Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
Assessing performance of a general and flexible business process management (BPM) products and solutions is challenging. It's notoriously difficult to assess, measure, and accurately predict how a product or solution will scale under normal use and load. Each user's unique business requirements and specific implementation design must be taken into account.
Red Hat has partnered with Vizuri, an IT consulting firm, to provide you with a performance test tool for any BPM framework or process server. The BPM performance test tool can be used to model and assess many different scenarios simulating a set of reusable resources. The results will be a uniform performance evaluation that accounts for as much end-user process design and implementation variability as feasible.
Join this webcast to learn more about this tool through a case study on Red Hat® JBoss® BPM Suite.
Choosing to move to the Cloud is a great decision, but it’s the first of many more decisions. You have to choose from 70 instance types, with 14 purchase options, running your choice of 4 operating systems, across dozens of availability zones and regions with distinct choices for tenancy and block storage. When you add it up, there are over a million options. In fact, Gartner has calculated that the number of decisions just for deploying an EC2 instance is over 1.7 million.
It’s easy to make the wrong decisions and spend too much or be underprepared to meet demand. There’s only one way to make such decisions reliably and efficiently and that is to automate and follow best practices. In this in-depth discussion and demonstration, Todd Bernhard, CloudCheckr Product Marketing Manager, will show how to use CloudCheckr's Best Practices tool to manage costs.
Join us for a "Deep Dive" into some of the 450+ Best Practice Checks offered by CloudCheckr to:
- Make sure you are not paying for unused resources
- Ensure the resources you are indeed using are being used at a high level of utilization
Organizations continue to adopt cloud strategies and technologies at a dizzying pace. Many organizations now look at new IT projects with cloud optics. With the volume of data being transmitted to, from and existing in the cloud ever increasing, protecting that data can be challenging. How can this data, which is always on the move and in myriad locations, have a coordinated security strategy? Join McAfee and (ISC)2 on May 25, 2017 at 1:00PM Eastern for a discussion on how to unify data security across applications, clouds and various locations.
Now, you can use Ext JS 6.5 to deliver rich desktop and tablet experiences for your data-intensive, cross-platform web applications – using the Ext JS Modern toolkit. With Cmd 6.5, you get support for ES2015 (formerly ES6) in Ext JS apps, dynamic package loading and support for Progressive Web Apps.
Join us for our upcoming webinar, where you will learn about:
Powerful new components and charts - DatePanel, Box Plot, Navigator
Major enhancements to modern Grid, List, Menu and Form
Enhancements to premium components - Pivot Grid and Exporter
Support for ES6, PWA, and Dynamic package loading with Cmd 6.5
When you don’t have a solution for data, you fall back on slow, suboptimal tactics for accessing data, denying business users and decision makers access to the most accurate, up to date, and relevant information.
Learn how Talkdesk went from a chaotic world like the one above to being a company where people can easily explore data and quickly get a 360° view of every account. Using FiveTran and Looker, Talkdesk’s product manager was able to tie all their now-centralized data together to create a powerful and stable environment for data discovery.
From this webinar, you will learn:
• What a centralized data store can do for you and how you can achieve that
• Why you should be transforming your data at the time of query, not before you load it into your database
• How one man created a company-wide data platform in one month
Watch to understand how to take control of your data and use it to drive results.
Over the past 20 years, Enterprise IT has evolved from a rigid, buying all IT equipment up-front and provisioning for the next 5 years approach, to the on-demand, agile, scale-out, software defined data centers that the hyperscale companies enjoy today. But if you are not one of those hyperscale companies and need to compete with them, what do you do? Then you will need a solution like Supermicro Rack Scale Design (RSD).
Based on Intel® Rack Scale Design software framework, Supermicro RSD is a total solution comprised of Supermicro server/storage/networking hardware and an optimized rack level management software. Designed with the whole rack as the new management unit in mind, Supermicro RSD leverages industry standard Redfish RESTful APIs developed by DMTF (Distributed Management Task Force) and provides the agility and efficiency for cloud scale data center operators to perform operations such as resource pooling and composability.
In this webinar, experts from Intel and Supermicro will discuss motivations behind Intel® Rack Scale Design software foundation and the unique benefits Supermicro RSD brings to cloud service providers, telecoms, and Fortune 500 companies to build their own agile, efficient, software-defined data centers.
The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:
- How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
- Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
- Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.
Register for a chance to win an Apple Watch 2.
As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.
In this session, we will discuss:
- What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
- What benefits your organization should expect from SDS technology
- What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.
Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.
That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.
Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.
In this webinar, you'll:
* Identify the most effective subscription plans and promotions
* Compare your trial program performance against industry benchmarks
* Use best practices to create a frictionless subscription experience
* Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
* Emma Clark, Sr Product Manager, Recurly
IoT is being embraced by an increasingly diverse set of sectors and one which is reaping the benefits is the retail sector, specifically supermarkets and how they are using data in cold-chain (refrigeration) solutions. For this webinar, join Paul Edrich, CTO of IMS Evolve, who is helping major supermarket chains to manage billions of data points in real time to inform operational processes, reduce energy consumption and increase product quality.
This webinar will include the following topics:
- Refrigeration and IoT: problems, new industry trends and benefits
- What IMS Evolve does to solve the problem
- The technologies enabling their solution today
Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.
Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:
• Who is part of APT32, where they are based, whom they target and how they operate
• Advice on how to defend against, hunt for and respond to APT32
• How your organization can improve your ability to detect, prevent and remediate APT32 attacks
Windows 10 is intended to deliver a unified user experience across all of the devices in your environment, but planning and executing a smooth migration is complex. To get it right, you must validate that app performance, device health, and end user experience are as good or better after upgrading.
This webinar will show how SteelCentral Aternity enables you to:
- Fight “Shadow IT” and migrate only the apps that matter
- Migrate to Windows 10 with confidence
- Proactively monitor apps and assure seamless user experience
- Justify the cost of your Windows 10 upgrade
GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.
Join us for the second in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about accelerating Data Discovery & Classification, how to automate and put in place a repeatable 'near real time capability' with Informatica's Secure@Source.
Secure@Source provides 360º visibility of sensitive data and analyses and ranks sensitive data risk. In the context of GDPR, it helps organisations understand where their sensitive data resides, which data stores contain high risk combinations and how it proliferates through the organisation.
This session will cover:
- Where to start with your sensitive data
- How to identify potential data risks
- Live Demo of Secure@Source
Watch a demonstration of an end to end loan application built with Bizagi. The demonstration will show you how you can deliver a customer experience across multiple channels both from the perspective of the customers and the employees. Also, walk you through the process model for this application, designed in the Bizagi Modeler.
Bizagi is a digital business platform that wraps around existing legacy systems to transform organizations into agile, engaging and connected digital businesses. The platform comprises of Bizagi Modeler to design the process models, Bizagi Studio to turn process models into running applications and Bizagi Engine to run the applications enterprise-wide.
Headquartered in the UK with customers across the world, Bizagi is a global leader in digital business platforms. With a global user community of over 650,000 process pioneers, Bizagi has helped over 500 enterprises in 50 countries to survive and thrive in the digital age.
Developers must often build and deploy applications that rely on isolated products. Instead of focusing on development, they find themselves worrying about the deployment and management of underlying services, as well as the configuration of historically error-prone areas like clustering, resource constraint tuning, and software updates.
Red Hat addresses this challenge by making its middleware portfolio available as containerized services, transforming them from isolated products to integrated application services running in a managed container environment.
Join this webcast to learn how to quickly and easily build a wide range of application types using Red Hat® JBoss® Middleware as containerized services on Red Hat OpenShift Container Platform.
Cloud-native platforms have rapidly gained acceptance as a means to deliver multi-cloud application deployments. But with data at the core of almost every application, how can IT organizations in highly regulated industries like healthcare, finance, and public services ensure that their production applications are backed by secure and multi-cloud databases?
Crunchy Data and Pivotal partnered with the Defense Information Systems Agency (DISA) to author the first Security Technical Implementation Guide (STIG) outlining best practices for PostgreSQL databases.
In this session, Kamala Dasika from Pivotal and Jason O’Donnell from Crunchy Data will cover how to:
- Configure PostgreSQL consistent with security best practices.
- Get on-demand, self-service access to certified open source PostgreSQL for use in high security environments.
- Leverage the built-in security and resilience of cloud-native environments to reduce risk and provide developers with a consistent experience on their cloud of choice.
The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
Cloud migrations are happening everywhere but are ripe with project delays, complex and time-consuming hardware-based networking and a lack of cloud skills to make them really successful. Not to mention extending your cloud is just as challenging. What if you could set up and manage clouds in a few minutes and accelerate your cloud projects?
Join the discussion where you will hear from one of the most foremost authorities on cloud, Chris McDaniel, SVP & Chief Infrastructure Architect at Integnology, who helps enterprises with their cloud strategy and migration path.
In this webinar you will learn:
- Best practices of Fortune 500 companies for cloud migration, operations and DevOps in the cloud
- How to avoid the 3 most common pitfalls with cloud set up and ongoing cloud management
- Why enterprises are choosing Aviatrix to connect their cloud in minutes, accelerating their migration, reducing costs and making everything dramatically more simple and secure
The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.
During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:
- Going all-in with the cloud as a major competitive advantage
- Understanding the differences between on-prem vs. operating in the cloud
- Choosing the right cloud management tools to gain complete visibility
The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and software-defined networks will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight, on-prem and in the cloud.
Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
Imagine if analyzing your company data was as easy as searching on Google? This vision has launched search into the analytics mainstream and inspired a wide range of approaches to enterprise search. But not all search is created equal.
Building The World’s First Relational Search Engine required a fundamentally different approach to search - one that ensures both lightning fast performance and 100% accurate results all within an easy to use search-driven interface. Join this webinar to learn more about:
- Emerging trends across various flavors of enterprise search
- How machine learning simplifies and guides you to 100% accurate answers
- Best practices for using search to analyze your data in seconds
- Live demo of ThoughtSpot’s Search-Driven Analytics solution
Test automation is a journey; one that needs careful planning, execution, and maintenance. If you’re embarking on the test automation journey, join us for a webinar on May 23rd to learn how Sencha Test 2.1, our latest release, can help you with the critical steps of developing your test automation strategy including test design, managing defects, and storing results.
Attend this webinar to learn how to:
- Locate components and elements on Ext JS applications with Inspector
- Execute tests from Sencha Studio and store test results on the local archive server
- Add external files or install npm modules and simply require them in test code
- Analyze test failures and publish bugs directly to JIRA with our new integration
- Perform visual testing directly from Sencha Studio
Who Should Attend:
- Development Managers and Developers
- QA Managers and Test Automation Engineers
- Anyone interested in delivering high quality Ext JS apps faster
The shift of customer service from a cost center to an engagement center will spur investments in more intelligent automation and conversational approaches to service and commerce. With 76% of customers preferring digital channels to communicate with businesses, and roughly 40% choosing to chat with a business through SMS, social media or Facebook messenger, conversational technologies have forever changed the customer service experience. Learn first-hand, from industry peers, how smart chatbots are improving how businesses converse with customers, and nurture relationships across the customer journey.
Join the 451 Group, Ticketmaster and Inbenta for this session to discover how:
•Digital engagement will shift commerce and service from interactions to conversations [The 451 Group predicts that 80% of all customer interactions will eventually be contained in a self-service channel].
•Customers want self-service options on their own terms, in their preferred channels, including SMS, web or mobile chat. [The 451 Group data shows 55% of survey respondents prefer self-serve tools to avoid calling a customer service agent]
•How businesses like Ticketmaster leverage enterprise-class chatbots; key factors to include and what to to avoid when launching a chatbot pilot [55% of companies employ self-service solutions; and 26% say they plan to build a chatbot as part of their self-service strategy]
Your enterprise and applications need to communicate – to collect information from many sources and get data where and when it needs to be, which increasingly means in real-time. Complicating matters, as you migrate applications to the cloud and implement IoT strategies, they need to connect increasingly diverse endpoints and systems running in diverse public cloud, private cloud and on-premise environments.
In this webinar, we’ll describe and demonstrate how the Solace Virtual Message Router can give applications and microservices running in Pivotal Cloud Foundry the ability to exchange information using open APIs and protocols like AMQP, JMS, MQTT, Qpid, Paho, REST and WebSockets. Jonathan Schabowsky of Solace’s office of the CTO will show how easily you can enable real-time communications between microservices with the new Solace Messaging Tile for Pivotal Cloud Foundry and how you can integrate Solace into your crucial data movement solution.
Jonathan Schabowsky is a Sr. Architect in the Office of the CTO at Solace. His expertise includes architecting large-scale, mission critical enterprise systems in various domains, such as for the FAA, satellite ground systems (GOES-R) and healthcare. Recently, Jonathan has been focused on the use of event driven architectures for microservices and their deployments into platform-as-a-services (PaaS) running within public clouds.
The WannaCry ransomware attacks a great example how neglecting security patches can have a catastrophic impact for businesses.
While many discuss whether their anti-virus could have stopped the attack, the plain facts are:
-This attack uses a vulnerability on a component of Windows and Windows Server that was patched by Microsoft two months ago
-The vulnerability was part of the recent NSA leak, a highly publicized scandal, and not an obscure vulnerability that no one had heard of before
-Applying the patch would prevent any successful attack
Join us for a discussion on the challenges of patch management and how to improve patching processes to avoid falling victim of attacks like WannaCry.
A Spark Application that worked well in a development environment or with sample data may not behave as expected when run against a much larger dataset in a production environment. Pepperdata Application Profiler, based on open source Dr Elephant, can help you tune you Spark Application based on current dataset characteristics and cluster execution environment. Application Profiler uses a set of heuristics to provide actionable recommendations to help you quickly tune your applications.
Occasionally an application will fail (or execute too slowly) due to circumstances outside your control: a busy cluster, another misbehaving YARN application, bad luck, or bad "cluster weather". We'll discuss ways to use Pepperdata's Cluster Analyzer to quickly determine when an application failure may not be your fault and how to diagnose and fix symptoms that you can affect.
Yelp, the platform that connects millions with business reviews and reservations, needed a way to make over 10+ terabytes of data accessible and usable to everyone within the company. It also needed to monitor the workloads that span both on-premises and cloud systems, across a variety of stacks.
Join this webinar to learn how Yelp uses the Splunk platform to proactively notify on issues with the web, and save engineering hours by empowering users with access to data. In this session, you’ll hear how the company:
• Improved website uptime with real-time notifications
• Quickly and reliably delivers application features to users
• Uncovers business insights and improves the customer experience
If you're already running workloads in the cloud, or in the process of migrating, this is a great opportunity to learn how you can gain additional visibility into your cloud strategy.
Applications are moving to the hybrid cloud: they are either migrating from the data center or they are being developed as cloud native applications. This webinar explores the challenges of gaining end-to-end visibility and control of your applications in a hybrid cloud environment.
Join us and learn how to:
•Identify the key requirements to shift your applications to the hybrid cloud
•Build an application-centric view across all your delivery infrastructure
•Automate tasks that save time and eliminate human error
•Integrate with OpenStack and Kubernetes to achieve true orchestration and automation
Join us for a webinar on May 31st where you will learn about Sencha’s newest release, ExtReact: the most comprehensive set of components for React apps. Now you can quickly and easily add any of our 115+ professionally tested and supported components including grid, tree grid, pivot grid, charts, D3 visualizations, trees, calendar, buttons, menus and more to your React applications.
With ExtReact, all of the components are designed to work together seamlessly which eliminates time-consuming integration work and reduces ongoing maintenance burdens. Attend this webinar and you will learn how to:
- Build data-intensive, cross-platform web apps leveraging Sencha components and React.
- Build immersive user engagement using layouts and adaptive design features.
- Leverage material design and other themes to save time and effort. Modify or extend themes without writing a single line of code.
Since its advent in 1974, POS has managed almost 100% of transaction processing with utmost efficiency. Even though modern Cloud POS helps to establish digital experience, traditional legacy POS systems cannot meet digital requirements and diminish the customer experience, online reachability as it lacks real-time access, inventory management & Omni-channel capabilities.
Learn how you can make your existing legacy POS more powerful & connected with your digital strategy to meet modern customers.
Learn how to securely configure host settings and Docker Engine.
Docker allows teams to increase the speed and scale that they can deliver software. As a result, adoption rates for docker are accelerating as more organizations are looking for ways to innovate faster.
As you move down the path to containers, it is important to note that an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, but it will leave your host exposed to many security and performance concerns if not configured properly.
Join us for this webinar to learn how to:
- Configure host settings to harden and protect it from unauthorized access
- Install and configure a Docker Engine with minimal attack surface
- Ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
Join us to learn about JupyterLab, the new open source computational environment for Jupyter. Increase the performance of your data science projects by working in an integrated environment for your notebooks, editor, terminal and console. We will also discuss R-Brain cloud platform and its new R Python Cloud IDE which is built on JupyterLab.
There is growing interest in running Spark natively on Kubernetes (see https://github.com/apache-spark-on-k8s/spark). Spark applications often access data in HDFS, and Spark supports HDFS locality by scheduling tasks on nodes that have the task input data on their local disks. When running Spark on Kubernetes, if the HDFS daemons run outside Kubernetes, applications will slow down while accessing the data remotely.
In this webinar, we will demonstrate how to run HDFS inside Kubernetes to speed up Spark. In particular, we will show:
- Spark scheduler can still provide HDFS data locality on Kubernetes by discovering the mapping of Kubernetes containers to physical nodes to HDFS datanode daemons.
- How one can provide Spark with the high availability of the critical HDFS namenode service when running HDFS in Kubernetes.
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:
-What we can learn from Jason Bourne about knowing one’s surroundings
-What we can learn from hackers to better protect valuable data
-What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
-How to change our mindset in a new era of a hacker driven gold rush
With Citrix XenApp and XenDesktop being two of the most critical and performance-sensitive applications used in enterprise networks today, Citrix performance management is of vital importance for a positive user experience and business continuity.
Join us for this webinar where we will discuss the top seven mistakes that IT professional make when managing their Citrix-based services as well as the best practices to address and avoid these mistakes to ensure positive user experiences and business operations.
You will discover how:
- Performance management is no longer just about monitoring CPU, memory and disk resources
- When a user complains that "Citrix is slow", it is not always a Citrix issue
- Built-in tools provided in the Citrix stack are useful, but not always sufficient for managing performance end-to-end
- Virtual desktops are VMs, but you can't confidently use monitoring tools you've used for virtual servers to monitor virtual desktops
- You don't always have to involve your experts in problem diagnosis
- Performance management is more than just about troubleshooting problems
- You shouldn’t worry about performance management just after you have deployed the Citrix infrastructure
Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
The Google security model is built on over fifteen years of experience in keeping customers safe while using Google applications. The security architecture of the Google Cloud Platform (GCP) is based on the same foundation and offers enterprises the tools they need to secure their data and applications in the cloud. Organizations deploying workloads on GCP need to understand the fundamental ways in which security in the public cloud is different from traditional datacenter security and use the right tools to harden their cloud environments.
Join Alex Corstorphine, Solutions Architect at Dome9 Security, and Naresh Venkat with the Google Cloud Strategic Technology Partnerships team, as they discuss best practices and common pitfalls around managing security, compliance, and governance in GCP environments. They will review GCP network security best practices and available compliance certifications, and provide practical examples of how to harden your cloud network environment.
The webinar will include a live demo of the Dome9 Arc SaaS platform that offers greater network visibility, control, and active enforcement in the cloud. Additionally, we will show how the Dome9 Compliance Engine allows businesses using GCP to assess their compliance posture, identify risks and gaps, fix issues such as overly permissive security group rules and weak password policies, enforce requirements and prove compliance in audits.
In this 45 minute webinar you will learn:
- Key features and capabilities of the GCP network security model
- How to gain visibility into network security posture and misconfigurations
- How to harden your Google Cloud environment by applying security best practices
MySQL is the simple choice for developers needing a transactional relational database.
When you operate an enterprise cloud for hundreds of developers and applications, the choice is not a simple one. Databases need to meet enterprise standards for security, availability, and disaster recovery. Cloud deployments need flexibility to balance each application's unique performance and scalability requirements. You cannot support continuous delivery of applications with manual deployment of databases.
Developers love MySQL cloud services because they get fast access to an instance. Operators love the services available in Pivotal Cloud Foundry because of the automation they bring.
This webinar reviews different MySQL offerings and plans in Pivotal Cloud Foundry including:
- Ways developers can access MySQL in Pivotal Cloud Foundry
- Operational requirements to serve developers
- Meeting enterprise standards and service levels
- Meeting performance and scale requirements
- Use case: modern architectures
- Use case: replatforming legacy applications
Join SAP and Zebra Technologies to learn how you can partner with SAP to develop and monetize your own applications connecting Zebra devices using SAP Cloud Platform services. The session will also highlight the asset intelligence solutions and services which you can leverage with your own manufacturing, logistics, healthcare and retail applications to drive increased worker productivity and product line efficiency for your customers.
Don’t miss this opportunity to hear from product experts and senior members from both SAP and Zebra Technologies!
Cloud solutions offer many benefits - lower initial costs, faster deployments, lower operating costs, and more product innovation. But they also enable business units to buy technology without the knowledge or involvement of the CIO. This creates a visibility challenge for the CIO and the IT function. "Dark" cloud spending can create security exposures, compliance risks, higher costs and operational problems.
Join Snow Software and a guest from Forrester Research as they:
• Explore the shift in IT spend and how it is driving the need for CIOs to redefine themselves as the Chief Influence Officer.
• Share how to use data and intelligence about what’s happening on the network to protect against unplanned expenditure
• Show how you can retain control of costs, optimization and risk in your IT operations.
Start shaping your future role in the digital business today.
More and more operational decision-making and activity that previously required human intervention is being programmatically driven into platforms. This type of intelligent automation baked into cloud-native platforms is transforming Operations teams into champions of delivering business value. This webinar will cover how you can:
- Auto detect apps and services running on multiple clouds
- Automate problem detection and resolution
- Identify behavior patterns, anticipate trends and respond quickly
- Why correlation is not causation
This is the final webinar in the series presented by Pivotal and Dynatrace on modernizing your application portfolio to cloud-native.
Webinars in this series are searchable by title:
- Journey to Cloud-Native: Where to start in your app modernization process
- Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
- Journey to Cloud-Native: Making Sense of Your Service Interactions
- Journey to Cloud-Native: Reducing Production Risks at Scale
Thank you in advance for joining us.
About the Speakers:
Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.
Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.
Most industry analysts agree that big data warehouses, built on a relational database, will continue to be the primary analytic database for storing much of the company’s core transactional data. These data warehouses will be augmented by big data systems. Even though this new information architecture consists of multiple physical data repositories and formats, the logical architecture is a single integrated data platform, spanning the relational data warehouse and the data lake.
Join the discussion to find out more about how high performance, high density all-flash storage can help.
Customer loyalty is won with both marketing messaging and customer service that anticipates needs, answers questions, and solves issues on the fly. And a well-integrated, data-soaked AI platform can deliver that perfectly timed, exquisitely personalized customer service with the right message, right time, right place support and communication that leads to big jumps in engagement rates. Not to mention enduring loyalty.
But while integrating AI technology into your marketing automation systems can help build profitable long-term relationships, there are security issues to tackle, privacy issues to consider, and data integration to execute flawlessly.
Want to do it right? Join our free VB Live event to learn how master marketers join marketing insight with AI intelligence execution to significantly boost customer loyalty.
In this webinar, you’ll:
* Learn how deep learning can help your customers get a "human" through chat
* Cut through the hype around chat bots and learn what really matters
* Understand privacy issues around AI and how it may impact your org's security
* Integrate a successful marketing campaign using chatbot interactions
Stewart Rogers, Director of marketing technology, VentureBeat
Wendy Schuchart, Moderator, VentureBeat
Challenged by IT infrastructure bottlenecks? Certification, compliance and security issues impeding your roll out of new applications? Are you an IT, Ops or Automation person working in the financial services industry? Then, this webinar is for you!
Join this 60-minute webinar with a demo and Q&A to learn:
•Overview of how IT infrastructure updates impact security and compliance faced by financial services
•Application and Infrastructure modernization initiatives including in brownfield deployments
•How to efficiently introduce, test and validate IT infrastructure and application updates