Hi [[ session.user.profile.firstName ]]

Application Management

  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Cloud-Native Operations with Kubernetes and CI/CD
    Cloud-Native Operations with Kubernetes and CI/CD
    Paul Czarkowski, Principal Technologist, Pivotal Software Recorded: Aug 15 2019 62 mins
    Operations practices have historically lagged behind development. Agile and Extreme Programming have become common practice for development teams. In the last decade, the DevOps and SRE movements have brought these concepts to operations, borrowing heavily from Lean principles such as Kanban and Value Stream Mapping. So, how does all of this play out if we’re using Kubernetes?

    In this class, Paul Czarkowski, Principal Technologist at Pivotal, will explain how Kubernetes enables a new cloud-native way of operating software. Attend to learn:

    ● what cloud-native operations are;
    ● how to build a cloud-native CI/CD stack; and
    ● how to deploy and upgrade an application from source to production on Kubernetes.

    We look forward to you joining us.
  • Building a connected service experience with Salesforce Service Cloud
    Building a connected service experience with Salesforce Service Cloud
    Esther Chen, Product Marketing Manager, MuleSoft & Jimil Patel, Technical Product Marketing Manager, MuleSoft Recorded: Aug 15 2019 38 mins
    Salesforce Service Cloud to systems like ERP, OMS, and databases to give agents a single view of customers and orders. Rather than switching between different systems, agents can instead focus on delivering superior service. Together, MuleSoft and Salesforce increase agent productivity by 25% by automating workflows and service actions and improve customer satisfaction by 35% with personalization throughout the service experience.

    Watch this webinar to:
    * See a live MuleSoft Flow designer demo with Salesforce Service Cloud to create a holistic view of your customer.
    * Learn how customers are transforming their service experience using MuleSoft to synchronize Service Cloud with other systems of record.
    * Get best practices to integrate Service Cloud with ERP, OMS, and third-party systems.
  • Make Your Data Dance – Qlik Virtual Forum Talkshow
    Make Your Data Dance – Qlik Virtual Forum Talkshow
    Robert Fleming, Qlik; Tom Pringle, Ovum; Thomas Barker, Humana; James Fisher, Qlik; Dan Potter, Attunity, a Division of Qlik Recorded: Aug 15 2019 38 mins
    Kicking off the June 2019 Virtual Forum with an expert analyst and customer guest, this year’s Qlik Virtual Forum Talk Show explores the future of data and analytics or as we refer to it, postmodern analytics. The session covers topics like the adoption of analytics, the new paradigm of data processing and management, and the role of data literacy.
  • Case Study: Real-World Applications of Business Process Automation & Management
    Case Study: Real-World Applications of Business Process Automation & Management
    Antonio Valle Gutierrez Global Head of BPM Architecture at BBVA Recorded: Aug 15 2019 28 mins
    Business processes touch every aspect of the way an organization runs. Therefore, business process automation cannot be an isolated environment. BPM can be a compelling part of a larger strategy, where business leaders can create the rules to achieve new innovation and business objectives.

    At BBVA, we have created a new global process automation platform, building on new technological trends, which allows both our business teams and our developers to focus on the needs of our customers. This session will cover:

    • How we integrated business goals into our new BPM platform
    • How we transformed our process developers
    • How we used Red Hat Process Automation Manager to create a new cloud-based BPM platform
    • How we defined KPIs for processes optimization
    • Some of the challenges and lessons we learned over the course of the project
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • Why your Contact Center needs a Conversational AI Platform
    Why your Contact Center needs a Conversational AI Platform
    Pranav Deshpande, Product Marketing - AI/ML @ Twilio and Ricky Holtz, Sales Engineer Recorded: Aug 15 2019 53 mins
    Conversations powered by AI allow your contact center teams to deliver more of a personal and faster customer experience while improving operational efficiency. So why do 60% of customers try to skip IVRs to get to a human agent as soon as they can?
  • Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Alyssa Dver, CCO at American Confidence Institute Recorded: Aug 15 2019 62 mins
    This week Alyssa Dver joins us to discuss total BS; using brain science to debunk and transform the business of speaking.

    Join two of Boston’s best speakers as they candidly discuss why so many speakers fail -- and the real secrets to speaking success. Whether you’re a speaker or an event professional, learn a bit of brain science to give yourself, and your audience real, sustained confidence.

    Innovation Women founder Bobbie Carlton will act as both host and mythslayer while she interviews the refreshingly candid Alyssa Dver. After years as a CMO for several companies, Alyssa founded and now helms the American Confidence Institute and the ERG Leadership Alliance. She speaks professionally 8-10 times every month and has trained over 300,000 people how to use the science of confidence to pitch, coach and be kickass. As both pro speakers and event planners, Bobbie and Alyssa will share real secrets and science so you can have remarkable impact on your audience and your career. Seriously, no BS.
     
    Learn:
    -The benefits and challenges of being a part- or full-time pro speaker
    -How to use brain science to make speaking more fulfilling for you and your audience
    -Expert tips to optimize speaking revenue and/or career opportunities

    About Alyssa

    Alyssa Dver is Co-Founder and Chief Confidence Officer at the American Confidence Institute. Recognized as the world’s Chief Confidence Officer and one of Boston’s Best Speakers, Alyssa helps students and professionals use brain science to inspire confidence in themselves and to anyone they pitch, coach, or care about. Alyssa is the co-founder of the American Confidence Institute which conducts and collects research that is then shared through keynotes, workshops, online and certification programs. Clients include Spotify, Wayfair, Pepsi, The US Air Force, State Street, Staples, The Royal Bank of Canada, plus dozens of other confidence-committed organizations, conferences, and associations. 
  • How to Automate and Streamline your Telecom Business with Intelligent Automation
    How to Automate and Streamline your Telecom Business with Intelligent Automation
    Heidi Hattendorf - Global Telecoms Leader at Automation Anywhere Recorded: Aug 15 2019 34 mins
    Gartner estimates that by 2021 over 90% of medium & large enterprises will have adopted Robotics Process Automation (RPA). As a constantly evolving industry, telecom operators cannot miss out.

    Join Heidi Hattendorf, Global Telecom Leader at Automation Anywhere, for this overview of Robotics Process Automation (RPA) & Intelligent Automation for Telecom.

    3 Key takeaways:
    1) Learn why intelligent automation is so effective and how you can apply it quickly to increase productivity and simplify your processes.
    2) Explore Telecom specific use cases, opportunities and ROI
    3) Find out about customer examples and success stories

    Learn why intelligent automation is so effective and how you can apply it quickly to your business to increase productivity and simplify your processes. We will look at how the technology can help you free your employees up from mundane repetitive tasks, allowing you to focus on your business in Telecom whether preparing for 5G, looking at new customer connections, leveraging content or enabling your team to focus on more strategic work with greater business impact.

    The webinar will also highlight the top Use Cases in Telecom with specifics on results achieved, how it can help you across the Enterprise and reference examples.

    This is part of a Series on Intelligent Automation for Telecom. Watch for future sessions on Building a Center of Excellence and a deeper dive on the most popular Use Cases/applications coming soon.
  • Getting started with Cisco SD-WAN Ansible Pipeline
    Getting started with Cisco SD-WAN Ansible Pipeline
    Stuart Clark, Developer Advocate, Cisco DevNet Recorded: Aug 15 2019 33 mins
    Learn how to apply modern agile methods and tools to the deployment of Cisco SD-WAN topologies. Take a step towards NetDevOps by using Ansible and VIRL to build test environments, create infrastructure-as-code, and automate Day 0, Day 1 and Day 2 configurations.
  • Building in the Cloud with AWS: Make the Move, Not the Mistakes
    Building in the Cloud with AWS: Make the Move, Not the Mistakes
    Scott Weber, EagleDream AWS APN Ambassador and Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 15 2019 59 mins
    Strategic use of the cloud is a must for today's modern businesses. But building a scalable, cost-effective, and profitable infrastructure with today’s leading cloud provider, Amazon Web Services (AWS), requires expertise.

    Join CloudCheckr, the #1 independent cloud management platform (CMP), and EagleDream, an APN Advanced Consulting Partner, for a free webinar. Expert and AWS APN Ambassador Scott Weber discuss how EagleDream builds secure, agile, and efficient AWS environments for enterprises. And CloudCheckr Product Marketing Manager, Todd Bernhard, covers cloud optimisation strategies and the future of enterprise cloud.
  • Serverless or Serverfull with Kubernetes
    Serverless or Serverfull with Kubernetes
    Burr Sutter, Director of Developer Experience, Red Hat Recorded: Aug 14 2019 53 mins
    Serverless is a misnomer; your future cloud native applications will consist of both microservces and functions, often wrapped as Linux containers, but in many cases where you the developer ignore the operational aspects of managing that infrastructure. In this session, we will dive into the capabilities of a Function-as-a-Service Platform for Kubernetes/OpenShift. The Microservices evolution was relatively easy, the programming model was nearly identical to the previous generation of Java EE. Today, Functions represent a new programming model for your next generation Java business applications. This will be a demo intensive session.

    About the Speaker:
    A lifelong developer advocate, community organizer, and technology evangelist, Burr Sutter is a featured speaker at technology events around the globe—from Bangalore to Brussels and Berlin to Beijing (and most parts in between). A Java Champion since 2005, Burr founded the DevNexus conference—now the second largest Java event in the U.S.—with the aim of making access to the world’s leading developers affordable to the developer community.
  • Bridging the Gap between Data Management and DevOps
    Bridging the Gap between Data Management and DevOps
    Adam Bowen - Delphix, Robert Reeves - Datical, John Pocknell - Quest Software Recorded: Aug 14 2019 64 mins
    DevOps continues to transform the way companies build and deploy applications through agile methodologies, better communication and collaboration, faster feedback loops and greater automation. However, even the best DevOps initiatives can fall victim to data bottlenecks, from challenges provisioning data quickly and easily, to synchronizing application and database changes and, in some cases, a serious lack of cooperation between developers and database administrators. The speed and flexibility requirements of DevOps and modern applications can be difficult to achieve in the world of data management with rigid schemas, manual processes and data silos providing obstacles.



    To educate IT decision makers and practitioners about the key technologies and strategies for bridging the gap between data management and DevOps, Database Trends and Applications is hosting a special roundtable webinar.
  • SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
    SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
    Jeffrey Needham, Confluent Recorded: Aug 14 2019 36 mins
    Of all security breaches, 85% are conducted with compromised credentials, often at the administration level or higher. A lot of IT groups think “security” means authentication, authorization and encryption (AAE), but these are often tick-boxes that rarely stop breaches. The internal threat surfaces of data streams or disk drives in a raidset in a data center are not the threat surface of interest.

    Cyber or Threat organizations must conduct internal investigations of IT, subcontractors and supply chains without implicating the innocent. Therefore, they are organizationally air-gapped from IT. Some surveys indicate up to 10% of IT is under investigation at any given time.

    Deploying a signal processing platform, such as Confluent Platform, allows organizations to evaluate data as soon as it becomes available enabling them to assess and mitigate risk before it arises. In Cyber or Threat Intelligence, events can be considered signals, and when analysts are hunting for threat actors, these don't appear as a single needle in a haystack, but as a series of needles. In this paradigm, streams of signals aggregate into signatures. This session shows how various sub-systems in Apache Kafka can be used to aggregate, integrate and attribute these signals into signatures of interest.

    Watch now to learn:
    -The current threat landscape
    -The difference between Security and Threat Intelligence
    -The value of Confluent Platform as an ideal complement to hardware endpoint detection systems and batch-based SIEM warehouses
  • How to Make a Recipe with H2O Driverless AI
    How to Make a Recipe with H2O Driverless AI
    Michelle Tanco, H2O.ai Recorded: Aug 14 2019 60 mins
    *** Please be aware that the content presented in this webinar will be technical and "code heavy." ***

    H2O Driverless AI employs the techniques of expert data scientists in an easy to use application that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months.

    We're excited to add the ability for users, partners and customers to extend the platform with Bring-Your-Own-Recipe. Domain experts and advanced data scientists can now write their own recipes (Python snippets) and seamlessly extend Driverless AI with their favorite tools from the rich ecosystem of open-source data science and machine learning libraries. In this webinar we'll demonstrate how make a recipe with Driverless AI.

    Michelle's bio:
    Michelle is a Customer Solutions Engineer & Data Scientist for H2O.ai. Prior to H2O she worked as a Senior Data Science Consultant for Teradata, focused on leading analytics projects to solve cross-industry business problems.

    Her background is in pure math and computer science and she is passionate about applying these skills to answer real world questions. When not coding or thinking of analytics, Michelle can be found hanging out with her dog or playing ukulele.
  • Open Source Testing – The Good, The Bad, The Ugly
    Open Source Testing – The Good, The Bad, The Ugly
    Elise Carmichael, Enterprise Evangelist, Tricentis Recorded: Aug 14 2019 33 mins
    At some point we all commit to automating some of the riskiest use cases because, let’s be honest, something bad happened in production. But how do you proceed? Do you standardize your projects and teams on a single framework or framework style such as BDD? Do you let each team do what they think is best? How will you maintain this new behemoth that you’re about to create? Learn how to answer these and other critical “getting started” questions — as well as track the KPIs vital for demonstrating the ROI on your automation investment.
  • Interview by Chuck Harold from Security Guy TV on Awake Security
    Interview by Chuck Harold from Security Guy TV on Awake Security
    Chuck Harold, Security Guy TV & Rudolph Araujo, VP, Awake Security Recorded: Aug 14 2019 9 mins
    The average customer only knows of about 30-40% of what’s on their network – but we aim to change that.

    In this on-demand live stream from Black Hat USA, Awake’s Rudolph Araujo, VP Marketing, chats with Security Guy TV’s Chuck Harold about the need for NTA solutions like Awake. Don’t miss out!
  • Front Matter: Next Level Front End Deployment on OpenShift
    Front Matter: Next Level Front End Deployment on OpenShift
    Lance Ball, Principal Software Engineer, Red Hat Recorded: Aug 14 2019 36 mins
    Applications aren’t just the back end anymore. Sure, your team may be great at building microservices, utilizing message queues, handling transactions, and utilizing CI/CD. But there is almost always a web based front end between the user and the server doing plenty of work of its own, whether that's in React, Angular or just plain HTML/CSS/JavaScript. In the brave new world of Kubernetes and containerized deployments, how does the front end best fit into the mix? Are you used to just copying your files up to the web server and forgetting about it? Well, that’s not going to cut it these days.. In this session, I will show you tips, tricks, and best practices for building and deploying your front-end applications on Red Hat’s OpenShift 4 Kubernetes platform.

    About the Speaker:
    Lance is a principal software engineer at Red Hat, leading the Node.js engineering efforts within Red Hat Middleware. He is an active open source contributor, an author of several NPM modules, and a core committer for the Node.js project. In addition to Node.js, you'll find his contributions in many other well-known open source projects, including: Wildfly Swarm, Vert.x, and Torquebox.
  • End-to-End Vulnerability and Risk Management Across the Enterprise
    End-to-End Vulnerability and Risk Management Across the Enterprise
    Brian McGraw, Global Head of Advisory Services, CyberProof, a UST Company; John Steven, CTO, ZeroNorth Recorded: Aug 14 2019 44 mins
    Digital transformation is redefining organizations in all industries into software-centric businesses. Assessing, planning and implementing vulnerability management across your organization is therefore crucial. In this webinar, CyberProof, a UST Global company, and ZeroNorth will share details on the companies’ integrated solution and discuss how customers are benefitting from end-to-end vulnerability & risk management across the enterprise.
  • Extend Existing Investments in Microservices to Leverage AI & Machine Learning
    Extend Existing Investments in Microservices to Leverage AI & Machine Learning
    Joe Dickman, SVP Technology Strategy, Vizuri Recorded: Aug 14 2019 49 mins
    Join us for this webinar as we learn about microservices, using AI to our benefit, machine learning and more.

    About the speaker:
    As the founder and head of Vizuri, Joe is responsible for its overall strategic direction. Through a hands-on approach, he offers customers more than thirty years of experience as a technical architect, developer, and business leader. Joe specializes in helping executives to solve complex business problems by mapping their business processes and adopting new technologies when appropriate. He proudly works with visionary leaders in multiple industries to help them understand how to improve their business agility. Through this experience, he has become a prominent speaker on open-source technologies, and he has helped to shape industry practices in business rules.
  • Learn how to massively scale your multiplayer game
    Learn how to massively scale your multiplayer game
    Madhukar Kumar, VP Technical & Product Marketing, Redis Labs, Alissa McAloon, News Editor & Associate Publisher, Gamasutra Recorded: Aug 14 2019 38 mins
    Tackling distributed computations and rapidly building accurate and readable leaderboards into multiplayer games is critical for game developers in this space, and it’s a process that can benefit from expert insight into the specific data structures (like sorted sets and hashes) and resources that are incredibly proficient at delivering vital scoring and ranking functionality.

    When it comes to massively scaling multiplayer games, there are unique sets of obstacles to address on that front, and Redis Labs - an open source, in-memory data structure store - is hosting a free webinar to help developers overcome those barriers in their own multiplayer projects.

    User experience is the heart of the game industry. Creating unique and dynamic experiences is crucial for companies to drive both customer acquisition and retention.

    Join this free webinar to learn how to use Redis’ easy to use tools in order to:

    - Accelerate analysis across a variety of data sets and data types
    - Attain consistency and durability of high-speed transactions
    - Auto-scale with multiple cloud providers
    - Keep costs down with a significantly-reduced deployment footprint
  • The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    John Spooner, H2O.ai and John Howe, H2O.ai Aug 19 2019 10:00 am UTC 60 mins
    Due to popular demand, we are presenting this webinar at a UK-friendly time!

    This discussion will explore real-world examples and how to democratize AI in your organization.

    1. Build a Data science culture
    2. Ask the right questions
    3. Connect to the community
    4. Technology considerations
    5. Trust in AI
  • [PANEL] Beyond Perimeter-Based Security
    [PANEL] Beyond Perimeter-Based Security
    Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7) Aug 19 2019 3:00 pm UTC 60 mins
    For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

    Join this exclusive panel of industry experts as they discuss:
    • Where traditional perimeter-based security models fall short
    • Notable cyber attack methods and how to protect against them
    • Strategies for improved network security and how to implement them

    Speakers:
    - Jo Peterson, VP Cloud Services, Clarify360 (moderator)
    - Tina Gravel, SVP Global Channels, Cyxtera
    - Adrian Taylor, CTO, ITC Secure
    - Josh Frantz, Lead Security Consultant, Rapid7
  • Platform of the Future - Network as a Sensor (Part 4)
    Platform of the Future - Network as a Sensor (Part 4)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 20 2019 1:00 am UTC 28 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Aug 20 2019 4:30 am UTC 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • Three Secrets to SD-WAN Success
    Three Secrets to SD-WAN Success
    Dan Shelton, Director Product Management at Zscaler Aug 20 2019 7:00 am UTC 39 mins
    Will 2019 be the year of SD-WAN?
    With more than 60% of branch traffic bound for the internet, organisations are turning to SD-WAN to provide intelligent routing and to directly, quickly, and securely connect branch users to the internet and the cloud applications they need to do their jobs.

    But, navigating the journey to secure SD-WAN can present challenges. How do you prepare for your SD-WAN deployment and ensure you can achieve your intended outcomes? Join this webinar to learn from a real-world example:

    - What is driving SD-WAN and the core issues impeding deployments
    - How to get the most out of your SD-WAN deployment
    - Why it is critical to address security before you begin your SD-WAN journey

    About the Speaker:
    Dan Shelton is an IT Executive and Change Agent with over 20 years experience in managing large multi-faceted global IT organisations. Prior to joining Zscaler, Dan served as the Senior Director for Global Networks & Telecom at Kelly Services where he led a large-scale, multi-phased Digital Transformation Program that leveraged several cloud-based infrastructure and security services to positively impact business operations across 900 locations in 22 countries.
  • The machine says….I don't know where I got that number from
    The machine says….I don't know where I got that number from
    Gary Richardson, MD, Emerging Technology, 6point6 Aug 20 2019 12:00 pm UTC 60 mins
    How data lineage is more important than ever in the drive towards AI-driven analytics:

    Historically Business Intelligence and Analytics has been providing businesses with the insights into how their businesses are operating and what trends are emerging. If a number looked funny an eagled eyed executive could take action and reset the machine, in the world of AI-driven analytics these days are drawing to an end as we increase the ability of machines to take action. The result is data lineage and governance in the age of AI-driven analytics is more important than ever.

    Speaker:
    Gary Richardson, MD, Emerging Technology, 6point6
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Aug 20 2019 2:00 pm UTC 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Introducing Events and Stream Processing into Nationwide Building Society.
    Introducing Events and Stream Processing into Nationwide Building Society.
    Rob Jackson, Head of Application Architecture at Nationwide Building Society Aug 20 2019 2:00 pm UTC 49 mins
    Open Banking regulations compel the UK’s largest banks, and building societies to enable their customers to share personal information with other regulated companies securely. As a result companies such as Nationwide Building Society are re-architecting their processes and infrastructure around customer needs to reduce the risk of losing relevance and the ability to innovate.

    In this online talk, you will learn why, when facing Open Banking regulation and rapidly increasing transaction volumes, Nationwide decided to take load off their back-end systems through real-time streaming of data changes into Apache Kafka®. You will hear how Nationwide started their journey with Apache Kafka®, beginning with the initial use case of creating a real-time data cache using Change Data Capture, Confluent Platform and Microservices. Rob Jackson, Head of Application Architecture, will also cover how Confluent enabled Nationwide to build the stream processing backbone that is being used to re-engineer the entire banking experience including online banking, payment processing and mortgage applications.
  • Innovation Financial Data Strategies for SAP S/4HANA Finance
    Innovation Financial Data Strategies for SAP S/4HANA Finance
    Susan Nee, Sr. Value Engineer at Syniti Aug 20 2019 3:00 pm UTC 60 mins
    Finance leaders struggle to gather required information due to the diverse and varying systems where financial data is stored. They need a solution to gather, analyze and act upon both the diverse sources and the centralized solution to make informed and timely financial business decisions. As a result, these leaders are moving towards SAP Central Finance and Syniti to bring central finance to reality. Hear how Syniti has used its solutions, experience, and best practices with customers to successfully complete their journey to SAP Central Finance.
  • Driving Increased Productivity with Your Vulnerability Management Program
    Driving Increased Productivity with Your Vulnerability Management Program
    Tori Sitcawich, Product Marketing Manager, Rapid7 Aug 20 2019 4:00 pm UTC 60 mins
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Transformation towards digital and automated ordering process
    Transformation towards digital and automated ordering process
    Katherine Gilbert-O'Neil, Anand Sagar- Wipro | Neil Becker, Lokesh Verma- Apttus Aug 20 2019 4:30 pm UTC 75 mins
    Wipro and Apttus on Cognitive Commerce & CPQ
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Aug 20 2019 5:00 pm UTC 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • Security Tool Misconfiguration and Abuse
    Security Tool Misconfiguration and Abuse
    Thomas Richards, Network and Red Team Practice Director Aug 20 2019 5:00 pm UTC 40 mins
    As any security program matures, it will use tools and techniques to automate processes to improve the security posture of the organization. This includes asset management and discovery, patch management, deploying software, and vulnerability discovery. However, if these tools are improperly configured, they can lead to a total compromise of your network by an attacker. In this talk we will go over a few case studies of abusing these tools while on penetration tests as well as remediation methods to prevent these attacks from occurring.
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Aug 20 2019 5:00 pm UTC 60 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Sameer Parulkar, Senior Product Marketing Manager, Red Hat Sameer Parulkar is a Senior Product Marketing Manager for Red Hat Aug 20 2019 6:00 pm UTC 57 mins
    The need for competitive advantage has driven organizations towards cloud computing, agile programming, and the move toward DevOps unification; and, it’s forced the modernization of IT architecture using innovative technologies such as containers, microservices, and artificial intelligence.

    But unintended consequences now burden organizations with disaggregated IT infrastructure composed of redundant data centers, multi-clouds, managed services, edge computing, devices, and things. To cope, business and IT leaders must conceptualize new agile means to integrate workloads across highly distributed and disparate hybrid multi-cloud architecture.

    During this webcast we discuss:
    - the fundamental elements of strategic analysis and techniques needed to create new competitive advantage
    - how to identify the essential technologies needed for the modern digital business
    - how next-generation hybrid integration platforms can support strategic and transformative initiatives
    - how some customers have embarked on this journey and their learnings
    - the strategy and practices needed to enable and deploy agile integration in the hybrid multi-cloud era
  • Protecting your Portal from File-based Malware
    Protecting your Portal from File-based Malware
    John Stevenson Aug 21 2019 10:00 am UTC 45 mins
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Aug 21 2019 11:00 am UTC 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Aug 21 2019 12:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Aug 21 2019 4:00 pm UTC 60 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Aug 21 2019 4:00 pm UTC 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Aug 21 2019 4:00 pm UTC 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Aug 21 2019 5:00 pm UTC 60 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Aug 21 2019 5:00 pm UTC 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Aug 21 2019 5:00 pm UTC 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA