Hi [[ session.user.profile.firstName ]]

Application Management

  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Recorded: Oct 19 2017 54 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • The TEK Center: Real World Testing for Real World Applications
    The TEK Center: Real World Testing for Real World Applications The TEK Center Recorded: Oct 19 2017 5 mins
    At Berk-Tek, we put the customer at the heart of everything we do. This statement stands true in the TEK Center’s research and development labs. A network is only as strong as the cables used to connect it and the applications lab works to ensure that every Berk-Tek cable performs beyond your expectations. By employing industry-leading research, advanced testing procedures and sophisticated modeling for emerging technologies, the applications lab translates expanding network requirements into leading edge cabling solutions that perform beyond the standard.
  • Accelerating Azure Adoption with ServiceNow Cloud Management
    Accelerating Azure Adoption with ServiceNow Cloud Management Eugene Chuvyrov, Senior Cloud Architect, Microsoft, and Manisha Arora, Senior Alliance Architect, ServiceNow Recorded: Oct 19 2017 39 mins
    Microsoft Azure is working with enterprise customers to enable digital transformation in order to improve business agility and give companies the ultimate flexibility with on‑demand infrastructure. For companies to thrive with public clouds, they need to meet the needs of the end users and developers while protecting the business. Enterprises are choosing Microsoft Azure to transition to the cloud while using ServiceNow Cloud Management to simplify self‑service, reduce risks, and control costs.

    Join us for a webinar featuring Eugene Chuvyrov, Senior Cloud Architect at Microsoft, and Manisha Arora, Senior Alliance Architect at ServiceNow, and find out how you can:

    • Minimize risk through consistent policies and standard configurations across cloud resources
    • Create a simple, self‑service catalog to automate the provisioning of Azure via cloud blueprints to accelerate your cloud journey
    • Manage cloud costs and understand utilization across your enterprise to ensure optimizing cloud services
  • DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution
    DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution Thomas Robinson, Solutions Architect, AWS & Eric Sigler, Head of DevOps, PagerDuty; Christopher Hoey, SRE, Datadog Recorded: Oct 19 2017 39 mins
    Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.

    PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
  • Keep C.A.L.M. and Integrate DevOps into Azure
    Keep C.A.L.M. and Integrate DevOps into Azure Glenn Mate, Solution Architect, 10th Magnitude & Ryan Lee, Cloud Infrastructure Engineer, 10th Magnitude Recorded: Oct 19 2017 50 mins
    Companies that embrace DevOps in the cloud develop apps faster, reduce overhead and can decrease downtime by 60% or even more. In this webinar, Glenn Mate, Solution Architect at 10th Magnitude & Ryan Lee, Cloud Infrastructure Engineer, 10th Magnitude will share several use cases around how to integrate your DevOps processes into Azure. They will also emphasize CALMS:

    * The framework that integrates the DevOps teams
    * Functions and systems within an organization around culture
    * Automation, lean, metrics, and sharing.

    By distilling the philosophy behind DevOps in the cloud, you’ll find automation and optimization at the core.
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Recorded: Oct 19 2017 66 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?

    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition
  • Defending Your Workloads with a Distributed Web Application Firewall (WAF)
    Defending Your Workloads with a Distributed Web Application Firewall (WAF) Guru Chahal Recorded: Oct 19 2017 57 mins
    Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

    Highest-performance web application security
    ● Elastic, automatic scale-out across data centers and clouds
    ● Scalable per-application deployments allow each mission-critical app to get its own WAF

    Analytics-driven, accurate security policies
    ● Real-time security insights eliminate false positives
    ● Visual policy checks prior to enforcement

    Central, simplified policy management
    ● Central management and automation of all distributed iWAF instances
    ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Recorded: Oct 19 2017 57 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • Micro Focus Fortify & Black Duck Present: End to End Security in a DevOps World
    Micro Focus Fortify & Black Duck Present: End to End Security in a DevOps World Erdem Menges, Sr. Product Marketing Manager, Micro Focus Fortify and Dave Meurer, Technical Director, Black Duck Recorded: Oct 19 2017 49 mins
    DevOps teams are building applications faster than ever before, and utilizing large amounts of open-source software to increase agility. However, that introduces the possibility of open-source security risk. The landscape of attacks has changed in recent years, with cyber-attacks increasingly happening on the application layer. This means DevOps teams need to be involved in the security process.

    This task is made more daunting as modern applications are a mix of custom code and open source in their applications. How do you protect your DevOps? Register for this webinar where security experts from Micro Focus Fortify and Black Duck discuss:
    - Understanding the mindset of an attacker
    - Ways to automate the process of risk identification
    - The ability to gate builds when finding risk elements
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security
    451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto Recorded: Oct 19 2017 57 mins
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
  • From Baseline to Audit - optimise your SAP licenses
    From Baseline to Audit - optimise your SAP licenses Martin Snookes, Senior SAP Specialist, Snow Software Recorded: Oct 19 2017 35 mins
    If you are preparing to submit your LAW Report or getting ready for an SAP audit you need to ensure your SAP License estate is optimised prior to any new purchase. Utilising the Snow Optimiser for SAP software, Snow Software’s Baseline to Audit (B2A) project service enables SAP customers to rapidly determine the true status of their SAP license position prior to any negotiation with SAP.
  • Briefing on Demand Part 3 - Talking to Your Developer about Security
    Briefing on Demand Part 3 - Talking to Your Developer about Security Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap (Moderator) Recorded: Oct 18 2017 51 mins
    More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
  • Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage
    Supermicro vSAN Hyper-Converged Solution Accelerates Software Defined Storage Sim Upadhyayula, Supermicro; Vivek Sarathy, Intel; Jase McCarty, VMware Recorded: Oct 18 2017 59 mins
    Supermicro has introduced its latest new All-Flash NVMe X11 BigTwin™ solution with Intel® Xeon® Scalable Processors and revolutionary Intel® Optane™ Technology. These offerings join an already diverse and robust portfolio of vSAN Ready Nodes from Supermicro that are easy to order, deploy and manage in wide ranging workload situations.

    BigTwin vSAN solution is designed for maximum density with 4 dual-processor nodes in a 2U rack space to support many virtual machines, and with up to 3TB of DDR4 memory per node, up to six all-flash NVMe drive bays per node, and a wide selection of Supermicro’s flexible onboard SIOM networking modules.

    For customers looking for even higher storage performance and lower price/performance, Supermicro’s vSAN portfolio also includes Intel® Optane™ SSD DC P4800X validated systems.

    Join this webinar to learn how you can enhance the efficiency and performance of your datacenter environments with Supermicro vSAN All-Flash NVMe with Intel® Optane™ SSD DC P4800X and understand the “behind the scenes” configuration, optimization, and benchmarking efforts that went in with our partners – Intel and VMware to ensure a seamless deployment with utmost confidence.
  • Taming data: How marketers turn data into real ROI
    Taming data: How marketers turn data into real ROI Jeff Sinclair, Product Manager, Engagement Platform, Atlassian Recorded: Oct 18 2017 61 mins
    Increasingly, companies have turned to customer data platforms (CDPs) to help them run more relevant marketing campaigns using the large volume of customer data at their fingertips. Customer-focused software company Atlassian will discuss how they made that decision and the types of complex marketing campaigns that they can now run as a result. Research analyst David Raab will also be on hand to discuss how other companies can use CDPs to harness customer data to increase sales and loyalty.

    In this webinar, you will learn:
    * Key considerations when deciding to build versus buy a customer data platform
    * How companies are taking advantage of CDPs for more relevant communications
    * How data science can improve marketing efficacy
    * The trends and market factors driving the need for customer data platforms

    Speaker Panel:
    * Jeff Sinclair, Product Manager, Engagement Platform, Atlassian
    * David Raab, Analyst and Founder at The Customer Data Platform Institute
    * Jeff Hardison, VP of Marketing at Lytics
    * Stewart Rogers, Analyst-at-Large, VentureBeat

    Sponsored by: Lytics
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Recorded: Oct 18 2017 42 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
     
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
     
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

     
    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Take the Chaos out of Container Monitoring
    Take the Chaos out of Container Monitoring Chris Kline, VP DevOps Strategy and Nishant Kabra, Product Management, CA Technologies Recorded: Oct 18 2017 64 mins
    Containers and microservice architectures simplify the development process, provide environmental consistency and speed updates; however, there are operational trade-offs. The ephemeral nature combined with API-centric communications results in a massive increase in objects, dependencies and metrics – challenging traditional monitoring approaches, including: topology mapping, instrumentation, and static baselining and alerting. New monitoring techniques and approaches are now needed to gain visibility and control over these dynamic platforms across the application lifecycle.

    View this webcast to learn:

    • What new monitoring, analytics and alerting techniques are best suited for containers.

    • Why an open data model is key to understanding and tracking microservice dependencies.

    • How to establish monitoring across the entire application lifecycle to increase development speed and quality.
  • Achieving Agile Application Integration
    Achieving Agile Application Integration Kevin Phillips, Sr Middleware Solutions Sales Specialist Larry Castello Sr Middleware Solutions Sales Specialist Recorded: Oct 18 2017 32 mins
    The ability to integrate APIs from multiple sources is critical to success. New approaches to enterprise integration, backed by flexible, cloud-ready technologies, are necessary. Agile integration, an architectural approach, combines agile methods and practices with technologies for the purpose of rapidly integrating applications and data.The webcast will present how to achieve an agile application integration environment on your journey to becoming a digital business.

    We will discuss:

    - How agile integration can benefit your organization and make it more responsive to market demands
    - Successful agile application integration approaches
    - Best practices for implementing an agile application integration environment

    The webcast is intended for system architects and application developers.
  • Kick-Start your Software Asset Management Practice
    Kick-Start your Software Asset Management Practice Michael Krutikov, Global Product Marketing, Snow Software and Martin Thompson, Founder of The ITAM Review Recorded: Oct 18 2017 46 mins
    What is Software Asset Management (SAM) and how can you develop a SAM practice to reduce risk, save money and empower business agility?

    This educational and interactive webinar provides an introduction to SAM for those new to the field. Martin Thompson, founder of ITAM Review, and Michael Krutikov, Global Product Marketing with Snow Software will share how organizations like yours have driven quantifiable efficiencies and delivered ROI by managing their cloud and on-premise software more efficiently.

    Learn the key steps to implementing a best-in-class SAM practice and how to avoid the most common pitfalls when starting a SAM practice.

    During this webinar you will learn:

    •What SAM is and how it differs from basic asset management
    •The ROI you can deliver with a SAM practice
    •Top 3 common hurdles to avoid when starting your implementation
    •Tips to getting your SAM solution started successfully
    •Best practices from other successful organizations such as Carnival and Sky.

    Register today and all attendees will enter a prize draw to win one of 20 free copies of Practical ITAM – The Essential Guide for IT Asset Managers: Getting started and making a difference in the field of IT Asset Management, by Martin Thompson from ITAM Review. Please click here for full terms and conditions http://ow.ly/7sSW30f6b3W
  • 10-step plan to roll out Cloud devops
    10-step plan to roll out Cloud devops Mark Baker, OpenStack Product Manager Recorded: Oct 18 2017 56 mins
    In this webinar we will talk about practical steps that will help you:
    - Reap the benefits of hybrid cloud by adapting to cloud devops
    - Deal with the technical and operational pitfalls involved in migrating to native cloud
    - Make the right choices for your cloud architectural to achieve lean devops
  • Briefing On Demand Part 1 - Rethinking Security for Hybrid Environments
    Briefing On Demand Part 1 - Rethinking Security for Hybrid Environments Bo Kim, Sr. Director of Information Security, Imperva; Brandon Dunlap (Moderator) Recorded: Oct 17 2017 58 mins
    As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
  • ExtraHop 7.0: Know the Shape of Your Enterprise - APAC
    ExtraHop 7.0: Know the Shape of Your Enterprise - APAC Isaac Roybal, Director of Product Marketing and Daniel Chu, Director of Systems Engineering Recorded: Oct 17 2017 55 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • Rethink Load Balancing: 7 Considerations Before Your Next Refresh
    Rethink Load Balancing: 7 Considerations Before Your Next Refresh Ashish Shah Recorded: Oct 13 2017 44 mins
    Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.

    Learn how Avi Networks delivers flexible application services beyond load balancing, including:

    • Application analytics and visibility
    • Predictive autoscaling
    • Automation in private data centers or the public cloud.
  • Data Services Overview - CloverETL
    Data Services Overview - CloverETL Pavel Najvar Recorded: Oct 13 2017 2 mins
    For on-demand fresh data from data sources, API focused on Data.
  • Version Control: Managing Tests, Results and Source Code
    Version Control: Managing Tests, Results and Source Code Jonathan Barber Recorded: Oct 12 2017 57 mins
    Writing software is hard, with projects easily reaching hundreds of thousands of lines of text. Source control allows developers to manage these giant corpuses, tracking who made what changes and when. In this webinar we’ll talk about how you can use the same source control systems to manage tests and their results, so you always have a record of what happened and when.

    In this webinar, learn about:
    1. The basics of source code management (SCM) tools
    2. How to use SCM to manage your test suite
    3. The advantages of storing tests alongside your source code
  • Cloud Leaders Panel: Expert Insights for Developing a Cloud-First Approach
    Cloud Leaders Panel: Expert Insights for Developing a Cloud-First Approach Bob Hale: CEO at Alterian, Mike Pinch: CISO at University of Rochester, Dan Wacker: CFO, ClubReady Recorded: Oct 12 2017 49 mins
    Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.

    In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
  • The Cost of Building a Threat Hunting Team in Your SOC
    The Cost of Building a Threat Hunting Team in Your SOC Stuart Davis, Director, Mandiant Oct 24 2017 9:00 am UTC 60 mins
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • Best Practices for Enterprise Cyber Intelligence Operations
    Best Practices for Enterprise Cyber Intelligence Operations Igors Konovalovs, Director, FireEye iSIGHT Intelligence Oct 24 2017 11:00 am UTC 45 mins
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • ThinkAgile VX Series: The World of HCI Just Got Easier
    ThinkAgile VX Series: The World of HCI Just Got Easier Tony Harvey, Sr Product Manager, vSAN Hyperconvergence, Lenovo; Robert Campbell, Technical Alliance Marketing Manager, Vmware Oct 24 2017 3:00 pm UTC 60 mins
    Imagine you went to a restaurant and ordered fish and your server came back with a Patagonian Toothfish, a pile of random spices and vegetables, a knife and a frying pan and told you to cook it yourself. Hhhmmm, you thought. So you asked for help. The response: a badly photocopied sheet of paper with a website URL to learn the ingredients for a “Chilean Sea Bass” and a few recipes to boot. This is how we build infrastructure today.

    VMware vSAN based hyperconverged solutions from Lenovo revolutionize how you can deliver your datacenter infrastructure. The set-up is simpler, it costs less and easier to use than traditional IT solution. It allows you to focus on running your business rather than on building your infrastructure. Join this webinar as VMware and Lenovo introduce the new ThinkAgile VX Series. The result of this offering: ability to focus on the true business value of hyperconvergence. You will see how vSAN ReadyNodes and ThinkAgile VX will help re-engineer Enterprise IT to be flexible and responsive, enabling more time delivering business value rather than integrating IT infrastructure.
  • How to Bridge the Gap between Citizen Developers and Corporate IT
    How to Bridge the Gap between Citizen Developers and Corporate IT Stephen Terlizzi Oct 24 2017 5:00 pm UTC 30 mins
    Not everyone can write code – but nearly anyone can solve a problem. Today's businesses are facing an ever increasing set of problems that require innovative digital solutions. Learn how to safely enable a new army of application developers: the citizen developer.

    This webinar will examine the use of citizen developers to meet the ever increasing demand for new applications. We will discuss:

    • The current challenges with citizen developers and the gap between them and corporate IT

    • An new approach to the application development lifecycle to reduce the complexity of software development and empower this new army of developers

    • The concept of gadgets and their role in providing functionality in a secure and compliant manner

    • Potential areas where citizen developers can quickly build their own applications
  • Bias in the Web
    Bias in the Web Ricardo Baeza-Yates, CTO, NTENT; ACM Fellow; IEEE Fellow Oct 24 2017 5:00 pm UTC 60 mins
    The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake news. Indeed, social (digital) media is just an amplifying mirror of ourselves. Hence, the main challenge of search engines and other websites that rely on web data is to assess the quality of such data. However, as all people have their own biases, web content, as well as our web interactions, are tainted with many biases.

    Data bias includes redundancy and spam, while interaction bias includes activity and presentation bias. In addition, sometimes algorithms add bias, particularly in the context of search and recommendation systems. As bias generates bias, we stress the importance of de-biasing data as well as using the context and other techniques such as explore & exploit, to break the filter bubble.

    The main goal of this talk is to make people aware of the different biases that affect all of us on the Web. Awareness is the first step to be able to fight and reduce the vicious cycle of bias.

    Ricardo Baeza-Yates areas of expertise are web search and data mining, information retrieval, data science, and algorithms. He is CTO of NTENT, a semantic search technology company based in California, USA since 2016. Before, he was VP of Research at Yahoo Labs, based first in Barcelona, Spain, and later in Sunnyvale, California, from January 2006 to February 2016. He also is part time Professor at DTIC of the Universitat Pompeu Fabra, in Barcelona, Spain, as well as at DCC of Universidad de Chile in Santiago.
  • First Impressions are Everything with the Employee Experience
    First Impressions are Everything with the Employee Experience Adam Mason, Tom Sweeney, Meghan Lockwood Oct 24 2017 5:00 pm UTC 60 mins
    Dealing with Employee Onboarding, Tracking, and Provisioning in the Digital Revolution - or Something Better...

    What if you could consumerize the Employee Service experience?

    Making onbaording a breeze for new employees, perhaps even increasing your employee satisfaction score? It's a no brainer right?

    There are a lot of platforms who promise they have the "right recipe" when it comes to HR delivery. Finding out the truth behind a platform can be just as scary as implementing one!

    That's why on Tuesday, October 24th, you should join Adam Mason, VP of Solutions and Innovation, and Tom Sweeney, Bussiness Process Consultant, of Acorio for our October webinar. They'll cover ServiceNow's new product, HR Service Delivery, and help you understand the platform's onboarding experience and what success it can bring to your company's future (and current) employees.

    Find out if your onboarding experience is working.
  • Rev Up Your Cloud Integrations with Big Data Technology
    Rev Up Your Cloud Integrations with Big Data Technology Eric Greenfeder, Chief Architect, Primitive Logic Oct 24 2017 9:00 pm UTC 60 mins
    This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
  • Cloud Interconnection: A Faster, More Secure Road to the Cloud
    Cloud Interconnection: A Faster, More Secure Road to the Cloud Carlos Arévalo, Global Solutions Architect, Equinix | David Maclean, Systems Engineer, F5 Networks Oct 25 2017 9:00 am UTC 60 mins
    Organisations are rapidly adopting cloud interconnection at colocation facilities. It is an ideal place to provide services that need to be shared by multiple cloud locations, run legacy applications, or deliver application and security services. By deploying application delivery with cloud interconnection services, businesses get the flexibility and scale of the public cloud without sacrificing security, availability, and performance of their applications.

    Join Equinix and F5 experts for an informative webinar where you will learn how to:

    - Benefit from cloud interconnection services
    - Deliver advanced security services: Single sign-on, Cloud federation, Web application firewall, SSL inspection, DDoS protection, DNS, and more
    - Leverage cloud gateway services as a central point of control between legacy data centers, colocation, and public, private, or hybrid cloud
    - Avoid cloud provider lock-in through direct, private access to multiple public clouds
  • Endpoint Security: No longer taking a back seat!
    Endpoint Security: No longer taking a back seat! Remon Verkerk, Systems Engineer, FireEye Oct 25 2017 10:00 am UTC 60 mins
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.



    -----------------------------------------------------------------------------------------------------------
    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap
    Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap Johannes Peeters, Stefan Kochishan CA Technologies Oct 25 2017 3:00 pm UTC 60 mins
    The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
    The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
    Now is the time to move from hype to reality.
    This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
  • Get Amped! TIA’s Telephone Verification Logos
    Get Amped! TIA’s Telephone Verification Logos Jessica Trentman, Jeff Strickland, Jonathan Gray, Don McKinnon, Linda Kozma-Spytek, Stephanie Montgomery, Limor Schafman Oct 25 2017 3:00 pm UTC 90 mins
    Telecommunications Industry Association TR-41 committee developed the TIA-4953 (amplified telephones) and TIA-1083 (HAC performance for telephones) standards.

    TIA has logos to provide the hearing-impaired community a simple and clear solution to identify telephones that meet hearing audio amplification and HAC performance needs per these standards.

    This webcast will review the process to receive and use the logos, and additionally cover what standards work is underway at TIA for mobile telephone audio performance.

    Speakers:
    >> Jessica Trentman, Marketing Director, CaptionCall
    >> Jeff Strickland, Director of R&D, Clarity Products
    >> Jonathan Gray, Director of Sales, Clarity Products
    >> Linda Kozma-Spytek, Research Audiologist, Technology Access Program, Gallaudet University
    >> Don McKinnon, VP of Testing Services, AST Technology Labs
    >> Stephanie Montgomery, VP Technology and Standards, TIA
  • Continuous Delivery: Fly the Friendly CI in Pivotal Cloud Foundry with Concourse
    Continuous Delivery: Fly the Friendly CI in Pivotal Cloud Foundry with Concourse Greg Chase, James Ma, Topher Bullock, Pivotal Oct 25 2017 6:00 pm UTC 60 mins
    Concourse is an open source continuous integration (CI) system designed for agile development teams. It supports developers that practice test-driven development and continuous delivery (CD) by automating a teams build-to-release process inclusive of all automated testing.

    Concourse provides dependable results for each build run. It allows agile development teams to deliver business value at a much higher velocity. It allows teams to treat every code commit as if it’s about to be deployed to production.

    In this webinar, we’ll talk about how teams’ practice agile development in relation to developing, testing and deploying apps in Cloud Foundry. We’ll also cover the role that Concourse plays in aiding high velocity delivery of applications.

    Our agenda includes:
    - What is CI / CD and how do these practices fit into Pivotal's development practices
    - Overview of Concourse and how it differs from other CI / CD systems
    - Why Pipelines are useful for continuously delivering apps to Pivotal Cloud Foundry
    - Why containers are useful for continuously delivering apps to Pivotal Cloud Foundry
    - Examples of how these concepts work in practice
    - How to get started using Concourse to continuously deliver value

    We thank you in advance for joining us.
    The Pivotal Team
  • How to Scale Enterprise DevOps in the Era of Docker & Application Containers
    How to Scale Enterprise DevOps in the Era of Docker & Application Containers Jay Lyman, 451 Research, & Scott Coulton, Puppet Oct 25 2017 6:00 pm UTC 45 mins
    Application container software such as Docker and Kubernetes are among today's most disruptive trends in enterprise IT. While many are contemplating how containers may disrupt or even overtake DevOps in terms of hype or adoption, it's important to remember the reality that both containers and DevOps are part of the larger trend toward digital transformation.

    Containers are definitely having an impact on DevOps tenets of faster application releases and more efficient infrastructure management, but are just as likely to be a catalyst to scaling DevOps rather than competition.

    This webinar presented by 451 Research and Puppet will offer some perspective on what container software really means for the modern DevOps movement in the enterprise based on industry analysis and experience, survey data and customer case studies.
  • Using EU GDPR Compliance to Build Better Apps
    Using EU GDPR Compliance to Build Better Apps Nathan Devoll, CA Technologies Oct 25 2017 6:00 pm UTC 60 mins
    With less than a year before the EU General Data Protection Regulation (EU GDPR) goes into effect, many companies are scrambling to figure out how to be compliant with yet another regulation. A better way to approach this (or any) compliance initiative is to understand its basic requirements then search for solutions that will not only help you to meet compliance, but improve your business.

    Don’t just become compliant, become better! The EU GDPR is not only an opportunity to evaluate how your teams use personal data for testing, but how those teams can build better data from scratch with faster and better results.

    Join our expert, Nathan Devoll from CA Technologies, as he clearly explains the EU GDPR and builds the case for generating new data more quickly without the compliance headaches. You’ll come away with a clear understanding how you can become EU GDPR compliant and build better data, at the same time!
  • Effective High-Speed Multi-Tenant Data Lakes
    Effective High-Speed Multi-Tenant Data Lakes Sean Suchter, CTO and founder, Pepperdata Oct 25 2017 9:00 pm UTC 60 mins
    Big Data has increased the demand for big data management solutions that operate at scale and meet business requirements. Big Data organizations realize quickly that scaling from small, pilot projects to large-scale production clusters involves a steep learning curve. Despite tremendous progress, critically important areas including multi-tenancy, performance optimization, and workflow monitoring remain areas where the operations team still needs management help.

    Intended for enterprises who already have a data lake or are setting up their first data lake, this presentation will discuss how to implement data lakes with operations tools that automatically optimize clusters with solutions for monitoring, performance tuning, and troubleshooting in production environments.

    Sean is the co-founder and CTO of Pepperdata. Previously, Sean was the founding GM of Microsoft’s Silicon Valley Search Technology Center, where he led the integration of Facebook and Twitter content into Bing search. Prior to Microsoft, Sean managed the Yahoo Search Technology team, the first production user of Hadoop. Sean joined Yahoo through the acquisition of Inktomi, and holds a B.S. in Engineering and Applied Science from Caltech.
  • Requirements for App Delivery in a hybrid and multi-cloud world
    Requirements for App Delivery in a hybrid and multi-cloud world Nihal Mirashi, Sr. Product Marketing Manager, Citrix & Mikko Disini, Director of Product Management, Citrix Oct 26 2017 1:00 pm UTC 60 mins
    In a cloud-first world, providing a seamless application experience for users can be challenging for IT. Is there a problem with the network or is it the server? Is there an issue with the cloud provider, or is it an issue on the other side? If these scenarios sound familiar, then this webinar is for you!

    What you will learn:

    •Key requirements for application delivery networking in a cloud-first world
    •Common enterprise application delivery use cases and challenges
    •How Citrix is evolving NetScaler to meet the app delivery needs of the cloud-enabled enterprise
  • SAP Indirect Usage costs more than you think. Learn how to avoid financial risk.
    SAP Indirect Usage costs more than you think. Learn how to avoid financial risk. Brian Skiba, Dan Kirtley Oct 26 2017 2:00 pm UTC 45 mins
    SAP customers are becoming increasingly exposed to financial risk through audits, particularly where third party applications and add-ons indirectly access and use SAP data.

    This type of access is known as Indirect Usage.

    In this webinar, we explain how some of the recent amendments to SAP’s terms and conditions might lead to further exposure for your organization. You will learn how to efficiently highlight activity in the SAP system to identify where Indirect Usage may be taking place and what to do about it.

    Don’t walk your organization into a hefty audit fine! Make sure that you’re fully prepared and reduce your exposure to a minimum.
  • How Splunk & AWS Enabled End-to-End Visibility for PagerDuty
    How Splunk & AWS Enabled End-to-End Visibility for PagerDuty David Potes, Solutions Architect, AWS; Erin Sweeney, Sr Director, Splunk; Arup Chakrabarti, Director of Engineering,PagerDuty Oct 26 2017 3:00 pm UTC 60 mins
    Threats are evolving and emerging every day. PagerDuty needed to take a more proactive and efficient stance to monitor, investigate and triage threats and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for PagerDuty to gain end-to-end visibility across their cloud environment. In this webinar, you’ll learn how PagerDuty gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk on AWS.

    Join us to Learn:

    •How to get started proactively identifying, scoping, and analyzing security threats.
    •The value of an analytics-driven security model.
    •How Splunk offers end-to-end visibility across your AWS environment.
  • ISO Cloud Computing Interoperability and Portability Standards
    ISO Cloud Computing Interoperability and Portability Standards Cloud Standards Customer Council Oct 26 2017 3:00 pm UTC 60 mins
    For cloud computing, interoperability and portability related challenges are likely to intensify and become more difficult to manage as systems grow more complex and interconnected, especially with the use of multiple cloud services as part of a system. In this webinar, the Cloud Standards Customer Council will receive an update on a new ISO Cloud Computing Interoperability and Portability specification - ISO/IEC 19941. This new ISO standard specifies cloud computing interoperability and portability types and the relationship and interactions between these two cross-cutting aspects of cloud computing. It also provides a model to enable a clear description of interoperability and portability when building and using systems based on cloud computing.

    Attending this webinar is beneficial for all parties involved in cloud computing – cloud service customers, cloud service providers, and cloud service partners – to gain a common understanding of interoperability and portability for their specific needs.
  • The Cognitive Business, where BPM and Intelligence Converge.
    The Cognitive Business, where BPM and Intelligence Converge. Frank Beyer, Business Process Consultant Oct 26 2017 5:00 pm UTC 45 mins
    Intelligence is the rocket fuel to all Process Automation projects, whether the task is low-level (RPA) or high-level complex processes. In this session, you will hear a holistic but pragmatic approach to implementing intelligence as part of a company’s digital transformation journey.

    Join this webinar to hear Frank Beyer and Bizagi as they discuss:

    - How to structure your approach to RPA and to higher-level process automation
    - Identifying processes that require a higher level of cognitive skills
    - How to digitize cognitive work such as analysis, synthesis and evaluation

    Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals
  • Understanding Software Capitalization: A Multi-Perspective Approach for a PMO
    Understanding Software Capitalization: A Multi-Perspective Approach for a PMO Donna Fitzgerald Executive Director, Nimble PM & Jim Tisch, CA Technologies Oct 26 2017 5:00 pm UTC 60 mins
    Join us for a discussion on a modern capitalization framework to comply with the requirements of SOP 98.1. We will discuss a common-sense, risk-aware approach that works with any software development method for project-oriented work. Once capitalization starts, the PMO will need to be able to show evidence of appropriate financial controls over the project. In this webinar, seasoned PPM and strategy execution expert Donna Fitzgerald explains in detail a framework for modern capitalization. Join Donna to learn:

    •Why the Modern PMO should be deeply involved in the portfolio process
    •Why project managers need to understand what value their software project is designed to deliver.
    •How to eliminate confusion around SOP-98.1
    •How to understand capitalization from an accounting perspective

    Gain key takeaways to apply in your organization today when applying best practices to software capitalization. Don’t miss this opportunity to learn best practices and recommendations to ensure your organization receives the highest possible value in the new world of digital business.
  • Amplifying VMware vSAN Performance: Lessons Learned and Tips
    Amplifying VMware vSAN Performance: Lessons Learned and Tips Jonathan Flynn, Virtualization Technologist, Western Digital; John Nicholson, Senior Technical Marketing Architect, VMware Oct 26 2017 5:00 pm UTC 45 mins
    How to get the most out of vSAN – VMware’s Hyper-Converged Infrastructure (HCI) software. In this webinar you will learn testing and tuning insights and lessons learned from Western Digital’s ongoing vSAN performance test bed. Learn the test bed design and why it’s done the way it is. You’ll find the answers to questions such as: What performance tools are used in the industry and why? How do vSAN features such as Erasure Coding, Deduplication and Compression, and Object Checksum impact performance? What design principles should be used when configuring your vSAN and implementing your VMs? What does “Working Set” mean, and how does it impact performance? What other knobs can be turned (e.g., Disk Stripes per Object, Cache Line Settings, etc.), and what can you expect from them?
  • Messaging for Cloud-Native and Migrated Apps: What’s New with RabbitMQ for PCF
    Messaging for Cloud-Native and Migrated Apps: What’s New with RabbitMQ for PCF Greg Chase, David Histon, Wayne Lund Oct 26 2017 5:00 pm UTC 60 mins
    Developers choose RabbitMQ for messaging between scalable microservices. It acts as a bridge to facilitate communication between replatformed or migrated applications and other legacy systems. In this webinar, we’ll review these common use cases and patterns.

    We’ll then introduce the new features of RabbitMQ and RabbitMQ for Pivotal Cloud Foundry (PCF), and explain how they can add scale and resiliency. Finally we’ll discuss the roadmap for both RabbitMQ and RabbitMQ for PCF.

    Our agenda includes:
    - Introduction of RabbitMQ and RabbitMQ for PCF
    - RabbitMQ patterns for microservices messaging
    - RabbitMQ patterns for application replatforming and migration
    - New features of RabbitMQ and RabbitMQ for PCF
    - How to use on-demand clusters of RabbitMQ for PCF
    - Roadmap for RabbitMQ and RabbitMQ for PCF

    We thank you in advance for joining us.
    The Pivotal Team