Hi [[ session.user.profile.firstName ]]

Application Management

  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Build Your Angular Apps with Sencha Components
    Build Your Angular Apps with Sencha Components Marc Gusmano, Solutions Architect at Sencha Recorded: Dec 15 2017 61 mins
    Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!

    Join us and you will:

    - See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
    - Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
    - See real examples of:
    -->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
    -->Visualization tools – Charts, D3 Visualizations
    -->Prebuilt packages - Calendar, Forms, Tabs, Menus
  • Intelligent Workload Placement and Optimization
    Intelligent Workload Placement and Optimization Bobby Allen, Dir of Technical Services, CloudGenera and Jim Wittry, GM Alliances & Channel, CloudGenera Recorded: Dec 15 2017 53 mins
    The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • 5 Essential Quality Metrics that Matter: Measuring the Quality of Your Product
    5 Essential Quality Metrics that Matter: Measuring the Quality of Your Product Jeremy Bivaud, Director of Professional Services, Rainforest QA Recorded: Dec 14 2017 46 mins
    Implementing a more strategic approach to testing can have a huge impact on product quality, but measuring exactly how your QA strategy has made a difference can be challenging. The long-term success of any QA strategy depends on measuring change and communicating that change to the team at large, so it’s important to measure the right metrics.

    In this webinar, discover...
    1. Five essential metrics that QA teams should track
    2. How to avoid common pitfalls when it comes to measuring the success of a QA strategy
    3. Techniques to level-up product quality by taking a data-driven approach to software testing
  • How to Maintain Visibility in Hybrid Multi-Cloud Environments
    How to Maintain Visibility in Hybrid Multi-Cloud Environments Brad Casemore - Research Director for Datacenter Networks, IDC and Eric Thomas - Director of Cloud Solutions, ExtraHop Recorded: Dec 14 2017 50 mins
    In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.

    There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.

    In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
  • Lifting the Clouds: Understanding Storage Challenges in a Container Environment
    Lifting the Clouds: Understanding Storage Challenges in a Container Environment Bill Borsari, Director, System Engineering at Datera Recorded: Dec 14 2017 54 mins
    Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.

    This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.

    Discover how Datera’s self-managing software-defined storage uniquely solves challenges:

    -Dynamic provisioning
    -Auto scaling
    -Making storage invisible for Containers
  • The SAFe® Way to Transform your Established Dev Organization
    The SAFe® Way to Transform your Established Dev Organization Dean Leffingwell, Scaled Agile, Inc & Ashok Reddy, CA Technologies Recorded: Dec 14 2017 61 mins
    Can your entire organization be agile? Hint: Yes

    If your organization says it too large or has too many legacy systems to take on an agile transformation, this webinar may change your mind. We’ll dig into how the Mainframe Business at CA Technologies, the founding product of our 40 year old company, embraced the Scaled Agile Framework (SAFe®) to help improve product quality, drive innovation, and create a culture of empowered teams.

    Join Dean Leffingwell, Founder of Scaled Agile, Inc and creator of SAFe®, and Ashok Reddy, General Manager of the Mainframe Business Unit at CA Technologies, to discuss how traditional, mission critical systems, with little room for risk, can push the boundaries of scaling agile and be the leaders for transformation across an organization.

    Since aligning 74 teams to the Scaled Agile Framework over the past eight quarters, the Mainframe Business Unit has:
    •Shipped 56 new product releases with zero defects
    •Reduced the defect backlog by 45%
    •Reduced the support backlog by 44%
    •Deployed 3 new, organically-driven products

    SAFe® is a registered trademark of Scaled Agile, Inc
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • Real World Use Cases for AI
    Real World Use Cases for AI Nick Patience (451 Research) and Mark Gamble (OpenText) Recorded: Dec 14 2017 54 mins
    The key to your enterprise's success lies in leveraging data, AI and analytics to improve processes and optimize your business. But what technologies and techniques should you use and what sorts of problems can AI solve for you? Join us to hear Nick Patience, Principal Analyst at 451 Research, discuss AI and explore how machine learning-based analytics benefits organizations across a variety of use cases. The session will include an overview of Magellan - OpenText's new AI and analytics platform - and will feature live demos and a customer case study. Attend to learn how Magellan can provide a powerful, cost effective, flexible option for implementing AI in your organization.
  • Oracle Town Hall
    Oracle Town Hall Theo Gray (PwC), Abhi Joshi (PwC), Kevin Cardenas (Snow Software) Recorded: Dec 14 2017 55 mins
    Moderator:
    Abhi Joshi - PwC Forensic Services, Partner & US Software Asset Management Leader

    Speakers:
    Theo Gray - PwC Forensic Services, Sr. Associate - Former Oracle Licensing Consultant
    Kevin Cardenas - Snow Software - Oracle Licensing Consultant

    Join Snow Software and PwC for a lively and informative conversation about managing your Oracle software footprint.

    Topics of discussion will include:
    1.Oracle Licensing
    2.Oracle Policy
    3.Oracle ULA Renewals
    4.Oracle Certification
    5.Oracle and VMware Observations
  • RIDE Containerized Data Science IDE server For Enterprise
    RIDE Containerized Data Science IDE server For Enterprise Ali Marami, Data Science Advisor at R-Brain Recorded: Dec 14 2017 45 mins
    RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.

    RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.

    Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.

    The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.

    The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
  • HAProxy's Dynamic Capabilities
    HAProxy's Dynamic Capabilities Nenad Merdanovic, Product Manager, HAProxy Recorded: Dec 14 2017 55 mins
    Responding to the need for an application delivery controller to be fully dynamic, HAProxy Technologies invested a lot of resources into developing HAProxy’s Runtime API and the LB-update module. In this webinar, we will demonstrate the abilities of the Runtime API which enables you to change the behavior of your application delivery controller on-the-fly.

    What you'll learn:
    How to dynamically scale your server farms
    How to perform maintenance on your servers
    How to change routing policies
    How the LB-update module can be used to dynamically update ACLs and maps by pulling a file from one central place
  • Developing an Insights-Driven Approach for Exceptional Digital Experiences
    Developing an Insights-Driven Approach for Exceptional Digital Experiences Bryan Whitmarsh, Director, Product Management at CA Technologies Recorded: Dec 14 2017 55 mins
    Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.

    Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
  • How AI is Transforming the World of Analytics
    How AI is Transforming the World of Analytics Andrew Yeung, Sr. Director of Product Marketing, ThoughtSpot Recorded: Dec 14 2017 47 mins
    Artificial Intelligence is a transformative capability that promises immense business potential—especially when infused in data analytics.

    Join ThoughtSpot to learn best practices for leveraging AI as a key enabler for analytics. We’ll discuss how to best understand and manage the potential opportunities and risks involved.
  • Black Duck Container Security MasterClass - Deploying Containers at Scale
    Black Duck Container Security MasterClass - Deploying Containers at Scale Tim Mackey, Sr. Technology Evangelist, Black Duck Recorded: Dec 14 2017 58 mins
    IT operations teams are now deploying and running hundreds or even thousands of containers at any given time. This rapid deployment surfaces challenges in validating the contents and security of container images being deployed. In this session, Black Duck container and virtualization expert Tim Mackey will provide an overview of technologies and solutions such as Red Hat OpenShift that enable organizations to deploy containers at scale securely.

    In this webinar, Tim Mackey explores this new era of large scale container deployments and how to manage and secure them.

    Attend and you'll learn:

    - How to maintain visibility and control for the open source deployed in hundreds of containers
    - How to help your development and operations teams work together to maintain the security of containers in production
    - How to build security into your deployment of container orchestration platforms
    - Measures you can take to proactively identify risks and remediate risks on containers in production
    - How you can use Black Duck OpsSight to scan containers being created, updated or deployed through their container orchestration platforms
  • CTO Outlook: Big Data Gets Real
    CTO Outlook: Big Data Gets Real Anthony Deighton, CTO, Qlik | Charles Zedlewski, SVP, Cloudera | Mike Saliter, VP, Qlik Recorded: Dec 14 2017 46 mins
    Big Data has a big reputation. But for many organizations, it hasn’t lived up to the hype delivering real-world outcomes. That’s because Big Data can’t deliver value unless it’s accessible and analyzed in the right way. Qlik and Cloudera technology executives will be cutting through the hype to discuss Big Data technology that is available today and being utilized by customers around the world including the real-world customer examples.

    Qlik® is the leading visual analytics platform and the pioneer of user-driven business intelligence. Its portfolio of cloud-based and on-premise solutions meets customers’ growing needs from reporting and self-service visual analytics to guided, embedded and custom analytics, regardless of where data is located. Customers using Qlik Sense®, QlikView® and Qlik® Cloud, gain meaning out of information from multiple sources, exploring the hidden relationships within data that lead to insights that ignite good ideas. For more information please visit: www.qlik.com
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Dec 14 2017 37 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • How to Modernize Legacy Applications
    How to Modernize Legacy Applications James Falkner Technical marketing manager, Red Hat Recorded: Dec 14 2017 29 mins
    Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.

    In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
  • Is Your Business Moving to the Cloud and Modern App Development?
    Is Your Business Moving to the Cloud and Modern App Development? Garrick Sobeski, Senior System Engineer, Citrix & Nihal Mirashi, Senior Marketing Manager, Citrix Recorded: Dec 13 2017 50 mins
    Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.

    Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?

    If you answered yes to any of these questions, then this webinar is for you! 

    Join this webinar and learn:

    • Why customers are not convinced that F5 is the right choice for them
    • Common enterprise application delivery use cases
    • Why Citrix NetScaler is gaining popularity amongst former F5 customers
  • Building a Big Data Fabric with a Next Generation Data Platform
    Building a Big Data Fabric with a Next Generation Data Platform Noel Yuhanna, Forrester, Jacque Istok, Pivotal Recorded: Dec 13 2017 57 mins
    For more than 25 years IT organizations have spent many cycles building enterprise data warehouses, but both speed to market and high cost has left people continually searching for a better way. Over the last 10 years, many found an answer with Hadoop, but the inability to recruit skilled resources, combined with common enterprise necessities such as ANSI compliant SQL, security and the overall complexity has Hadoop relegated to an inexpensive, but scalable data repository.

    Join Noel Yuhanna from Forrester and Pivotal’s Jacque Istok for an interactive discussion about the most recent data architecture evolution; the Big Data Fabric. During this webinar you will learn:

    What a Big Data Fabric is
    - How does it leverage your existing investments in enterprise data warehouses, data marts, cloud analytics, and Hadoop clusters?
    How to leverage your team’s expertise to build a Big Data Fabric
    - What skills should you be investing in to continue evolving with the market?
    When is it appropriate for an organization to move to a Big Data Fabric
    - Can you afford to divert from your existing path? Can you afford not to?
    The skills and technologies that will ease the move to this new architecture
    - What bets can you place that will keep you moving forward?
  • Strategic or Bust, Why Project Execution Needs to Change
    Strategic or Bust, Why Project Execution Needs to Change Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Recorded: Dec 13 2017 52 mins
    Strategic Project Management or SPM shouldn’t be difficult. At the most basic level it’s about ensuring the projects we deliver help our organization to achieve its strategic goals and objectives. Yet consistently SPM fails to deliver consistent results. In this thought provoking webinar industry, expert Andy Jordan joins CA’s Jim Tisch to discuss SPM and understand some of the things that go wrong:

    •Setting ourselves up for failure with the prong projects
    •The focus on what instead of why
    •Short term thinking in project execution
    •Failure to ensure commitments are actually met

    As 2017 draws to a close and organizations the world over commit to do things better in 2018 this is a webinar you simply can’t afford to miss. Sign up today and let Andy give you the tools you need to deliver on next year’s strategic objectives.
  • 3 Steps to Optimizing Application Performance with Multi-CDN
    3 Steps to Optimizing Application Performance with Multi-CDN Nate Lindstrom, VP Sales Engineering Recorded: Dec 13 2017 29 mins
    The days of relying on a single Content Delivery Network (CDN) are far behind us. With a wide range of CDN providers available, each with unique regional strengths and weaknesses, using more than one CDN is now virtually required of any business that cares about providing its users with an optimal experience. But with multiple CDNs comes unique traffic steering and management challenges. Learn what these are, and how best to solve them so you’re able to maximize the performance of your multi-CDN strategy.
  • Providing Containerized Cinder Services to Bare Metal Kubernetes Clusters
    Providing Containerized Cinder Services to Bare Metal Kubernetes Clusters John Griffith, SolidFire Ecosystem Engineering, NetApp Recorded: Dec 13 2017 36 mins
    Kubernetes deployments running on OpenStack clusters require a full OpenStack instance including Keystone, Nova, and Cinder services.

    This talk presents a more pervasive and simplified deployment architecture by integrating Containerized standalone Cinder services with baremetal Kubernetes. Cinder services offer many storage features that are still missing in Kubernetes. Cinder is supported by many storage vendors, with over 70 storage drivers in its repository. A Containerized standalone Cinder service makes these features and extensive storage products available to Kubernetes clusters, quickly and easily.

    Key to this architecture is an external Kubernetes volume provisioner that provisions Cinder volumes transparently and converts Cinder volumes to Kubernetes supported storage types, such as iSCSI, Fibre Channel, NFS, or Ceph RBD.

    We'll show you how the combination of the services above with a true Next Generation Data Center Storage Solution like NetApp SolidFire simplifies and accelerates your ability to leverage persistence in a bare metal Kubernetes cluster while delivering advanced features like multi-tenancy, automation and guaranteed Quality of Service.
  • AI in VR: Enabling a world of “6 DoF” Analytics
    AI in VR: Enabling a world of “6 DoF” Analytics John Cutter, Product Manager, Watson Developers Labs & AR/VR Labs, IBM Recorded: Dec 13 2017 42 mins
    Augmented Reality and Virtual Reality hold the potential to affect nearly every facet of daily business. Those implications go beyond the disruptive nature of even the mobile phone.

    Explore the business implications of AR & VR with John as he discusses trends through the lens Big Data, Analytics, and AI.

    John, IBM’s Head of AR/VR Labs, will discuss real-world examples of compelling work in these categories, draw on the lessons learned, and expand on future trends that businesses should seriously consider when using AR or VR in their company.
  • APT34 - New Targeted Attack in the Middle East
    APT34 - New Targeted Attack in the Middle East Dan Caban, Principal Consultant; Stuart Davis, Regional Sales Director Dec 19 2017 1:30 pm UTC 60 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • Developing your app for scale: a talk with JustPark, UK's leading parking app
    Developing your app for scale: a talk with JustPark, UK's leading parking app Jono Warren, Senior Developer at JustPark; Ina Yulo and Harriet Jamieson, BrightTALK Dec 19 2017 2:00 pm UTC 60 mins
    Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.

    With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.

    Discussions will include:

    • Recommendations for scaling for a growing user base

    • Coding environments, standards and styles

    • Mobile payments and integration
  • How to Approach a Cyber Security Review with Your Eyes Wide Open
    How to Approach a Cyber Security Review with Your Eyes Wide Open Matthew Rogers, Security Director at Freudenberg IT Dec 19 2017 4:00 pm UTC 15 mins
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • 4 Steps to Risk Ranking Your Vulnerabilities
    4 Steps to Risk Ranking Your Vulnerabilities Mike Pittenger, VP Security Strategy, Black Duck Software Dec 19 2017 4:00 pm UTC 30 mins
    Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
     
    Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
     
    - Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
    - Ways to assess the risk associated with a disclosed open source vulnerability
    - Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
  • Where Do We Go From Here?  A Fork in the Road for Multimode Fiber
    Where Do We Go From Here? A Fork in the Road for Multimode Fiber Robert Reid, Panduit Dec 19 2017 4:00 pm UTC 90 mins
    This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
    Attendees will earn 1 BICSI CEC.
  • The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud?
    The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud? Michelle Cobb, CMO, Skybox; Joel Scambray, NCC Group; Derrick Butts, CIO, The Truth Initiative;Brandon Dunlap (Moderator) Dec 19 2017 6:00 pm UTC 75 mins
    Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
  • Pivotal Cloud Foundry 2.0: A First Look
    Pivotal Cloud Foundry 2.0: A First Look Pieter Humphrey & Jared Ruckle, Pivotal Dec 19 2017 7:00 pm UTC 60 mins
    Join Jared Ruckle and Pieter Humphrey for a view into Pivotal Cloud Foundry (PCF) 2.0 capabilities with demos and expert Q&A. See how the platform enables:

    DEVELOPER PRODUCTIVITY
    - Accelerate feature delivery with an updated application runtime to speed innovation.

    OPERATOR EFFICIENCY
    - Run all of your apps on the highly automated Pivotal Cloud Foundry platform. Deploy in your data center or the public cloud.

    COMPREHENSIVE SECURITY
    - Reduce risk across your app portfolio. Protecting systems and customer data using Pivotal’s 3 Rs of security: repair, repave, and rotate.

    HIGH AVAILABILITY
    - Deliver enterprise SLAs at scale. Keep customer-facing systems online under even the most challenging circumstances.

    Learn about the updates during this online event to understand why brand leaders continue to choose PCF as the leading multi-cloud platform.
  • Kill your cloud bill and own your infrastructure, with Open Cloud Services
    Kill your cloud bill and own your infrastructure, with Open Cloud Services Rob Szumski, CoreOS Tectonic Product Manager Dec 20 2017 6:00 pm UTC 60 mins
    Explore Tectonic's new Open Cloud Services and learn how etcd, Prometheus and Vault can be effortlessly installed, operated, scaled and handle failover. Unlike proprietary cloud services, Open Cloud Services are first-class, fully automated Kubernetes resources running on the CoreOS Tectonic platform, leveraging the Operator pattern.

    Join this webinar to learn about these unique capabilities and a live demo of the Vault Open Cloud Service.
  • Automating CI/CD Pipelines and Policing Applications
    Automating CI/CD Pipelines and Policing Applications Justin Goldsmith Technical Consulting Architect, Financial Services, Red Hat Jan 2 2018 4:00 pm UTC 60 mins
    Recent public breaches highlight the importance of a security strategy that extends beyond the network perimeter. As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.

    In this webcast, you'll learn how Red Hat OpenShift Container Platform can be used to:
    - Integrate security monitoring software into CI/CD pipelines for containerized applications.
    - Know what's in your containers and where they come from, which is vital to secure and quickly remediate workloads.
    - Enhance open source library security, in true DevSecOps fashion, and establish a security-first mindset for application development.
  • Kubernetes 1.9 AMA
    Kubernetes 1.9 AMA Dan Gillespie, Senior Software Engineer Jan 3 2018 6:00 pm UTC 60 mins
    What's new in Kubernetes 1.9? Explore the new capabilities and improvements introduced in the latest release of the container orchestrator.

    Bring your Kube questions - after a look at what's new we will dive into answering what the community wants to know most!
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 9 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • Transitioning from Traditional to Cloud-Native Development
    Transitioning from Traditional to Cloud-Native Development Syed Rasheed Solutions Marketing Manager, Red Hat Jan 9 2018 5:00 pm UTC 60 mins
    "What is cloud-native development?” And, “How do I transition from a traditional application development approach?” These two questions are often top of mind for developers and IT strategists tasked with aligning existing IT applications and investments more closely with current digital business needs.

    In this webcast get answers to these questions and learn about considerations for choosing a cloud-native platform, how to plan for a successful transition, and Red Hat’s approach to cloud-native services.
  • Best Practices for Container Design and Orchestration
    Best Practices for Container Design and Orchestration Torr Schmey, Red Hat Sr Middleware Solutions Sales Specialist Rob Sedor, Red Hat Sr. Solutions Architect Jan 10 2018 4:00 pm UTC 60 mins
    Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments. .

    During this webcast, you will learn:
    -How to make application deployment and operations at scale simple and reliable
    -How to make it easy to create “cloud-native” applications in the first place
    -Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
  • Vault OCS - Secrets to a Secure Jenkins on Tectonic
    Vault OCS - Secrets to a Secure Jenkins on Tectonic Praveen Rajagopalan, Solutions Engineer Jan 10 2018 6:00 pm UTC 60 mins
    Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.

    CoreOS Vault OCS is effortlessly installed, operated, scaled, and configured to handle failover. Unlike proprietary cloud services, CoreOS Open Cloud Services are first-class, automated Kubernetes resources running on the CoreOS Tectonic platform leveraging the Operator platform we introduced in 2016.
  • Proactive ITSM: Panacea or Possibility?
    Proactive ITSM: Panacea or Possibility? George Spalding, Pink Elephant and Allen Houpt, Advisor, Product, CA Technologies Jan 10 2018 6:00 pm UTC 60 mins
    Seems like there’s a lot of talk and no action when it comes to organizations implementing “proactive ITSM”. With “agile this” and “agile that” pervading IT organizations, one would think “proactive” would be embraced as by definition it provides what’s needed before it’s needed. Well, proactive ITSM isn’t as farfetched as you might think. This webcast explores how infrastructure monitoring, process automation and technology integrations can play a huge role in enabling ITSM to become truly proactive. The result is more time for IT to focus on things that really matter to the business other than just keeping the lights on or resolving problems.
  • Prometheus 101: Overview and Demo
    Prometheus 101: Overview and Demo Chris Ricci, Solutions Engineer Jan 11 2018 6:00 pm UTC 60 mins
    Are you currently operating a complex distributed system or in the process of transforming to a distributed architecture? Join us for this webinar to learn more about some of the challenges of operating distributed systems and how you can leverage monitoring to ensure your system is always up and running as efficiently as possible.

    In this session we'll give an introduction to the Open Source monitoring solution, Prometheus. We'll cover how to get started with Prometheus, basic concepts such as time series data, metrics, querying and alerting. We'll also show a brief demonstration of Prometheus in action.
  • Secrets of Successful Digital Transformers
    Secrets of Successful Digital Transformers Dormain Drewitz Jan 11 2018 7:00 pm UTC 60 mins
    Call it Younger Sibling Syndrome: You study the successes and failures of those who came before. You replicate the wins. You limit the failures. You capitalize on the experience of pioneers and trailblazers.

    Digital transformation is no different. Over half of the Fortune 500 is already using Cloud Foundry® as part of their digital transformation strategy. Where have they succeeded? How can you replicate? What will you need?

    Wherever you are on your digital transformation journey, learn from your predecessors. In this talk, Dormain Drewitz distills the experiences of Fortune 500 companies using Cloud Foundry. Attend this session to learn more about the patterns around strategies, processes, and team-level tactics.
  • The Breadth and Reach of the OpenShift Marketplace
    The Breadth and Reach of the OpenShift Marketplace Brian Gracely Director of Product Strategy, Red Hat Jan 16 2018 4:00 pm UTC 60 mins
    From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.

    In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
  • Ask an Agile Expert
    Ask an Agile Expert Doug Dockery, Senior Director of Agile Management at CA Technologies Jan 16 2018 6:00 pm UTC 60 mins
    Here’s your opportunity to ask an agile expert.

    Every organization undergoes different pain points during their agile transformation.

    We've been a part of many of those transformations, and our experts can offer insights and best practices for your organization to overcome those pain points. Join CA's Senior Director of Agile Management, Doug Dockery, agile coach and co-author of Modern Business Management: Creating a Built-to-Change Organization and resident agile expert, on Tuesday, January 16, for your opportunity to ask the questions on your mind as your organization starts, expands and scales agile across multiple teams and departments.
  • Designing a Distributed Application Using DDS QoS
    Designing a Distributed Application Using DDS QoS Larry Johnson, OMG Vice President; Adam Mitz, Principal Software Engineer at Object Computing, Inc. Jan 17 2018 3:00 pm UTC 60 mins
    DDS Technical Overview Series - Part IV: The OMG Data Distribution Service provides a diverse set of Quality of Service policies. Strategic use of these QoS policies enables intelligent behavior in middleware and allows the application developer to focus on the domain. In this webinar, we examine one application in detail and explore how it uses DDS QoS policies to address several non-functional requirements. We'll also cover the trade-offs involved in different design choices involving DDS QoS and other DDS features. This webinar builds on the Part I and Part II webinars by examining certain QoS policies in more depth and taking a deep dive into a single application as it evolves from simple data transfer to taking full advantage of the Data-Centric Publish/Subscribe model of DDS.
  • The 2017 Open Source Year in Review
    The 2017 Open Source Year in Review Karen Copenhaver, Mark Radcliffe, Phil Odence Jan 17 2018 4:30 pm UTC 60 mins
    Gain insights into these important legal developments from two of the leading open source legal experts, Karen Copenhaver, Partner at Choate Hall & Stewart and Counsel for the Linux Foundation, and Mark Radcliffe, Partner at DLA Piper and General Counsel for the Open Source Initiative. This annual review will highlight the most significant legal developments related to open source software in 2017, including:
    - Current litigation
    - An open source security update
    - Blockchain and its forks
    - Software Package Data Exchange (SPDX) and OpenChain
    - GDPR
    - And more
  • Don't Lose Control Over Your .com
    Don't Lose Control Over Your .com Jonathan Lewis, VP Product Marketing Jan 17 2018 5:00 pm UTC 30 mins
    Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.