Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas
    Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas 151 Advisors | Marty Jefferson | Ken Briodagh Recorded: Sep 21 2018 50 mins
    On this week’s episode of the Real World IoT Podcast, host Ken Briodagh discusses why satellite connectivity is crucial to the productivity of the Oil & Gas Industry with Data Services Manager at Globalstar, Marty Jefferson.
  • Successful SuccessFactors® Data Migrations
    Successful SuccessFactors® Data Migrations Jan Wade & Nikkia Conley, American Airlines and Nate LaFerle BackOffice Associates Recorded: Sep 21 2018 44 mins
    Preparing your employee data for SuccessFactors® is more complex than you think. American Airlines tackled highly challenging transformations from multiple legacy systems and pre-merger organizations to bring a unified HR platform to life with SuccessFactors®.

    Join Jan Wade, Director, HR Information Systems and Nikkia Conley, Sr. Manager, HR Shared Services, of American Airlines; and Nate LaFerle, Client Partner at BackOffice Associates, as they discuss how they addressed key challenges along the way.
  • [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente
    [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente Ricardo de Melo, System Engineer Brazil, A10 Networks Recorded: Sep 21 2018 44 mins
    Adotar uma estratégia híbrida e em várias nuvens para a entrega de suas aplicações tambiém pode levar a perda da percepção de rendimento de suas aplicações. Compartiremos e demostraremos as últimas funções de análises centralizadas nas aplicações com o Harmony Controller 4.1. Nosso mais novo controlador ajuda as organizações a obter informação útil sobre o rendimento das aplicações, a experiência do usuário final e os problemas de segurança, além de permitir uma resolução de problemas de forma muito mais rápida e fácil.

    O Harmony Controller de múltiplas nuvens nos entrega inteligência conectada através de uma série de serviços de aplicações seguras da A10: ADC / balanceamento de carga, inspeção SSL, Gi-Firewall e Carrier Grade NAT.

    Ao se conectar a este webinar, você aprenderá como:
    * Simplificar e agilizar suas operações de TI
    * Assegurar a disponibilidade da aplicação
    * Separar facilmente os dados contextuais e rapidamente identificar as áreas problemáticas
    * Acessar aplicações centralizadas, redes e análises de segurança a partir de um único painel
    * Habilitar a análise de auto-serviço para vários proprietários de aplicações
  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • How to Give Your Patient Experience Scores a Boost
    How to Give Your Patient Experience Scores a Boost Adam Mahmud, Healthcare Manager, Jamf; Nick Thompson, Jamf Recorded: Sep 20 2018 38 mins
    Improving the patient experience is a critical priority in today’s healthcare landscape. But how can you engage patients in new ways and positively impact HCAHPS scores at the same time? One option is to invest in a mobile technology initiative that delivers faster, more personalized care to patients, while also improving care team communication and clinical workflow efficiency.

    In our webinar, How to Give Your Patient Experience Scores a Boost, we will discuss mobility trends in healthcare, explain security and automation implications to consider, and provide a methodology to ensure a successful technology deployment that positively impacts patients and clinical staff.

    You’ll learn how:

    - iPad and Apple TV can be deployed to patient rooms to empower patients in new ways
    - iPhone and iPad can be used to streamline the delivery of care
    - Healthcare specific solutions can automate IT processes
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • Part 3 of 3: Secrets of Mature DLP Programs -  Getting from "How" to "Wow"!
    Part 3 of 3: Secrets of Mature DLP Programs - Getting from "How" to "Wow"! Carmine Clementelli, Tim Merriam, Daphne Zhao from Symantec Recorded: Sep 20 2018 49 mins
    In the third and final session of the three-part webcast series:

    Part 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud

    As hybrid cloud infrastructures become the new normal, DLP programs must adapt and expand to ensure that data – where ever it’s located – stays protected. New challenges include uncovering shadow data in unauthorized apps, eliminating multiple islands of DLP overhead, and maintaining performance across on-prem hardware and the cloud.

    Join Symantec on September 20 and Learn how to:

    -Reuse existing DLP policies and workflows for cloud apps

    -Incorporate authentication and encryption with Symantec ICE & VIP

    -Discover sensitive data within cloud apps with Symantec CloudSOC

    Register Today

    About the three-part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure. The need to maintain visibility protection and control over the data is extremely difficult. This is especially true with increasing and more strict compliance laws such as the new California data protection law, GDPR. While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    Part 1: First Things First - Understanding "Normal" Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)

    Part 2: Talking it Out - Cross-Functional Communication Key to Mature DLP Programs (View Now: http://bit.ly/0830DLPwebcast)
  • Securing AWS Fargate from Build to Runtime
    Securing AWS Fargate from Build to Runtime Kevin Lewis, Principal Solution Architect, Twistlock Recorded: Sep 20 2018 24 mins
    Since the announcement of AWS Fargate at AWS re:Invent 2018, enterprises have been working with their development and devops teams to explore how this new technology aligns with their application modernization strategy. With this new CaaS platform comes new operational concerns and security threats.

    Join Principal Solution Architect Kevin Lewis to learn more about:
    • How enterprises are beginning to leverage AWS Fargate
    • Potential risk and security concerns from this emerging paradigm
    • Different security approaches and how Twistlock looks to provide runtime protection for applications using Fargate
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Recorded: Sep 20 2018 63 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • Infuse Your Business Processes With Machine Learning
    Infuse Your Business Processes With Machine Learning Pat Roche, CTO, TenPoint7 & Fen Wei, Lead Data Scientist, TenPoint7 Recorded: Sep 20 2018 47 mins
    Learn how machine learning is being used to optimize common business processes and the improvements that can be achieved. In this 45-minute webinar, you will see case studies of numerous machine learning applications that your organization may need.

    -IT professionals wanting to learn more about ML
    -CTO - evaluating applying Machine Learning to core technology strategies
    -CIO - support business units looking to apply Machine Learning
    -Innovators within companies
    -Mid-Small businesses looking for competitive advantage with Machine Learning

    -Various case studies of how Machine Learning was applied to common business processes
    -Methodology for evaluating if Machine Learning is a viable solution
    -Learn the truth and myth of Machine Learning for common business processes
  • Application platforms as a central component in digital transformation journey
    Application platforms as a central component in digital transformation journey Larry Carvalho, Research Director, PaaS, IDC. Tyler Britten, Technical Marketing Manager, OpenShift, Red Hat. Recorded: Sep 20 2018 41 mins
    As businesses in all types of industries are being disrupted by startups, organizations are being challenged to digitally transform themselves. Technology is playing a central role in this transformation, and the demand for applications is increasing to meet transformation goals. Application platforms, which are undergoing a transformation of their own, are playing a central role in accelerating application development.

    Join this webinar to learn about:

    -The evolution of application platforms.
    -How containers are becoming the destination of choice for workloads.
    -How companies are transforming a broad set of existing and new applications.
    -Evolving a culture of greater agility.


    Larry Carvalho, research director, PaaS, IDC

    Larry Carvalho is research director of IDC's worldwide Platform-as-a-Service (PaaS) research practice. He focuses on the Cloud Applications Platform (CAP)-as-a-Service aspect of PaaS and directs research into the component competitive markets of PaaS, including business process management (BPM) PaaS, database PaaS, cloud testing, and integration PaaS. Larry has extensive experience in systems integration and the enterprise software business.

    Tyler Britten, technical marketing manager, OpenShift, Red Hat

    Tyler Britten is a technical marketing manager for Red Hat® OpenShift® and has spent the last 15 years working with container, cloud, virtualization, and infrastructure technologies. Prior to joining Red Hat, he was a technical advocate for Blue Box, an IBM Company, and principal technical marketing manager and vSpecialist at EMC. Tyler has also been a technical consultant for a small infrastructure reseller, a network engineer for a Fortune 1000 company, and a freelance IT consultant for small businesses.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Sep 24 2018 12:00 pm UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Leveraging the Power of the Cloud to Protect VMware Data
    Leveraging the Power of the Cloud to Protect VMware Data Steven Hill Senior Research Analyst, 451 Research Sep 24 2018 2:00 pm UTC 60 mins
    Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
    - Virtualization and cloud adoption trends, usage and business drivers
    Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
    - How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
    - Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
  • Lightboard Lessons: Explaining the GitHub DDoS Attack
    Lightboard Lessons: Explaining the GitHub DDoS Attack John Wagnon - Senior Solution Developer, DevCentral Sep 25 2018 8:30 am UTC 15 mins
    On Feb 28, 2018 the popular website GitHub was the victim of the largest Distributed Denial of Service (DDoS) attack in recorded history. The attackers used open memcached servers to launch an amplification attack that pushed traffic at the rate of 1.35 Tbps. Fortunately, GitHub was prepared with a DDoS scrubbing service and was able to mitigate the attack, and the attackers stopped after about 20 minutes. The unfortunate part, though, is that many thousands of open memcached servers are still out there on the Internet and could be used for a similar attack at any time. Watch the video below to learn about the details of the attack and the mitigation steps.
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 25 2018 9:00 am UTC 60 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.

    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • Be More Avocado
    Be More Avocado Yogi Chandiramani Sep 25 2018 9:00 am UTC 60 mins
    Most security gateways are like a coconut, once you're through the hard shell, you have access to everything.
    Zscaler is different. We give you security all the way through the stacks for known and unknown threats, on all devices.
    Like an Avocado
  • Share your data everywhere: Different databases? No problem!
    Share your data everywhere: Different databases? No problem! Max Gieparda, Manager, Sales Engineering, Syncsort Sep 25 2018 9:00 am UTC 60 mins
    How do you keep all your databases in sync and provide access to information across the business, when and where it’s needed in real-time? In this short webinar and demo, we’ll be looking at the easy way to automate data sharing for queries, reports, business intelligence, data warehousing and data lakes using Syncsort’s MIMIX Share solution. MIMIX Share captures data changes in real-time, replicates them between different databases and ensures data integrity. As an example, we’ll be demonstrating how data can be replicated between Microsoft SQL, Oracle and Kafka.

    Learn about:
    - Connecting different databases in your organization with just a couple of mouse clicks.
    - Migrating your databases without a downtime
    - Sharing, distributing, consolidating and transforming your databases
  • Predicting Failures Before They Happen With Machine Learning
    Predicting Failures Before They Happen With Machine Learning Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner Sep 25 2018 9:00 am UTC 45 mins
    Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.

    The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!

    Join our webinar to learn how to:

    ● Predict a service health score
    ● Proactively take action based on those predictions
    ● Employ novel tactics for better incident management using advanced search commands
  • Why Run Microsoft Workloads on AWS?
    Why Run Microsoft Workloads on AWS? Malcom North & Harjeet Kumar Sep 25 2018 9:00 am UTC 60 mins
    Rackspace and AWS have partnered for this webinar on how to successfully migrate and run Microsoft Workloads on AWS. The webinar will describe how AWS supports critical Microsoft workloads including legacy SQL Server and lessons learned from AWS Premier Partner Rackspace.


    • Why AWS for Microsoft Workloads?

    • Microsoft Technologies on AWS – SQL Server, .Net, Active Directory, Exchange, Dynamics.

    • Planning and optimising your Microsoft licensing on AWS

    • Migrating Microsoft workloads

    • SQL Server 2008 End of Support – What to do?

    • How to plan a successful POC from customer case studies

    Who should attend?

    • IT Managers – learn how to modernise and optimise your Microsoft workloads

    • Architects – understand how to architect Microsoft technologies on AWS

    • Technical C level Executives – improve operational efficiency and drive digital transformation with Rackspace and AWS.

    As an AWS-audited Managed Service Partner with 1,000+ certifications, Rackspace are one of a select few Premier Consulting Partners holding both the APN Competency for Microsoft Workloads Competency for Productivity and Database workloads.

    Presented by Malcolm North, AWS Specialist Architect at Rackspace and Harjeet Kumar AWS EMEA Microsoft Partner Lead, LIVE online on Tuesday 25th September at 10:00am.

    So, book your place now. Complete the registration form opposite and avoid missing out on valuable insights.

    If you’d like to speak to us beforehand, feel free to get in touch on +44 203 811 4179 or learn more about AWS.
  • VDI / Client virtualisatie / Moonshot Update
    VDI / Client virtualisatie / Moonshot Update Johan Benning, Solutions Architect, HPE Sep 25 2018 9:00 am UTC 60 mins
    Op het gebied van Client Virtualisatie gebeurt er nog steeds veel. In deze presentatie krijgt u de laatste update vanuit een data center / hardware-perspectief.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Sep 25 2018 10:00 am UTC 60 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • HPE ProLiant voor Microsoft Azure Stack
    HPE ProLiant voor Microsoft Azure Stack Martin van Seventer, Solutions Architect, HPE Sep 25 2018 10:30 am UTC 60 mins
    In deze sessie hoort u wat HPE ProLiant voor Microsoft Azure Stack (hét hybride cloudplatform waarmee u Azure-services kunt leveren vanuit uw datacenter die als geïntegreerd systeem wordt geleverd) voor u kan betekenen. Wat is Azure Stack, wat kun je ermee en wat is de rol van HPE hierin? U hoort in deze technisch-georiënteerde sessie alles te weten over HPE Microsoft voor Azure Stack.
  • Infosight – Artificial Intelligence in het datacenter
    Infosight – Artificial Intelligence in het datacenter Jeroen Venema, Solutions Architect, HPE Sep 25 2018 12:00 pm UTC 60 mins
    Hoe krijg je met AI inzicht in je datacenter en kun je problemen oplossen voordat ze storingen veroorzaken met als doel het “Autonomous Datacenter?
  • Uncovering the Power of Box Governance
    Uncovering the Power of Box Governance Eleonore Hebrard - Box Implementation Consultant & Frederico Costa - Box Customer Success Manager  Sep 25 2018 1:00 pm UTC 45 mins
    Get your Box Governance package set up and deployed with the Customer Success Team. 

    It has now been 6 months since GDPR has been adopted in the EU and as a Box Governance customer, we want to ensure you deploy and get value out of our legal and compliance solution. 

    Companies and institutions like Metropolitan Police, General Electrics and AstraZeneca have already entrusted their content to Box Governance. 
    We want to show you how you can be on top of your Industry Legal and Compliance standards by providing you a hands-on webinar "Uncovering the power of Box Governance", hosted by a member of our Box Consulting Team. 

    Use cases for Legal hold, Security Classification, Retention Management.
    Checklist for successful deployment at scale
    Questions and Next Steps
  • Synergy versus c-Class versus DL
    Synergy versus c-Class versus DL Remco Pomp, Solution Architect, HPE Sep 25 2018 1:30 pm UTC 60 mins
    Wat zijn de kosten per workload? Hoe verhoudt zicht Hybride It zich ten opzichten cloud-only voor wat betreft de kosten? Hoe is verhouding TCO en Capex? Met welke aanpak hou je de kosten zo laag mogelijk? Kies je voor veel cores met weinig MHz of weinig cores met veel MHz? En wat doet dit met softwarelicentiekosten?
  • How to Leverage Tools that Support Innovation and Differentiation
    How to Leverage Tools that Support Innovation and Differentiation Gary Middleton: Group Networking Senior Practice Director DCN,Networking &Chris Wolf: CTO, Global Field & Industry,VMWare Sep 25 2018 2:00 pm UTC 45 mins
    Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
    Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:

    • Use containerisation to transform your cloud capabilities.
    • Empower IT to embrace the solutions and services needed to evolve.
    • Build applications that streamline and transform business success.
    • Move with speed and agility while maintaining a strong infrastructure.
    • Exploit the software as a service (SaaS) revolution.
  • NVMe™ over Fabrics: Updates for 2018
    NVMe™ over Fabrics: Updates for 2018 Brandon Hoff, Distinguished Software Architect at Broadcom, NVM Express,Inc. Marketing Workgroup Member Sep 25 2018 4:00 pm UTC 60 mins
    NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.

    Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
  • Infrastructure as Code & Changing Organizational Design: 2019 & Beyond
    Infrastructure as Code & Changing Organizational Design: 2019 & Beyond Mark Thiele, Erik Ottem, Jeanne Morain and Karthik Krishnaswamy Sep 25 2018 5:00 pm UTC 45 mins
    This webinar is part of BrightTALK's I&O Tech Talk Series.

    Data center hardware and configuration are on the outs as technologies such as Infrastructure as Code (IaC) take shape. The world of manual processes and provisioning is disappearing before our eyes, and it's changing the way organizations are designed and modernized.

    Tune into this roundtable panel discussion led by Mark Thiele, Chief Strategy Officer, Apcera as they discuss the phenomenon of Infrastructure as Code and other emerging technologies, and how they are disrupting IT infrastructure and the traditional data center.

    Moderator: Mark Thiele, Chief Strategy Officer, Apcera
    Panelists: Erik Ottem, Director of Product Marketing, Western Digital and Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud, Karthik Krishnaswamy, Sr Product Marketing Manager, NGINX
  • Pacific Dental Cloud Migration Strategy on AWS
    Pacific Dental Cloud Migration Strategy on AWS Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Sep 25 2018 5:00 pm UTC 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Sep 25 2018 6:00 pm UTC 45 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • API Gateways: Why You Should Use Them in Microservices Development
    API Gateways: Why You Should Use Them in Microservices Development Charles Pretzer, Technical Architect, NGINX Sep 25 2018 6:00 pm UTC 60 mins
    The use of an API gateway and the move to microservices are two of the most important trends in application development. But are they similar, or different; complementary, or contradictory? In this webinar we discuss the advantages of an API gateway, the advantages of microservices development, and how and when they can work together.

    Join this webinar to learn:
    - More about the advantages of an API gateway
    - More about the advantages of microservices
    - Whether an API gateway approach works with different microservices network architectures, including service mesh
    - How to reduce rework if your application needs to move from one network architecture to another
  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Sep 25 2018 6:00 pm UTC 45 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
  • Get Ready for OS Upgrades and Apple Business Manager
    Get Ready for OS Upgrades and Apple Business Manager Nick Thompson, Product Manager, Jamf Sep 25 2018 6:30 pm UTC 60 mins
    With Apple’s Worldwide Developers Conference (WWDC) behind us, it’s time to review the exciting announcements and discuss how you can prepare now for your future iOS 12, tvOS 12 and macOS Mojave updates.

    In our webinar, Get Ready for OS Upgrades and Apple Business Manager, we’ll explain the new management features and services coming your way.

    We will cover:

    •What new mobile device management (MDM) features will be available with Apple’s upcoming OS releases
    •How to prepare for OS upgrades this fall
    •An introduction to Apple Business Manager