Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    Graeme Hackland, Chief Informations Officer, Williams Group Recorded: Mar 22 2019 3 mins
    (2:28 Customer Testimonial Video)
    Learn how William’s Racing Group has secured email, data, and threat from account takeover in their Office 365 (O365) environment.
  • CISO of Natural Gas Distribution Company Discusses Security for Office 365
    CISO of Natural Gas Distribution Company Discusses Security for Office 365
    Mo Ahddoud, Chief Information Security Officer, SGN Recorded: Mar 22 2019 2 mins
    (1:47 Customer Testimonial Video)
    Hear how SGN secures their Office 365 instance with Symantec solutions for cloud visibility and control
  • Build Security In: Cloud Security at DevOps Speed
    Build Security In: Cloud Security at DevOps Speed
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks Recorded: Mar 22 2019 55 mins
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Recorded: Mar 21 2019 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • How to Protect Your Business Critical Operations in AWS
    How to Protect Your Business Critical Operations in AWS
    Deena Thomchick, Sr. Director, Cloud Security, Symantec Recorded: Mar 21 2019 52 mins
    When Securing AWS the Top 5 Things to Consider

    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    - Monitor activity and security configurations
    - Control access and prevent risky changes or privileged misuse
    - Detect malicious insiders and compromised accounts
    - Keep S3 buckets private and secure confidential data with DLP
    - Defend S3 buckets from advanced malware threats
  • A SD-WAN Service that Ensures your Network Serves your Business Needs
    A SD-WAN Service that Ensures your Network Serves your Business Needs
    Michael Leonard & Jonathan Biggs Recorded: Mar 21 2019 55 mins
    Managing the wide area network can be a challenge for small business that have limited IT resources. As the use of applications grows organizations need to add bandwidth and connect to the cloud with high performance. They need to ensure that critical traffic like voice is given high priority and that they have tools to ensure performance.

    In this webinar with AT&T and VMware we will show you how you can improve the quality of your WAN and increase visibility into network performance while reducing the resources that you dedicate to managing your WAN. You will learn how you can access applications from the cloud with ease and get better voice quality for your remote sites. Together, AT&T is offering a cloud-delivered SD-WAN service to all of your business needs.

    Join this webinar to:

    Discover the benefits of cloud-delivered SD-WAN for your small business
    Find out how other businesses like yours are implementing cloud-delivered SD-WAN
    Learn about the AT&T SD-WAN NOW managed service offering
  • 3 Keys to NoSQL Backup Success: A Demo
    3 Keys to NoSQL Backup Success: A Demo
    David Sedgwick Recorded: Mar 21 2019 29 mins
    Rubrik Datos IO offers fast NoSQL data recovery, any-to-any data mobility, and cost savings to organizations that rely on Apache Cassandra, DataStax Enterprise or MongoDB. In this webcast we’ll do a deep dive into how Rubrik Datos IO can save time by automatically discovering and identifying your databases and tables, how to quickly build a test/dev database from production data, and how Datos IO saves 70% or more on secondary storage with semantic deduplication – a capability unique to Rubrik.
  • Your Medical Device Firm Just Bought Some Software - Now What?
    Your Medical Device Firm Just Bought Some Software - Now What?
    Brad Hinke, Director of Quality Services & Validation at Propel Recorded: Mar 21 2019 51 mins
    If your company is thinking about buying software to help with product development and manufacturing, validation is a critical step for complying with FDA 21 CFR Part 11 and Part 820. But many firms often lack detailed expertise and experience to make sure their non-product software is validated. With lack of resources and direction, how can you make sure your software is validated at a reasonable cost.

    Brad Hinke, Director of Quality Services & Validation at Propel will host a live webinar and provide guidance and best practices from real-life lessons on validation. Brad has worked with both small and large medical device firms in all aspects of validation and implementation.
    In this webinar, learn the following:
    - what software needs to be validated and lessons learned from past validation efforts
    - frameworks for approaching validation
    - steps you must do to be compliant with the FDA.
  • Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Dilip Krishna, Anuta Networks Recorded: Mar 21 2019 11 mins
    In this video, we share some of Anuta ATOM customer deployments including Tata Communications, Neustar, F5 Networks, An Energy Provider in APAC and a Financials Services Enterprise in the US.
  • Cloud Native Security: What’s Missing?
    Cloud Native Security: What’s Missing?
    Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks Recorded: Mar 21 2019 43 mins
    As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
  • 5 Key Considerations for Your Hybrid Cloud Content Management Strategy
    5 Key Considerations for Your Hybrid Cloud Content Management Strategy
    Kevin Bender, ASG & Brad Steinmeyer, Zia Consulting Recorded: Mar 21 2019 29 mins
    As companies strive to make the Cloud a coherent part of their overall IT infrastructure, we often hear customers asking, “Are we taking the best approach to get the most from our Content?” Navigating the best path for your organization is more varied and compelling than ‘just moving content to the Cloud’.

    Blending traditional and modern IT models can offer cost savings as well as the agility you need to compete in the digital world. Watch this webinar to hear ASG and Zia Consulting discuss best practices developed while helping organizations construct and implement successful cloud strategies:
    • How Cloud migration can enhance IT agility and business competitiveness
    • What Consolidation vs. Migration really means
    • How Efficiency and Security can and should ‘work together’
    • How to measure immediate gains that align with your long-term vision
    • Why the Cloud is important as you drive digital transformation
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Recorded: Mar 21 2019 32 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web Services Recorded: Mar 21 2019 45 mins
    With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.

    In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:

    >Leverage compliance policies for scanning images in your CI/CD pipeline
    >Scan Kubernetes and Docker environments and visualize compliance posture
    >Enforce runtime container compliance
    >Investigate policy violations post-mortem by using forensics after container is disposed
  • 7 Key Technology Expense Management Trends for 2019
    7 Key Technology Expense Management Trends for 2019
    Hyoun Park Recorded: Mar 21 2019 34 mins
    Cloud, telecom, & mobility costs overwhelmed unprepared IT teams in 2018 with unbudgeted surprises. To avoid these costs at a time when the need for IT is growing rapidly, Amalgam Insights provides 7 trends and recommendations to counteract these challenges.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Recorded: Mar 21 2019 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Tools and Recipes to Replatform Monolithic Apps to Modern Cloud Environments
    Rohit Kelapure, Pivotal Consulting Practice Lead Recorded: Mar 21 2019 64 mins
    Digital transformation includes replatforming applications to streamline release cycles, improve availability, and manage apps and services at scale. But many enterprises are afraid to take the first step because they don’t know where to start. In this webinar, Rohit will provide a step-by-step guide that covers:

    ● How to find high-value modernization projects within your application portfolio
    ● Easy tools and techniques to minimally change applications in preparation for replatforming
    ● How to choose the platform with the right level of abstraction for your app
    ● Examples that show how Java EE Websphere applications can be deployed to Pivotal Cloud Foundry

    We look forward to you joining us.

    Pivotal Privacy Statement:
  • How to Plan & Execute a Successful SAP Migration to AWS
    How to Plan & Execute a Successful SAP Migration to AWS
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Mar 21 2019 43 mins
    Join us to learn how to:

    - Plan & Execute SAP Business workloads migrations on AWS.

    - Cover the routes on each scenario: OS/DB platform, database size, downtime window and connection bandwidth.

    - Impact of each variable on the overall migration project and combine all together to shape the right migration strategy to AWS.

    This is a technical webinar aimed for Infrastructure Engineers, SAP Basis and OS/DB migration experts and technical decision makers.
  • This is Security: Nothing is what it SIEMs
    This is Security: Nothing is what it SIEMs
    Dan Pitman, Principal Security Architect, Alert Logic Recorded: Mar 21 2019 49 mins
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Bojujte za dobro proti zlým botům
    Bojujte za dobro proti zlým botům
    Radovan Gibala - Senior Systems Engineer, F5 Networks Recorded: Mar 21 2019 54 mins
    Hlavní prioritou pro organizace, které podporují strategii udržitelného zabezpečení, je identifikovat škodlivé boty a vytvořit proti nim ochranu. Zúčastněte se tohoto webináře a dozvíte se:

    • jak boti infikují systémy, šíří se a napadají aplikace,
    • jaké typy útoků na aplikace boti obvykle provádějí,
    • jak se můžete bránit proti zlým botům, aniž byste zničili ty hodné.

    Sledováním tohoto webináře souhlasíte, že Vaše osobní údaje budou sdíleny s F5 a zpracovávány v souladu se Zásadami o ochraně osobních údajů společnosti F5 (https://f5.com/about-us/policies/privacy-policy). Také souhlasíte, že Vás F5 může kontaktovat ohledně produktů, služeb a budoucích akcí F5, ale s možností se kdykoli odhlásit.
  • IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk
    IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk
    Marcel Leitel, Sales Engineer DACH Cyren Recorded: Mar 21 2019 58 mins
    Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten im Januar und Februar ein großer Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen.

    Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge.
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Recorded: Mar 21 2019 19 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadow Recorded: Mar 21 2019 26 mins
    With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?

    End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.

    SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:

    •What are the available options: on-premise upgrades, migrate to cloud or do nothing?
    •Best practice methodologies
    •Cloud tooling options for migration acceleration
    •Cloud migration framework for success

    Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.

    This webinar will primarily focus on cloud migration.
  • AWS WEBINAR: Designing and migrating data and databases to AWS
    AWS WEBINAR: Designing and migrating data and databases to AWS
    Kyle Jenner, Specialist AWS Architect Recorded: Mar 21 2019 48 mins
    Are you considering migrating your data and databases to the cloud to help improve your operations? Do you need advice on architecting and planning a smooth and seamless migration?

    Then sign up for our webinar on Thursday 21 March at 10am (UK), and learn how moving from proprietary database vendors to open source alternatives on AWS can help increase reliability and improve performance, while also providing backup and DR benefits. We’ll also reveal how you can optimise licensing for Oracle and MS SQL to maximise cost savings in the cloud.

    Our webinar will be hosted by Rackspace specialist AWS architect, Kyle Jenner, who will cover:

    • selecting the right database services in AWS
    • optimising licensing for Oracle and MS SQL databases
    • benefits and approaches to migrating to open source and managed services
    • architecting for backup and DR in highly available solutions

    So, complete the registration form and book your webinar place now. Join us to make the most out of your cloud migration journey. By attending, you will also be eligible to receive a credit voucher to use on the AWS platform.

    Rackspace is an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner.
  • Ensono | Developing a cloud strategy and roadmap
    Ensono | Developing a cloud strategy and roadmap
    Simon Ratcliffe, Sean Roberts Recorded: Mar 21 2019 30 mins
    Leading managed services provider Ensono talk about how to develop a cloud strategy and roadmap and how it is a critical element of your modernisation and transformation journey. Listen to Simon Ratcliffe and Sean Roberts discuss the crucial steps when moving applications and workloads to the cloud as well as other important topics.

    Simon and Sean will cover area such as:

    •IT Cloud Culture – big bang or evolution?
    •Steps for moving applications and workloads to the cloud
    •Bridging the gap in a hybrid world
    •Steps to public cloud migration
    •Security in the public cloud
    •Budgeting in the cloud – how lots of organisations get this badly wrong and how to budget correctly.

    If you have further questions for either Simon or Sean you can email them here.

  • Luttez efficacement contre les bots malveillants
    Luttez efficacement contre les bots malveillants
    Gregory Rabin - Systems Engineer, F5 Networks Recorded: Mar 21 2019 66 mins
    Pour les entreprises à la recherche d’une stratégie de sécurité durable, il est primordial de savoir identifier les bots malveillants et de s’en prémunir. Participez à ce webinar pour découvrir :

    • Comment les bots infectent et attaquent les applications et se propagent
    • Les types d’attaques généralement réalisées par les bots ciblant les applications
    • Comment vous défendre contre ces bots malveillants sans affecter ceux qui sont inoffensifs

    En regardant ce webinar, vos données personnelles seront partagées avec F5 et traitées conformément à la politique de confidentialité F5 (https://f5.com/about-us/policies/privacy-policy). Vous recevrez également des communications liés aux produits et services F5, vous pourrez vous désabonner à tout moment.
  • Lessons Learned from an Enterprise-Scale Migration Project
    Lessons Learned from an Enterprise-Scale Migration Project
    Lars Muller, CRM Partners AG, TIBCO MVP Mar 25 2019 3:00 pm UTC 37 mins
    Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.

    Watch this webinar to learn:

    - The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
    - Key decisions you need to make at the outset of your project that will minimize risks
    - How to prepare your data for a successful migration
    - How to test and execute your migration to ensure a smooth launch
  • Anleitung zum Kampf gegen bösartige Bots
    Anleitung zum Kampf gegen bösartige Bots
    Frank Thias - Principal Systems Engineer, F5 Networks Mar 26 2019 9:00 am UTC 62 mins
    Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:

    • Wie Bots Anwendungen infizieren, verbreiten und angreifen
    • Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
    • Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.

    Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
  • The Accelerate State of DevOps Report
    The Accelerate State of DevOps Report
    Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, Pivotal Mar 26 2019 9:30 am UTC 60 mins
    The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.

    In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:

    - Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
    - Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
    - Outsourcing may save money in the short term, but is much more likely to contribute to low performance
    - Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)

    Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.

    Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
  • Blockchain: Flying the Friendly Skies
    Blockchain: Flying the Friendly Skies
    Nelson Petrack, CTO, TIBO Software Mar 26 2019 10:00 am UTC 36 mins
    According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.

    Watch this webinar with TIBCO CTO Nelson Petrack presenting:

    -A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
    -How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
    -What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?

    Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
  • Réalisez enfin les promesses du Big Data grâce à la Data Virtualization
    Réalisez enfin les promesses du Big Data grâce à la Data Virtualization
    Sihem Merah, ingénieure avant-vente, Denodo & Rick van der Lans, analyste indépendant et expert Big Data & BI Mar 26 2019 10:00 am UTC 60 mins
    Selon le Gartner, deux tiers des projets big data des entreprises ne franchiront pas le stade du pilote et de l’expérimentation au cours des deux prochaines années, et finiront par être abandonnés. Et selon une étude de Capgemini, seulement 29% des projets big data en cours sont pleinement rentables… A l'évidence, ces entreprises n'ont pas envisagé la data virtualisation dans leur architecture.
    Denodo et Rick van der Lans - analyste indépendant et consultant de renommée internationale sur des sujets big data et BI - vous invitent à en discuter durant ce webinar. Nous développerons les bonnes pratiques à mettre en place pour réaliser les promesses du Big Data et détaillerons comment la Data Virtualization simplifie et sécurise les initiatives Big Data, vous garantissant ainsi de rejoindre ces entreprises “data-driven” ou “insight-driven” qui, selon une étude Forrester, seront celles qui connaîtront la croissance la plus remarquable.
  • Alles, was Sie über AI, ML und Ubuntu wissen müssen
    Alles, was Sie über AI, ML und Ubuntu wissen müssen
    Timo Brueggemann Apr 9 2019 10:00 am UTC 60 mins
    Anwendungen von AI und ML verbreiten sich rasant vom Silicon Valley bis an die Wallstreet. Ubuntu wird die führende Plattform für diese Vorhaben - von Entwickler-Workstations über Racks und Clouds bis zu Edge Computing mit intelligent verbundenem IoT. Aber mit neuen Trends in der Entwicklung entsteht eine Fülle neuer Technologien und Terminologien, die Entwickler erlernen müssen.

    In diesem Webinar bietet Ihnen Canonicals Kubernetes Product Manager Carmine Rime:
    - eine Erläuterung wichtiger AI/ML-Konzepte
    - einen Einblick, warum AI Anwendungen und ihre Entwicklung die IT in Unternehmen grundlegend neu gestalten
    - eine detaillierte Darstellung, wie Unternehmen DevOps Praktiken auf ihre ML Infrastruktur und Workflows anwenden
    - eine Einführung in das AI/ML Portfolio von Ubuntu bis zur Canonical Distribution von Kubernetes und wie Sie sofort mit Ihrem Projekt beginnen können

    Zusätzlich werden wir einige der folgenden Fragen beantworten:
    - Was leisten Kubeflow, Tensorflow, Jupyter, Edge AI und GPGPUs?
    - Wie unterscheiden sich AI und ML?
    - Was ist ein AI Modell? Wie wird es trainiert? Wie kann man es entwickeln/optimieren?

    Und am Ende werden wir uns in einer Q & A Session noch Zeit für die Beantwortung Ihrer Fragen nehmen.
  • Authentication, Security, and Performance for the Internet of Things
    Authentication, Security, and Performance for the Internet of Things
    Dan Goldstein, Product Strategy Mar 26 2019 11:00 am UTC 45 mins
    Gartner estimates by the end of 2020 over 20 million Internet of Things (IoT) devices will be online. Every day the automotive, aviation, consumer goods and utilities industries (just to name a few) are pushing new boundaries in how customers interact with technology. While this evolution unlocks incredible potential, security and performance challenges put IoT device manufacturers and providers at risk of security incidents and unable to meet customers' rapidly growing expectations.

    Security-wise many devices are still treated like machines from early in the century: release patches on Tuesdays and cross our fingers our users update. Performance-wise centralized cloud providers are not built to deliver ultra low-latent responses to millions of devices with a global footprint.

    Join our webinar and take a look at how Cloudflare is helping IoT manufacturers and providers meet emerging security and performance challenges.
  • Cyberattacks: Q1 Review and Emerging Trends
    Cyberattacks: Q1 Review and Emerging Trends
    Kelvin Murray, Threat Expert, Webroot Mar 26 2019 11:00 am UTC 60 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Threat expert as he discusses topics such as:

    •The rise of information stealers
    •The changing face of ransomware
    •Relentless phishing attacks
    •The theft, trade and cracking of passwords
  • AWS Backup & Disaster Recovery: Die ultimative Checkliste
    AWS Backup & Disaster Recovery: Die ultimative Checkliste
    Catalin Voicu - Systems Engineer, N2WS und Daniela Kasabova - Inside Sales Representative, N2WS Mar 26 2019 1:00 pm UTC 60 mins
    Das Versprechen der Cloud war immer eine mehr agile, kosteneffiziente und katastrophesichere Weise zu skalieren. Wie es aber immer wieder passiert, Versprechen kommen mit kleingedrucktes zusammen. AWS und jeder anderer Public Cloud Anbieter garantieren die Sicherheit und Verfügbarkeit der Infrastrukturebene aber nicht Ihrer Daten: 

    Nehmen Sie an unserer LIVE Session teil und erfahren Sie mehr über:
    ·         Warum sollte man AWS Environments schützen und warum native Backups nicht genügend sind. 
    ·         Wie man eine einwandfreie, schnelle und granulare Daten-Wiederherstellung durchführt. 
    ·         Wie erreicht man Anwendungskonsistenz mit 100% Uptime
    …und mehr!  
  • Mądrze zwalczaj szkodliwe boty
    Mądrze zwalczaj szkodliwe boty
    Mariusz Sawczuk – Specialist Systems Engineer, F5 Networks Mar 26 2019 2:00 pm UTC 66 mins
    Identyfikacja złośliwych botów i ochrona przed nimi jest priorytetem dla firm opracowujących zrównoważoną strategię bezpieczeństwa. Weź udział w tym webinarium, aby dowiedzieć się:

    • W jaki sposób boty infekują, rozprzestrzeniają i atakują aplikacje
    • Jakie rodzaje ataków na aplikacje są najczęściej przeprowadzane przez boty
    • W jaki sposób możesz bronić się przed szkodliwymi botami, nie przeszkadzając tym dobrym

    Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Mar 26 2019 2:00 pm UTC 30 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Running Kubernetes on AWS EC2 with Avi Networks
    Running Kubernetes on AWS EC2 with Avi Networks
    Bhushan Pai, Lei Yang Mar 26 2019 3:00 pm UTC 50 mins
    Azure Kubernetes Service (AKS) is offered by Microsoft Azure as a fully-managed Kubernetes orchestration service.
  • Why You No Longer Need a SIEM Tool
    Why You No Longer Need a SIEM Tool
    Matt Selheimer, Chief Strategist Mar 26 2019 3:00 pm UTC 58 mins
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
  • Introduction to Managed SD-WAN
    Introduction to Managed SD-WAN
    Ashwath Nagaraj (Founder & CTO, Aryaka) Mar 26 2019 4:00 pm UTC 45 mins
    As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?

    In this webinar you will join industry experts to learn:

    - Fundamental building blocks of a managed SD-WAN architecture
    - Pros and cons for each of the different management and operational models
    - Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
  • How to Prepare for Your HubSpot-CRM Integration Project
    How to Prepare for Your HubSpot-CRM Integration Project
    TIBCO Mar 26 2019 4:00 pm UTC 31 mins
    Any integration project can have gotchas, such as custom fields or duplicate records that can slow you down. Proper up-front planning can help you successfully manage the gotchas, reduce the time needed and achieve better results.

    In this presentation, integration experts from LyntonWeb discuss:

    - How to prepare for your HubSpot-Dynamics CRM integration project to get the results you want
    - How to apply this advice to other marketing automation-CRM integration projects, including Salesforce integrations
  • Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Dave Bartoletti, VP & Principal Analyst at Forrester & Jenny Fong, Director of Product Marketing at Docker Mar 26 2019 5:00 pm UTC 58 mins
    Learn what you should be evaluating and how containers will be essential to powering your next phase of digital transformation.

    Webinar will dive into the state of the container platform market with insights into:

    - The state of the cloud and container platform markets heading into 2019: what’s driving all this digital transformation?

    - The rise of the enterprise container platform market and the core capabilities enterprises look for in their next development and operations platform

    - How to evaluate the market for enterprise container platforms and find the best solution to help you create new applications and modernize your key existing applications

    - Why we believe Docker Enterprise has been named a Leader in the enterprise container platform market
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
  • Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Customer Briefing: Aerospike Connect for Kafka and Aerospike Connect for Spark
    Srini Srinivasan, Co Founder and Chief Development Officer Mar 26 2019 5:00 pm UTC 60 mins
    The Aerospike Connect family of add-on modules as well a new REST-API now make it even easier to integrate the Aerospike Database into both new and existing enterprise infrastructure systems, helping customers modernize and optimize their data architecture. We are happy to announce that Aerospike Connect for Kafka and Aerospike Connect for Spark are our two newest add-on modules.

    Join us on March 26 at 10am PT to hear from Aerospike Founder and Chief Product Officer, Srini Srinivasan, who will cover:
    - The Aerospike Connect product strategy

    - How Aerospike Connect for Spark enables companies to directly integrate the Aerospike database with their existing Spark infrastructure

    - How Aerospike Connect for Kafka makes it easy for enterprises to exchange data bi-directionally between the Aerospike database and enterprise transactional systems at the edge and core

    - How Aerospike REST Client can be utilized as an easy and standard interface for the Aerospike database that enables developers to work with the Aerospike data layer
  • Throwing IoT in the Trash (literally)
    Throwing IoT in the Trash (literally)
    Shane Swiderek, Brett Orr, Peter Girgis, Gavin Adams Mar 26 2019 5:00 pm UTC 55 mins
    Innovative IoT solutions are solving real-world problems, with data serving communities in ways you would never expect. Who would have predicted the hidden insights and cost savings waiting to be uncovered in our trash? Well, Bigmate! This IoT solutions provider turns real-time sensor data into insights.

    Realizing the trash collection process was outdated and inefficient, Bigmate developed a system with IoT sensors providing location, temperature, and bin level monitoring to optimize trash pickup. Saving money, streamlining operations, and optimizing processes, IoT sensor data can help your business discover new ways to solve old problems.

    Join our interactive webinar panel with Bigmate and AWS to learn:

    -How city-wide IoT implementation is optimizing trash pickup
    -How to translate raw data into actionable insights for users
    -The ins and outs of Bigmate’s IoT platform

    Presented By:

    -Gavin Adams, Sr. Solutions Architect, IoT at Amazon Web Services
    -Peter Girgis, Chief Technology Officer, Bigmate
    -Brett Orr, General Manager, Bigmate
    -Shane Swiderek, Product Marketing Manager, TIBCO Jaspersoft
  • 5 Critical Enterprise Cloud Backup Capabilities
    5 Critical Enterprise Cloud Backup Capabilities
    Storage Switzerland, Carbonite Mar 26 2019 5:00 pm UTC 60 mins
    The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.

    Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.

    In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.

    Join us for this live event to learn:

    1. Why switch to the cloud for enterprise backup?
    2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
    3. Why and where most solutions miss the mark
    4. How Carbonite Server delivers the five critical capabilities
  • Advanced Automated Security with Symantec and Splunk
    Advanced Automated Security with Symantec and Splunk
    Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances) Mar 26 2019 5:00 pm UTC 60 mins
    Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
    In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
  • Open Source for Telecommunications Service Providers
    Open Source for Telecommunications Service Providers
    Red Hat Mar 26 2019 6:00 pm UTC 56 mins
    As telecommunications service providers increasingly turn toward open source to modernize and transform their networks, they face the prospect of tackling a do-it-yourself project or working with a vendor partner that can support the required technologies. This important choice can determine the success of these strategic modernization initiatives.

    Join Heavy Reading principal analyst Roz Roseboro and Pano Xinos, Red Hat global lead for telecommunications solution marketing, to hear more about:
    • Why open source is so prominent in the telecommunications industry.
    • Pitfalls to avoid when deciding to work with open source technologies.
    • What the future holds for service providers at the network edge.

    Your Presenters:
    Roz Roseboro, Principal Analyst, Cloud Infrastructure and Management, Heavy Reading
    Pano Xinos, Global Telecommunications Solution Marketing Lead, Red Hat
    Azhar Sayeed, Chief Architect, Global Telcommunications, Red Hat
  • Requirements of Optimized Traffic Flow and Security in Kubernetes
    Requirements of Optimized Traffic Flow and Security in Kubernetes
    John Allen, Sr. Systems Engineer, A10 Networks Mar 26 2019 6:00 pm UTC 45 mins
    The adoption of containers is an accelerating trend in the application deployment space and Kubernetes has become the de-facto standard for container orchestration and management. However, many are still learning about Kubernetes and how it can benefit their organization.

    In this webinar you will learn to:
    * Make your application development more agile
    * Enhance security and compliance between microservices
    * Correlate traffic flow and security
    * Drill down to contextual data and quickly pin-point problem areas
  • Mastering the API life cycle in an agile world
    Mastering the API life cycle in an agile world
    Nicolas Masse, Technical Marketing Manager for API management, Red Hat. David Codelli Product Marketing Manager, Red Hat Mar 26 2019 6:00 pm UTC 36 mins
    Investment in application programming interface (API) management software increased by an average of 44% from 2012 to 2017, according to IDC.1 This growth reflects the tremendous importance of APIs to today’s businesses. While opening up digital assets promises new opportunities, companies must develop new processes to ensure that APIs are built efficiently and securely.

    This session will cover Red Hat’s approach for API development. We’ll discuss how to:

    - Use mocking to speed up and break dependencies.
    - Use a contract-first approach for defining tests that will harden your implementation.
    - Protect exposed APIs through a management gateway.
    - Manage deliveries using a continuous integration/continuous delivery (CI/CD) pipeline.
  • Maximise SAP HANA system uptime with SUSE Linux on AWS
    Maximise SAP HANA system uptime with SUSE Linux on AWS
    Santosh Choudhary, AWS, and Michael Bukva, SUSE Mar 27 2019 3:30 am UTC 60 mins
    In this session you will get an overview of how systems management, live patching and other high availability features provided by SUSE and AWS can help you maximise the uptime of your SAP HANA systems. We will demonstrate Live Patching of the kernel of a SUSE system running SAP HANA in AWS , driven by AWS Systems Manager, and the use of the CVE audit capability of SUSE Manager to identify the patches required to mitigate a serious vulnerability.