Join thousands of engaged IT professionals in the application management community on BrightTALK. Interact with your peers in relevant webinars and videos on the latest trends and best practices for application lifecycle management, application performance management and application development.
Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, CitrixRecorded: Jan 17 201948 mins
Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.
Discover how Citrix Workspace:
• Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
• Extends the perimeter into cloud apps and across multiple devices and networks
• Automates image management and provisioning to move workloads from datacenters to any cloud
• Enables choices of devices from a single endpoint management solution
• Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
• Improves the experience of mobile apps with secure email integrated with Slack
Nick Dearden, Confluent + John Thuma, Arcadia Data, Thomas Clarke, RCG Global ServicesRecorded: Jan 16 201956 mins
Digital transformation is more than just a buzzword, it’s become a necessity in order to compete in the modern era. At the heart of digital transformation is real-time data. Your organization must respond in real time to every customer experience transaction, sale, and market movement in order to stay competitive.
Streaming data technologies like Apache Kafka® and Confluent KSQL, the streaming SQL engine for Apache Kafka, are being used to detect and react to events as they occur. Combining this technology with the analytics insights from RCG and visualizations from Arcadia Data delivers a powerful foundation for driving real time business decisions. Use cases span across industries and include retail transaction cost analysis, automotive maintenance and loyalty program management, and credit card fraud detection.
Join experts from Confluent, RCG and Arcadia Data for a discussion and demo on how companies are integrating streaming data technologies to transform their business.
Watch now to learn:
-Why Apache Kafka is widely used for real-time event monitoring and decisioning
-How to integrate real-time analytics and visualizations to drive business processes
-How KSQL, streaming SQL for Kafka, can easily transform and filter streams of data in real time
Troy Kent, Threat Researcher, Awake SecurityRecorded: Jan 16 201934 mins
Everyone talks about alert fatigue and the unfortunate reality of overworked and undertrained analysts. What happens though when attackers start to focus on that reality as a point of failure? In this webinar, we will discuss how trivial this can be for an attacker. Using minimal time and open source tools, we will fly under the radar by taking advantage of analyst biases and assumptions. We'll specifically explore how we can edit an open source miner to make it fileless, and then use it for command and control and to exfiltrate data. We will then show how artificial intelligence and advanced network traffic analysis tools detect threats such as these and enable you to respond decisively.
Key Learning Objectives include:
- Discuss the not-so-obvious challenges alert fatigue poses
- Illustrate with an example how attackers hide in plain sight
- See how AI can help the analyst find and then respond to these attackers
Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, GigamonRecorded: Jan 16 201958 mins
Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.
Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:
- Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
- Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
- Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks
Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
Red Hat Presenters: Lance Ball, Ram Maddali, Rafael Benevides - Hugh McKee, LightbendRecorded: Jan 16 2019244 mins
Join industry experts with in depth of knowledge of the latest microservices implementations. This event is created specifically for developers familiar with open source software or with an interest in the gradual adoption of microservices and the fundamental changes in application development. Hear about the techniques and tools that address the pain points and missteps encountered by early adopters of containers and microservices. At Red Hat’s 3rd annual Microservices Day Atlanta you will:
* Find out which DevOps strategies are required for success
* Learn how to handle data with CQRS
* Discover when, where, and how to fit in Serverless applications
* Review event driven and Reactive application design
* Hear from the experts about the best practices to create front ends for MSA applications
Agenda (all times in ET):
1:00 PM | Lightbend Presentation
2:00 PM | Front Matter: Next Level Front End Deployments on OpenShift
3:00 PM | Strategies, Techniques, and Toolkits for Testing Microservices
4:00 PM | Serverless or Serverfull: Microservices^Functions
Jonathon Wright, Vivit Advocacy Board Director and Malcolm Isaacs, Solutions Marketing, Micro FocusRecorded: Jan 16 201960 mins
The 2018-19 edition of the World Quality Report (WQR) discusses the trends shaping QA and testing today, and offers recommendations for addressing tomorrow’s challenges. In this webinar, we’ll present an overview of the WQR’s key findings, with a deep dive into the analysis of the responses from the Financial Services sector, which is going through a radical change in its approach to application development and quality.
Attend this webinar to learn:
• How end-user satisfaction is top priority for QA and testing
• Why an increase in digitalization is driving disruption in the Financial Services sector’s approach to application development and delivery
• How the emergence of new technologies in Financial Services such as blockchain, Internet of Things and Artificial Intelligence are reshaping how QA and testing is done
• Trends over the next two to three years that will combine automation, AI, and analytics to become a key differentiator for Financial Services organizations
Red Hat Presenters: Chris Van Tuin, Marius Bogoevici, Edson YanagaRecorded: Jan 16 2019193 mins
Join industry experts with in depth of knowledge of the latest microservices implementations. This event is created specifically for developers familiar with open source software or with an interest in the gradual adoption of microservices and the fundamental changes occurring in application development. Hear about the techniques and tools that address the pain points and missteps encountered by early adopters of containers and microservices. At Red Hat’s 3rd annual Microservices Day Atlanta you will:
* Find out which DevOps strategies are required for success
* Learn how to handle data with CQRS
* Discover when, where, and how to fit in Serverless applications
* Review event driven and Reactive application design
* Hear from the experts about the best practices to create front ends for MSA applications
Agenda (all times in ET):
9:15 AM | A DevOps State of Mind: Managing Microservices + Databases with Kubernetes
10:15 AM | Event Driven Microservices with Kafka, Kubernetes, and Camel
11:15 AM | Microservices Data Patterns: CQRS and Event Sourcing with Kafka and Eclipse Vert.x
Bill Hansey, George RubioRecorded: Jan 15 201958 mins
Part two will help you deliver an IT service experience everyone loves. Topics include:
How to deliver a consumer-like employee experience through a self-service portal
Providing a modern experience with personalized mobile apps, self service portals, and contextual collaboration
Using machine learning and AI-powered chatbots to automate common requests, making work easier and more efficient
Bryan J Smith, Sr. Cloud Architect, ORock & Matt Plummer, Sr. VP of Cloud Architecture, ORockRecorded: Jan 15 201936 mins
Migrating legacy applications and sensitive data (such as personally identifiable information (PII)) to the cloud introduces challenges that many government agencies may be unable to overcome. Challenges include lack of financial resources or internal expertise for application modernization and concerns over data security, network performance, and compliance.As a result, many agencies continue to host and process their most sensitive data and workloads on-premise or in private clouds despite growing pressure to modernize and reduce costs.
In this webinar, we’ll discuss a Red Hat solution that lets you move and host your legacy government off-the-shelf (GOTS) or commercial-off-the-shelf (COTS) applications in a FedRAMP moderate cloud while keeping your most sensitive data on-premise. This on-premise to cloud solution helps you satisfy compliance requirements while improving performance, security, and total cost of ownership.
Attend this webinar to hear more about how you can:
- Process workloads and backups in a Red Hat open source cloud.
- Keep your most sensitive data on-premise.
- Move legacy applications to a private Infrastructure-as-a-Service (IaaS) with limited-to-no refactoring.
- Transport data securely over a public internet connection without a virtual private network (VPN) connection.
- Satisfy FedRAMP, Health Insurance Portability and Accountability Act (HIPAA), Health - Information Technology for Economic and Clinical Health (HITECH) Act, and other compliance requirements for data protection.
- Prevent dedicated denial of service (DDoS) and man-in-the-middle (MITM) attacks.
Raghu Kulkarni, SNIA PM & NVDIMM SIG member and Alex McDonald, SNIA SSSI Co-ChairRecorded: Jan 15 201960 mins
Kick off the new year with a new SNIA Persistent Memory and NVDIMM Special Interest Group webcast on how applications can take advantage of Persistent Memory today with NVDIMM - the go-to Persistent Memory technology for boosting performance for next generation storage platforms. NVDIMM standards have paved the way to simple, plug-n-play solutions. If you're a developer or integrator who hasn't yet realized the benefits of NVDIMMs in your products, you will want to attend to learn about NVDIMM functionality, applications, and benefits. You'll come away with an understanding of how NVDIMMs fit into the persistent memory landscape.
Dan Gallo, Sr. Solutions Architect at SenchaRecorded: Jan 15 201960 mins
This webinar will showcase the benefits of incorporating automated testing into your application development process and we’ll demonstrate how you can test your Ext JS apps using Sencha Test. We’ll show you how to generate stable locators for components, leverage the Future APIs to more easily reference and interact with those components, and structure your tests using Jasmine.
If you are a new or existing user, we’ll cover various examples and tips that will help you to gain a greater insight into the use of Sencha Test for testing your own applications.
John Withers, Product Manager Jimil Patel, Product Marketing Manager, and Manan Sangvi, Solution ConsultantRecorded: Jan 15 201950 mins
Well-designed APIs, created along with a holistic integration strategy with Anypoint Platform, create a seamless omnichannel experience that customers want and businesses need. To deliver a reliable and unified experience more quickly, companies must adopt a new approach that involves an omnichannel architecture.
Across industries from healthcare to banking to retail, MuleSoft is powering omnichannel strategies that result in faster time to market, improved customer satisfaction, and increased revenue.
Watch this webinar, including a demo, to learn how to:
- Take an API-led approach to omnichannel that enables companies to deliver a unified experience 5x faster
- Leverage Anypoint Exchange to enable consistency by design through the reuse of integration assets across channels, translating to a consistent experience for your customers
- Prepare for the future (and future channels) with support for different deployment models with a single, unified platform
Typical anti-money laundering process can be complicated, difficult, lengthy, highly manual, and prone to false positives. The data required for AML investigations is often complex, highly connected, and can come from multiple data sources within an organisation as well as from external providers.
Learn how to use Neo4j and the power of connected data along with graph analytics techniques to improve anti-money laundering investigations and compliance. We’ll demonstrate how Neo4j enables faster and more accurate AML investigations, even across diverse and siloed data landscapes.
Christopher Liljenstolpe, Chief Technical Officer, Solutions at TigeraRecorded: Jan 11 201938 mins
The networking infrastructure within a Kubernetes cluster is usually
private, or at least internally oriented. So what do you want to do
when you need to expose your application or services to the public?
What are your options for connecting to resources outside of your
cluster? In this webinar we'll discuss:
* Address cluster endpoints from the outside world
* Communicate from within the cluster to external resources
* Load balance services
Andrei Bezdedeanu, VP of Engineering, CYBRICRecorded: Jan 10 201931 mins
Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. The challenges associated with adoption can be mitigated by empowering developers with the appropriate security tools and processes, automation and orchestration.
In this video, Andrei Bezdedeanu, CYBRIC VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits, including the delivery of more secure applications, lower cost of managing your security posture and full visibility into application and enterprise risks. He will also review the challenges, enablers and benefits to DevOps and DevSecOps and review key concepts such as DevOps vs SecOps and automation and orchestration.
You will learn:
• How to seamlessly automate and orchestrate security across the entire SDLC.
• The foundation of DevSecOps, and the application development and deployment processes.
• How to remove the cultural differences between DevOps and SecOps teams to make way for collaboration.
Rohit Kelapure, Pivotal, Joel Thimsen, Perficient & Jeff Kelly, Pivotal (Host)Recorded: Jan 10 201963 mins
Your current middleware platform is costing you more than you think. It wasn't designed to support high-velocity software releases and frequent iteration of applications—prerequisites for success in today’s world. A new, modern approach to middleware is needed that enables both developer productivity and operational efficiency.
Join Pivotal’s Rohit Kelapure and Perficient’s Joel Thimsen as they discuss:
- The limitations of traditional middleware
- The benefits of middleware modernization
- Your options for modernization, including a cloud-native platform
- Tips for overcoming some common challenges
Chintan Udeshi, Security Product Marketing, Infoblox; Brandon Dunlap, ModeratorRecorded: Jan 10 201954 mins
Most organizations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)2 on January 10, 2019 at 1:00PM Eastern for an examination of how Infoblox and Fortinet have joined together to assist organizations in improving their security operations and reducing time to containment.
Lucy Kerner, Security Global Technical Evangelist and Strategist, Red HatRecorded: Jan 10 201932 mins
In a hybrid infrastructure consisting of physical, virtual, cloud, and container environments, maintaining visibility, control, security, governance, and compliance remains paramount—but it becomes more difficult and time consuming.
In this session, you’ll learn how to solve these challenges in your hybrid infrastructure by automating security and compliance with a combination of Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, Red Hat Ansible Tower, and OpenSCAP. Specifically, in your hybrid infrastructure, you’ll learn how to:
• Easily provision a security-compliant host.
• Quickly detect and remediate security and compliance issues.
• Ensure governance and control in an automated way.
• Proactively monitor security and automate risk management.
• Perform audit scans and remediations on your systems.
• Automate security to ensure compliance against regulatory or custom profiles.
Gerd Danner from SAP & Frank Schuler from BackOffice AssociatesRecorded: Jan 10 201960 mins
Anyone planning a move to SAP S/4HANA will want to optimise their investment to achieve full business beneﬁts from day one. This means getting it right from outset — starting with the migration. Yet data migration is often not highlighted as a key work stream in S/4HANA projects. So, considering so many data migration projects run over time and/or over budget, the question to ask is how is your business planning to do this?
This informative webinar will discuss the various migration options available and share best practice customer cases.
Gerd Danner Vice President EMEA Centre of Excellence for Information Management at SAP
Frank Schuler SAP Mentor and Vice President SAP Technical Architecture with BackOffice Associates
John Wagnon, DevCentralRecorded: Jan 10 20199 mins
F5 security expert discusses the details of the top vulnerability listed in this year's OWASP Top 10 Security Risks: Injection Attacks. Defending against the OWASP Top 10 is one piece of a defence-in-depth strategy that will help you ensure the confidentiality, integrity, and availability of your apps, your data, and your business. Watch the video to learn more about injection attacks and how to guard against them.
Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, CitrixRecorded: Jan 10 201958 mins
Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.
Attend this webinar and we’ll show you how you can:
• Get visibility to mitigate growing security threats resulting from multi-cloud environments
• Protect apps, data and network resources while maximizing user experience
• Get insights into user behavior with rich analytics
Chris Marsh of 451 Research & Matt Crawford of CitrixRecorded: Jan 10 201955 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Randy Heffner, VP and Principal Analyst at ForresterJan 17 20194:00 pmUTC45 mins
Agile integration strategy — combining integration technologies, agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation.
The pace of innovation and disruption continues to accelerate, driving faster change to business models, processes, and applications. Firms that also quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers.
In this session, Red Hat’s guest speaker, Randy Heffner of Forrester, will describe the blurring lines between integration and application development, outline the foundations for agile integration, and provide guidance for how to build and accelerate your ability to drive business change by improving your software integration and delivery capabilities.
Michael Ocampo, Product Mgr, Supermicro; Jason Kennedy, Director, Data-Centric Product Mktg, IntelJan 17 20195:00 pmUTC60 mins
The 5th generation of Supermicro’s Twin Architecture has been optimized to support cloud application solutions. In this Webinar, we will learn how companies configure their cloud infrastructure to maximize the BigTwin’s compute, memory and storage resources with virtualization. We will take a deep look into how BigTwin offers cost-effective memory bandwidth, which is critical for cloud applications and NoSQL performance.
The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MOJan 17 20196:00 pmUTC60 mins
Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
Join Simon Black, Chief Technology Evangelist at Mendix, for everything about cloud native applications and multi-cloud deployment in this rendition of Low-Code in 30.
He’ll cover how cloud native is a strategy for building and running applications. It is not concerned about where applications run, but how they’re built. Simon demonstrates this within the Mendix low-code development platform.
Also covered is how cloud native came about. Simon goes indepth about Heroku’s 12 Factor Apps which set best practices and was designed to enable applications to be built with portability and resilience.
The importance of cloud native:
• Cost Reduction
• Faster Change
• Reduces Reliance on IT
• Access to New Features
Cloud native apps run the same across all environments: public, virtual and on-premise. They run the same no matter on the web, mobile or tablet. That is the value of cloud native.
“…a true platform that adopts and utilizes cloud native is not just about deployment, it is not just about utilizing containers, it is about being able to bridge all of that together to bring the application lifecycle for ease of use and being able to deploy very rapidly.”
- Simon Black
Questions or Comments? Please post below!
Examples of Apps Built with Mendix: https://gallery.mendix.com/
The Latest News: https://www.mendix.com/blogs/
Guide to Low-Code Development: https://www.mendix.com/low-code-guide/
Elise Carmichael, Judy Chung and Callie McConnell, The qTest Product TeamJan 21 201912:00 pmUTC37 mins
The discipline of testing will continue to broaden, become more visible and grow more critical to the success of today’s leading enterprises in 2019. We’ve rounded up the top nine trends that will shape the future of software testing in 2019 and beyond.
In this webinar, you’ll hear about the changes our product experts are seeing in the market and learn how they’re likely to affect your approach to software quality and your business in 2019. You’ll also learn how qTest is shaping the future and leading innovation in test management and see a preview of key innovations slated for the 2019 qTest roadmap.
Learn about the trends that will shape the future of testing, including:
- The growth of software quality as a cross-functional discipline
- Increasing levels of BYO test automation and increasingly complex testing tool stacks and environments
- Why software quality is shifting both left and right (and how the right tools make it possible)
- What’s on the 2019 qTest roadmap to help organizations stay ahead of the trends
Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP ComplianceJan 21 201910:00 pmUTC47 mins
What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.
Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.
This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.
Here's what they'll discuss:
-How to get executives and users to care about security and compliance
-Top of mind security or compliance issues (and tackling them)
-The toughest challenges they faced
Anand Subramaniam, Principal Architect, Analytics Centre of Excellence, Aspire SystemsJan 22 20193:00 amUTC60 mins
How to use Machine Learning for Customer Intelligence in the Fintech world?
Customer behaviors in Asia Pacific economies with countries like China, Japan, Australia, Singapore, and South Korea have a tech-savvy client base, who demand a great digital banking experience, whereas on the other hand, countries with a low smartphone penetration demand face-to-face interactions.
The main areas of improvement through ML & AI can be divided into three categories: enhanced client experience, new products & services, and improved internal services.
This workshop will let you help you acquire customer intelligence techniques, the pre-requisites, key information and tools to help you build a customer driving lending business.
Discover ready to use methodologies for the below:
• How do you make sense of customers’ data and predict the future of their financial needs?
• How do you make your products more customized for your customers?
• How do you identify your customer based who they are and not just with their ID?
Save your spot for this AI & ML webinar that can help bring you up to speed on readily available use cases.
Simon Tompson, Product Marketing LeadJan 22 201910:00 amUTC25 mins
Increasing digital consumption by your customers and modern-day technology provides your business with unlimited opportunities! The challenges of digitalization vary, but each digital infrastructure requires one thing above all: a strong network foundation. Join us for a webinar to learn more about cloud-managed IT and accelerate your digital journey!
Today’s companies are feeling pressure like never before. Global shifts in social demographics play out against a backdrop of rapid urbanisation and digital revolution. How do firms engage with companies operating in new economic centres? What does service as a commodity actually look like?
This webinar will explore how these global trends impact all professional service organisations, and asks how can technology enable firms to maintain the upper hand?
Specifically, the importance of relationships will be highlighted, and the question asked if technology will become the driving force behind this most human of enterprises.
Join this webinar to keep up-to-date on the trends likely to make an impact on your business.
Neil Ward-Dutton and Andrea MinonneJan 22 20192:00 pmUTC45 mins
Digital transformation is a key strategy for every company of size across Europe, as organizations look to remain relevant and competitive in the age of digital business. IDC finds that AI is a key enabler of that transformation, allowing businesses to reimagine processes, services and value propositions to customers. Yet while the focus on customers is as strong as ever but as experience matures, European companies are increasingly looking to AI to drive internal process improvement as well as improve customer experience.
In this IDC Web Conference, Neil Ward-Dutton, VP of AI and DX European Research Practices, and Andrea Minonne, Research Analyst for IDC's Customer Insight & Analysis team, will discuss the transformative power of AI for European companies, drawing on IDC's qualitative and quantitative research and examples to discuss what are the top drivers and barriers, which are the key use cases, technology and industry adoptions trends across Europe.
Gart Forth, Director Product Management, AWS Marketplace | Srini Sankaran, Senior Product Manager, AWS MarketplaceJan 22 20192:00 pmUTC60 mins
Until now, many customers spent time creating or searching for the right algorithm and model when using Amazon SageMaker. In this session you’ll learn how to build machine learning applications even faster by finding curated algorithms and model packages in AWS Marketplace and deploying them directly on Amazon SageMaker.
Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & SullivanJan 22 20194:00 pmUTC60 mins
In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.
With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.
• Do perceptions of customers in the business community align with consumer reality?
• What makes (or breaks) consumer digital confidence in organizations?
• Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, GigamonJan 22 20196:00 pmUTC60 mins
Enable IT Collaboration with a Common Distributed Data Services Layer.
The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.
To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.
ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.
Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
Bill Hansey, George RubioJan 22 20197:30 pmUTC34 mins
In this final episode, you’ll find out how to make sure your IT services are performing optimally with smart strategies to:
Get full visibility with built-in dashboards and Performance Analytics providing real-time, actionable information to continually improve services
Learn how a single data model can eliminate information silos with one data source for your enterprise
Learn how Continual Improvement Management can align data, people, and business goals in one place and empower strategic planning and execution
Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, CitrixJan 23 201910:00 amUTC45 mins
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
•Contextual and secure access to applications
•Website and application protection from internal and external threats
•Application and network visibility and intelligent analytics
•Flexibility and performance
You don’t need an expert to tell you that open source software will be ubiquitous in the enterprise in 2019. You also don’t need an expert to tell you that this will present security challenges either. But what can you do in 2019 to ensure your open source software is as secure as you can make it? Best practices, processes and tools are coming into focus. 2019 is the year you need to implement and use them.
Join the panel of experts as they share their best advice to help make 2019 a secure year for your open source use.
David Ingham - Director, Software Engineering, Red Hat. Jakub Scholz, Principal Software Engineer, Red Hat.Jan 23 20194:00 pmUTC60 mins
Run Apache Kafka on Kubernetes with Red Hat AMQ streams
With the introduction of the Red Hat® AMQ streams component, you can now use the massive scalability of Apache Kafka on the most advanced container management technology, Kubernetes, using Red Hat OpenShift®.
The Red Hat AMQ streams component, the newest member of the AMQ messaging platform suite, is a massively scalable, distributed, and high-performance data streaming capability based on the Apache Kafka and Strimzi open source projects. The AMQ streams component provides an event-streaming backbone that allows microservices and other application components to reliably exchange data with extremely high throughput. AMQ streams has a particular focus on using Kafka on Red Hat OpenShift, the open source container application platform based on the Kubernetes container orchestrator.
Join this webinar to learn:
-Why Kafka is so frequently used in microservices, Internet of Things (IoT), and event processing.
-Why Apache Kafka on Red Hat OpenShift is a great match.
-How Red Hat OpenShift delivers clustering, high availability, and observability to Kafka.
-How the AMQ streams component serves as an automated Kafka administrator, automating the deployment, management, upgrades, and configuration of a Kafka ecosystem installation.
Jeff Ready, CEO and Co-Founder of Scale ComputingJan 23 20196:00 pmUTC60 mins
In today’s global economy, businesses and governments are instrumenting the edge with ever greater intelligence, so the desire for reliable, scalable and agile edge infrastructure solutions continues to grow. Implementing a solution ideal for highly distributed, on-premises environments, such as retail stores, bank branches or manufacturing, with multiple locations managed by the enterprise from a central location has become and will remain critical.
Learn how providers are addressing this market by providing edge infrastructure that has the capacity to run various IT and OT workloads, is space conscious and can be managed at each individual location by generalists. This in return reduces the time and budget spent managing technology and allows companies to focus more on growing their business and serving their customers.
Attendees will learn:
How to maximize uptime at the edge
The extraordinary ease of use
How a converged platform simplifies deployment and management
Total management cost reductions of 60%-80% with automation and intelligence
Jeff Ready, CEO of Scale Computing, is a high tech entrepreneur and executive with deep roots in technology and industry trends. Jeff has a keen interest in current and future technologies of IT infrastructure to help alleviate the management and overall costs of IT in your business.
Timothy Warner, Microsoft MVP, PluralsightJan 23 20196:00 pmUTC57 mins
Are you running Microsoft Windows Server 2008 or 2003 for your business critical applications, like many enterprises? Server 2008 will reach End of Support in January 2020 and with that no more security and maintenance patches without costly alternatives.
Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. You will learn how:
A container platform can accelerate migration to Server 2016
Containers are more than a development toolset used primarily to build new applications
The Docker container platform gives enterprises a way to containerize and easily migrate existing applications
Cut infrastructure and management costs for your legacy applications by up to 50%
Learn how to simplify your migration!
James Ma, Senior Product Manager, Pivotal & Michael Villiger, Sr. Technical Partner Manager, DynatraceJan 23 20196:00 pmUTC60 mins
The demands of fast incremental code development require a stable, safe, and continuous delivery pipeline that can get your code into the hands of your customers without delay. Put your continuous delivery pipeline on autopilot by automating and simplifying the workflow—continuous integration to production readiness—and by using an automated monitoring solution to prevent bad builds from impacting production.
This webinar will cover the steps to building an automated, monitored pipeline:
1. Modeling and visualizing your build and delivery process as a pipeline (defined as a single, declarative config file) using Concourse CI.
2. Leveraging integrations to trigger actions and share data, supporting functions like testing, collaboration, and monitoring.
3. Enhancing your end-to-end continuous delivery pipeline with contextual deployment event feeds to Dynatrace.
4. Adding automated, metrics-based quality gates between pre-production stages and an automatic post-production approval step, all with specifications defined in source control.
Attendees will learn how some of the unique capabilities of Concourse CI and Pivotal Cloud Foundry, coupled with Dynatrace’s software intelligence, can put your continuous delivery pipeline on autopilot and ensure safer production outcomes.
Manav Kumar senior middleware solutions architect, Red Hat & Mike Bourgeois middleware solutions specialist, Red HatJan 23 20197:00 pmUTC43 mins
In this webinar, we will discuss and demonstrate the following topics to illustrate how customers in state and local government and higher education can use AMP to share the legacy and new services while controlling and monitoring a portfolio of APIs.
Benefit of APIs in state and local government, and higher education
Discuss API life-cycle management
Discuss API-first design approach
Build and deploy your APIs
Build and deploy your APIs
Control your APIs via usage policies
Operation your APIs via monitoring, analytics, reporting, and billing
Engage with developers through Developer Portal and interactive API documentation
Make your APIs available via API discovery
Priya Rajagopal, Principal Product Manager, Mobile, CouchbaseJan 23 20197:00 pmUTC60 mins
Architecting a mobile storage solution may feel like a daunting task, but it doesn’t have to be. In this webinar, we’ll guide you through the toughest challenges and demonstrate how NoSQL can deliver a seamless mobile experience anywhere by extending your data center to the edge.
We’ll walk you through:
-Critical requirements of an offline or offline-first storage solution
-Why NoSQL is uniquely suited for data storage on the edge
-Key architectural elements of the Couchbase Mobile NoSQL data platform
You’ll see how Couchbase Mobile makes it easy to ensure your local data is always available. We’ll show you how to achieve auto sync from edge to cloud and direct peer-to-peer sync for exceptional online and offline experiences. And you’ll learn how Couchbase provides enterprise-grade security with end-to-end and over-the-wire encryption.
Brian Bulkowski, Founder and CTO, Aerospike; Matt Bushell, Director of Product Marketing, AerospikeJan 23 20199:00 pmUTC60 mins
Artificial Intelligence / Machine Learning is being implemented to make better decisions to avert fraud and lower risk for digital payments. These systems thrive on data: the more you can feed them, the better they perform. We call this “Hungry AI.” Furthermore, fraud and risk decisions need to be conducted in real-time (milliseconds or less).
Unfortunately, most data infrastructures aren’t built to handle real-time data analysis, ingesting and acting on massive datasets at the global scale needed to mitigate these problems.
Register now for this webinar to learn:
- The key characteristics between offline and online AI/ML
- Why more data is better, and the measurable impacts to your business
- Real-world AI/ML real-time use cases for fraud and risk prevention that are deployed today