Welcome to the big data and data management community on BrightTALK. Join thousands of data quality engineers, data scientists, database administrators and other professionals to find more information about the hottest topics affecting your data. Subscribe now to learn about efficiently storing, optimizing a complex infrastructure, developing governing policies, ensuring data quality and analyzing data to make better informed decisions. Join the conversation by watching live and on-demand webinars and take the opportunity to interact with top experts and thought leaders in the field.
Does this sound familiar? It’s month end… time for reconciliations, account analysis, journal entries, and long hours. Pulling multiple reports to get to the necessary subledger transactions can be tedious and time consuming. Booking journal entries, tying out accounts, plus more, all in different systems and tools is inefficient and error-prone. What if you had a tool that can simplify these processes, plus more? In this webinar, we will show you GL Connect, a month end tool that allows:
•Reconciliations with full drill down to the subledger
Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability of metadata searching operations. Join Caringo VP of Product Tony Barbagallo and Caringo Engineer Jamshid Afshar as they take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage.
VR creates infinite storytelling possibilities, but it’s also infinitely difficult to pull off. It’s a completely new medium that requires an entirely new way of creating content, and endless inventiveness, and have you ever seen a 360-degree camera?
Join our latest interactive VB Live event to hear how companies are reducing travel expenses but improving employee connection, conducting interviews, and giving presentations. Learn about companies like Walmart using VR technology to train employees; how doctors are leveling up their skills; educators are transforming learning; and audience engagement skyrockets when you give them a whole new way to see, touch and interact.
And discover how consumers are interacting with VR right now, and what the marketplace is expected to look like in the year ahead.
Register now for real talk on the possibilities of virtual reality, the resources you need, and the rules to break.
In this webinar you’ll:
*Hear the results - for the first time - of the latest VR market research
*Discover the compelling business case for VR
*Understand why consumer-generated VR content is important to business
*Find out how companies are using VR content to strengthen their bottom line
*Learn what’s next in the VR content world
* Dean Johnson, Head of Innovation, Brandwidth
* Crystal O’Hea, Senior Director Expedition X, SeaWorld Parks and Entertainment
* Stewart Rogers, Director of Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.
Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.
Attend this webinar to learn how telecoms and other mobile companies can:
Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.
Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.
Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.
Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.
MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.
Try the demo here: https://www.tutela.com/explorer/
The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:
+ How should objections to production requests be handled?
+ Are you required to produce subpoenaed data stored internationally?
+ Should there be a limit to fees assessed for discovery misconduct?
+ When is data stored by a third party considered to be within your control?
+ Should courts dictate search terms to parties?
+ How can you make an effective proportionality argument to address burdensome requests?
+ Can the requesting party dictate the form of production?
+ Does storing data on a file share site waive privilege?
+ If data is intentionally deleted, should Rule 37(e) apply?
+ Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
+ Should keyword search be performed before Technology-Assisted Review?
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.
Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.
Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.
Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.
In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.
If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
To achieve digital transformation means businesses need to be data driven, insight rich, and intelligently powered. Companies that strategically invested in MDM consistently out perform both digital and non digitally focused organizations. Why? Because MDM brings understanding to the data across a complex hybrid ecosystem of data silos and platforms allowing digital enterprises to gather, orchestrate and syndicate data and insights anywhere at any time. The best practices, skills and technologies needed to power master data, are the foundational skills to scale the broader investment in information and analytic architecture. Michele Goetz, Principal Analyst at Forrester Research, will share how digital transformation is shaping MDM and how businesses are rethinking their MDM strategies for competitive advantage.
• How MDM is at the center of driving stronger business outcomes
• How MDM competencies lay the foundation for data mastery and deeper insight
• How MDM technology is evolving to meet the new digital age and how to select your MDM capabilities
Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.
This webinar will cover:
•A review of CMP capabilities
•How to operate and manage applications and data across hybrid cloud infrastructures
•Available CMPs on the market today
•Evaluation criteria for selecting a CMP to meet your needs
Watch this video to find out how Nasdaq improves agility and reduces costs for their Big Data infrastructure, while ensuring performance and security. To learn more about the BlueData software platform, visit www.bluedata.com
Is your organization adopting the Cloud? Are you involved in any discussions about implementing a Data Lake?
In this webinar, HVR experts Joe deBuzna and Mark Van de Wiel provide practical, real-world knowledge about how to integrate data successfully into your cloud-based data lake. They address common cloud and data lake deployment concerns such as: integrating data from multiple sources, moving data securely, validating data and more.
This webinar also features a live demo of HVR's latest Data Lake release to continuously move on-prem data into a Data Lake on S3, and programmatically validate data correctness.
What you will learn:
- Evolution of data integration that led to Data Lakes
- Common challenges when integrating data into a Data Lake and how to overcome them
- Best practices for integration into, out of and between Clouds.
Who should attend: Data Architects, Database Administrators, Business Intelligence Analysts
The BlueData EPIC software platform makes deployment of Big Data infrastructure and applications easier, faster, and more cost-effective – whether on-premises or on the public cloud.
With BlueData EPIC on AWS, you can quickly and easily deploy your preferred Big Data applications, distributions and tools; leverage enterprise-class security and cost controls for multi-tenant deployments on the Amazon cloud; and tap into both Amazon S3 and on-premises storage for your Big Data analytics.
Sign up for a free two-week trial at www.bluedata.com/aws
Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
Join us for this live webinar to discover:
oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
oThe pitfalls and limits of vertically scaling your ADC
oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
oExamples of organizations who have accomplished this with HAProxy
IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.
In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:
•The market and technology trends that influence workload, data center and cloud strategy
•How to evaluate the characteristics of various workloads and execution venues
•How to manage workloads across on-premises and off-premises ecosystems
Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
The BlueData software platform is a game-changer for Big Data analytics. Watch this video to see how BlueData makes it easier, faster, and more cost-effective to deploy Big Data infrastructure and applications on-premises.
With BlueData, you can spin up Hadoop or Spark clusters in minutes rather than months – at a fraction of the cost and with far fewer resources. Leveraging Docker containers and optimized to run on Intel architecture, BlueData’s software delivers agility and high performance for your Big Data analytics.
See an in-depth discussion of the new features and a demo of Enterprise Information Catalog10.2. Learn how this smart data catalog can manage and maximize the value and re-use of data assets across the enterprise.
The upcoming GDPR legislation represents a sea change for organisations that store or process data relating to EU residents. With penalties for violations up to 4% of annual global turnover, organisations are scrambling to comply with GDPR provisions. Effective data governance and access control helps enterprises manage risk effectively, comply with regulations and gain competitive advantage through agile decision.
Join Srikanth Venkat, Sr. Director Product Management and Ana Gillan, Solutions Engineer as they discuss effective data governance and its role in complying with regulations such as GDPR. They will also cover Atlas and Ranger, the governance and security components of Hortonworks Data Platform and their role in effective data governance.
This webinar is not intended to constitute legal advice. Viewers should consult with their own legal counsel regarding compliance with GDPR and other laws and regulations applicable to their particular situation and intended use of any Hortonworks products and services. Hortonworks makes no warranties, express, implied, or statutory, as to the information in this webinar.
This 30-minute webinar will elaborate on how you can apply Design Thinking to your BI and analytics projects with a few real-world scenarios.
In Scenario 1, we’ll explore a dashboard application project to illustrate best practices for designing for straight-up “data consumption” by your users.
Scenario 2 explores the design possibilities for an intuitive analytics app (InfoApps™), which moves us from pure data consumption to data interaction and discovery.
We’ll look at examples of research documentation, prototypes, and wireframe samples to understand how we can use Design Thinking to focus our ideas into tangible, workable solutions.
All registrants will receive a Design Thinking Starter kit with wireframe templates.
More than 800,000 people use our Yellowfin product every week. We’ve achieved this by making user adoption and stickiness a core part of our product development.
We think about stickiness constantly and have a central goal to continuously improve our user adoption rates. It’s taken us years to understand the drivers of these behaviours. The lessons we’ve learned along the way can be distilled into five key components:
Building an analytics strategy from nothing can seem daunting. In many companies data analysis happens in isolated pockets of the business, rather than a more impactful, strategic approach to analytics. But going from zero to data-driven is easier than you thought. In September 2015 the Cox Automotive Data Solutions team started as a team of one with a blank sheet of paper. 14 months later, Cox Automotive is revolutionising decision-making within the business and the wider automotive retail industry.
Watch this webinar to discover some of the lessons learned by Cox Automotive along their journey to data discovery, including:
-Where to begin transforming a legacy business into a data-driven organisation
-How to build and maintain momentum
-How to deliver meaningful results at pace
IoT data is growing at such an enormous rate that it’s simply overwhelming traditional data storage and analytics technology. Check out this on demand episode of IM Live, with guests IoT analyst Mark Madsen and Zoomdata’s Ian Fyfe
With the EU General Data Protection Regulation (GDPR) now agreed for implementation, now is the right time for organizations to review their data governance and protection requirements.
During this webinar, Martin Sugden discussed and explored practical advice for US organizations about EU GDPR and how it affects organizations located outside of the EU which hold information on EU citizens.
This webinar provides you with practical advice about how to identify the data that will be impacted by EU GDPR and how data classification can help improve your data governance measures and get data protection processes in shape in advance of EU GDPR
“I would not want to be a merchant responsible for managing fraud today,” Spear told Karen Webster in a live online discussion on the topic held last week with an audience of online retailers. “It is a full-time job, 24/7/365, against constantly evolving threats.”
Ecommerce fraud losses have fallen 34.7% since Q1 2016, helped by machine learning and new services like Guaranteed Fraud Protection. However, merchants across eight major industry segments are still expected to lose $48.2 billion this year. And not all industries have improved. For example, online Department Stores saw fraud losses rise by 146.5% between Q1 2016 and Q1 2017. What’s changing, and what’s next? Hear directly from experts responsible for protecting over 5,000 e-commerce merchants globally.
Join PYMNTS CEO Karen Webster and Signifyd’s Vice President of Partnerships, Skye Spear, as they discuss the first installment of the Global Fraud Index, covering 5 quarters from Q1 2016 through Q1 2017. The Index provides the most extensive data and reporting to date on ecommerce fraud across 8 major verticals. Specific types of fraud and key trends are examined for each major vertical, including apparel; department stores; consumer electronics; cosmetics and perfumes; furniture, appliances and home improvement; health, leisure and hobbies; jewelry and precious metals; and alcohol, tobacco and cannabis.
Operational Technology (OT) consists of hardware and software that are designed to detect or cause changes in physical processes through direct monitoring and control of devices. As companies increasingly embrace OT, they face a dilemma as to whether to keep these new systems independent or integrate them with their existing IT systems. As IT leaders evaluate the alternatives, there are 5 key barriers to IT/OT integration to consider.
Business Process Knowledge
Manageability & Support
Dependency Risk – Two of the key challenges of enterprise IT environments are managing the complex web of dependencies and managing the risk of service impact when a dependent component fails or is unavailable. With traditional IT, the impact is typical to some human activity, and the user is able to mitigate impact through some type of manual activity. For OT, companies must be very careful managing the dependencies on IT components to avoid the risk of impacting physical processes when and where humans are not available to intervene and mitigate the situation.
Management of OT Data – The data produced by OT devices can be large, diverse in content, time sensitive for consumption and geographically distributed (sometimes not even connected to the corporate network). In comparison, most IT systems have some level of tolerance for time delays, are relatively constrained in size and content and reliably connected to company networks, making them accessible to the IT staff for data management and support.
Security – IT systems are a common target for malicious behavior by those wishing to harm the company. The integration of OT systems with IT creates additional vulnerability targets with the potential of impacting not just people and but also physical processes.
Segmentation of IT
What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
In this webinar, produced in conjunction with Commvault EMEA Platinum Partner of the Year COOLSPIRiT, learn how Commvault's scalable, powerful and simple solutions ensure Application Availability and Robust Data Protection across your entire infrastructure.
Presented by Marc Lucas, Commvault Systems Engineer, find out how to:
* Simplify the move to the Cloud
* Utilise award-winning BaaS, DraaS and SaaS Data Protection
* Obtain greater insight with software defined storage
* Ensure data availability for business-critical applications
* Minimize system downtime with an innovative and scalable solution
COOLSPIRiT provides in-depth knowledge and expertise across the solutions portfolio. Their highly-skilled accredited experts can analyse and review your existing IT infrastructure to recommend and deliver the best value for your business. With proven best practice and multiple use cases, COOLSPIRiT Solutions Architects can help to design, configure and implement a robust IT strategy for data availability, compliance and disaster recovery.
Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.
In this webinar, we will explore how Tableau can help with all stages of an analytics project, but focus specifically on a few advanced capabilities. Broadly, we will look at the following scenarios and the capabilities that support them:
-Segmentation and Cohort Analysis
-What-If and Scenario Analysis
-Rand Python Integration
Attend to see how Tableau is making advanced analytics exploratory, faster and more scalable than ever before.
Is your company on a data-driven digital transformation journey?
With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.
In this webinar, you will learn:
- Current digital transformation market trends driving the influence of cloud.
- Role of hybrid data management
- How National Instruments is growing at scale and reducing time to market for their products and services
- How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
In this webinar, Healthcare Analytics Expert, Dr. Gwen O'Keefe will explore analytics capabilities that have transformed other industries, like healthcare, and how they can be applied to yours. She'll outline the key steps for success and adoption of predictive analytics projects and share how to advance the use of predictive analytics and machine learning to improve all aspects of your business.
Deep Learning has shown a tremendous success, yet it often requires a lot of effort to leverage its power. Existing Deep Learning frameworks require writing a lot of code to work with a model, let alone in a distributed manner.
This webinar is the first of a series in which we survey the state of Deep Learning at scale, and where we introduce the Deep Learning Pipelines, a new open-source package for Apache Spark. This package simplifies Deep Learning in three major ways:
1. It has a simple API that integrates well with enterprise Machine Learning pipelines.
2. It automatically scales out common Deep Learning patterns, thanks to Spark.
3. It enables exposing Deep Learning models through the familiar Spark APIs, such as MLlib and Spark SQL.
In this webinar, we will look at a complex problem of image classification, using Deep Learning and Spark. Using Deep Learning Pipelines, we will show:
* how to build deep learning models in a few lines of code;
* how to scale common tasks like transfer learning and prediction; and
* how to publish models in Spark SQL.
Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.
•What SNIA is doing to advance persistent memory
•What the ecosystem enablement efforts are around persistent memory solutions
•How NVDIMMs are paving the way for plug-n-play adoption into containers environments
Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
Join this webinar to learn the key considerations and options for container orchestration with Big Data workloads.
Container orchestration tools such as Kubernetes, Marathon, and Swarm were designed for a microservice architecture with a single, stateless service running in each container. But this design is not well suited for Big Data clusters constructed from a collection of interdependent, stateful services. So what are your options?
In this webinar, we’ll discuss:
- Requirements for deploying Hadoop and Spark clusters using Docker containers
- Container orchestration options and considerations for Big Data environments
- Key issues such as management, security, networking, and petabyte-scale storage
- Best practices for a scalable, secure, and multi-tenant Big Data architecture
Don’t miss this webinar on container orchestration for Hadoop, Spark, and other Big Data workloads.
Learn how automotive manufacturers can take advantage of connected vehicle innovation, data management and analytical opportunities supporting these strategies - webinar from SAS and Bosch.
By 2030, market estimates from McKinsey & Company indicate the automotive revenue pool could grow by $1.5 trillion stemming from shared mobility, connectivity services and feature upgrades to vehicles. Driven by these potential gains, automotive companies are racing to find ways to define and claim their role with new business models.
Yet, what is possible for automotive companies to achieve now given the availability of accessible driver and vehicle information? How can innovation teams take advantage of near-term opportunities that propel both current and future projects enabled by connected vehicle, mobility and on-demand services? How can companies start “doing” work around these emerging opportunities?
During the webinar you will learn about:
•Business development opportunities tied to connected vehicle and mobility strategies that ultimately allow for data monetization.
•Technology that allows OEMs and other organizations to draw out complex vehicle data before using it for analytical initiatives.
•A framework that helps organizations leverage predictive analytics, streaming and real-time information to improve business outcomes as well as customer experiences
Join us as we continue this series of workshops specifically designed for the community by the community with the goal to share knowledge, spark innovation and further build and link the relationships within our HPCC Systems community.
Episode 6 will include 15 minute Tech Talks from our HPCC Systems summer interns. Come hear the cool projects they have been working on!
This session will include Lorraine Chapman, Consulting Business Analyst, LexisNexis Risk Solutions, who manages our HPCC Systems internship program, along with our 2017 HPCC Systems summer interns. Come hear the cool projects they have been working on!
Lily Xu - PhD student of Computer Science at Clemson University, USA
Extending the YinYang K-Means machine learning algorithm in ECL
Vivek Nair - PhD student of Computer Science North Carolina State University, USA
Working to allow Spark to use HPCC Systems as a datastore and provide ECL programmers with the ability to access Spark algorithms.
George Mathew - PhD student of Computer Science at North Carolina State University, USA
Implementing the Gradient Trees machine learning algorithm in ECL to build predictive models.
A majority of manufacturers in MPI’s recent survey are now making money off the IoT – a big change from just two years ago. But challenges remain. Many decision makers can’t access essential data: They can’t always get what they want. This growing digital divide means that improvements in operations, supply chain, logistics, and customer service are being delayed for some while others are benefiting. Webinar attendees will learn how their manufacturing peers benefit from IoT data today, what solutions, such as streaming analytics, are gaining traction, and where early adopters are seeing success.
As we’ve learned from the recent WannaCry and Petya attacks, attackers can now bypass not only antivirus systems but more advanced, next-generation security systems and put large enterprises out of service. Today, detecting advanced attacks requires understanding their behavioral patterns and analyzing massive amounts of data in near real time. This can be achieved by using machine learning, behavioral analysis and big data security analytics.
Join us on this webcast and learn how Cyberbit Endpoint Detection is using next generation technologies originally developed for confidential military projects, to detect threats that outsmart conventional security solutions.
What you will learn:
-Why most organizations are vulnerable to advanced cyberattacks even after deploying security systems
-How behavioral detection and machine learning can surface a cyber threat that penetrated the organization - before damage was done.
-How you can detect zero-day attacks and accelerate response and slash SOC operation cost
-How Cyberbit uses Vertica with near real-time data ingestion and advanced data transformation from hundreds of thousands endpoints
You know it already: artificial intelligence (AI) is key to making sense of big data -- it’s the only way to scale security data analytics, because the “spray and pray” shotgun approach is too expensive and too imprecise to combat advanced attacks. So how do you use the power of machine learning (ML) for precision threat hunting, to proactively stay ahead of advanced attacks, and to focus on what’s important? What are the right questions to ask as you evaluate tools for your threat hunting team?
In this 40-minute online fireside chat, guest speaker Josh Zelonis, a Senior Analyst at Forrester, and Stephen Pieraldi, Senior Director of AI and ML at E8 Security, will discuss how behavioral analytics is transforming security operations with improved visibility across endpoints, users, and networks.
Join to learn how this translates into better detection and faster investigation time for security incidents. And be a part of the conversation with live Q&A during the chat.
- The top challenges that are facing security teams like yours
- How machine learning (and AI in general) help scale security response
- Three most common use cases for threat hunters using machine learning
- What you can do to reduce false positives in your environment
In this, the seventh entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into the mysticism and magic of what happens when you send your data off into the wilderness. Once you click “save,” for example, where does it actually go?
When we start to dig deeper beyond the application layer, we often don’t understand what happens behind the scenes. It’s important to understand multiple aspects of the type of storage our data goes to along with their associated benefits and drawbacks as well as some of the protocols used to transport it.
In this webcast we will show you more about the following:
•Volatile v Non-Volatile v Persistent Memory
•NVDIMM v RAM v DRAM v SLC v MLC v TLC v NAND v 3D NAND v Flash v SSDs v NVMe
•NVMe (the protocol)
Many people get nervous when they see that many acronyms, but all too often they come up in conversation, and you’re expected to know all of them? Worse, you’re expected to know the differences between them, and the consequences of using them? Even worse, you’re expected to know what happens when you use the wrong one?
We’re here to help.
It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.
Please join us on August 1st for another edition of the “Too Proud To Ask” series, as we work towards making you feel more comfortable in the strange, mystical world of storage.
You have a legacy system that no longer meet the demands of your current data needs, and replacing it isn’t an option. But don’t panic: Modernizing your traditional enterprise data warehouse is easier than you may think.
Join us on August 1st at 11am PDT to hear from David Loshin, President of Knowledge Integrity, Inc. and Scott Gnau, Chief Technology Officer of Hortonworks as they discuss what it takes to optimize your enterprise data warehouse. When you attend, you will learn how to:
• Leverage Horizontal Scalability/Elasticity with Open Source Technologies to Reduce Costs
• Augment enterprise data warehouse storage with Hadoop and Hive
• Use Flexible Data Organization to Enable Schema on Read
Retailers and brands today face more challenges than ever before in terms of collecting, normalizing, editing and syndicating consistent product content across channels and partners. The penalties for inaccurate or inconsistent content are severe.
The webinar will discuss best practices for using connectors to deliver product content consistency across a network of partners and to drive customer satisfaction and long term profitability. We will examine some of the challenges of synchronizing content with partners and at the connectors from GS1 to product data feeds that help ensure a consistent rich experience for customers across channels.
As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.
As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.
Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.
- Discussion on the increased dependence on HTTP and HTTPS
- The limitations of Firewalls in the web and cloud world
The increasing critical need for web gateways, both on premise and in the cloud, for achieving:
- Access governance for users and devices
- Verifiable protection against advanced attack methods
- Agile risk management and measurable return on investment.
Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.
Gain industry insights on harnessing Digital Transformation to drive the next generation of operational capabilities.
Implementing a digital transformation strategy that can encompass platforms, systems, integrations and needs across organizations is vital. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations, including how to build a cloud architecture to support data, analytics and digital transformation from end to end.
GDPR is quickly becoming a global data privacy crisis. With the May 2018 deadline looming, businesses in every industry are taking a fresh look at governing personal information. They’re finding out what’s needed to ensure compliance - and it’s not going to be easy.
Big data thought leader, Ben Sharma, has years of experience in data management and governance. He will discuss the impact GDPR has on big data management and explain how data lakes can set you up for success, both for GDPR compliance and future governance endeavors. This webinar will discuss specific technical solutions. If you are concerned about your GDPR compliance initiative, or just interested in verifying your current path, then this is a must-attend webinar.
- Data lineage
- Masking of PII
- Leveraging custom metadata
- Data lifecycle management
- Building a next-generation data architecture for compliance
- Your GDPR preparation checklist
In preparation for this deep dive into GDPR, we suggest you view our previous webinar on the basics of GDPR.
It’s not uncommon for security teams to see upwards of 17,000 malware alerts per week and only investigate a third of them. Each incident detected requires investigation and eventually remediation before it can be laid to rest. Unfortunately, the security talent capable of performing these tasks is scarce, which leaves most security operations teams spread thin, a symptom of sparse coverage compounded by the drain of low fidelity security alerts and false positives. Join Exabeam and (ISC)² on August 3, 2017 at 1:00PM Eastern to learn how SIEM technologies must evolve to include automated playbooks and orchestration for common attacks such as malware and spear-phishing.
Today's corporate organizations are evolving at a pace that it has become imperative to become data driven, digitally transformed to stay competitive. With this in mind, further advances in new technologies such as open source platforms, artificial Intelligence, virtual reality have challenged those once aspirations now called norms.
Join Abhas of Hortonworks as he shares how organizations have evolved transforming their business practices, operations and culture. He'll also share insights into what industries and technologies are trending and what to expect in the not so distant future.
Big data analytics (BDA) and cloud computing are a top priority for CIOs. Harnessing the value and power of big data and cloud computing can give your company a competitive advantage, spark new innovations, and increase revenue. The majority of the use cases for big data and analytics are built on hybrid cloud infrastructure. Hybrid cloud is a secure and cost-effective way to manage big data and analytics while allowing for increased scalability and computational power.
This webinar will cover:
•Business reasons to adopt cloud computing for big data and analytics capabilities
•An architectural overview of a big data analytics solution in a cloud environment with a description of the capabilities offered by cloud providers
•Proven architecture patterns that have been deployed in successful enterprise projects
•An overview of what hybrid cloud is and why it is important in the context of big data and analytics
•Hybrid cloud implementation considerations
The information provided in this webinar draws from the following two deliverables from the Cloud Standards Customer Council: Cloud Customer Architecture for Big Data and Analytics Version 2.0 and Hybrid Cloud Considerations for Big Data and Analytics.
The traditional method of doing security create enormous amount of work for security team without desired outcome. Secure@Source is designed to transform cybersecurity from a concept or idea into concrete actions, with the awareness of where enterprise data resides, how much of it is deemed as confidential or sensitive, how this sensitive data moves and flows through the entire organization and who has access to it
Join us for the webinars which focus on how to building a next generation security solution with using machine learning context, intelligent systems to aid companies like in mitigating external as well as internal threats.
This webinar will cover the today’s security challenges how Informatica addresses these with data security intelligence and controls with:
• Enterprise-wide visibility to sensitive data, providing 360 degree insights on data context, so that you can confirm what you know and learn what you don’t know about your sensitive data risks.
• Detection of anomalous user activities to detect the unexpected insider threats.
• Enabling the prioritization of data security investments based on a risk driven approach to continuously monitor sensitive data risks based on multiple factors.
• Finally, automatically orchestrating the flow across the stakeholders within the organization to apply the needed data protection to close the loop on remediation.
Join us to view the live demonstration and get ahead of the game!!
Join ThoughtSpot and Forrester Research Principal Analyst, Martha Bennett, to learn best practices for leveraging AI as a key enabler for analytics. We’ll also discuss how to best understand and manage the potential risks involved.