Hi [[ session.user.profile.firstName ]]

Application Management

  • Quality Management Systems (QMS) for Medical Devices
    Quality Management Systems (QMS) for Medical Devices
    Miguel Tam Recorded: Mar 25 2019 8 mins
    Modern cloud QMS solutions for medical devices provides closed-loop quality management with integrated product lifecycle management (PLM), CRM to speed products to market while maintaining regulatory compliance, all in the cloud.
  • What is Pepperdata?
    What is Pepperdata?
    Pepperdata Recorded: Mar 25 2019 2 mins
    Pepperdata has engineered a big data APM solution that empowers operators to automatically optimize the performance and capacity of their big data infrastructure while enabling developers to improve the performance of their applications.

    Unlike other APM tools that merely summarize static data and make application performance recommendations in isolation, Pepperdata delivers complete system analytics on hundreds of real-time operational metrics continuously collected from applications as well as the infrastructure — including CPU, RAM, disk I/O, and network usage metrics on every job, task, user, host, workflow, and queue.

    The result is a comprehensive, intuitive dashboard that provides a holistic view of cluster resources, system alerts, and dynamic recommendations for more accurate and effective troubleshooting, capacity planning, reporting, and application performance management.

    Pepperdata diagnoses problems quickly, automatically alerts about critical conditions affecting system performance, and provides recommendations for rightsizing containers, queues and other resources. Leveraging AI-driven resource management, Pepperdata tunes and optimizes infrastructure resources to recapture wasted capacity and get the most out of the infrastructure.

    Welcome to the new world of real-time big data application and infrastructure performance management.

    Welcome to Pepperdata.

    Optimize your infrastructure, your applications, and your time — at scale.
  • Pepperdata Application Spotlight FREE
    Pepperdata Application Spotlight FREE
    Pepperdata Recorded: Mar 25 2019
    Use Application Spotlight for free on up to 20 Nodes
    Pepperdata Application Spotlight is a self-service APM solution that provides developers with a holistic and real-time view of their applications in the context of the entire big data cluster, allowing them to quickly identify and fix problems (failed Spark applications, for instance) to improve application runtime, predictability, performance and efficiency.
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Recorded: Mar 25 2019 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • Lessons Learned from an Enterprise-Scale Migration Project
    Lessons Learned from an Enterprise-Scale Migration Project
    Lars Muller, CRM Partners AG, TIBCO MVP Recorded: Mar 25 2019 37 mins
    Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.

    Watch this webinar to learn:

    - The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
    - Key decisions you need to make at the outset of your project that will minimize risks
    - How to prepare your data for a successful migration
    - How to test and execute your migration to ensure a smooth launch
  • HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE Storage Recorded: Mar 22 2019 60 mins
    Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
    So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Recorded: Mar 21 2019 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • Your Medical Device Firm Just Bought Some Software - Now What?
    Your Medical Device Firm Just Bought Some Software - Now What?
    Brad Hinke, Director of Quality Services & Validation at Propel Recorded: Mar 21 2019 51 mins
    If your company is thinking about buying software to help with product development and manufacturing, validation is a critical step for complying with FDA 21 CFR Part 11 and Part 820. But many firms often lack detailed expertise and experience to make sure their non-product software is validated. With lack of resources and direction, how can you make sure your software is validated at a reasonable cost.

    Brad Hinke, Director of Quality Services & Validation at Propel will host a live webinar and provide guidance and best practices from real-life lessons on validation. Brad has worked with both small and large medical device firms in all aspects of validation and implementation.
    In this webinar, learn the following:
    - what software needs to be validated and lessons learned from past validation efforts
    - frameworks for approaching validation
    - steps you must do to be compliant with the FDA.
  • Getting Started with AWS IoT Demo
    Getting Started with AWS IoT Demo
    Tolga Tarhan, CTO at Onica Recorded: Mar 21 2019 30 mins
    Learn how AWS can accelerate your IoT strategy by allowing for rapid IoT prototyping in less than 6 weeks. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost. We'll cover serverless IoT architecture as well as do a live demo on how to connect & configure devices on AWS IoT Core.

    What we’ll cover:
    * Device connectivity & security
    * Ingesting data with AWS IoT
    * Reacting to IoT data in real-time
    * Storing data in Amazon DynamoDB and Amazon S3
    * Building a simple RESTful API to consume the stored data
    * Analytics: Batch processing, analytics at the edge device with AWS Greengrass
    * IoTanium by Onica for quick hardware/software prototyping
    * Customer success: automation and remote management with AWS IoT
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web Services Recorded: Mar 21 2019 45 mins
    With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.

    In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:

    >Leverage compliance policies for scanning images in your CI/CD pipeline
    >Scan Kubernetes and Docker environments and visualize compliance posture
    >Enforce runtime container compliance
    >Investigate policy violations post-mortem by using forensics after container is disposed
  • Essential SaaS benchmarks for a competitive advantage
    Essential SaaS benchmarks for a competitive advantage
    Recurly Recorded: Mar 21 2019 61 mins
    The competition is coming. By 2020, eighty percent of SaaS players will move to a subscription-based model, which means your success strategies have to evolve — and that includes the all-important fundamental: how your subscriptions are structured.

    Your subscription pricing and plan structure have a profound impact on subscriber acquisition and retention, and once you nail the formula, you'll see revenue increase. Do you choose an annual or monthly plan? Offer a trial or discounts?

    This is where a test plan is critical. Combined with benchmark data, you can test and iterate your way to the right pricing and plan structure. And when important decisions are backed by comprehensive benchmark data, you’re far more likely to see an increase in adoption and revenue.

    Join this VB Live event to discover essential SaaS benchmarks and best practices to maximize revenue, improve acquisition, and spur adoption.

    Registration is free!

    Attendees will learn:

    * Important SaaS benchmarks by industry segment
    * How to structure your SaaS subscription plans and pricing to maximize revenue and retention
    * How successful SaaS companies use a test, learn, and iterate framework to optimize revenue
    * The key metrics — and reports — to monitor for success and maximum LTV
    * The results of an in-depth case study on SaaS testing and pricing

    Speakers:
    *Panelist: Emma Clark, Chief of Staff, Recurly
    *Moderator/Analyst: Sean Joyce, Recurring Revenue Technologies, Navint
  • Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Rohit Kelapure, Pivotal Consulting Practice Lead Recorded: Mar 21 2019 64 mins
    Digital transformation includes replatforming applications to streamline release cycles, improve availability, and manage apps and services at scale. But many enterprises are afraid to take the first step because they don’t know where to start. In this webinar, Rohit will provide a step-by-step guide that covers:

    ● How to find high-value modernization projects within your application portfolio
    ● Easy tools and techniques to minimally change applications in preparation for replatforming
    ● How to choose the platform with the right level of abstraction for your app
    ● Examples that show how Java EE Websphere applications can be deployed to Pivotal Cloud Foundry

    We look forward to you joining us.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Recorded: Mar 21 2019 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • Top Considerations for Software Audits in M&A Due Diligence
    Top Considerations for Software Audits in M&A Due Diligence
    Phil Odence, Synopsys Recorded: Mar 21 2019 61 mins
    There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate that risk. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.

    Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:

    • Uncovering application risks: What’s in the code
    • Taking a comprehensive approach to security audits
    • Choosing the right partner for audits

    Don’t miss this informational webinar. Register today!
  • How to Plan & Execute a Successful SAP Migration to AWS
    How to Plan & Execute a Successful SAP Migration to AWS
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Mar 21 2019 43 mins
    Join us to learn how to:

    - Plan & Execute SAP Business workloads migrations on AWS.

    - Cover the routes on each scenario: OS/DB platform, database size, downtime window and connection bandwidth.

    - Impact of each variable on the overall migration project and combine all together to shape the right migration strategy to AWS.

    This is a technical webinar aimed for Infrastructure Engineers, SAP Basis and OS/DB migration experts and technical decision makers.
  • Limiting the attack vectors of a cloud-native app
    Limiting the attack vectors of a cloud-native app
    John Osborne principal OpenShift architect, Red Hat & Glen Kosaka vice president of product management, Neuvector Recorded: Mar 21 2019 53 mins
    NeuVector, a software company focusing on container network security, uses security features built into Red Hat OpenShift to provide defense in depth for business critical production deployments. This webinar will cover:

    Potential attack vectors for container deployments and explain how the combination of Red Hat OpenShift and NeuVector can detect and prevent damaging attacks.
    How to integrate security into the pipeline using Red Hat OpenShift and NeuVector automation and integration points.
  • Bojujte za dobro proti zlým botům
    Bojujte za dobro proti zlým botům
    Radovan Gibala - Senior Systems Engineer, F5 Networks Recorded: Mar 21 2019 54 mins
    Hlavní prioritou pro organizace, které podporují strategii udržitelného zabezpečení, je identifikovat škodlivé boty a vytvořit proti nim ochranu. Zúčastněte se tohoto webináře a dozvíte se:

    • jak boti infikují systémy, šíří se a napadají aplikace,
    • jaké typy útoků na aplikace boti obvykle provádějí,
    • jak se můžete bránit proti zlým botům, aniž byste zničili ty hodné.

    Sledováním tohoto webináře souhlasíte, že Vaše osobní údaje budou sdíleny s F5 a zpracovávány v souladu se Zásadami o ochraně osobních údajů společnosti F5 (https://f5.com/about-us/policies/privacy-policy). Také souhlasíte, že Vás F5 může kontaktovat ohledně produktů, služeb a budoucích akcí F5, ale s možností se kdykoli odhlásit.
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Recorded: Mar 21 2019 33 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Using Infrastructure-as-Code to manage third-party apps in Red Hat's OpenShift C
    Using Infrastructure-as-Code to manage third-party apps in Red Hat's OpenShift C
    Red Hat Consulting Recorded: Mar 21 2019 5 mins
    How can Infrastructure-as-Code (IaC) be used to manage your third-party applications with ease? How does Red Hat® Ansible® Automation and inventories source controlled in git repositories pair up with Red Hat OpenShift® Container Platform to simplify these tasks? This Red Hat Consulting whiteboarding video provides a brief introduction to IaC, and how it is used to perform the customized deployment of a third-party software solution from a provider such as Dynatrace. It also discusses how IaC can be applied and integrated with existing infrastructure to be managed as a complete solution.
  • Luttez efficacement contre les bots malveillants
    Luttez efficacement contre les bots malveillants
    Gregory Rabin - Systems Engineer, F5 Networks Recorded: Mar 21 2019 66 mins
    Pour les entreprises à la recherche d’une stratégie de sécurité durable, il est primordial de savoir identifier les bots malveillants et de s’en prémunir. Participez à ce webinar pour découvrir :

    • Comment les bots infectent et attaquent les applications et se propagent
    • Les types d’attaques généralement réalisées par les bots ciblant les applications
    • Comment vous défendre contre ces bots malveillants sans affecter ceux qui sont inoffensifs

    En regardant ce webinar, vos données personnelles seront partagées avec F5 et traitées conformément à la politique de confidentialité F5 (https://f5.com/about-us/policies/privacy-policy). Vous recevrez également des communications liés aux produits et services F5, vous pourrez vous désabonner à tout moment.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Recorded: Mar 21 2019 43 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Allison Willams, Pivotal Senior Solutions Architect & Tom Collings, Pivotal Advisory Solutions Architect Recorded: Mar 20 2019 35 mins
    Migrating your applications to the cloud can be a harrowing journey, one fraught with complexity and uncertainty. What’s required to succeed, above and beyond the right platform, are the right set of people, equipped with modern practices, to build and run cloud native applications with confidence.

    Join Allison and Tom, from Pivotal's Application Transformation (AppTx) team, as they discuss what common problems arise when teams try to get their apps on the platform and the AppTx team approach to solving them.

    Whether you have purchased PCF (Pivotal Cloud Foundry) or are of a mind to move your legacy applications to the cloud this webinar will help you understand:

    ● Why it’s imperative to have a small team dedicated to the application portfolio
    ● When to re-platform, modernize or rewrite an application
    ● Strategies to address the most common issues we see

    We look forward to you joining us.
  • Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product Manager Recorded: Mar 20 2019 45 mins
    Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

    Join us live Wednesday, March 20 @10AM PST to learn

    * Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
    * How to set triggers based on thresholds important to your business
    * Set feature flags to control specific parts of your environment to reduce stress levels.

    See a Honeycomb demo, ask questions and learn more.
  • AI Improves Profitability of Core Financial Services at Paraguay Bank
    AI Improves Profitability of Core Financial Services at Paraguay Bank
    Ruben Diaz, Data Scientist at Vision Banco and Rafael Coss, Maker at H2O.ai Recorded: Mar 20 2019 60 mins
    In the financial industry, data can translate to revenue if used correctly, yet financial institutions need to operate with scale, speed, and immense accuracy.

    Data scientists at Visión Banco needed to improve the bank’s credit scoring process, including predicting existing customer behavior and churn, determining credit risk, and offering credit to new customers. Join our webinar to learn how the bank saved time and improved accuracy by building and deploying models using H2O Driverless AI. As a result, the Paraguayan bank has doubled its rate of customer propensity to buy.

    Join our webinar to learn:

    • How to automate machine learning modeling to create more models faster and scale data science efforts
    • How you can use high-performance computing to solve complex data challenges such as real-time targeting of promotions or customer churn predictions
    • How one financial institution now easily determines credit risks and expands offers to customers using H2O Driverless AI
    • How you can optimize business processes across your financial institution, such as evaluating credit scores or credit risk, detecting fraud, or performing analysis for Know Your Customer (KYC)
  • Anleitung zum Kampf gegen bösartige Bots
    Anleitung zum Kampf gegen bösartige Bots
    Frank Thias - Principal Systems Engineer, F5 Networks Mar 26 2019 9:00 am UTC 62 mins
    Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:

    • Wie Bots Anwendungen infizieren, verbreiten und angreifen
    • Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
    • Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.

    Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
  • The Accelerate State of DevOps Report
    The Accelerate State of DevOps Report
    Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, Pivotal Mar 26 2019 9:30 am UTC 60 mins
    The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.

    In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:

    - Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
    - Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
    - Outsourcing may save money in the short term, but is much more likely to contribute to low performance
    - Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)

    Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.

    Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
  • Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Sean Carpenter & Stephen Crowley Mar 26 2019 10:00 am UTC 39 mins
    Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.

    New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
  • Blockchain: Flying the Friendly Skies
    Blockchain: Flying the Friendly Skies
    Nelson Petrack, CTO, TIBO Software Mar 26 2019 10:00 am UTC 36 mins
    According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.

    Watch this webinar with TIBCO CTO Nelson Petrack presenting:

    -A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
    -How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
    -What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?

    Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
  • Otwórz. Kliknij. Daj się zhakować
    Otwórz. Kliknij. Daj się zhakować
    Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales Engineer Mar 26 2019 10:00 am UTC 45 mins
    Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.

    Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
    ·Spear phishing
    ·Impersonation
    ·W2 Scam
  • AWS Backup & Disaster Recovery: Die ultimative Checkliste
    AWS Backup & Disaster Recovery: Die ultimative Checkliste
    Catalin Voicu - Systems Engineer, N2WS und Daniela Kasabova - Inside Sales Representative, N2WS Mar 26 2019 1:00 pm UTC 60 mins
    Das Versprechen der Cloud war immer eine mehr agile, kosteneffiziente und katastrophesichere Weise zu skalieren. Wie es aber immer wieder passiert, Versprechen kommen mit kleingedrucktes zusammen. AWS und jeder anderer Public Cloud Anbieter garantieren die Sicherheit und Verfügbarkeit der Infrastrukturebene aber nicht Ihrer Daten: 


    Nehmen Sie an unserer LIVE Session teil und erfahren Sie mehr über:
    ·         Warum sollte man AWS Environments schützen und warum native Backups nicht genügend sind. 
    ·         Wie man eine einwandfreie, schnelle und granulare Daten-Wiederherstellung durchführt. 
    ·         Wie erreicht man Anwendungskonsistenz mit 100% Uptime
    …und mehr!  
  • Mądrze zwalczaj szkodliwe boty
    Mądrze zwalczaj szkodliwe boty
    Mariusz Sawczuk – Specialist Systems Engineer, F5 Networks Mar 26 2019 2:00 pm UTC 66 mins
    Identyfikacja złośliwych botów i ochrona przed nimi jest priorytetem dla firm opracowujących zrównoważoną strategię bezpieczeństwa. Weź udział w tym webinarium, aby dowiedzieć się:

    • W jaki sposób boty infekują, rozprzestrzeniają i atakują aplikacje
    • Jakie rodzaje ataków na aplikacje są najczęściej przeprowadzane przez boty
    • W jaki sposób możesz bronić się przed szkodliwymi botami, nie przeszkadzając tym dobrym

    Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
  • Running Kubernetes on AWS EC2 with Avi Networks
    Running Kubernetes on AWS EC2 with Avi Networks
    Bhushan Pai, Lei Yang Mar 26 2019 3:00 pm UTC 50 mins
    Azure Kubernetes Service (AKS) is offered by Microsoft Azure as a fully-managed Kubernetes orchestration service.
  • Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Jim Davis, Fluke Networks Mar 26 2019 3:00 pm UTC 71 mins
    This presentation will look at some of the requirements for field testing Single Mode fiber to make sure it will support the new applications you are planning to run on it. Starting with inspection and cleaning it will answer many of those little questions, “can I use that click pen from UPC multimode connectors on APC connectors?, How do I inspect APC connectors?”

    From there the presentation will move on to the calculation of a loss budget, what is the correct budget, and what wavelengths should be tested. We will look at the best practices in Tier I loss testing to assure the minimum of uncertainty in our test results. The presentation will explain how this can be done for both single connectors such as LC and SC as well as MPO connections.

    Finally, we will look at troubleshooting the fiber using an OTDR and give an introduction to the identification of common events in Single Mode OTDR traces.

    Attendees will earn 1 BICSI CEC
  • Enterprise Security in Data Access
    Enterprise Security in Data Access
    Jim Silhavy, Manager of Software Engineering, Progress Mar 26 2019 4:00 pm UTC 45 mins
    Get up-to-speed on the latest security advances for cloud, big data and relational databases. In the wake of increasingly frequent data breaches and emerging data protection laws like GDPR, enterprise security has become paramount. Spending on enterprise security is forecasted to increase to $96.3 billion in 2018.

    As organizations continue to invest in business intelligence, big data, IoT and cloud, IT teams are introducing increasingly complex security mechanisms to authorize and encrypt access to data. Your analytics and data management tools need to be able to securely access data spread across different systems. They must run within existing policies, and without introducing security risks.

    Listen to the Progress experts as they explain what it takes to securely access data from rapidly evolving enterprise data access layers.

    Watch this webinar to learn about:
    - Advances in end-to-end data security
    - Latest technologies for big data and cloud—Knox, Ranger, Sentry, Kerberos, OAuth
    - Newest security innovations in enterprise databases such as Oracle, SQL Server and more
    - How Progress configures and tests security in complex environments
  • How to Prepare for Your HubSpot-CRM Integration Project
    How to Prepare for Your HubSpot-CRM Integration Project
    TIBCO Mar 26 2019 4:00 pm UTC 31 mins
    Any integration project can have gotchas, such as custom fields or duplicate records that can slow you down. Proper up-front planning can help you successfully manage the gotchas, reduce the time needed and achieve better results.

    In this presentation, integration experts from LyntonWeb discuss:

    - How to prepare for your HubSpot-Dynamics CRM integration project to get the results you want
    - How to apply this advice to other marketing automation-CRM integration projects, including Salesforce integrations
  • Throwing IoT in the Trash (literally)
    Throwing IoT in the Trash (literally)
    Shane Swiderek, Brett Orr, Peter Girgis, Gavin Adams Mar 26 2019 5:00 pm UTC 55 mins
    Innovative IoT solutions are solving real-world problems, with data serving communities in ways you would never expect. Who would have predicted the hidden insights and cost savings waiting to be uncovered in our trash? Well, Bigmate! This IoT solutions provider turns real-time sensor data into insights.

    Realizing the trash collection process was outdated and inefficient, Bigmate developed a system with IoT sensors providing location, temperature, and bin level monitoring to optimize trash pickup. Saving money, streamlining operations, and optimizing processes, IoT sensor data can help your business discover new ways to solve old problems.

    Join our interactive webinar panel with Bigmate and AWS to learn:

    -How city-wide IoT implementation is optimizing trash pickup
    -How to translate raw data into actionable insights for users
    -The ins and outs of Bigmate’s IoT platform


    Presented By:

    -Gavin Adams, Sr. Solutions Architect, IoT at Amazon Web Services
    -Peter Girgis, Chief Technology Officer, Bigmate
    -Brett Orr, General Manager, Bigmate
    -Shane Swiderek, Product Marketing Manager, TIBCO Jaspersoft
  • Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Dave Bartoletti, VP & Principal Analyst at Forrester & Jenny Fong, Director of Product Marketing at Docker Mar 26 2019 5:00 pm UTC 58 mins
    Learn what you should be evaluating and how containers will be essential to powering your next phase of digital transformation.

    Webinar will dive into the state of the container platform market with insights into:

    - The state of the cloud and container platform markets heading into 2019: what’s driving all this digital transformation?

    - The rise of the enterprise container platform market and the core capabilities enterprises look for in their next development and operations platform

    - How to evaluate the market for enterprise container platforms and find the best solution to help you create new applications and modernize your key existing applications

    - Why we believe Docker Enterprise has been named a Leader in the enterprise container platform market
  • How to Improve Software Engineering with DevOps Orchestration and Feedback Loop?
    How to Improve Software Engineering with DevOps Orchestration and Feedback Loop?
    Sridhar Prabhakar – Sr. Software Engineering Consultant, Althaf Ali - DevOps Solutions Architect Mar 26 2019 5:00 pm UTC 60 mins
    In grand finale of the webinar series ‘4 dimensions of DevOps’, we will conclude by discussing the importance of the fourth and final dimension – Orchestration and Feedback Loop. We would also offer the viewers a sneak peek into our DevOps Template rule engine that has the ideologies embedded. These are the DevOps essentials that we follow in our projects to help us streamline the DevOps Pipeline and deliver high ROI to our customers.

    In a nutshell, this session will offer the following takeaways:

    1. Introduction to the fourth dimension – orchestration and feedback loop.

    2. Why is it important and How does it affects the parameters of a developers requirement?

    3. How Aspire's inference engine applies rules to arrive at a template for a given DevOps project.

    4. Benefits of using this approach to help you make decisions faster and build products that meet your customer needs.
  • Understanding U.S. SMS Compliance
    Understanding U.S. SMS Compliance
    Sheila Jambekar, Associate General Counsel @ Twilio & Pranav Deshpande, Sr. Product Marketing Manager @ Twilio Mar 26 2019 5:00 pm UTC 57 mins
    The business SMS messaging ecosystem is complex and can easily seem overwhelming. Sending a message to the wrong person–at the wrong time–may not only affect your customer’s experience, but could also put your business at risk of legal action.

    Buzzwords like opt-in, opt-out, P2P, A2P, TCPA, and the CTIA can make the idea of sending messages to customers that much more daunting. On the other hand, a welcome text message to the right person can be a powerful and effective way to communicate with your users.

    In this webinar, we’ll touch on:

    -The basics of messaging compliance
    -The in's and out's of U.S. regulations
    -Expert advice from helping thousands of companies deliver powerful communications experiences
  • Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Srini Srinivasan, Co Founder and Chief Development Officer Mar 26 2019 5:00 pm UTC 60 mins
    The Aerospike Connect family of add-on modules as well a new REST-API now make it even easier to integrate the Aerospike Database into both new and existing enterprise infrastructure systems, helping customers modernize and optimize their data architecture. We are happy to announce that Aerospike Connect for Kafka and Aerospike Connect for Spark are our two newest add-on modules.

    Join us on March 26 at 10am PT to hear from Aerospike Founder and Chief Product Officer, Srini Srinivasan, who will cover:
    - The Aerospike Connect product strategy

    - How Aerospike Connect for Spark enables companies to directly integrate the Aerospike database with their existing Spark infrastructure

    - How Aerospike Connect for Kafka makes it easy for enterprises to exchange data bi-directionally between the Aerospike database and enterprise transactional systems at the edge and core

    - How Aerospike REST Client can be utilized as an easy and standard interface for the Aerospike database that enables developers to work with the Aerospike data layer
  • Value Stream Management vs Value Stream Mapping: What You Need To Know
    Value Stream Management vs Value Stream Mapping: What You Need To Know
    Dominica DeGrandis, Director of Digital Transformation, Tasktop Mar 26 2019 5:00 pm UTC 60 mins
    The emergence of Value Stream Management (VSM) as a concept applicable to IT signals a change for traditional enterprises in a tech-driven world. Finally, organizations have a digital practice available that is focused on the optimization of business value.

    By combining the people, processes, and technologies that map, optimize, visualize and control how value flows across software delivery pipeline, these organizations now have an opportunity to level the digital playing field.

    At the same time, all this talk of value streams and Value Stream Mapping - also acronymized as VSM - is causing some confusion. While the two “VSMs” are different concepts, they are not mutually exclusive. In this webinar, Dominica DeGrandis answers questions on how they complement one another, what they are and what they can do.
  • Customer-proven Source Code Management Migration Process to Compuware ISPW
    Customer-proven Source Code Management Migration Process to Compuware ISPW
    Francois Dansereau, Director of Migration Services Team Mar 26 2019 5:00 pm UTC 39 mins
    Have you been reluctant to change your Source Code Management (SCM) system because it’s too risky? For Compuware ISPW customers, our migration process helped them switch and they found the grass to be greener on the other side. In this webcast, you’ll hear their stories. We know migrating away from an entrenched mainframe SCM system is daunting. Our customers have massive amounts of code in their SCM systems and numerous active development projects that cannot be disrupted. They also lack both in-house expertise in SCM migration and headcount to spare for large migration projects.

    Leveraging 24+ years of experience, our team of experts in SCM migration, with their proven methodology and state of-the-art migration tools, seamlessly migrate customers to ISPW.The Compuware ISPW SCM Migration Service is a customized solution for organizations migrating from CA Endevor, CA Panvalet, CA Librarian, Micro Focus/Serena ChangeMan, IBM RTC as well as homegrown systems to ISPW SCM. This service is designed to quickly and economically take you through all the steps of your migration—from project planning, data migration and integration to testing and knowledge transfer. Our methodology and infrastructure provide a single, lighter, more robust and agile SCM environment.

    This proven SCM migration practice: Accurately finds and documents codebase characteristics including histories and inter-application dependencies, so they can be fully preserved in the new environment

    •Manages migration in targeted, rightsized stages to accelerate time-to-benefit and limit exposure to risk
    •Rigorously tests code artifacts in the customer’s new SCM environment and brings them to a near-live state in parallel to the old environment to ensure zero disruption of development work
    •Improves code structure and reduces code complexity due to reorganizing the code base during the migration
    •Involves an end-to-end methodology addressing all critical dimensions of the migration project
  • 7 Key Elements of an Enterprise AI Strategy
    7 Key Elements of an Enterprise AI Strategy
    Guest speaker Mike Gualtieri, Forrester Research and Ingrid Burton, H2O.ai Mar 26 2019 6:00 pm UTC 60 mins
    Artificial Intelligence (AI) is influencing every industry and decision makers are being asked: What is your AI Strategy for 2019? Most have begun thinking about how AI can be incorporated into their business strategy but the exponential growth of AI resources and offerings is making it difficult to find the right fit for one's organization. What is needed is a practical approach to AI that filters out the signal-to-noise ratio when deciding on an enterprise AI strategy. In this webinar, guest speaker and Forrester Research Vice President & Principal Analyst, Mike Gualtieri, maps out the seven key elements of an enterprise AI strategy.
  • Mastering the API life cycle in an agile world
    Mastering the API life cycle in an agile world
    Nicolas Masse, Technical Marketing Manager for API management, Red Hat. David Codelli Product Marketing Manager, Red Hat Mar 26 2019 6:00 pm UTC 36 mins
    Investment in application programming interface (API) management software increased by an average of 44% from 2012 to 2017, according to IDC.1 This growth reflects the tremendous importance of APIs to today’s businesses. While opening up digital assets promises new opportunities, companies must develop new processes to ensure that APIs are built efficiently and securely.

    This session will cover Red Hat’s approach for API development. We’ll discuss how to:

    - Use mocking to speed up and break dependencies.
    - Use a contract-first approach for defining tests that will harden your implementation.
    - Protect exposed APIs through a management gateway.
    - Manage deliveries using a continuous integration/continuous delivery (CI/CD) pipeline.
  • Got a Hungry Splunk? Feed it Smartly with syslog-ng
    Got a Hungry Splunk? Feed it Smartly with syslog-ng
    James Bonamico, Senior Engineer (syslog-ng product specialist) Mar 27 2019 10:00 am UTC 32 mins
    We can help eliminate your struggle to reliably collect and send your log data to Splunk.

    Register for our free webinar to learn how you can easily manage and scale log ingestion across your whole enterprise environment.

    In this webinar we will demonstrate:
    •syslog-ng Premium Edition’s high-performance Splunk HTTP Event Collector (HEC) destination
    •How to batch and send messages to multiple Splunk HEC nodes
    •How to eliminate the need for forwarders and external load balancers
  • Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Priya Shivakumar, Director of Product, Confluent + Ryan Lippert, Product Marketing, Google Cloud Mar 27 2019 10:00 am UTC 56 mins
    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka® service, to migrate to Google Cloud Platform. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    Register now to learn:
    -How to take the first step in migrating to GCP
    -How to reliably sync your on premises applications using a persistent bridge to cloud
    -How Confluent Cloud can make this daunting task simple, reliable and performant
  • How Micro Focus PlateSpin Strengthens Operational Agility
    How Micro Focus PlateSpin Strengthens Operational Agility
    Alain Salesse, Senior Solutions Architect, Micro Focus Mar 27 2019 11:00 am UTC 60 mins
    Your IT run budget is shrinking and you need a more agile way to deliver application services to the business. You could move to software-as-a-service. You could redesign your apps to leverage container or platform-as-a-service technologies. Or, you could opt for the fastest, least risky transformation option of all—re-hosting.

    This webinar is all about re-hosting. More specifically, it’s all about the Micro Focus PlateSpin re-hosting solution and what it can do for you. Here’s what you can look forward to learning:

    • How PlateSpin stands apart from other re-hosting approaches, including data centre consolidation, (re)virtualisation, the adoption of or switching between managed service providers, and the adoption of public or private cloud services.

    • How PlateSpin re-hosts entire server workloads between physical, virtual, and cloud platforms with minimal risk, downtime, and effort.

    • How PlateSpin helps enterprises and service providers deliver large-scale transformation projects on time and within budget.
  • Outpace Your Rivals with an Insights-driven Culture
    Outpace Your Rivals with an Insights-driven Culture
    Boris Evelson, VP - Principal Analyst at Forrester & Andrew Yeung, Sr Dir PMM Mar 27 2019 5:00 pm UTC 60 mins
    The pace of innovation in analytics has hit breakneck speed. Technologies like AI, natural language processing, and voice-driven analytics make it easy for insights-driven businesses to harness insights from data to operate smarter and faster in a fast-moving competitive environment. Turning these data-driven insights into action fuel an organization’s intelligence to improve customer experience, streamline operations and drive growth. And the payoff is immense. According to Forrester Research, insights-driven businesses grow on average 30% year-over-year, seven to ten times faster than the global economy1.

    Join ThoughtSpot and guest speaker, Forrester Research VP and Principal Analyst Boris Evelson to learn how to transform your organization into an insights-driven business by letting business users uncover actionable insights in a whole new way using search and AI.
  • Securing the Istio Service Mesh: Twistlock Compliance Checks
    Securing the Istio Service Mesh: Twistlock Compliance Checks
    Neil Carpenter, Principal Solution Architect and Sonya Koptyev, Director of Product Marketing and Evangelism Mar 27 2019 5:00 pm UTC 60 mins
    Service meshes are one of the newest innovations in the world of microservices and cloud-native computing. They’re a critical tool for making microservices applications feasible to implement and manage.

    At the same time, however, service meshes — like all components of the software stack — must be properly secured. Without sufficient security oversight, service meshes run the risk of becoming a vector for attack into software infrastructure, as well as a compliance liability.

    Register now to learn more about:

    •How service meshes work and which security considerations apply to them
    •Why Twistlock identified Istio compliance checks as an important gap to address for the cloud native community
    •The official Twistlock compliance checks for Istio, including proper configurations, risk severity, major threats, and countermeasures