Hi [[ session.user.profile.firstName ]]

Application Management

  • We Are TESM
    We Are TESM Animation Recorded: Jun 25 2018 3 mins
    An overview of how TESM can help you realise maximum return on your ServiceNow platform investment.
  • DevOps Security Challenges and Solutions
    DevOps Security Challenges and Solutions Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer Recorded: Jun 24 2018 42 mins
    What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of cloud WAF. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment with Cloudentity to provide state of the art protections against application attacks.
  • 5 Steps to Building a Successful Citizen Developer Program
    5 Steps to Building a Successful Citizen Developer Program Glen Bryant, VP Global Account Management, K2 Recorded: Jun 22 2018 30 mins
    Glen Bryant will dive into what it takes to build a successful citizen developer program - covering approach, implementation, and tooling. Glen is VP of Global Account Management at K2.
  • Building Your Application Security Toolkit: A Holistic Approach
    Building Your Application Security Toolkit: A Holistic Approach Stephen Giguere, Solution Engineer, Synopsys Recorded: Jun 22 2018 59 mins
    Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
  • Informatica MDM: Provisioning Tool – A Closer Look
    Informatica MDM: Provisioning Tool – A Closer Look Hazik Afzal, Product Manager, MDM, Informatica, Prash Chandramohan, Director of Product Marketing, MDM, Informatica Recorded: Jun 22 2018 48 mins
    Join us for this webinar as we take an in-depth look Business Entity, Business Entity View, and Layout configuration options available in Informatica MDM Provisioning Tool.

    During this webinar, Informatica MDM product experts will cover following topics:

    - Discuss Business Entity concept and review configuration options.
    - Understand Business Entity View and how to create transformations.
    - A walkthrough of the layout design and create data view layouts.
  • Improve Customer Experience through Multi-Arm Bandit
    Improve Customer Experience through Multi-Arm Bandit Jeremy Gu, Sr. Data Scientist, Uber Recorded: Jun 21 2018 59 mins
    In order to accelerate innovation and learning, the data science team at Uber is looking to optimize Driver, Rider, Eater, Restaurant and Courier experience through reinforcement learning methods.

    The team has implemented bandits methods of optimization which learn iteratively and rapidly from a continuous evaluation of related metric performance. Recently, we completed an AI-powered experiment using bandits techniques for content optimization to improve the customer engagement. The technique helped improve customer experience compared to any classic hypothesis testing methods.

    In this session, we will explain various use cases at Uber that this technique has proven its value and how bandits have helped optimize and improve customer experience and engagement at Uber.
  • Using Energy Harvesting to Create Self Sustaining IoT Devices
    Using Energy Harvesting to Create Self Sustaining IoT Devices Sam Jones, R&D Engineer, PowerFilm Solar Recorded: Jun 21 2018 61 mins
    Today’s ultra low-power sensors and wireless modules not only allow batteries to last longer but also make completely self-sustaining IoT devices possible. This webinar will overview energy harvesting methods including photovoltaic, piezoelectric, thermoelectric, and RF with a focus on indoor ambient light collection.

    Practical applications and how to integrate solar energy harvesters into electronics will also be discussed. An indoor solar-powered Bluetooth sensor will be analyzed as a use case example.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 46 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • What's new with H2O Driverless AI?
    What's new with H2O Driverless AI? Arno Candel Recorded: Jun 21 2018 48 mins
    Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.

    Speaker's Bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Recorded: Jun 21 2018 45 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • Intro to EKS: Amazon's Elastic Compute Service for Kubernetes
    Intro to EKS: Amazon's Elastic Compute Service for Kubernetes Nate Fox, Director of Engineering at Onica & Curtis Rissi, Solutions Architect at AWS Recorded: Jun 21 2018 63 mins
    For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.

    Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.

    In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.

    In this webinar, we’ll discuss:
    -How Amazon EKS makes it easy to run Kubernetes on AWS 
    -How to leverage additional AWS services with EKS
    -Optimizing costs on EKS
    -Demo on how to setup your cluster to run on Amazon EKS  
    -Customer success story
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Customer Driven Features in Hub 4.7
    Customer Driven Features in Hub 4.7 Jeff Michael, Senior Product Manager and Hal Hearst, Principle Product Manager for Black Duck by Synopsys Recorded: Jun 21 2018 43 mins
    Once again, our newest Hub release is packed with features requested by you – our customer! Lead Product Managers for Hub, Hal Hearst and Jeff Michael, will share all the new features. We will dive into:

    -Bulk snippet confirmation
    -BoM hierarchy tree display
    -BoM policy violation comments
    -Cross-project BoM difference comparison
    -Ability to map Hub projects to external application IDs
  • AI is the Catalyst of IoT
    AI is the Catalyst of IoT Prof. Ahmed Banafa, IoT Expert, Faculty, Author and Keynote Speaker, SJSU Recorded: Jun 21 2018 53 mins
    For companies to realize the full potential of IoT enablement, they need to combine IoT with rapidly-advancing Artificial Intelligence technologies, which enable ‘smart machines’ to simulate intelligent behavior and make well-informed decisions with little or no human intervention.

    Join this webcast to learn and discuss the best practices and trends coming for AI in IoT.

    About the speaker:
    Ahmed Banafa has extensive experience in research, operations and management, with focus on IoT, Blockchain and AI. He is a reviewer and a technical contributor for the publication of several technical books. He served as a faculty at well-known universities and colleges, including the University of California, Berkeley; California State University-East Bay; San Jose State University; and University of Massachusetts. He is the recipient of several awards, including Distinguished Tenured Staff Award of 2013, Instructor of the year for 2013, 2014, and Certificate of Honor from the City and County of San Francisco. He was named as number one tech voice to follow by LinkedIn in 2016, his researches featured in many reputable sites and magazines including Forbes, IEEE and MIT Technology Review, and Interviewed by ABC, CBS, NBC and Fox TV and Radio stations.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Best of Box World Tour Europe 2018 - The Future of Work Together
    Best of Box World Tour Europe 2018 - The Future of Work Together Anthony Tate, EMEA Product Marketing at Box Recorded: Jun 21 2018 31 mins
    Catch the latest and greatest highlights from Box World Tour 2018

    Hear from our head of EMEA Product Marketing at Box, Anthony Tate.

    Let's shape the future of work together!
  • Tech Talks with Chris Bradbury - Director of Technology, reed.co.uk
    Tech Talks with Chris Bradbury - Director of Technology, reed.co.uk David Savage & Jack Pearce Recorded: Jun 21 2018 38 mins
    Chris is responsible for technology at reed.co.uk, the UK's largest job board. In this week's podcast he talks about the challenges of being asked to make a business move quicker, why he took this role and the importance of purpose to him, as well as innovation in the sector.

    Also on this week's show, two articles. One on being a startup working with enterprise, and one on IBM's Watson AI.
  • Winning the Red Queen's Race with IoT and Artificial Intelligence
    Winning the Red Queen's Race with IoT and Artificial Intelligence Jen Stirrup, Director, Data Relish Recorded: Jun 20 2018 39 mins
    Artificial Intelligence is a part of our daily lives through the use of technologies like virtual assistants such as Cortana, smart homes, and automated customer service. We also have the power of the Internet of Things technology in organizations. How can we put them together for success in our organizations?

    Businesses are running the Red Queen's race not just to win, but to survive in a world where Artificial Intelligence and IoT are becoming the present as well as the future of technology, and ideas are developing into reality at accelerated rates.

    How can you help your company to evolve, adapt and succeed using IoT and Artificial Intelligence to stay at the forefront of the competition, and win the Red Queen's Race? What are the potential issues, complications, and benefits that the future of technology could bring to us and our organisations, right now?

    In this session, Jen Stirrup will explain the quick wins to win the Red Queen's Race in AI and IoT to help you and your organization to win the Red Queen's race.
  • Do We Trust Software?
    Do We Trust Software? Chris Clark, Principal Security Engineer – Strategic Initiatives, Synopsys Recorded: Jun 20 2018 46 mins
    Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?

    See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
  • Why Cloud Native Requires a New Approach to Firewalls
    Why Cloud Native Requires a New Approach to Firewalls Paul Fox, Principal Solution Architect, Twistlock Recorded: Jun 20 2018 40 mins
    As more organizations deploy containers across the enterprise, network security needs to become more automated and less dependent on static configurations. However, organizations’ network security practices have often not kept pace with the evolution of cloud native technology, and expertise on network security for containers and microservices is lacking.

    Companies often rely primarily on static perimeter based defenses and manually defined VLANs which don’t work well in a cloud native environments because there is no reliable perimeter.

    In this session, Paul Fox, Principal Solution Architect at Twistlock, will:
    • Explain why cloud native environments require a new approach for firewalls
    • Share specific tactics IT and security teams can implement to ensure security across the stack
    • Conduct a live demonstration of Windows to linux container network traffic firewalling
  • Container-native storage for the OpenShift masses
    Container-native storage for the OpenShift masses Jamie Duncan, cloud solutions architect, Red Hat Recorded: Jun 20 2018 61 mins
    Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?

    Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:

    -What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
    -How container-native storage lets you dynamically provision storage for your modern applications.
    -How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
  • Webinar: Accelerate Technical Sales through Self-Service Demos
    Webinar: Accelerate Technical Sales through Self-Service Demos Pascal Joly, Dir Techology Partnerships, Quali, Matt Branche, Services Lab Engineer, Broadcom Recorded: Jun 20 2018 37 mins
    Featuring: Industry Experts from Broadcom and Quali
    Are you spending too much time prepping demos? Not enough time running killer customer demos? That’s the challenge with demoing complex technology products: they’re hard to setup.

    Join us with industry experts from Broadcom and learn how to create a self-service catalog of demo environments that can serve your sales team effectively, how these environments can be deployed in minutes with built in orchestration, and how to expose "one-click" commands in the sandbox for demoing complex technology products. To be sure, there will also be a live demo :)
  • Part 3: Streaming Transformations - Putting the T in Streaming ETL
    Part 3: Streaming Transformations - Putting the T in Streaming ETL Nick Dearden, Director of Engineering, Confluent Recorded: Jun 20 2018 60 mins
    We’ll discuss how to leverage some of the more advanced transformation capabilities available in both KSQL and Kafka Connect, including how to chain them together into powerful combinations for handling tasks such as data-masking, restructuring and aggregations. Using KSQL, you can deliver the streaming transformation capability easily and quickly.

    This is part 3 of 3 in Streaming ETL - The New Data Integration series.
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Recorded: Jun 20 2018 81 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • Bringing hope to young refugees with AI-powered education applications: Paz.ai
    Bringing hope to young refugees with AI-powered education applications: Paz.ai Aida Martinez, AI Education Program Lead at Google, Alvaro Sanmartin, Head of Growth at Skills Matter and CEO Leticia Galdon Jun 25 2018 4:30 pm UTC 60 mins
    Paz.ai is an AI-powered multiplayer online gaming platform that teaches block-based programming to refugees.

    Using Google’s CS First curriculum as a guide to follow a structured educational plan, the AI-powered application was co-founded by Aida Martinez, AI Education Program Lead at Google, Alvaro Sanmartin, Head of Growth at Skills Matter and CEO Leticia Galdon, international social worker.

    Created and backed by leading entrepreneurs, Paz.ai is working with refugee camps to ensure that every young person escaping from violence and war can have a future through technology.

    Learn more about the application, the technology behind it and the story of Paz in this exclusive session with the founders.

    To support the project on Kickstarter, please go to:
    https://www.kickstarter.com/projects/1781579443/paz-never-plays-alone
  • What's the True ROI of SD-WAN vs MPLS?
    What's the True ROI of SD-WAN vs MPLS? Shamus McGillicuddy, EMA; Randy Taylor, GHD; Joshua Dobies, Riverbed Jun 26 2018 8:00 am UTC 60 mins
    Tired of all the SD-WAN hype? Ready to see real data on ROI, payback, and operational savings? In a new ROI study, Enterprise Management Associates (EMA) quantifies the business benefits of deploying Riverbed SD-WAN. It’s the data you need to build your business case for next-generation cloud networking.


    Join EMA, customer GHD, and Riverbed to learn:

    Key ROI contributors, including connectivity costs, CAPEX savings, and employee productivity gains
    TCO of SD-WAN vs traditional dual MPLS
    Actual ROI achieved at GHD
  • Top 10 Ways to Fail at DevOps
    Top 10 Ways to Fail at DevOps Ron Gidron - ARA Evangelist and Product Marketing Manager at CA Technologies Jun 26 2018 9:00 am UTC 60 mins
    In this webinar, Ron Gidron discusses the Top 10 Ways to Fail at DevOps as learned from organizations around the globe.

    This recording was made prior to the acquisition of Automic by CA Technologies; therefore, some old terminology and branding may be in place. Because the Automic Software portfolio has been retained in its entirety by CA Technologies, the content is still accurate and useful.
  • Business Strategy requires Data Strategy
    Business Strategy requires Data Strategy Guest speaker Michele Goetz, Principal Analyst at Forrester Research and Rex Ahlstrom, Chief Strategy and Technology Officer Jun 26 2018 3:00 pm UTC 60 mins
    Analytics, machine learning, and artificial intelligence will have a bigger impact on your business strategy. None will be effective without the right data. Therefore when defining your business strategy, it must be aligned with your data strategy.

    This webinar will help your organization find that right combination by demonstrating how:

    • Organizations are aligning data to business strategy
    • New collaboration models accelerate data activation and outcomes
    • Augmenting data management processes with Agile Process scales and accelerates data capabilities
    • Harnessing enterprise tribes overcomes resistance and shadow IT for data
  • Embrace an Application Architecture to Succeed at Digital Transformation
    Embrace an Application Architecture to Succeed at Digital Transformation Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research Jun 26 2018 3:00 pm UTC 75 mins
    Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.

    Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:

    · Master digital’s new rules of business
    · Embrace the role that technology plays in business success
    · Invest in modern application architecture to accelerate business development
    · Work better with IT to bring your digital initiatives to market faster

    All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.

    Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
  • Enterprise Node.js on OpenShift
    Enterprise Node.js on OpenShift Lance Ball, Principal Software Engineer, Red Hat Jun 26 2018 3:00 pm UTC 60 mins
    JavaScript has always played an important role in the browser, and now it’s use in enterprise server-side development has exploded with Node.js. It’s reactive architecture and lightweight makes it an ideal technology for containerized microservices architectures you’ve been hearing so much about.

    What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?

    Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.

    Lance Ball, principal software engineer, Red Hat
    Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.

    https://twitter.com/lanceball
  • The Buzz Around Cognitive Computing in Energy & Utilities
    The Buzz Around Cognitive Computing in Energy & Utilities Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM Jun 26 2018 4:00 pm UTC 60 mins
    Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

    This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
  • Part 1 of 3: Marketing Analytics at the Speed of Business
    Part 1 of 3: Marketing Analytics at the Speed of Business Guest Speaker Matt Hertig, CTO Alight Analytics, Laura Crawford, VP Marketing & J.Tyler McGraw, Sr. Consultant at Yellowfin Jun 26 2018 4:00 pm UTC 45 mins
    What is the cost to your business if you continue using spreadsheets or disparate reports and data sources? How many times have you waited for answers from the analytics queue, only for it to be too late to take action that impacts the business? We're going to show you a platform today that can bring your data and organization together that can give you those insights at the speed of business in a governed and secure way.

    What you'll learn:
    •The typical path marketing leaders take to solving the data and insights problem
    •Best practices for getting to insights and business outcomes at the speed of your business
    •The three stages of readiness: which stage is your business in today?
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • CMDB for the Enterprise Mind
    CMDB for the Enterprise Mind Terrell Pursley, Ryan Gillespie, Meghan Lockwood Jun 26 2018 5:00 pm UTC 60 mins
    Get the rundown of different audiences for the CMDB and how to achieve each of their objectives through out-of-the-box products.

    Plus, Find out...
    - Why CMDB should be your ServiceNow foundation
    - What's the roadmap to success
    - Conventional and specialized uses, including services and dashboards
    - Real-world examples of companies transforming today
  • The Four Keys to Unlocking Application Identity for Security
    The Four Keys to Unlocking Application Identity for Security John O'Neil, Pete Nahas, Adam Sell Jun 26 2018 5:30 pm UTC 60 mins
    Join Edgewise Chief Data Scientist John O’Neil, Agent Developer Pete Nahas, and Director of Marketing Operations Adam Sell for a conversation on how to enable a zero trust project by establishing secure identities for applications in your cloud or data center.
  • Going the Distance: Innovative Ways to Extend Your Network
    Going the Distance: Innovative Ways to Extend Your Network Teresa Hoffman, Fiber Product Business Manager Jun 26 2018 6:00 pm UTC 30 mins
    According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.

    Attend this webinar if you want to learn about:
    - The evolution of the fiber backbone
    - Wireless requirements for up to 40G in new construction
    - The distances you can reach with different multimode fibers
    - A unique Berk-Tek solution for indoor/outdoor applications
  • Vulnerability Analytics : The Visual Language of Vulnerability Management
    Vulnerability Analytics : The Visual Language of Vulnerability Management Syed Abdur, Brinqa, Director of Product and James Walta, Brinqa, Sales Engineer Jun 26 2018 7:00 pm UTC 60 mins
    Join us for this webinar as we discuss the visual language necessary to communicate with all the varied stakeholders that are impacted by or part of the vulnerability risk management process: business users, application owners, IT administrators, security professionals, compliance regulators, and others.
    We will discuss the data analysis necessary to create and communicate different types of metrics, including :

    Business Exposure: What risks are different business entities exposed to due the vulnerabilities?

    Vulnerability Impact: How do different technologies and various types of vulnerabilities contribute to risk?

    Remediation Performance: How effective and efficient are current remediation efforts?

    And More...
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Hyperconvergence at the Core of DX & Cloud Initiatives
    Hyperconvergence at the Core of DX & Cloud Initiatives Swapna Subramani - Senior Research Manager, Middle East, Africa, and Turkey, IDC Jun 27 2018 9:00 am UTC 60 mins
    This exclusive IDC Webinar will explore the uptake and scope of hyperconverged systems in the Middle East. The 30-minute session will examine the importance of hyperconverged systems in the digital transformation (DX) and cloud adoption context and highlight the extended benefits that such systems have in terms of transforming datacenter environments. The Webinar will conclude by detailing the key DX trends that are set to shape the Middle East in 2018 and beyond.
  • [Panel] Defending the Cloud
    [Panel] Defending the Cloud Alex Hilton, Cloud Industry Forum; Chris Hill, Barracuda Networks; Patrick Grillo, Fortinet; Paul Dignan, F5 Networks Jun 27 2018 9:00 am UTC 60 mins
    This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Encryption, key management and beyond
    - Biggest threats to the cloud
    - How to better safeguard data and privacy

    Speakers:
    - Alex Hilton, Chief Executive, Cloud Industry Forum
    - Chris Hill, RVP Cloud EMEA, Barracuda Networks
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Paul Dignan, Global Technical Account Manager, F5 Networks

    By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy)
  • Multi-Cloud Application Services
    Multi-Cloud Application Services Gert Jan Wolfis, Sr Systems Engineer – Cloud, F5 Networks Jun 27 2018 10:00 am UTC 60 mins
    Applications make life changing experiences happen every day for consumers. Organisations understand that their services might be the next great experience therefore they work hard to create agile applications and bring them to market as fast as possible. This means that IT assets are often stretched to use public cloud for either development or to deliver ‘born in the cloud’ services. One way or another, organisations often end up in a multi-cloud environment, where IT has to solve the challenges of new technologies, remain compliant and avoid cloud lock-in.

    Join this webinar to learn more about how F5 supports organisations in their journey to a multi-cloud environment whilst being able to maintain the same standards, deliver application availability and enforce security policies wherever applications are deployed.

    By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy)
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • ESG Interview: Multi-Cloud Trends
    ESG Interview: Multi-Cloud Trends Edwin Yuen, Senior Analyst, ESG and Robert Haynes, Principal Technical Marketing, F5 Networks Jun 27 2018 12:00 pm UTC 60 mins
    Multi-cloud is one of the hottest buzzwords in IT today. Reflecting the growing use of multiple cloud service providers, vendors who offer products that support the public cloud must also be multi-cloud compatible. Learn more about the reasons behind companies using multiple public clouds and the future of the multi-cloud world.

    By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy)
  • Multi-Cloud Maze: 5 Principals for Success
    Multi-Cloud Maze: 5 Principals for Success Matthew Prickett, Systems Engineer – Cloud, F5 Networks Jun 27 2018 1:00 pm UTC 60 mins
    85% of organisations are committed to a multi-cloud architecture. The other 15% are probably doing it by accident. However, with every additional cloud comes increased operational complexity, a new set of interfaces, and another potential security loophole to worry about.

    Help your organisation nullify these challenges and succeed in a multi-cloud world by providing the key principles, solutions, technologies, and tools that enable you to deliver services consistently, efficiently, and securely across all your clouds.

    In this webinar, you will learn:

    5 key principles including abstraction, standardisation, and automation ‒ the new imperatives for network operations
    How planning for a multi-cloud architecture will help you avoid the pitfalls of disparate environments across multiple cloud providers
    Common use cases that will give you the confidence to deploy your cloud apps in a fast, controlled, and more secure manner.

    By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy)
  • Modern M&As require data transformation
    Modern M&As require data transformation Santosh Mathew, Director of Global Mergers & Acquisitions at Nielsen Jun 27 2018 3:00 pm UTC 60 mins
    Today's M&As need to quickly demonstrate return on investment. As data is a critical asset that impacts business performance, a successful merger requires a data transformation strategy that quickly consolidates to a single set of business rules, policies, and data knowledge between two companies for seamless processes and operations.

    Please join this webinar to hear guest speaker Santosh Mathew, Director of Global Mergers & Acquisitions at Nielsen discuss how they rethought their M&A through a data transformation strategy.
  • Application Deployments with Kubernetes
    Application Deployments with Kubernetes Slava Koltovich, CEO Kublr Jun 27 2018 3:00 pm UTC 60 mins
    Kubernetes ensures your deployed applications are always available to users. But how do you deploy applications in Kubernetes without user/service interruptions? Should you write your own scripts using low-level Kubernetes objects, package everything in Helm, or use specific CI/CD tools? There isn’t a clear-cut answer; it always depends.

    In this online meetup, Slava Koltovich, CEO of Kublr, will discuss various application deployment options and demonstrate how tools like Spinnaker, Istio, and Jenkins can be used to implement blue-green or canary deployments to ensure zero-downtime application rollout.
  • Accelerating Genomic Data Sharing in Clouds & On Premise
    Accelerating Genomic Data Sharing in Clouds & On Premise David Labrosse, NetApp Global Alliances Mgr.; Dan Greenfield, PetaGene, CEO Jun 27 2018 3:00 pm UTC 60 mins
    Many of the answers locked inside human DNA are discoverable and actionable, and the goal of precision medicine is within reach. However, we need to face the looming tsunami of data: the latest sequencers generate two or more terabytes daily. This enormous data management challenge is impacting both bio medical researchers and IT leaders around the globe who are searching for efficient, effective solutions.
    Learn how data compression and unified data management are increasing efficiency, and how the move from IT silos to a common storage platform is enabling seamless data sharing, on premise and in the cloud. Find out how your institution can achieve faster genomic data sharing, paving an accelerated path to improved patient care.
  • How to Drive Better SAP Performance with ABAP Visibility
    How to Drive Better SAP Performance with ABAP Visibility Jonah Kowall, VP Market Development and Insights, AppDynamics and Paul Urfi, Sr Sales Enablement, AppDynamics Jun 27 2018 4:00 pm UTC 45 mins
    When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.

    See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:

    * Visualizes SAP components and dependencies in real time
    * Establishes dynamic baselines for key SAP transactions
    * Diagnoses SAP issues down to a single ABAP statement
    * Assists with cloud migrations and SAP S/4HANA transitions
  • Accudata's White-Hat Files | June 2018 Edition
    Accudata's White-Hat Files | June 2018 Edition Ismael Alfaro, Professional Services Manager Jun 27 2018 4:00 pm UTC 15 mins
    Welcome to the White-Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our second White-Hat File comes from Ismael Alfaro, Professional Services Manager.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.