Hi [[ session.user.profile.firstName ]]

Application Management

  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Recorded: Jan 17 2019 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Driving Business Transformation with Real-Time Analytics
    Driving Business Transformation with Real-Time Analytics
    Nick Dearden, Confluent + John Thuma, Arcadia Data, Thomas Clarke, RCG Global Services Recorded: Jan 16 2019 56 mins
    Digital transformation is more than just a buzzword, it’s become a necessity in order to compete in the modern era. At the heart of digital transformation is real-time data. Your organization must respond in real time to every customer experience transaction, sale, and market movement in order to stay competitive.

    Streaming data technologies like Apache Kafka® and Confluent KSQL, the streaming SQL engine for Apache Kafka, are being used to detect and react to events as they occur. Combining this technology with the analytics insights from RCG and visualizations from Arcadia Data delivers a powerful foundation for driving real time business decisions. Use cases span across industries and include retail transaction cost analysis, automotive maintenance and loyalty program management, and credit card fraud detection.

    Join experts from Confluent, RCG and Arcadia Data for a discussion and demo on how companies are integrating streaming data technologies to transform their business.

    Watch now to learn:

    -Why Apache Kafka is widely used for real-time event monitoring and decisioning
    -How to integrate real-time analytics and visualizations to drive business processes
    -How KSQL, streaming SQL for Kafka, can easily transform and filter streams of data in real time
  • Crouching Miner, Hidden Exfil: The Saga Continues
    Crouching Miner, Hidden Exfil: The Saga Continues
    Troy Kent, Threat Researcher, Awake Security Recorded: Jan 16 2019 34 mins
    Everyone talks about alert fatigue and the unfortunate reality of overworked and undertrained analysts. What happens though when attackers start to focus on that reality as a point of failure? In this webinar, we will discuss how trivial this can be for an attacker. Using minimal time and open source tools, we will fly under the radar by taking advantage of analyst biases and assumptions. We'll specifically explore how we can edit an open source miner to make it fileless, and then use it for command and control and to exfiltrate data. We will then show how artificial intelligence and advanced network traffic analysis tools detect threats such as these and enable you to respond decisively.

    Key Learning Objectives include:

    - Discuss the not-so-obvious challenges alert fatigue poses

    - Illustrate with an example how attackers hide in plain sight

    - See how AI can help the analyst find and then respond to these attackers
  • Network Upgrades Giving You Security Headaches?
    Network Upgrades Giving You Security Headaches?
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Jan 16 2019 58 mins
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Microservices Day Atlanta 2019: Afternoon Session
    Microservices Day Atlanta 2019: Afternoon Session
    Red Hat Presenters: Lance Ball, Ram Maddali, Rafael Benevides - Hugh McKee, Lightbend Recorded: Jan 16 2019 244 mins
    Join industry experts with in depth of knowledge of the latest microservices implementations. This event is created specifically for developers familiar with open source software or with an interest in the gradual adoption of microservices and the fundamental changes in application development. Hear about the techniques and tools that address the pain points and missteps encountered by early adopters of containers and microservices. At Red Hat’s 3rd annual Microservices Day Atlanta you will:

    * Find out which DevOps strategies are required for success
    * Learn how to handle data with CQRS
    * Discover when, where, and how to fit in Serverless applications
    * Review event driven and Reactive application design
    * Hear from the experts about the best practices to create front ends for MSA applications

    Agenda (all times in ET):
    1:00 PM | Lightbend Presentation
    2:00 PM | Front Matter: Next Level Front End Deployments on OpenShift
    3:00 PM | Strategies, Techniques, and Toolkits for Testing Microservices
    4:00 PM | Serverless or Serverfull: Microservices^Functions
  • The World Quality Report 2018-19: Focus on the Financial Services Sector
    The World Quality Report 2018-19: Focus on the Financial Services Sector
    Jonathon Wright, Vivit Advocacy Board Director and Malcolm Isaacs, Solutions Marketing, Micro Focus Recorded: Jan 16 2019 60 mins
    The 2018-19 edition of the World Quality Report (WQR) discusses the trends shaping QA and testing today, and offers recommendations for addressing tomorrow’s challenges. In this webinar, we’ll present an overview of the WQR’s key findings, with a deep dive into the analysis of the responses from the Financial Services sector, which is going through a radical change in its approach to application development and quality.

    Attend this webinar to learn:
    • How end-user satisfaction is top priority for QA and testing
    • Why an increase in digitalization is driving disruption in the Financial Services sector’s approach to application development and delivery
    • How the emergence of new technologies in Financial Services such as blockchain, Internet of Things and Artificial Intelligence are reshaping how QA and testing is done
    • Trends over the next two to three years that will combine automation, AI, and analytics to become a key differentiator for Financial Services organizations
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Jan 16 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Microservices Day Atlanta 2019: Morning Session
    Microservices Day Atlanta 2019: Morning Session
    Red Hat Presenters: Chris Van Tuin, Marius Bogoevici, Edson Yanaga Recorded: Jan 16 2019 193 mins
    Join industry experts with in depth of knowledge of the latest microservices implementations. This event is created specifically for developers familiar with open source software or with an interest in the gradual adoption of microservices and the fundamental changes occurring in application development. Hear about the techniques and tools that address the pain points and missteps encountered by early adopters of containers and microservices. At Red Hat’s 3rd annual Microservices Day Atlanta you will:

    * Find out which DevOps strategies are required for success
    * Learn how to handle data with CQRS
    * Discover when, where, and how to fit in Serverless applications
    * Review event driven and Reactive application design
    * Hear from the experts about the best practices to create front ends for MSA applications

    Agenda (all times in ET):
    9:15 AM | A DevOps State of Mind: Managing Microservices + Databases with Kubernetes
    10:15 AM | Event Driven Microservices with Kafka, Kubernetes, and Camel
    11:15 AM | Microservices Data Patterns: CQRS and Event Sourcing with Kafka and Eclipse Vert.x
  • ITSM Series: Deliver amazing IT service while increasing productivity (2 of 3)
    ITSM Series: Deliver amazing IT service while increasing productivity (2 of 3)
    Bill Hansey, George Rubio Recorded: Jan 15 2019 58 mins
    Part two will help you deliver an IT service experience everyone loves. Topics include:

    How to deliver a consumer-like employee experience through a self-service portal
    Providing a modern experience with personalized mobile apps, self service portals, and contextual collaboration
    Using machine learning and AI-powered chatbots to automate common requests, making work easier and more efficient
  • Moving to the Cloud without Migration
    Moving to the Cloud without Migration
    Bryan J Smith, Sr. Cloud Architect, ORock & Matt Plummer, Sr. VP of Cloud Architecture, ORock Recorded: Jan 15 2019 36 mins
    Migrating legacy applications and sensitive data (such as personally identifiable information (PII)) to the cloud introduces challenges that many government agencies may be unable to overcome. Challenges include lack of financial resources or internal expertise for application modernization and concerns over data security, network performance, and compliance.As a result, many agencies continue to host and process their most sensitive data and workloads on-premise or in private clouds despite growing pressure to modernize and reduce costs.

    In this webinar, we’ll discuss a Red Hat solution that lets you move and host your legacy government off-the-shelf (GOTS) or commercial-off-the-shelf (COTS) applications in a FedRAMP moderate cloud while keeping your most sensitive data on-premise. This on-premise to cloud solution helps you satisfy compliance requirements while improving performance, security, and total cost of ownership.

    Attend this webinar to hear more about how you can:

    - Process workloads and backups in a Red Hat open source cloud.
    - Keep your most sensitive data on-premise.
    - Move legacy applications to a private Infrastructure-as-a-Service (IaaS) with limited-to-no refactoring.
    - Transport data securely over a public internet connection without a virtual private network (VPN) connection.
    - Satisfy FedRAMP, Health Insurance Portability and Accountability Act (HIPAA), Health - Information Technology for Economic and Clinical Health (HITECH) Act, and other compliance requirements for data protection.
    - Prevent dedicated denial of service (DDoS) and man-in-the-middle (MITM) attacks.
  • Applications Take Advantage of Persistent Memory
    Applications Take Advantage of Persistent Memory
    Raghu Kulkarni, SNIA PM & NVDIMM SIG member and Alex McDonald, SNIA SSSI Co-Chair Recorded: Jan 15 2019 60 mins
    Kick off the new year with a new SNIA Persistent Memory and NVDIMM Special Interest Group webcast on how applications can take advantage of Persistent Memory today with NVDIMM - the go-to Persistent Memory technology for boosting performance for next generation storage platforms. NVDIMM standards have paved the way to simple, plug-n-play solutions. If you're a developer or integrator who hasn't yet realized the benefits of NVDIMMs in your products, you will want to attend to learn about NVDIMM functionality, applications, and benefits. You'll come away with an understanding of how NVDIMMs fit into the persistent memory landscape.
  • Testing your Ext JS apps with Sencha Test: Benefits & How-to Tips
    Testing your Ext JS apps with Sencha Test: Benefits & How-to Tips
    Dan Gallo, Sr. Solutions Architect at Sencha Recorded: Jan 15 2019 60 mins
    This webinar will showcase the benefits of incorporating automated testing into your application development process and we’ll demonstrate how you can test your Ext JS apps using Sencha Test. We’ll show you how to generate stable locators for components, leverage the Future APIs to more easily reference and interact with those components, and structure your tests using Jasmine.

    If you are a new or existing user, we’ll cover various examples and tips that will help you to gain a greater insight into the use of Sencha Test for testing your own applications.
  • Using APIs to Build your Omni-Channel Architecture
    Using APIs to Build your Omni-Channel Architecture
    John Withers, Product Manager Jimil Patel, Product Marketing Manager, and Manan Sangvi, Solution Consultant Recorded: Jan 15 2019 50 mins
    Well-designed APIs, created along with a holistic integration strategy with Anypoint Platform, create a seamless omnichannel experience that customers want and businesses need. To deliver a reliable and unified experience more quickly, companies must adopt a new approach that involves an omnichannel architecture.

    Across industries from healthcare to banking to retail, MuleSoft is powering omnichannel strategies that result in faster time to market, improved customer satisfaction, and increased revenue.

    Watch this webinar, including a demo, to learn how to:

    - Take an API-led approach to omnichannel that enables companies to deliver a unified experience 5x faster
    - Leverage Anypoint Exchange to enable consistency by design through the reuse of integration assets across channels, translating to a consistent experience for your customers
    - Prepare for the future (and future channels) with support for different deployment models with a single, unified platform
  • How to Improve Anti-Money Laundering Investigation using Neo4j
    How to Improve Anti-Money Laundering Investigation using Neo4j
    Joe Depeau, Neo4j Recorded: Jan 15 2019 47 mins
    Typical anti-money laundering process can be complicated, difficult, lengthy, highly manual, and prone to false positives. The data required for AML investigations is often complex, highly connected, and can come from multiple data sources within an organisation as well as from external providers.

    Learn how to use Neo4j and the power of connected data along with graph analytics techniques to improve anti-money laundering investigations and compliance. We’ll demonstrate how Neo4j enables faster and more accurate AML investigations, even across diverse and siloed data landscapes.
  • A Java Developer's Journey to Kubernetes and OpenShift
    A Java Developer's Journey to Kubernetes and OpenShift
    Rafael Benevides, Director of Developer Experience, Red Hat. Recorded: Jan 14 2019 29 mins
    In this session, we'll demonstrate tips, techniques, and best practices to build and deploy better software faster to increase the speed at which you deliver value for your business.

    We'll cover:
    • Microservices architecture patterns
    • Istio service mesh techniques
    • Advanced deployment and release patterns like dark and smart canaries
    • Pipelines
  • Kubernetes Ingress & Egress Traffic Management
    Kubernetes Ingress & Egress Traffic Management
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Jan 11 2019 38 mins
    The networking infrastructure within a Kubernetes cluster is usually
    private, or at least internally oriented. So what do you want to do
    when you need to expose your application or services to the public?
    What are your options for connecting to resources outside of your
    cluster? In this webinar we'll discuss:

    * Address cluster endpoints from the outside world
    * Communicate from within the cluster to external resources
    * Load balance services
  • Getting Started with DevSecOps
    Getting Started with DevSecOps
    Andrei Bezdedeanu, VP of Engineering, CYBRIC Recorded: Jan 10 2019 31 mins
    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. The challenges associated with adoption can be mitigated by empowering developers with the appropriate security tools and processes, automation and orchestration.

    In this video, Andrei Bezdedeanu, CYBRIC VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits, including the delivery of more secure applications, lower cost of managing your security posture and full visibility into application and enterprise risks. He will also review the challenges, enablers and benefits to DevOps and DevSecOps and review key concepts such as DevOps vs SecOps and automation and orchestration.

    You will learn:
    • How to seamlessly automate and orchestrate security across the entire SDLC.
    • The foundation of DevSecOps, and the application development and deployment processes.
    • How to remove the cultural differences between DevOps and SecOps teams to make way for collaboration.
  • Why Your Digital Transformation Strategy Demands Middleware Modernization
    Why Your Digital Transformation Strategy Demands Middleware Modernization
    Rohit Kelapure, Pivotal, Joel Thimsen, Perficient & Jeff Kelly, Pivotal (Host) Recorded: Jan 10 2019 63 mins
    Your current middleware platform is costing you more than you think. It wasn't designed to support high-velocity software releases and frequent iteration of applications—prerequisites for success in today’s world. A new, modern approach to middleware is needed that enables both developer productivity and operational efficiency.

    Join Pivotal’s Rohit Kelapure and Perficient’s Joel Thimsen as they discuss:

    - The limitations of traditional middleware
    - The benefits of middleware modernization
    - Your options for modernization, including a cloud-native platform
    - Tips for overcoming some common challenges


    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Perficient Privacy Statement:
    https://www.perficient.com/privacy-policy

    This webinar:
    https://content.pivotal.io/webinars/jan-10-why-your-digital-transformation-strategy-demands-middleware-modernization-webinar
  • Infoblox #1: Remediating Threats by Bridging Islands of Security
    Infoblox #1: Remediating Threats by Bridging Islands of Security
    Chintan Udeshi, Security Product Marketing, Infoblox; Brandon Dunlap, Moderator Recorded: Jan 10 2019 54 mins
    Most organizations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)2 on January 10, 2019 at 1:00PM Eastern for an examination of how Infoblox and Fortinet have joined together to assist organizations in improving their security operations and reducing time to containment.
  • Automating security and compliance for hybrid cloud environments
    Automating security and compliance for hybrid cloud environments
    Lucy Kerner, Security Global Technical Evangelist and Strategist, Red Hat Recorded: Jan 10 2019 32 mins
    In a hybrid infrastructure consisting of physical, virtual, cloud, and container environments, maintaining visibility, control, security, governance, and compliance remains paramount—but it becomes more difficult and time consuming.

    In this session, you’ll learn how to solve these challenges in your hybrid infrastructure by automating security and compliance with a combination of Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, Red Hat Ansible Tower, and OpenSCAP. Specifically, in your hybrid infrastructure, you’ll learn how to:
    • Easily provision a security-compliant host.
    • Quickly detect and remediate security and compliance issues.
    • Ensure governance and control in an automated way.
    • Proactively monitor security and automate risk management.
    • Perform audit scans and remediations on your systems.
    • Automate security to ensure compliance against regulatory or custom profiles.
  • What are my options to migrate to SAP S/4HANA?
    What are my options to migrate to SAP S/4HANA?
    Gerd Danner from SAP & Frank Schuler from BackOffice Associates Recorded: Jan 10 2019 60 mins
    Anyone planning a move to SAP S/4HANA will want to optimise their investment to achieve full business benefits from day one. This means getting it right from outset — starting with the migration. Yet data migration is often not highlighted as a key work stream in S/4HANA projects. So, considering so many data migration projects run over time and/or over budget, the question to ask is how is your business planning to do this?

    This informative webinar will discuss the various migration options available and share best practice customer cases.

    Presenters:
    Gerd Danner Vice President EMEA Centre of Excellence for Information Management at SAP

    Frank Schuler SAP Mentor and Vice President SAP Technical Architecture with BackOffice Associates
  • OWASP Top 10: Injection Attacks
    OWASP Top 10: Injection Attacks
    John Wagnon, DevCentral Recorded: Jan 10 2019 9 mins
    F5 security expert discusses the details of the top vulnerability listed in this year's OWASP Top 10 Security Risks: Injection Attacks. Defending against the OWASP Top 10 is one piece of a defence-in-depth strategy that will help you ensure the confidentiality, integrity, and availability of your apps, your data, and your business. Watch the video to learn more about injection attacks and how to guard against them.
  • Evolving security strategies- It’s time for a people-centric approach
    Evolving security strategies- It’s time for a people-centric approach
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix Recorded: Jan 10 2019 58 mins
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Jan 10 2019 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Why Agile Integration Is Critical To Successful Digital Transformation
    Why Agile Integration Is Critical To Successful Digital Transformation
    Randy Heffner, VP and Principal Analyst at Forrester Jan 17 2019 4:00 pm UTC 45 mins
    Agile integration strategy — combining integration technologies, agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation.

    The pace of innovation and disruption continues to accelerate, driving faster change to business models, processes, and applications. Firms that also quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers.

    In this session, Red Hat’s guest speaker, Randy Heffner of Forrester, will describe the blurring lines between integration and application development, outline the foundations for agile integration, and provide guidance for how to build and accelerate your ability to drive business change by improving your software integration and delivery capabilities.
  • Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Supermicro Presents: Flexible Cloud Performance in a 2U 4-Node System
    Michael Ocampo, Product Mgr, Supermicro; Jason Kennedy, Director, Data-Centric Product Mktg, Intel Jan 17 2019 5:00 pm UTC 60 mins
    The 5th generation of Supermicro’s Twin Architecture has been optimized to support cloud application solutions. In this Webinar, we will learn how companies configure their cloud infrastructure to maximize the BigTwin’s compute, memory and storage resources with virtualization. We will take a deep look into how BigTwin offers cost-effective memory bandwidth, which is critical for cloud applications and NoSQL performance.
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani, Docker Jan 17 2019 6:00 pm UTC 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • Employing Users as Your Quality Control
    Employing Users as Your Quality Control
    Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MO Jan 17 2019 6:00 pm UTC 60 mins
    Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
  • Low-Code in 30 Webinar: Cloud Native Applications and Multi-Cloud Deployment
    Low-Code in 30 Webinar: Cloud Native Applications and Multi-Cloud Deployment
    Simon Black Jan 21 2019 11:00 am UTC 31 mins
    Try Mendix: https://signup.mendix.com/

    Join Simon Black, Chief Technology Evangelist at Mendix, for everything about cloud native applications and multi-cloud deployment in this rendition of Low-Code in 30.

    He’ll cover how cloud native is a strategy for building and running applications. It is not concerned about where applications run, but how they’re built. Simon demonstrates this within the Mendix low-code development platform.

    Also covered is how cloud native came about. Simon goes indepth about Heroku’s 12 Factor Apps which set best practices and was designed to enable applications to be built with portability and resilience.

    The importance of cloud native:
    • Portability
    • Cost Reduction
    • Scalability
    • Faster Change
    • Reduces Reliance on IT
    • Access to New Features

    Cloud native apps run the same across all environments: public, virtual and on-premise. They run the same no matter on the web, mobile or tablet. That is the value of cloud native.

    “…a true platform that adopts and utilizes cloud native is not just about deployment, it is not just about utilizing containers, it is about being able to bridge all of that together to bring the application lifecycle for ease of use and being able to deploy very rapidly.”

    - Simon Black

    Questions or Comments? Please post below!

    Examples of Apps Built with Mendix: https://gallery.mendix.com/

    The Latest News: https://www.mendix.com/blogs/

    Guide to Low-Code Development: https://www.mendix.com/low-code-guide/
  • The Top 9 Testing Trends We’re Anticipating in 2019
    The Top 9 Testing Trends We’re Anticipating in 2019
    Elise Carmichael, Judy Chung and Callie McConnell, The qTest Product Team Jan 21 2019 12:00 pm UTC 37 mins
    The discipline of testing will continue to broaden, become more visible and grow more critical to the success of today’s leading enterprises in 2019. We’ve rounded up the top nine trends that will shape the future of software testing in 2019 and beyond.

    In this webinar, you’ll hear about the changes our product experts are seeing in the market and learn how they’re likely to affect your approach to software quality and your business in 2019. You’ll also learn how qTest is shaping the future and leading innovation in test management and see a preview of key innovations slated for the 2019 qTest roadmap.

    Learn about the trends that will shape the future of testing, including:
    - The growth of software quality as a cross-functional discipline
    - Increasing levels of BYO test automation and increasingly complex testing tool stacks and environments
    - Why software quality is shifting both left and right (and how the right tools make it possible)
    - What’s on the 2019 qTest roadmap to help organizations stay ahead of the trends
  • A CISO, CIO, and Compliance Officer Grab Coffee
    A CISO, CIO, and Compliance Officer Grab Coffee
    Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Jan 21 2019 10:00 pm UTC 47 mins
    What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

    Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

    This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

    Here's what they'll discuss:
    -How to get executives and users to care about security and compliance
    -Top of mind security or compliance issues (and tackling them)
    -The toughest challenges they faced
  • Customer Intelligence Crash Course with ML & AI for Asia Pacific Banks
    Customer Intelligence Crash Course with ML & AI for Asia Pacific Banks
    Anand Subramaniam, Principal Architect, Analytics Centre of Excellence, Aspire Systems Jan 22 2019 3:00 am UTC 60 mins
    How to use Machine Learning for Customer Intelligence in the Fintech world?

    Customer behaviors in Asia Pacific economies with countries like China, Japan, Australia, Singapore, and South Korea have a tech-savvy client base, who demand a great digital banking experience, whereas on the other hand, countries with a low smartphone penetration demand face-to-face interactions.

    The main areas of improvement through ML & AI can be divided into three categories: enhanced client experience, new products & services, and improved internal services.

    This workshop will let you help you acquire customer intelligence techniques, the pre-requisites, key information and tools to help you build a customer driving lending business.

    Discover ready to use methodologies for the below:
    • How do you make sense of customers’ data and predict the future of their financial needs?
    • How do you make your products more customized for your customers?
    • How do you identify your customer based who they are and not just with their ID?

    Save your spot for this AI & ML webinar that can help bring you up to speed on readily available use cases.
  • Ready for the future? Boost your digital transformation with cloud-managed IT
    Ready for the future? Boost your digital transformation with cloud-managed IT
    Simon Tompson, Product Marketing Lead Jan 22 2019 10:00 am UTC 25 mins
    Increasing digital consumption by your customers and modern-day technology provides your business with unlimited opportunities! The challenges of digitalization vary, but each digital infrastructure requires one thing above all: a strong network foundation. Join us for a webinar to learn more about cloud-managed IT and accelerate your digital journey!
  • Using Technology to Power Relationships in Today's Changing World
    Using Technology to Power Relationships in Today's Changing World
    Ben Roles Jan 22 2019 10:00 am UTC 60 mins
    Today’s companies are feeling pressure like never before. Global shifts in social demographics play out against a backdrop of rapid urbanisation and digital revolution. How do firms engage with companies operating in new economic centres? What does service as a commodity actually look like?

    This webinar will explore how these global trends impact all professional service organisations, and asks how can technology enable firms to maintain the upper hand?
    Specifically, the importance of relationships will be highlighted, and the question asked if technology will become the driving force behind this most human of enterprises.

    Join this webinar to keep up-to-date on the trends likely to make an impact on your business.
  • Building the Intelligent Enterprise: Digital Transformation through AI
    Building the Intelligent Enterprise: Digital Transformation through AI
    Neil Ward-Dutton and Andrea Minonne Jan 22 2019 2:00 pm UTC 45 mins
    Digital transformation is a key strategy for every company of size across Europe, as organizations look to remain relevant and competitive in the age of digital business. IDC finds that AI is a key enabler of that transformation, allowing businesses to reimagine processes, services and value propositions to customers. Yet while the focus on customers is as strong as ever but as experience matures, European companies are increasingly looking to AI to drive internal process improvement as well as improve customer experience.

    In this IDC Web Conference, Neil Ward-Dutton, VP of AI and DX European Research Practices, and Andrea Minonne, Research Analyst for IDC's Customer Insight & Analysis team, will discuss the transformative power of AI for European companies, drawing on IDC's qualitative and quantitative research and examples to discuss what are the top drivers and barriers, which are the key use cases, technology and industry adoptions trends across Europe.
  • Accelerating Machine Learning with Amazon SageMaker and AWS Marketplace
    Accelerating Machine Learning with Amazon SageMaker and AWS Marketplace
    Gart Forth, Director Product Management, AWS Marketplace | Srini Sankaran, Senior Product Manager, AWS Marketplace Jan 22 2019 2:00 pm UTC 60 mins
    Until now, many customers spent time creating or searching for the right algorithm and model when using Amazon SageMaker. In this session you’ll learn how to build machine learning applications even faster by finding curated algorithms and model packages in AWS Marketplace and deploying them directly on Amazon SageMaker.

    This session is intended for: Technical Audiences
  • Digital Trust in the Age of Normalized Data Breaches
    Digital Trust in the Age of Normalized Data Breaches
    Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & Sullivan Jan 22 2019 4:00 pm UTC 60 mins
    In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.

    With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.

    Key Takeaways:

    • Do perceptions of customers in the business community align with consumer reality?
    • What makes (or breaks) consumer digital confidence in organizations?
    • Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
  • Redis Enterprise on Kubernetes
    Redis Enterprise on Kubernetes
    Vick Kelkar, Global Alliances Technology Manager, at Redis Labs Jan 22 2019 5:00 pm UTC 56 mins
    Containers are becoming the basic unit of deployment. Kubernetes is becoming the industry standard for managing containerized applications.

    In this webinar, we will talk about basic Kubernetes constructs and will show how you can run three pod clustered Redis Enterprise on Kubernetes.

    You Will Learn:

    - Kubernetes primitives
    - How to deploy Redis Enterprise service on Kubernetes
    - How to deploy your app and connect to Redis Kubernetes service

    About the presenter:

    Vick Kelkar, Product, Redis Labs
    Vick has been in the technology field for most of his career. In the last few years, he has focused on distributed computing and container technologies.
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jan 22 2019 6:00 pm UTC 60 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • ITSM Series: Achieve insights and visibility for continual innovation and improv
    ITSM Series: Achieve insights and visibility for continual innovation and improv
    Bill Hansey, George Rubio Jan 22 2019 7:30 pm UTC 34 mins
    In this final episode, you’ll find out how to make sure your IT services are performing optimally with smart strategies to:

    Get full visibility with built-in dashboards and Performance Analytics providing real-time, actionable information to continually improve services
    Learn how a single data model can eliminate information silos with one data source for your enterprise
    Learn how Continual Improvement Management can align data, people, and business goals in one place and empower strategic planning and execution
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Jan 23 2019 10:00 am UTC 45 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Ubiquitous Open Source Makes for Security Challenges
    Ubiquitous Open Source Makes for Security Challenges
    Rami Sass (WhiteSource) | Baruch Sadogursky (JFrog) | Cindy Blake (Gitlab) Jan 23 2019 1:00 pm UTC 29 mins
    You don’t need an expert to tell you that open source software will be ubiquitous in the enterprise in 2019. You also don’t need an expert to tell you that this will present security challenges either. But what can you do in 2019 to ensure your open source software is as secure as you can make it? Best practices, processes and tools are coming into focus. 2019 is the year you need to implement and use them.

    Join the panel of experts as they share their best advice to help make 2019 a secure year for your open source use.
  • Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    David Ingham - Director, Software Engineering, Red Hat. Jakub Scholz, Principal Software Engineer, Red Hat. Jan 23 2019 4:00 pm UTC 60 mins
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    With the introduction of the Red Hat® AMQ streams component, you can now use the massive scalability of Apache Kafka on the most advanced container management technology, Kubernetes, using Red Hat OpenShift®.

    The Red Hat AMQ streams component, the newest member of the AMQ messaging platform suite, is a massively scalable, distributed, and high-performance data streaming capability based on the Apache Kafka and Strimzi open source projects. The AMQ streams component provides an event-streaming backbone that allows microservices and other application components to reliably exchange data with extremely high throughput. AMQ streams has a particular focus on using Kafka on Red Hat OpenShift, the open source container application platform based on the Kubernetes container orchestrator.

    Join this webinar to learn:

    -Why Kafka is so frequently used in microservices, Internet of Things (IoT), and event processing.
    -Why Apache Kafka on Red Hat OpenShift is a great match.
    -How Red Hat OpenShift delivers clustering, high availability, and observability to Kafka.
    -How the AMQ streams component serves as an automated Kafka administrator, automating the deployment, management, upgrades, and configuration of a Kafka ecosystem installation.
  • Expanding Your Data Center to the Resource and Space Conscious Edge
    Expanding Your Data Center to the Resource and Space Conscious Edge
    Jeff Ready, CEO and Co-Founder of Scale Computing Jan 23 2019 6:00 pm UTC 60 mins
    In today’s global economy, businesses and governments are instrumenting the edge with ever greater intelligence, so the desire for reliable, scalable and agile edge infrastructure solutions continues to grow. Implementing a solution ideal for highly distributed, on-premises environments, such as retail stores, bank branches or manufacturing, with multiple locations managed by the enterprise from a central location has become and will remain critical.

    Learn how providers are addressing this market by providing edge infrastructure that has the capacity to run various IT and OT workloads, is space conscious and can be managed at each individual location by generalists. This in return reduces the time and budget spent managing technology and allows companies to focus more on growing their business and serving their customers.

    Attendees will learn:
    How to maximize uptime at the edge
    The extraordinary ease of use
    How a converged platform simplifies deployment and management
    Total management cost reductions of 60%-80% with automation and intelligence

    Jeff Ready, CEO of Scale Computing, is a high tech entrepreneur and executive with deep roots in technology and industry trends. Jeff has a keen interest in current and future technologies of IT infrastructure to help alleviate the management and overall costs of IT in your business.
  • How to Prepare for Windows Server 2008 End of Support
    How to Prepare for Windows Server 2008 End of Support
    Timothy Warner, Microsoft MVP, Pluralsight Jan 23 2019 6:00 pm UTC 57 mins
    Are you running Microsoft Windows Server 2008 or 2003 for your business critical applications, like many enterprises? Server 2008 will reach End of Support in January 2020 and with that no more security and maintenance patches without costly alternatives.

    Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. You will learn how:

    A container platform can accelerate migration to Server 2016
    Containers are more than a development toolset used primarily to build new applications
    The Docker container platform gives enterprises a way to containerize and easily migrate existing applications
    Cut infrastructure and management costs for your legacy applications by up to 50%
    Learn how to simplify your migration!
  • Four Steps Toward a Safer Continuous Delivery Practice (Hint: Add Monitoring)
    Four Steps Toward a Safer Continuous Delivery Practice (Hint: Add Monitoring)
    James Ma, Senior Product Manager, Pivotal & Michael Villiger, Sr. Technical Partner Manager, Dynatrace Jan 23 2019 6:00 pm UTC 60 mins
    The demands of fast incremental code development require a stable, safe, and continuous delivery pipeline that can get your code into the hands of your customers without delay. Put your continuous delivery pipeline on autopilot by automating and simplifying the workflow—continuous integration to production readiness—and by using an automated monitoring solution to prevent bad builds from impacting production.


    This webinar will cover the steps to building an automated, monitored pipeline:

    1. Modeling and visualizing your build and delivery process as a pipeline (defined as a single, declarative config file) using Concourse CI.

    2. Leveraging integrations to trigger actions and share data, supporting functions like testing, collaboration, and monitoring.

    3. Enhancing your end-to-end continuous delivery pipeline with contextual deployment event feeds to Dynatrace.

    4. Adding automated, metrics-based quality gates between pre-production stages and an automatic post-production approval step, all with specifications defined in source control.

    Attendees will learn how some of the unique capabilities of Concourse CI and Pivotal Cloud Foundry, coupled with Dynatrace’s software intelligence, can put your continuous delivery pipeline on autopilot and ensure safer production outcomes.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Dynatrace Privacy Statement:
    https://www.dynatrace.com/support/help/data-privacy-and-security/

    This webinar:
    https://content.pivotal.io/webinars/jan-23-four-steps-toward-a-safer-continuous-delivery-practice-hint-add-monitoring-webinar
  • Application programming interface (API) management in state and local government
    Application programming interface (API) management in state and local government
    Manav Kumar senior middleware solutions architect, Red Hat & Mike Bourgeois middleware solutions specialist, Red Hat Jan 23 2019 7:00 pm UTC 43 mins
    In this webinar, we will discuss and demonstrate the following topics to illustrate how customers in state and local government and higher education can use AMP to share the legacy and new services while controlling and monitoring a portfolio of APIs.

    Benefit of APIs in state and local government, and higher education
    Discuss API life-cycle management
    Discuss API-first design approach
    Build and deploy your APIs
    Build and deploy your APIs
    Control your APIs via usage policies
    Operation your APIs via monitoring, analytics, reporting, and billing
    Engage with developers through Developer Portal and interactive API documentation
    Make your APIs available via API discovery
  • Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Priya Rajagopal, Principal Product Manager, Mobile, Couchbase Jan 23 2019 7:00 pm UTC 60 mins
    Architecting a mobile storage solution may feel like a daunting task, but it doesn’t have to be. In this webinar, we’ll guide you through the toughest challenges and demonstrate how NoSQL can deliver a seamless mobile experience anywhere by extending your data center to the edge.

    We’ll walk you through:

    -Critical requirements of an offline or offline-first storage solution
    -Why NoSQL is uniquely suited for data storage on the edge
    -Key architectural elements of the Couchbase Mobile NoSQL data platform

    You’ll see how Couchbase Mobile makes it easy to ensure your local data is always available. We’ll show you how to achieve auto sync from edge to cloud and direct peer-to-peer sync for exceptional online and offline experiences. And you’ll learn how Couchbase provides enterprise-grade security with end-to-end and over-the-wire encryption.
  • Hungry AI/ML for Fraud, Risk & Payments: Why the Database Matters
    Hungry AI/ML for Fraud, Risk & Payments: Why the Database Matters
    Brian Bulkowski, Founder and CTO, Aerospike; Matt Bushell, Director of Product Marketing, Aerospike Jan 23 2019 9:00 pm UTC 60 mins
    Artificial Intelligence / Machine Learning is being implemented to make better decisions to avert fraud and lower risk for digital payments. These systems thrive on data: the more you can feed them, the better they perform. We call this “Hungry AI.” Furthermore, fraud and risk decisions need to be conducted in real-time (milliseconds or less).

    Unfortunately, most data infrastructures aren’t built to handle real-time data analysis, ingesting and acting on massive datasets at the global scale needed to mitigate these problems.

    Register now for this webinar to learn:

    - The key characteristics between offline and online AI/ML
    - Why more data is better, and the measurable impacts to your business
    - Real-world AI/ML real-time use cases for fraud and risk prevention that are deployed today