Hi [[ session.user.profile.firstName ]]

Application Management

  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Recorded: Aug 21 2017 76 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
  • Deliver analytics to the whole business with Yellowfin
    Deliver analytics to the whole business with Yellowfin Brett Churchill, BI Consultant, Yellowfin Recorded: Aug 21 2017 39 mins
    With Yellowfin you can engage users with governed data they will actually use. Learn how you can deliver timely engaging, and curated analytics with the highest employee usage in the industry.

    The Yellowfin BI platform gives IT the control they need, analysts the tools and flexibility they need, and business decision-makers the trustworthy data they need. And it gives developers the flexibility and easy integration they desire.
  • The Hunt for IoT that Threatens Our Modern Way of Life
    The Hunt for IoT that Threatens Our Modern Way of Life Sara Boddy, Principal Threat Research Evangelist Recorded: Aug 18 2017 62 mins
    Not a week goes by without another IoT hack headline, yet we’re not doing enough to address this threat. We’ll show you in this presentation why the threat of IoT should remain top of mind.

    Join us for this webinar to learn about:

    - Global scope of IoT devices and their vulnerability posture – aka the IoT threat landscape
    - The growth of threat actor activity targeting IoT devices from 2016 to current day
    - A viewpoint of pre and post Mirai as an indication of what’s to come
    - The networks launching IoT attacks
    - The countries being targeted
    - What “dealing with” the threat of IoT looks like
  • Global Encryption Trends
    Global Encryption Trends David Holmes, Principal Threat Research Evangelist Recorded: Aug 18 2017 62 mins
    F5 is releasing three years of original mass scanning data and analysis on cryptographic security posture.

    What you’ll learn in the webinar:
    •How you rank against the rest of the world and your competitors.
    •Why TLS 1.3 should probably be named TLS 4.0. ​
    •Which attacks are concealing payload within encrypted tunnels
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Recorded: Aug 18 2017 21 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Automated Security for Jenkins
    Automated Security for Jenkins Matthew Barker, Solutions Architect, Twistlock Recorded: Aug 17 2017 26 mins
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Recorded: Aug 17 2017 43 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Recorded: Aug 17 2017 58 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Using Open Standards to Comply with GDPR
    Using Open Standards to Comply with GDPR Tommaso De Orchi, Solution Manager (EMEA), Yubico and Nic Sarginson, Solutions Engineer (EMEA) Recorded: Aug 17 2017 33 mins
    The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.

    An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).

    Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:

    •How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
    •How to leverage open standards to achieve GDPR compliance for strong authentication
    •How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
  • 5G in Asia Pacific, Forecast to 2022
    5G in Asia Pacific, Forecast to 2022 Quah Mei Lee, Industry Principal - Telecoms & Payments Strategy, Digital Transformation Practice, Frost Sullivan Recorded: Aug 17 2017 17 mins
    5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.

    The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.

    5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
    If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
    •How will 5G impact industry?
    •What are the market challenges and opportunities?
    •What are the key drivers for growth?
    •How big will the market be for 5G by 2022?
  • Smart Load Balancer vs Legacy Load Balancer - High Availability
    Smart Load Balancer vs Legacy Load Balancer - High Availability Chris Heggem Recorded: Aug 17 2017 1 min
    Legacy load balancers operate as HA pairs to guarantee availability. A Smart Load Balancer offers better performance, elasticity, and availability. Learn more at https://avinetworks.com/.
  • Not Your Grandmothers Network: What SDN Really Means
    Not Your Grandmothers Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Recorded: Aug 16 2017 46 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • What’s behind the “1-2 punch” of continuous testing
    What’s behind the “1-2 punch” of continuous testing Rick Bansal, Principal Consultant, CA Technologies Recorded: Aug 16 2017 45 mins
    Learn the “1-2 punch” of continuous testing by simulating needed test environments and running multi-layer testing across 100’s of protocols even before the UI is complete.With organization’s DevOps efforts testing maturity becomes a key differentiator in organization’s ability to deliver innovation to market. The benefit Agile practices gave development teams to speed up their sprints also left QA and testing professionals having to play catch-up due to slow and inadequate testing practices at the time.

    This session covers how DevTest solutions from CA allows development and testing teams to virtualize critical components, environments and 3rd party systems that might have cost or access restrictions, and then automate functional, regression, API, Web UI and performance tests across all application layers by invoking and verifying the behavior of each component.
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • Learn What's New in Sencha Test 2.2 Early Access
    Learn What's New in Sencha Test 2.2 Early Access Subu Baskaran, Sr. Product Manager at Sencha Recorded: Aug 16 2017 57 mins
    Learn about the exciting new features in Sencha Test 2.2 early access release, including simplified test creation, defect management, and results storage. We have also addressed one of the biggest challenges that test automation engineers face at the time of product evaluation – how to build good tests using stable locators.

    Attend this webinar to see a live demonstration and learn what’s new in Sencha Test 2.2 Early Access, including how to:

    - Write application (end-to-end) tests for applications built using the ExtReact framework
    - Select and use unique locators by using the DOM Tree directly from Sencha Studio
    - Create and use Page Objects to build robust tests for web applications
    - Visualize tests using a tree view and focus on the test under construction
  • Find What's Broken Fast With Splunk ITSI and Event Analytics
    Find What's Broken Fast With Splunk ITSI and Event Analytics Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Recorded: Aug 16 2017 62 mins
    The problem with data centers is that they generate a lot of events – from low-level disk warnings to critical network issues to service-level failures. While you can create manual rules to filter out some of the noise, this often isn’t enough. How do you navigate this flood of events and prioritize the ones that truly matter? How do you relate these critical events to the same core issue, and ensure everyone has the same understanding of the impacted service, relative priority and likely root cause?

    Watch this webinar to learn how you can use Splunk IT Service Intelligence and machine learning to:

    - Monitor real-time data and be alerted when an anomaly occurs
    - Automatically correlate data to generate highly qualified information, so you can take fast action
    - Enable users to investigate with context, priority and importance, so they are empowered to take actions faster
  • Considerations in Data Center Transformation
    Considerations in Data Center Transformation Tom Parker, Solutions Product Manager, Lenovo and Robert Campbell, Senior Global Technical Alliance Manager, VMWare Recorded: Aug 16 2017 43 mins
    VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.

    In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s ThinkSystem servers and infrastructure based on Intel® Xeon® Scalable processors. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
  • [Talk] op 10 Barriers to DevOps - and how to overcome them
    [Talk] op 10 Barriers to DevOps - and how to overcome them Shashi Kiran, CMO, Quali Recorded: Aug 15 2017 52 mins
    his presentation will share key insights from a survey Quali conducted of 2045 professionals to gauge the state of DevOps and Cloud adoption. It reviews the top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This is an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
  • Enterprise Authentication: Understanding the Security/Simplicity Trade-off
    Enterprise Authentication: Understanding the Security/Simplicity Trade-off Jerrod Chong, CISSP VP Solutions (USA), Yubico Recorded: Aug 15 2017 62 mins
    The 2017 Verizon Data Breach Report found that 81% of hacking-related breaches leveraged stolen and/or weak passwords last year. Organizations looking for strong authentication solutions often face a trade-off between security and simplicity.

    Smart card and FIDO Universal 2nd Factor (U2F) are two of the strongest authentication solutions for protecting your entire organization, and securing the information they access. Employees, vendors, partners, and customers all need strong authentication for workstation login, access to web applications, remote access to services, and privileged system access. During this webinar, Yubico’s VP of Solutions Jerrod Chong will share:

    • A comparison of enterprise authentication techniques, including username/password, one-time password, mobile push, smart card, and FIDO U2F
    • Why smart card and FIDO U2F are the strongest authentication solutions available today
    • How a single hardware authentication device combining smart card and FIDO U2F authentication can protect your entire organization from phishing, malware, and man-in-the-middle attacks

    Nine of the top 10 tech companies, including Google, Facebook, and Salesforce.com, use Yubico’s authentication solutions to protect all of their employees from phishing, man-in-the-middle, and malware attacks. Yubico’s enterprise-wide solution, the YubiKey, combines both smart card and FIDO U2F capabilities in a single hardware-based authentication device.
  • Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
    Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry Chris Rawles, Data Scientist and Jeff Kelly, Pivotal Recorded: Aug 15 2017 42 mins
    The Internet of Things (IoT) holds promise for both consumers and enterprises alike. To succeed, any IoT project must concern itself with how to ingest machine and sensor data, how to build actionable models, and how to react to the output of models in real-time.

    Join Pivotal Data Scientist Chris Rawles, as he illustrates how to build and operationalize an IoT application running on Pivotal Cloud Foundry that scores and reacts to streaming data in real-time. In this webinar, you will learn how to:

    - Collect streaming IoT data
    - Build and train machine learning models in real-time
    - Score streaming data in real-time in an application

    We look forward to having you join us.

    The Pivotal Team
  • Meetup: Architecting for operational sustainability with Kubernetes
    Meetup: Architecting for operational sustainability with Kubernetes Ranga Rajagopalan Recorded: Aug 15 2017 55 mins
    Container Networking and Application Services meet up with Avi Networks CTO, Ranga Rajagopalan and guest speaker Craig McLuckie from Heptio.
  • Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation
    Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation Ross Rexer, Liz Alexander, Meghan Lockwood Recorded: Aug 15 2017 47 mins
    With ServiceNow launching their new Platform upgrade, you might be in the midst of deciding whether or not this upgrade will lure you in (if you don’t have the Portal yet, you might want to think about that!).

    But more than just a binary, “should I or shouldn’t I upgrade” decision, ServiceNow’s major releases are an opportunity for companies to take a strategic look at their ServiceNow strategy.

    This webinar will talk you through:
    - Upgrades and major releases to help you think BIG
    - What you should strategically consider about Jakarta (including the quick wins)
    - Hidden pockets of value in your ServiceNow Roadmap
  • Analytics Nightmares and How You Can Prevent Them
    Analytics Nightmares and How You Can Prevent Them Meta S. Brown, Author, Data Mining for Dummies and President, A4A Brown, Inc. Aug 22 2017 3:00 pm UTC 60 mins
    Analytics risks can keep you up at night. What if…
    · We make a big investment and don’t break even?
    · Management doesn’t trust the results?
    · Analysts cross data privacy boundaries?

    What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.

    In this presentation, you will learn:
    · What causes most analytics failures
    · How you can diminish risk and maximize returns through strong analytics process
    · Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
  • How to Stay Ahead of Today's Ransomware Realities
    How to Stay Ahead of Today's Ransomware Realities Ken Westin, Security Specialist, Splunk Aug 22 2017 3:00 pm UTC 75 mins
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 22 2017 3:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Aug 22 2017 4:00 pm UTC 75 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • The 5 Keys to Successful Predictive Business Analytics
    The 5 Keys to Successful Predictive Business Analytics Lawrence Maisel, President, DecisionVu Group, Inc. Aug 22 2017 5:00 pm UTC 45 mins
    Today businesses of varying sizes, products and services, and industries are actively applying Predictive Business Analytics in seeking to improve greater customer engagement and resulting increased revenues and profits. Often these businesses are looking to their finance group to guide, if not lead, these efforts to successful outcomes.

    In a recent article written by Ray Tong, he cited a CFO magazine survey that:
    • Over 70% of respondents said that they plan to substantially increase the use of data analytics to support decision making and improve business partnering;
    • 68% of respondents, the majority of who were finance executives, said that they plan to improve their data analytic skills in the coming year.

    Consequently, it is essential that the financial professional understands what it is going to take for them to succeed.

    This webinar discusses the five (5) keys to applying Predictive Business Analytics in your organization. It provides attendees with specific and practical insights to guide their approaches to develop and deploy an effective process that improves managerial decision making across many core performance and financial areas.

    What you will learn:

    • What are the key steps to success with practical examples
    • What steps to avoid
    • How to ensure and gain organizational impact

    Larry Maisel a recognized author and thought leader in Business Analytics, with experience assisting companies to improve operating performance and business results. An accomplished business professional, with over 20+ years of experience, with proven leadership skills, expertise to drive bottom-line profits and implementing business systems.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Aug 22 2017 6:00 pm UTC 30 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy
    Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy Todd Bernhard, CloudCheckr Product Marketing Manager Aug 22 2017 6:00 pm UTC 60 mins
    The Cloud Economy represents a drastic change in how enterprises perform computing but it's not totally unprecedented. Running simultaneously in parallel with the advent of the Cloud First mentality, is the Gig Economy.

    In the Gig Economy people don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't habitually reserve a hotel room on a trip. They can use AirBnB. What lessons can cloud leaders learn from the Gig Economy that apply to the Cloud Economy and what pitfalls can we avoid?

    Cloud Professor Todd Bernhard will address these lessons in our next webinar, Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy. During this live webcast we’ll discuss:

    - Financial savings promised by the new economic model
    - New challenges presented
    - How to mitigate against such challenges
  • The Millennial Banking Technology Framework
    The Millennial Banking Technology Framework Mythili Madhav, BFS Delivery Manager & Vishwas Anand, Head of Thought Leadership Aug 23 2017 9:30 am UTC 15 mins
    In an open banking ecosystem, 92% of millennials are going to choose a bank for its digital services. Banks need to have a robust framework they can go by to develop new business models, services and data for radical transformation of millennial engagement. In this webinar you will realize:
    •The needs and MOTs of millennials in the digital age for a customer-centric approach
    •How the Millennial Banking Framework can be used by banks to transform millennial interactions
    •Value delivered through Aspire’s Millennial Banking Offering
    •Millennial engagement success stories
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Aug 23 2017 1:00 pm UTC 60 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Aug 23 2017 3:00 pm UTC 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Using Predictive Analytics to Empower Customer Experience
    Using Predictive Analytics to Empower Customer Experience Patrick Rice, CEO, Lumidatum Aug 23 2017 3:00 pm UTC 45 mins
    Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.

    In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:

    - Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
    - We have the data, now what? AI & the Future of Customer Experience
    - How to use Predictive Analytics to find the right customer on the right channel
    - 3 ways to drive ROI for your business by applying AI to improve the Customer Experience

    Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Scott Summer, Solutions Engineer Aug 23 2017 4:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • 5 Ways to Improve Your Agile/DevOps Automation Strategy
    5 Ways to Improve Your Agile/DevOps Automation Strategy Joshua Eastman, Test Automation Architect Aug 23 2017 5:00 pm UTC 60 mins
    Test automation has become a must, especially in agile and DevOps projects with their goals of continuous integration and fast deployment. QA teams face many challenges today with testing including emerging technologies, digital maturity, and fast-paced delivery expectations.

    In this session, attendees will learn about:
    1.Key challenges in today’s testing landscape that impact automation testing
    2.Ways to set expectations for automation that accelerate buy-in and support
    3.Considerations for prioritizing types of testing and technologies for automation
    4.Understanding who should be included in planning for automation
  • Data scientists: Can't live with them, can't live without them.
    Data scientists: Can't live with them, can't live without them. Wyatt Benno, CEO, DataHero Aug 24 2017 3:00 pm UTC 45 mins
    There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
    As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?

    - Should your software emulate a data scientist?
    - Learn about the power of data visualizations.
    - Learn about creating value from disperse data sets.
  • Learn How Equinix Uses Splunk as a Cloud-Based SIEM
    Learn How Equinix Uses Splunk as a Cloud-Based SIEM George Do, CISO at Equinix; Girish Bhat, Director of Security Product Marketing at Splunk Aug 24 2017 4:00 pm UTC 60 mins
    Security teams are tasked with minimizing risk and safeguarding the business while dealing with increasingly complex threats. In addition, they must have the flexibility to monitor across diverse infrastructure. Cloud-based SIEM enables security teams to spend precious time and energy on mitigating security risks rather than on deploying and managing infrastructure.

    Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM, with Splunk Enterprise Security running on Splunk Cloud, delivers instant access to advanced security analytics, valuable context and detailed insights.

    You will also learn how Splunk Enterprise Security running on Splunk Cloud can:

    •Enable you to improve threat identification and risk mitigation
    •Reduce remediation cycle times
    •Demonstrate regulatory compliance
    •Scale your SIEM deployment while reducing TCO by 50 percent compared to legacy solutions
  • Deliver apps faster with hybrid cloud solutions from Red Hat and Google
    Deliver apps faster with hybrid cloud solutions from Red Hat and Google Brandon Jung from Google Cloud and Christine Puccio & Jeff Ekstrom from RedHat Aug 24 2017 4:00 pm UTC 60 mins
    Many organizations are good at making management plans and then executing against those plans. The problem is organizations are now spending more time trying to understand the future, while at the same time the future is becoming less knowable.Organizations must adapt to growing uncertainty with innovation, not retreat, using the right combination of cloud technologies and agile operations.

    In this webinar, experts from Google and Red Hat discuss how to:
    - Implement hybrid cloud solutions more effectively
    - Launch new initiatives with less risk
    - Collectively use open source to create a more agile environment.
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks James Peng, Head of Mobile and Social Acquisition, Match Group Aug 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * James Peng, Head of Mobile and Social Acquisition, Match Group
    * Stewart Rogers, Director of Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Adjust
  • A Guide to Machine Learning Patterns and Data Visualizations
    A Guide to Machine Learning Patterns and Data Visualizations Dr. Umesh Hodeghatta Rao, CTO, Nu-Sigma Analytics Labs Aug 24 2017 5:00 pm UTC 60 mins
    Data visualization must be intuitive in order for non-IT business leaders to see data patterns. Representing data in a graphical or pictorial format is easy, but constructing the data in the best and most logical way can be tricky.

    In this session, Umesh will talk about how to represent data simply to make quicker and better business decisions. He will walk through several data visualization techniques through business cases and examples. By the end of the session, you will not only know different data visualization techniques, but also have an understanding of circumstances under which each technique should be used and the best way to represent particular data sets for different business cases.
  • Confidently Securing Docker on AWS
    Confidently Securing Docker on AWS Anupam Sahai, Vice President Product Management, Cavirin Systems; Ravi Rajamiyer, Vice President Engineering, Cavirin Systems Aug 24 2017 5:30 pm UTC 30 mins
    Please join us, on August 24th, at 10:30 AM PT, for a Webinar on how to confidently secure Docker on AWS.

    Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:

    > Securing EC2 Container Services, as well as Docker images, brought in from different registries
    > Integrating CloudTrail and CloudFormation
    > Today's best Docker security practices on AWS
    > The latest on Kubernetes

    Attend the AWS Docker Webinar and a chance to win Snapchat Spectacles.