problem can be a time consuming, manual process. Join this webinar with CA Technologies’ internal IT team, as they discuss how automation has helped them save time with disaster recovery through consistent, predicable processes – and enabled them to get up and running again seamlessly.

    You will learn:
    How to save money and time from outages – even when the worst happens
    •How to shift your focus from manual problem solving to fast recovery through automation and repeatable processes
    •How keeping an audit trail prevented the team from making the same mistakes in the future
  • Does IT Asset Management Still have a Place in a Service Management World Does IT Asset Management Still have a Place in a Service Management World George Spalding, EVP from Pink Elephant Recorded: Jan 11 2017 56 mins
    We’ve been counting, measuring, assessing and reallocating IT assets since time began, or at least since IT time began. Now that we’ve moved into a world where Service Management is foundational to IT Asset Management (ITAM), do we still have to employ the resources (time, people, tools, etc.) involved in ITAM? After all, isn’t Configuration Management the same thing, only better? Do I need both disciplines? Isn’t ITAM really a function of Finance or Audit? As an ITAM professional, should I be worrying about my future employment prospects? Join George Spalding, EVP from Pink Elephant as he ponders the answers to these questions.
  • The hybrid portfolio: Can’t we all just get along? 1 PMI PDU The hybrid portfolio: Can’t we all just get along? 1 PMI PDU Andy Jordan, ProjectManagement.com and Jim Tisch, Dir Product Marketing, PPM Recorded: Jan 11 2017 55 mins
    Agile is here to stay, waterfall’s not going away anytime soon, and more and more organizations are creating hybrid project execution models that combine both. What does that mean at the portfolio level? If you’re struggling to manage a portfolio of different project approaches, if you have executives looking for common reporting metrics, or if you have frustrated project teams, this webcast is for you. Join PPM expert Andy Jordan as he explains:
    •Value based reporting that ignores the project execution approach
    •The importance of flexibility in portfolio planning and delivery
    •The need to create an environment that supports both Agile and waterfall
    •Some simple steps you can take today to improve hybrid portfolios
    The future of portfolio management will include both Agile and waterfall, unless you’ve mastered them both you need to attend this webinar.
  • Spreadsheet Integration with Oracle EBS. What are the Options? Spreadsheet Integration with Oracle EBS. What are the Options? Carlos Urtubia, Support and Pre-Sales Consultant, More4Apps Recorded: Jan 11 2017 33 mins
    Spreadsheet Integration is a necessity when it comes to easily and efficiently getting your business data into Oracle EBS and maintaining it in the long term. It is overwhelming when you start researching the options to know when it is appropriate to use tools such as SQL*Loader, Dataloader, WebADI, More4Apps AIW (Application Interface Wizard) or alternatively a prebuilt end user solution.

    Join our technical expert Carlos Urtubia as he discusses the advantages and disadvantages of each of these options.
  • Evaluation to Implementation: Coca-Cola's Cloud Migration Strategy Made Easy Evaluation to Implementation: Coca-Cola's Cloud Migration Strategy Made Easy Danny Eng, Enterprise Integration Architect, The Coca-Cola Company Jag Ramaswamy, Enterprise Integration Lead, The Coca-Cola Recorded: Jan 10 2017 38 mins
    Just a few years ago, The Coca-Cola Company (TCCC) was completely on-premises, looking for a way to move toward their cloud-first strategy. Watch TCCC’s presentation from MuleSoft’s Atlanta Summit to learn Coke’s journey with MuleSoft starting from evaluation to how they are currently taking an API-led approach to integration. With this, Coke is now creating great customer experiences and enabling their sales force to continue to lead through innovation.

    Attendees will learn how TCCC is using MuleSoft to:

    Implement a microservices architecture
    Automate release management to accelerate time to production
    Move from a COE to a Center for Enablement (C4E) to maximize reuse
  • NVDIMM - Applications are Here NVDIMM - Applications are Here SNIA NVDIMM Special Interest Group Recorded: Jan 10 2017 60 mins
    Get a glimpse of the future of Persistent Memory - it's NOW! Join SNIA NVDIMM Special Interest Group in another in our series of webcasts on the NVDIMM Cookbook - how to incorporate NVDIMM into your systems and what non-volatile DIMM applications now available. We'll even highlight some of the "knobs" to turn to optimize use of NVDIMM in your applications to ease the way to simple, plug-n-play adoption!
  • Risk-Ranking Open Source Vulnerabilities Risk-Ranking Open Source Vulnerabilities Mike Pittenger, VP Security Strategy, Black Duck Jan 19 2017 4:00 pm UTC 60 mins
    Increase security effectiveness and maintain dev agility

    Three certainties in 2017: organizations worldwide will continue to increase their use of open source software; new open source security vulnerabilities will be discovered; exploits of open source vulnerabilities will occur.

    With dev teams under constant pressure to accelerate application delivery and with security resources often scarce, organizations need more effective ways to determine which open source vulnerabilities to fix first and the options available to reduce risk during remediation.

    Join Black Duck VP of Security Strategy Mike Pittenger as he discusses strategies and emerging best practices for risk-ranking open source vulnerabilities. He will cover:
    - the most important considerations in prioritizing open source security issues
    - ways to determine the risk associated with a discovered open source vulnerability
    - options for dealing with open source security vulnerabilities beyond simply replacing the component
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Jan 19 2017 4:00 pm UTC 60 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless Jan 19 2017 4:00 pm UTC 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
  • Patching Clients and Servers using Configuration Manager Current Branch Patching Clients and Servers using Configuration Manager Current Branch Kent Agerlund, Microsoft MVP, Coretech Jan 19 2017 5:00 pm UTC 60 mins
    Dealing with server management is often very different from managing client devices in the enterprise. In this session we will demonstrate some of the tools and solutions we use to successfully manage servers in the enterprise. We will also discuss how you can integrate Flexera Software's Corporate Software Inspector into your enterprise client management strategy.
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society; Dave Lewis, Global Sec Advocate, Akamai Jan 19 2017 6:00 pm UTC 75 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • Taking A Design Approach to Bridge DevOps and Business Automation Taking A Design Approach to Bridge DevOps and Business Automation Justin Holmes Leader, Consulting Business Automation Practice, Red Hat Jan 19 2017 8:00 pm UTC 60 mins
    Custom software development and business automation have historically provided 2 equal but distinct paths to bring high-quality products to market. Each has its own benefits and trade-offs. Business process management (BPM) and business rules management systems (BRMS) provide a lightweight, modular platform that can be tailored for your organizational structure and technical architecture.

    Red Hat® Consulting offers a Business Automation Practice—a design model that combines the rigor and security of software development with the speed and accessibility of business automation technology. The result? Businesses can develop better products, more quickly and fully evolve with DevOps.
  • Are Hybrid Clouds in Tune with Future Business Growth? Are Hybrid Clouds in Tune with Future Business Growth? Agatha Poon 451 Research, Rajesh Awasthi Tata Communications Jan 24 2017 6:30 am UTC 60 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
  • How Mouser Electronics Differentiates with Rich Product Information How Mouser Electronics Differentiates with Rich Product Information Hayne Shumate, Matt Wienke, Prash Chandramohan Jan 24 2017 4:00 pm UTC 60 mins
    When a manufacturer wants a Wifi Module for the next generation of smart phone, the design engineers turn to Mouser Electronics to find the exact module they need. As a worldwide, leading authorized distributor of electronic components and semiconductors, Mouser specializes in the rapid introduction of new products and technologies for more than 600 manufacturers.
    With neither Inside Sales nor Outside Sales teams, new customers discover Mouser through the detailed product pages on the many country specific websites. Most sales are completed online and with 7 million active products and information on 14 million obsolete/unavailable products. Mouser.com serves as a primary reference for anyone designing a circuit. Mouser’s product data is a critical differentiator and is elemental to Mouser’s growth and success in providing engineers and buyers with product data that is highly searchable, complete, and accurate.
    Join this webinar to hear Hayne Shumate, SVP of Internet Business from Mouser Electronics, Matt Weinke of Infoverity, and Prash Chandramohan of Informatica share:
    -Product information management (PIM) requirements that help Mouser sustain 20% annual growth
    -How Mouser uses Informatica MDM Product 360 to maintain high-quality, detailed electronics data so that customers can quickly find, select and buy the components that meet their specifications
    -Best practices from Infoverity and their Quickstart framework that helps companies like Mouser start small and scale with their PIM implementations
    -Lessons learned from this experience, and the next steps in Mouser’s PIM journey
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud Jan 24 2017 4:00 pm UTC 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Elevate IT Operations in the Boardroom with App Analytics Elevate IT Operations in the Boardroom with App Analytics Bryan Whitmarsh, Sr Principal Product Manager, Application Performance Management, CA Technologies Jan 24 2017 6:00 pm UTC 60 mins
    Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
  • How to Choose the Right Data Platform for Big Data Storage and Faster Apps How to Choose the Right Data Platform for Big Data Storage and Faster Apps Divya Mehra Principal Product Manager, Red Hat William Burns Senior Software Engineer, Red Hat Jan 24 2017 8:00 pm UTC 60 mins
    The convergence of mobile, social, big data, and cloud has increased demands on applications to react instantaneously to changes in data at a large scale. A delay of a few seconds can mean the difference between engaging or losing a customer.

    Application performance is highly correlated to how quickly an app can access and process a variety of data types. It's crucial that data platforms provide high performance as data changes, scales out linearly to handle large data sets, and maintains data integrity and security.

    Watch this webcast to learn about the market and data trends driving the need for computing and in-memory storage.
  • 7 Questions To Consider When Looking For An Effective Endpoint Solution 7 Questions To Consider When Looking For An Effective Endpoint Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Jan 25 2017 2:00 pm UTC 45 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Introduction to Uncertainty Modeling Introduction to Uncertainty Modeling Tao Yue, Shaukat Ali, and Bran Selic - Simula Research Laboratory Jan 25 2017 4:00 pm UTC 60 mins
    The importance of facing, understanding, predicting and even mitigating uncertainty has been well acknowledged and studied in various fields such as philosophy, physics and finance. In terms of software and system engineering, due to the increasing complex of large-scale systems themselves, and the dynamic and unpredictable deployment and operation environments of such systems, increasing attentions have been given to address challenges of explicitly specifying and modeling uncertainty.
    Uncertainty Modeling (UM) aims to promote and enable explicit specifications of uncertainty and uncertainty related concepts, at various contexts (e.g., developing large-scale Cyber-Physical Systems and Internet of Things, for different purposes (e.g., enabling uncertainty-wise requirements specifications, modeling, verification and validation, e.g., facilitating the definition of uncertainty-wise testing strategies), and at different phases of the development of such complex and uncertainty-inherent systems (e.g., requirements, architecture, design, testing and operation).
    In the context of OMG, we see a diverse set of uncertainty modeling applications, such as 1) integrating with UML use cases, SysML Requirements Diagram, to enable requirements V&V, 2) capturing uncertainty as part of SysML or UML models to facilitate design and/or testing, 3) integrating with BPMN and other OMG standards to facilitate different kinds of analyses and generations.
    OMG’s Uncertainty Modeling Request for Information (RFI) is currently open for responses. The RFI aims to solicit ideas, discussions, comments, recommendations, user needs and experiences about uncertainty modeling. Collected responses will be carefully analyzed and will be used to identify requirements, based on an RFP for an UM will be developed. Instructions for responding to this RFI are specified in the OMG Uncertainty Modeling Request for Information document (ad/16-09-02 (Uncertainty RFI)).
    We invite you to join the conversation.
  • Strengthening your app monetization super powers Strengthening your app monetization super powers Stewart Rogers, Director of Technology, VentureBeat Jan 25 2017 6:00 pm UTC 60 mins
    It takes more than Superman or his Justice League to develop and maintain an effective app monetization strategy. This is especially true in light of a recent report which found that 0.19 percent of all mobile game players contributed 48 percent of revenue. How can one identify the high-spend users while not alienating the remaining percentage that only have potential to spend within the app?

    Ideally, one would customize app strategy according to type of user. Better still, each user would have her own strategy. Unfortunately this isn't a scalable solution to monetization.

    In this webinar, you'll learn to:

    * Customize your monetization strategy so that it's scalable
    * Unlock the revenue potential of lower spending users
    * Attract higher-spend users
    * Negotiate monetization strategies without alienating current users

    Speakers:
    * Maximo Cavazzani, founder and CEO, Etermax (Trivia Crack)
    * Eric Shashoua, CEO, Kiwi for Gmail
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Analyst, VentureBeat


    Register today for this free webinar.
  • The Data-Driven CMO: Master Marketing Attribution With Search-Driven Analytics The Data-Driven CMO: Master Marketing Attribution With Search-Driven Analytics Scott Holden, Chief Marketing Officer, ThoughtSpot Jan 25 2017 6:00 pm UTC 60 mins
    Join CMO, Scott Holden, in a live webinar to learn how his team has mastered marketing attribution with ThoughtSpot’s search-driven analytics. Using ThoughtSpot, Scott’s entire marketing team can now analyze all their marketing data in one place without waiting weeks.
    We'll cover:
    - Top data sources and key metrics to include when building out your marketing analytics program
    - Best practices for transform your team into a data-driven marketing masters
    - How search-driven analytics is enabling the entire marketing team to analyze attribution without a team of data scientists
  • Turbocharge Data-Intensive Ext JS App Performance Turbocharge Data-Intensive Ext JS App Performance Anselm McClain, Principal at xh.io, Per Minborg, CTO at Speedment, Jon Jarboe, Technical Marketing Manager at Sencha Jan 25 2017 6:00 pm UTC 60 mins
    Web applications are becoming increasingly data-intensive and complex while users demand a great user experience, including blazingly fast speeds, across many device types.

    In this webinar, we will show front-end and back-end developers how to dramatically improve the performance of your web applications by using Sencha Ext JS and Ext Speeder. See Extremely Heavy Industries (xh.io) demonstrate a sophisticated visualization app as it fluently analyzes millions of rows in real-time.

    Join us and you will learn how to:

    - Significantly improve application responsiveness without making any modifications to your front-end Ext JS application

    - Accelerate your back-end data requests up to 10x by leveraging sophisticated in-memory, object-oriented techniques

    - Quickly get started with database acceleration in standard J2EE environments
  • How to Manage, Orchestrate and Analyze Copy Data How to Manage, Orchestrate and Analyze Copy Data Alex Infanzon, Application Solutions Manager, Pure Storage; Prashant Jagannathan, Technical Manager, Catalogic Jan 25 2017 7:00 pm UTC 60 mins
    Oracle database sprawl comes with significant cost and complexity. The complexity is the result of proliferation of database copies created for a range of uses including disaster recovery, provisioning of development and testing infrastructure, quality assurance (QA), DevOps in private or hybrid clouds to name a few.

    Join this webinar to learn how Catalogic Software’s® ECX™ Copy Data Management platform deployed in conjunction with the Pure Storage® FlashArray™, allows organizations to manage, orchestrate and analyze Copy Data. The solution provides full lifecycle management of your Copy Data through automated workflows that allow you to streamline the creation, management and use of Oracle database copies.
  • Big Room Planning: Harnessing the Power of Agile at Scale Big Room Planning: Harnessing the Power of Agile at Scale Jonas Högstrand & Andrew Sales Jan 26 2017 9:00 am UTC 60 mins
    Harnessing the Power of Agile at Scale with Big Room Planning

    Many organisations are already using agile methodologies like Scrum, but largely at an individual team level.
    But how do you ensure correlation and coordination between different agile teams? How do you ensure alignment between business strategy and execution level? And how do you provide business stakeholders with visibility to track the progress of ongoing projects and programmes – traditional and agile?
    The secret to succeeding with Enterprise Scale Agile is Big Room Planning; real-time collaboration, where teams identify risks early, untangle dependencies, and effectively plan their work aligned to business priorities and customer needs.

    In this webinar, Jonas Högstrand and Andrew Sales, will discuss:

    •What benefits organisations can achieve with greater levels of business agility
    •Why Big Room Planning is a core activity for succeeding with agile at scale and the agile behaviours it drives
    •How Big Room Planning works, who participates, what you do and why it’s worthwhile
    •How CA Agile Central supports Big Room Planning and provides visibility to track and steer the plans that are created

    Learn how to achieve faster time to market, improved quality, strategic alignment between IT and the business, and predictable delivery of features that delight customers.
  • Building Blocks for Securing the Industrial Internet: IISF Building Blocks for Securing the Industrial Internet: IISF Dr. Jesus Molina, Security Consultant, Fujitsu; Dan Isaacs, Director Connected Systems at Xilinx Jan 26 2017 4:00 pm UTC 60 mins
    Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF).

    On January 26, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will provide an introduction to the approach needed to secure industrial systems and offer insights gained from one of our testbeds encompassing several security technologies.

    Join the webinar to learn:
    • The importance of securing the IIoT and why it differs from securing the IoT
    • The value of securing industrial Internet systems
    • Recommendations for engaging OT about developing an IIoT strategy

    Don’t miss this webinar – first in a series of monthly webinars offered by the Industrial Internet Consortium.

    *Upcoming Webinars*
    February: Securing IIoT Endpoints
    March: Securing the Smart Factory
  • 2017 Trends in Software 2017 Trends in Software Nick Patience, Founder and Research Vice President - Software Jan 26 2017 4:00 pm UTC 60 mins
    Digital transformation is real, and it's happening, although there is still a very long way to go. We believe it is an inescapable truth that every business is becoming a digital business, controlled by software, which is the manifestation of these digital transformations. Businesses must react, driven by the imperatives of improving intelligence, agility and their customer-centricity, with the ultimate goal of survival in a digital world.

    Join Nick Patience, Founder and Research Vice President for Software, as he dives into the three business imperatives behind digital transformation and what specifically will be transformed in 2017.
  • Digital Transformation: How to Deliver Meaningful Results Digital Transformation: How to Deliver Meaningful Results Neil Ward-Dutton, Research Director, MWD Advisors and Sapna Maheswari, Bizagi Jan 26 2017 4:00 pm UTC 60 mins
    Stop right there, here is the inescapable truth: Every large business, everywhere needs to transform in order to survive – and transformation is beyond difficult. So let’s get beyond the aspiration and talk about the practicalities of this journey for real businesses.

    Join this session to hear MWD Advisors’ Neil Ward-Dutton speaking in this Bizagi-hosted webinar to share his analyst insights into one of the most common mistakes that businesses make when trying to digitally transform – thinking only about the front-end, marketing driven side of the customer experience.

    Register now to see why change in the ‘Above the water line’ customer experience fails to deliver the essential elements of digital transformation, and hear how a digital business platform can enable you to:
    - Co-ordinate work and share data and knowledge at scale, across teams, to support customers’ needs and expectations
    - Make operational course adjustments collaboratively, quickly and cost-effectively
    - Give you analytical insight into your digital products, services and operations to inform your innovation programs
  • Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Bernard Sanders, CTO and Cofounder, CloudBolt; Chris Sells, Product Management Lead, Google Cloud Developer Tools Jan 26 2017 5:00 pm UTC 30 mins
    Enterprise IT organizations looking to get a foothold into public cloud need solutions that deliver the efficiency and innovation promised by cloud platforms—without throwing away the investments they've made in on-prem technology, policies, and skills.

    Creating self-service Development & Test (or Dev/Test) environments is one of the first and most popular cloud workloads enterprise IT organizations explore in their journey to cloud. Google Cloud and CloudBolt have partnered to create a hybrid cloud solution for this important workload that's easy to set up, and can be fully tailored to your environment. CloudBolt is a cloud management platform that integrates your on-prem virtualization and private cloud resources with the public cloud, serving as a bridge between your existing infrastructure and Google Cloud Platform.

    With these hybrid solutions, users can rapidly provision the resources they need through an intuitive self-service portal. IT organizations maintain full control over system configuration, usage quotas, and cost transparency. By delivering a self-service, fully auditable alternative to shadow IT, CloudBolt and Google Cloud let you tap the latest cloud innovations from Google directly from the technology you're already familiar with on-prem.
  • Value at the Speed of Business: Insights from the 2016-17 World Quality Report Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Jan 26 2017 5:00 pm UTC 45 mins
    Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and when ever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

    In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

    • Digital Transformation driving and shaping IT strategy
    • Agile and DevOps continue to expand and grow in adoption
    • Internet of Things a disrupting force with real implications on quality
    • Infrastructure costs (test environments); a rising concern
  • Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Dr. Lance Cottrell; Dominique Kilman; Aamir Lakhani; Brandon Dunlap Jan 26 2017 6:00 pm UTC 75 mins
    Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.