Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.
With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.
In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
• Live activity maps that allow for unprecedented visual environment exploration
• Automated anomaly workflows—including new security anomalies
• Scheduled reports that share real-time views of the information that matters most to each user
Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.
Learn how Avi Networks delivers flexible application services beyond load balancing, including:
• Application analytics and visibility
• Predictive autoscaling
• Automation in private data centers or the public cloud.
Writing software is hard, with projects easily reaching hundreds of thousands of lines of text. Source control allows developers to manage these giant corpuses, tracking who made what changes and when. In this webinar we’ll talk about how you can use the same source control systems to manage tests and their results, so you always have a record of what happened and when.
In this webinar, learn about:
1. The basics of source code management (SCM) tools
2. How to use SCM to manage your test suite
3. The advantages of storing tests alongside your source code
Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.
In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
Hybrid cloud is becoming an increasingly common deployment model, where companies utilize both internal cloud environments, as well as public cloud environments (Amazon AWS, Microsoft Azure, Google Cloud, etc). There are many advantages to such an approach, including flexibility, data privacy, and cost.
Avi Networks helps hybrid cloud deployments with cloudbursting via multicloud support and application AutoScale. Avi Vantage has native support for multiple cloud environments from the same controller cluster, allowing for a true single pane of glass view into your load balancing environment, regardless where it lives.
Join Avi Networks in this webinar to learn about:
• Multicloud support
• Application autoscale
Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.
Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.
Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
The complexity of getting visibility and control on your IT spend will only increase in the coming year. Comply with the licensing of software vendors is an absolute must, but not an easy task. While your IT landscape is evolving continuously it has a huge impact on how you should deal with Software Asset Management (SAM). What are the key developments you must take in 2017?
Deloitte and Snow Software discuss the six SAM trends for 2017:
1. The gap between IT and the business
2. Growing focus on paying for actual use
3. Growing number of devices
4. Increasing complexity of IT environments
5. The continuous rising number of software audits
6. The ever increasing License complexity
During this one-hour webinar we will go into details on how these trends impact your daily job and how Deloitte and Snow Software can help you battle these trends.
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
Tectonic Sandbox makes it easy to try, develop, and deploy applications to a Tectonic cluster locally. In this webinar, we'll discuss the differences between Tectonic Sandbox and other local Kubernetes environments. We'll cover what kinds of tasks a local cluster is better suited for. And, we'll use this local setup to look under the hood at some of the features that make Tectonic special.
Experience Rainforest in a much cleaner and easier to use interface. We redesigned the entire platform from the ground up and will be giving a live demo on Rainforest 2.0. We will also introduce a new set of tools that make it easier to organize your test suite and view your test coverage. The session will conclude with a live Q&A.
What’s in a cloud platform? Turns out, often several clouds! Companies automate operations in a cloud by treating all components as commodities. However, at enterprise- scale, different business requirements dictate deploying multiple clouds including:
- Hybrid infrastructures and multiple cloud providers
- Compliance with country privacy laws and different security standards
- Specialization requests
The most advanced Pivotal Cloud Foundry (PCF) customers engineer their entire cloud platform, including their multitude of PCF instances, as a product. They create pervasive automation, treat their infrastructure as code, and continuously test and update their platform with delivery pipelines.
In this webinar we’ll discuss how companies are scaling operations of their multi-cloud platforms with Pivotal Cloud Foundry.
- Why enterprises deploy multiple clouds
- What operational challenges this causes
- How PCF customers are applying DevOps techniques and tools to platform automation
- An idealized tool stack for a engineering a multi-cloud platform at scale
- How to improve your platform engineering
We thank you in advance for joining us.
The Pivotal Team
Applications are moving to the hybrid cloud: they are either migrating from the data center or they are being developed as cloud-native applications. This webinar explores the challenges of gaining end-to-end visibility and control of your applications in a hybrid cloud environment.
Join us and learn how to:
•Identify the key requirements to shift your applications to the hybrid cloud
•Build an application-centric view across all your delivery infrastructure
•Automate tasks that save time and eliminate human error
•Integrate with OpenStack and Kubernetes to achieve true orchestration and automation
Intended for software engineers, developers, architects and technical leads who develop Spark applications, Vinod Nair will discuss how Pepperdata the product suite helps developers in Big Data Environments.
In this 30 minute webinar, Jonathan Lewis, VP Product Marketing, will cover some of the difficulties of delivering applications in mainland China and how NS1’s Managed DNS for China can deliver superior manageability, reliability, and performance for your .CN and global domains.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
In this webinar, we will learn about image recognition with deep learning. After a brief overview of what deep learning is, and why it matters, we will learn how to classify dogs from cats. That is, how to train a model to recognize dog images from cat images.
We use Keras, an easy to use python deep learning library that sits on top of Tensorflow, and “fine-tuning”, a very important skill for any deep learning practitioner, to train a model to classify the images.
Once we trained our model to classify dogs from cats images with high accuracy, we dig into the details of the trained model and look at its building blocks, i.e., Convolutional Neural Networks (CNN), Fully Connected Block and activation functions to develop an understanding of how the deep learning model works.
Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace.
Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise when it comes to your storage solution. Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what storage and infrastructure models are best for your organization.
Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
Registrati al webinar per saperne di più!
Three time winner of Editors' Choice Award by PC Magazine and heralded as "the most customizable contract management system on the market", Our agile technology platform makes it quick to setup and easy to use. Agiloft provides a centralized, searchable repository with integrated workflows, email alerts, PDF contract generation and reports that address even the most sophisticated approval processes. Fully audit compliant with support for HIPAA, SOX and CFR21. Start today with a free custom demo.
Data scientists Daniel and Ryan were the only resources on-hand for Crest Financial's increasing predictive analytics workload, making them feel like mere mortals as they faced the ever-increasing challenge of developing and deploying predictive models to boost their business.
Enter the DataRobot machine learning automation platform. With DataRobot's help, Daniel and Ryan are quickly transforming into data science superheroes, now able to tackle more projects with better results -- faster than a speeding bullet! In this on-demand webinar, you'll learn how they are helping Crest Financial make better lending decisions while:
* Completing tasks that once took months -- almost immediately
* Rolling out models through an easy-to-use and robust enterprise-ready framework
* Delivering more accurate results to their colleagues and educating management on results
It’s easy to preach the value of sourcing, but it’s difficult to prioritize regularly. Why spend hours reaching out to passive candidates - who may never reply - when you can just respond to candidates who are actively looking?
Because proactive sourcing is key to filling your high-priority, hard-to-fill roles. Since Shopify zeroed in on proactive outreach three years ago, their growth has been explosive. They’ve skyrocketed from 550 to over 2,000 employees and made 387 hires through proactive sourcing, including 110 hard-to-fill roles.
What’s more? They've doubled their candidate response rate to cold outreach from 21 to 42 percent since rolling out Lever Nurture.
Want to know the secrets behind their unprecedented success? On October 10th, Recruiting Researcher Jess Verbruggen will share the outreach tactics that actually pique the interest of candidates, and ultimately lead to monumental growth.
Join us to learn:
- Why Shopify knew they had to prioritize proactive sourcing in the first place
- How they advocated to build a team of recruiting researchers who specialize in sourcing
- Concrete steps to increase your response rate to cold outreach
- The direct link between sourcing and massively scaling your team
Awarded "Best Overall Value" from Info-Tech Research Group for the 3rd year in a row, Agiloft provides the fastest time to value because it slashes the time to configure the solution to your requirements. We can customize it for you live during the demo -so you get a trial system that you can actually use and a fast, affordable deployment. Agiloft addresses even the most sophisticated requirements in record time. Start today with a free custom demo.
Kubernetes provides the ability to handle path-based load balancing with ingress resources.
We will discuss how to secure those ingress resources with kube-lego. kube-lego is a common pattern for automatically acquiring certificates from let's encrypt. We will also highlight how to use a feature recently added to kube-lego to secure resources that are leveraging the tectonic-ingress-controller. The tectonic ingress controller enables you to satisfy your ingress resources.
What is Software Asset Management (SAM) and how can you develop a SAM practice to reduce risk, save money and empower business agility?
This educational and interactive webinar provides an introduction to SAM for those new to the field. Martin Thompson, founder of ITAM Review, and Michael Krutikov, Global Product Marketing with Snow Software will share how organizations like yours have driven quantifiable efficiencies and delivered ROI by managing their cloud and on-premise software more efficiently.
Learn the key steps to implementing a best-in-class SAM practice and how to avoid the most common pitfalls when starting a SAM practice.
During this webinar you will learn:
•What SAM is and how it differs from basic asset management
•The ROI you can deliver with a SAM practice
•Top 3 common hurdles to avoid when starting your implementation
•Tips to getting your SAM solution started successfully
•Best practices from other successful organizations such as Carnival and Sky.
Register today and all attendees will enter a prize draw to win one of 20 free copies of Practical ITAM – The Essential Guide for IT Asset Managers: Getting started and making a difference in the field of IT Asset Management, by Martin Thompson from ITAM Review. Please click here for full terms and conditions http://ow.ly/7sSW30f6b3W
In this webinar we will talk about practical steps that will help you:
- Reap the benefits of hybrid cloud by adapting to cloud devops
- Deal with the technical and operational pitfalls involved in migrating to native cloud
- Make the right choices for your cloud architectural to achieve lean devops
The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.
We will discuss:
- How agile integration can benefit your organization and make it more responsive to market demands
- Successful agile application integration approaches
- Best practices for implementing an agile application integration environment
The webcast is intended for system architects and application developers.
Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis.
Simon and Jack will demonstrate:
•How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
•How to automate tasks to find and block the use of Kaspersky in government organizations.
•How to streamline dozens of sources to gain insight into security events.
•How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
•How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
Join us for the first in a series of monthly webinars, presented by Greenlight Group, where Micro Focus and Greenlight Group will provide an introductory session of Micro Focus's container orchestrated IT Operations Management platform. In this webinar, Torrey Jones, Greenlight Group Principal Consultant, will talk through the basics of Micro Focus’s cloud native Container Deployment Foundation – a Docker and Kubernetes centric game changing platform for IT Operations Management in the Enterprise. Prior to diving into the topic of the hour, special guest Roy Ritthaler , VP, Marketing, IT Operations Management, will provide a short update of the New, Combined Micro Focus – post merger with HPE Software.
Increasingly, companies have turned to customer data platforms (CDPs) to help them run more relevant marketing campaigns using the large volume of customer data at their fingertips. Customer-focused software company Atlassian will discuss how they made that decision and the types of complex marketing campaigns that they can now run as a result. Research analyst David Raab will also be on hand to discuss how other companies can use CDPs to harness customer data to increase sales and loyalty.
In this webinar, you will learn:
* Key considerations when deciding to build versus buy a customer data platform
* How companies are taking advantage of CDPs for more relevant communications
* How data science can improve marketing efficacy
* The trends and market factors driving the need for customer data platforms
* Jeff Sinclair, Product Manager, Engagement Platform, Atlassian
* David Raab, Analyst and Founder at The Customer Data Platform Institute
* Jeff Hardison, VP of Marketing at Lytics
* Stewart Rogers, Analyst-at-Large, VentureBeat
Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.
BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.
For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.
Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
This webinar will show how to set up an ELK (elasticsearch-logstash-kibana) logging stack on top of a Tectonic Kubernetes cluster. These three components work together to provide a solid logging, searching, and visualization of your infrastructure's data logs. We'll split this webinar into 3 segments to teach how to deploy the stack, how to query your log data, and how to integrate the ELK stack with Tectonic's cloud-native tools.
Part I: Deploy the stack
This involves three new components which will be deployed on the cluster: Elasticsearch statefulset, Fluentd daemonset, and Kibana.
Part II: Querying log data
Next, we'll look at how to effectively reference Kubernetes metadata when querying log objects in stored in Elasticsearch, and some common patterns in querying Kubernetes logs and gaining visiblity into various cluster components and/or deployed applications.
Part III: EFK/ELK cluster logging on tectonic
Finally, we will address how to deploy the ELK stack optimally on top of Tectonic.
If you are preparing to submit your LAW Report or getting ready for an SAP audit you need to ensure your SAP License estate is optimised prior to any new purchase. Utilising the Snow Optimiser for SAP software, Snow Software’s Baseline to Audit (B2A) project service enables SAP customers to rapidly determine the true status of their SAP license position prior to any negotiation with SAP.
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
DevOps teams are building applications faster than ever before, and utilizing large amounts of open-source software to increase agility. However, that introduces the possibility of open-source security risk. The landscape of attacks has changed in recent years, with cyber-attacks increasingly happening on the application layer. This means DevOps teams need to be involved in the security process.
This task is made more daunting as modern applications are a mix of custom code and open source in their applications. How do you protect your DevOps? Register for this webinar where security experts from Micro Focus Fortify and Black Duck discuss:
- Understanding the mindset of an attacker
- Ways to automate the process of risk identification
- The ability to gate builds when finding risk elements
Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.
From this webinar you will learn:
• How to design SQL server infrastructures for optimal performance
• How the software and hardware infrastructure affect database performance
• Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
• Tools and metrics to find current bottlenecks, inside and outside of the database server
• Tools and best practices for monitoring all layers
Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
Companies that embrace DevOps in the cloud develop apps faster, reduce overhead and can decrease downtime by 60% or even more. In this webinar, Glenn Mate, Solution Architect at 10th Magnitude, will share several use cases around how to integrate your DevOps processes into Azure. He will also emphasize CALMS:
* The framework that integrates the DevOps teams
* Functions and systems within an organization around culture
* Automation, lean, metrics, and sharing.
By distilling the philosophy behind DevOps in the cloud, you’ll find automation and optimization at the core.
ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?
This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.
What you will learn:
•The shift to cloud native, software and service-based offerings
•Support for new application architectures
•Operational complexities and scale at production
•Flexibility and support for hybrid topologies in transition
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.
PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.
This webinar explains:
· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise
· The key requirements for establishing a cyber threat intelligence function
· Basic cyber threat intelligence workflows
· Resource and training requirements to support a Cyber Threat intelligence function
Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.
Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.
During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.
Imagine you went to a restaurant and ordered fish and your server came back with a Patagonian Toothfish, a pile of random spices and vegetables, a knife and a frying pan and told you to cook it yourself. Hhhmmm, you thought. So you asked for help. The response: a badly photocopied sheet of paper with a website URL to learn the ingredients for a “Chilean Sea Bass” and a few recipes to boot. This is how we build infrastructure today.
VMware vSAN based hyperconverged solutions from Lenovo revolutionize how you can deliver your datacenter infrastructure. The set-up is simpler, it costs less and easier to use than traditional IT solution. It allows you to focus on running your business rather than on building your infrastructure. Join this webinar as VMware and Lenovo introduce the new ThinkAgile VX Series. The result of this offering: ability to focus on the true business value of hyperconvergence. You will see how vSAN ReadyNodes and ThinkAgile VX will help re-engineer Enterprise IT to be flexible and responsive, enabling more time delivering business value rather than integrating IT infrastructure.
Not everyone can write code – but nearly anyone can solve a problem. Today's businesses are facing an ever increasing set of problems that require innovative digital solutions. Learn how to safely enable a new army of application developers: the citizen developer.
This webinar will examine the use of citizen developers to meet the ever increasing demand for new applications. We will discuss:
• The current challenges with citizen developers and the gap between them and corporate IT
• An new approach to the application development lifecycle to reduce the complexity of software development and empower this new army of developers
• The concept of gadgets and their role in providing functionality in a secure and compliant manner
• Potential areas where citizen developers can quickly build their own applications
The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake news. Indeed, social (digital) media is just an amplifying mirror of ourselves. Hence, the main challenge of search engines and other websites that rely on web data is to assess the quality of such data. However, as all people have their own biases, web content, as well as our web interactions, are tainted with many biases.
Data bias includes redundancy and spam, while interaction bias includes activity and presentation bias. In addition, sometimes algorithms add bias, particularly in the context of search and recommendation systems. As bias generates bias, we stress the importance of de-biasing data as well as using the context and other techniques such as explore & exploit, to break the filter bubble.
The main goal of this talk is to make people aware of the different biases that affect all of us on the Web. Awareness is the first step to be able to fight and reduce the vicious cycle of bias.
Ricardo Baeza-Yates areas of expertise are web search and data mining, information retrieval, data science, and algorithms. He is CTO of NTENT, a semantic search technology company based in California, USA since 2016. Before, he was VP of Research at Yahoo Labs, based first in Barcelona, Spain, and later in Sunnyvale, California, from January 2006 to February 2016. He also is part time Professor at DTIC of the Universitat Pompeu Fabra, in Barcelona, Spain, as well as at DCC of Universidad de Chile in Santiago.
Dealing with Employee Onboarding, Tracking, and Provisioning in the Digital Revolution - or Something Better...
What if you could consumerize the Employee Service experience?
Making onbaording a breeze for new employees, perhaps even increasing your employee satisfaction score? It's a no brainer right?
There are a lot of platforms who promise they have the "right recipe" when it comes to HR delivery. Finding out the truth behind a platform can be just as scary as implementing one!
That's why on Tuesday, October 24th, you should join Adam Mason, VP of Solutions and Innovation, and Tom Sweeney, Bussiness Process Consultant, of Acorio for our October webinar. They'll cover ServiceNow's new product, HR Service Delivery, and help you understand the platform's onboarding experience and what success it can bring to your company's future (and current) employees.
Find out if your onboarding experience is working.
This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
Organisations are rapidly adopting cloud interconnection at colocation facilities. It is an ideal place to provide services that need to be shared by multiple cloud locations, run legacy applications, or deliver application and security services. By deploying application delivery with cloud interconnection services, businesses get the flexibility and scale of the public cloud without sacrificing security, availability, and performance of their applications.
Join Equinix and F5 experts for an informative webinar where you will learn how to:
- Benefit from cloud interconnection services
- Deliver advanced security services: Single sign-on, Cloud federation, Web application firewall, SSL inspection, DDoS protection, DNS, and more
- Leverage cloud gateway services as a central point of control between legacy data centers, colocation, and public, private, or hybrid cloud
- Avoid cloud provider lock-in through direct, private access to multiple public clouds