Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • From Download to Engagement: Delivering the Right Mobile Apps at the Right Time From Download to Engagement: Delivering the Right Mobile Apps at the Right Time Mahdi Alirezaie, Technical Solutions Professional, Microsoft Corporation Mar 1 2017 7:00 pm UTC 60 mins
    Whether you’re a mobile-only startup looking to turn early adopters into evangelists or a multi-million dollar enterprise mobilizing your workforce, you need to ship the right apps to the right customer at the right time. You need users to use your apps, turning downloaders into engaged users. To win mobile users’ loyalty, you must continuously ship high quality software and continuously listen and learn from your users, giving them features before they know they want them. Mobile isn’t just build, release, and done, it’s a continuous cycle. In this webinar, you’ll see how HockeyApp helps you track real user behavior, understand how your apps behave in the wild, and easily distribute new apps to your beta users.

    You'll learn how to:
    - Capture usage data, analytics, and crash reports to identify trends
    - Get in-app feedback and respond to your users
    - Use HockeyApp to distribute your apps to various groups, including beta users and internal testers
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Mar 1 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • From Now to Next: Migrating Your Servers to Google Cloud [Live Q&A] From Now to Next: Migrating Your Servers to Google Cloud [Live Q&A] Gonen Stein, CloudEndure and Andy Tzou, Google Mar 2 2017 4:00 pm UTC 30 mins
    Join CloudEndure’s Gonen Stein and GCP’s Andy Tzou as they discuss how companies can take full advantage of the cloud using the talent, technology, and applications they already have. They'll dive into the technology behind a free cloud migration service that utilizes CloudEndure’s continuous, block-level replication to provide disruption-free migration to Google Cloud Platform.

    This video will provide an overview of key considerations for IT and live-demonstrate Google Cloud and CloudEndure's partnership to create a self-service VM migration solution for enterprise. Whether it's on-prem or in the cloud already, move your existing server infrastructure to Google Cloud Platform at no cost.

    Have you been waiting for the right moment to migrate to the cloud? Get your questions answered about how companies are using the new automated migration service to seamlessly migrate to the cloud.
  • Two Clicks to Find and Fix Data Quality Issues in Salesforce Two Clicks to Find and Fix Data Quality Issues in Salesforce Donal Dunne, Jason Medd Mar 2 2017 5:00 pm UTC 30 mins
    Contact and lead records enter Salesforce from various sources, but bad data is costly, and leaves you unable to communicate with your customers. While many departments have different needs they are typically using the same contact data – And each one has their own approach to fixing bad data.

    Bad data in your Salesforce environment impacts your ability to;
    •Communicate with customers
    •Identify cross sell and upsell opportunities
    •Plan and align territories
    •Score and route leads
    •Bill customers

    To fix these and other issues caused by bad data it is imperative that you implement the right tools and processes to understand the scale of the problem and fix it.

    Informatica Cloud Data Quality Radar quickly identifies, fixes, and monitors data quality problems in your Salesforce environment. Attend this short webinar to hear how you can:

    •Easily identify and visualize data quality issues within your applications – and drive increased confidence in data
    •Automatically fix the most impactful data quality problems sooner - while reducing reliance on IT for data quality related activities
    •Continuously monitor data quality across source systems
  • How Not to Get Fired as a CISO How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Mar 2 2017 6:00 pm UTC 60 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • How to Extend SD-WAN to AWS How to Extend SD-WAN to AWS Parag Thakore, Director of Product Management Mar 2 2017 6:00 pm UTC 45 mins
    Enterprises are trending towards deploying inexpensive Internet broadband links to enable bandwidth-intensive applications, but public transport links are “best-effort”, insecure and susceptible to damaging attacks. A cloud-delivered SD-WAN delivers ubiquitous security and enterprise-grade application performance independent of the transport medium, enabling a cost-effective solution for organizations increasingly moving data center workloads to IaaS, such as Amazon Web Services (AWS).

    In this seminar, you learn ways to reduce operational complexity and optimize application performance to cloud data centers, including:

    - The challenges inherent in access to IaaS workloads such as AWS and Azure
    - Seamlessly including IaaS workloads in your SD-WAN architecture with only a few clicks
    - How to secure and optimize IaaS access in your SD-WAN
    - A live demonstration of cloud-delivered SD-WAN capabilities
  • CTO PoV: Enterprise Networks CTO PoV: Enterprise Networks Khalid Raza, CTO & Co-Founder, Viptela Mar 2 2017 6:00 pm UTC 45 mins
    Rapidly changing enterprise application requirements, the cloud, and mobile computing are placing stress on traditional wide area networks (WANs). Enterprises are being challenged to rethink network architectures to meet present and future business requirements.

    Khalid Raza, CTO and Co-Founder at Viptela, will discuss why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging approaches can help organizations adapt to these changes.

    In this webinar, we will cover:

    - Key applications molding enterprise network requirements
    - Impact on current WAN architectures & shift in present and future business needs
    - How enterprise network teams and service providers can adapt the traditional WAN to support new traffic patterns
  • Unlock Public Cloud Benefits While Maintaining Security Unlock Public Cloud Benefits While Maintaining Security Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec Mar 2 2017 6:00 pm UTC 60 mins
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • Information Overload - Making Sense of Threat Intelligence Sources Information Overload - Making Sense of Threat Intelligence Sources John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Erik Von Geldern, FXCM; Brandon Dunlap (Moderator) Mar 2 2017 6:00 pm UTC 75 mins
    There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
  • How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving Storage Switzerland, Panzura Mar 2 2017 6:00 pm UTC 60 mins
    Join Storage Switzerland and Panzura in a live webinar on March 2nd as we cover why you should really want to aggressively archive data, what the challenges are to an aggressive strategy and, most importantly, how to use cloud storage to overcome them.
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.

    Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.

    Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Disaster Recovery Best Practices: From Cyberattacks to Natural Disasters Disaster Recovery Best Practices: From Cyberattacks to Natural Disasters Dave Deibert, President SMB TechFest, CIO IT Innovators, President IAMCP (SoCal), VP SMB Technology Network Mar 2 2017 7:00 pm UTC 60 mins
    Technology and preparation go hand-in-hand for disaster recovery and business continuity.

    What happens to your business if a natural disaster strikes?

    Will your business be able to survive a fire, or a security breach? It's time to learn the nuances of disaster recovery and why you as a business owner should take simple steps to ensure your operation will be okay when the unexpected happens. Get ready to learn through several case studies of businesses that have both survived and closed their doors due to natural disasters.

    Join this webcast to:

    - Learn how Innovation and Technology theory is being used to mitigate business disruption
    - Find out how businesses are protecting themselves
    - Discover why businesses embrace technology and what you can do to get started
    - Review case studies on several organizations that have thrived after adopting disaster recovery solutions
  • Automatyczny backup środowisk VMware Automatyczny backup środowisk VMware Daniel Olkowski, Dell EMC Mar 3 2017 9:00 am UTC 60 mins
    Na przełomie roku ukazała się nowa wersja oprogramowania do backupu/odtwarzania: Avamar 7.4.
    Jedną z najciekawszych funkcji jest automatyczne rozpoznawanie i backup nowo utworzonych maszyn wirtualnych.
    Zapraszam na sesję, w trakcie której porozmawiamy o:
    •tym jak działają „dynamiczne polityki”, które rozpoznają i backupują nowo powstałe maszyny wirtualne
    •kiedy stosować
    •kosztach
    Całość uatrakcyjni pokaz demo zabezpieczanego środowiska wirtualnego.
    Zapraszam,
    Daniel Olkowski
  • Microsoft Platform Security: Detecting Threats & Preventing Breaches Microsoft Platform Security: Detecting Threats & Preventing Breaches Paul Edlund, Technical Solutions Professional, Microsoft Mar 3 2017 4:00 pm UTC 30 mins
    We built security into Microsoft products and services from the start. That’s how we deliver a comprehensive, agile platform to better protect your endpoints, move faster to detect cybersecurity threats, and respond to security breaches across the smallest and largest of organizations.

    Join this session to learn more about:
    - Preventing identity compromise
    - Securing apps and data
    - Expanding device controls
    - Safeguarding your cloud infrastructure
  • Cloud-Enabled: The Future of Endpoint Security Cloud-Enabled: The Future of Endpoint Security Jackie Castelli CrowdStrike, Sr. Product Manager Mar 3 2017 4:00 pm UTC 60 mins
    As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers.

    CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrike’s cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises.

    In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss:

    • The advantages of endpoint protection purpose-built for the cloud – why it allows you to take full advantage of the cloud’s power

    • The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured?

    • Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcon’s innovative cloud-powered platform


    About the Speaker:

    Jackie Castelli
    CrowdStrike, Sr. Product Manager

    Jackie Castelli, CISSP, has over 20 years of experience in the cybersecurity industry. She has gained practical security experience in her roles as a security architect and data center manager. As a senior product marketing manager for CrowdStrike, she is responsible for educating the market about Falcon Host, CrowdStrike’s next-generation endpoint protection. Prior to CrowdStrike, Jackie worked in technical roles in pre-sales, IT and support. Jackie frequently speaks on cyber security topics at executive briefings and industry events.
  • Windows 10 Deployment Best Practices: Upgrade App Integration & Network Security Windows 10 Deployment Best Practices: Upgrade App Integration & Network Security Todd Furst, Technical Solutions Professional, Microsoft Corporation Mar 3 2017 9:00 pm UTC 75 mins
    With Windows 10, you can simplify IT and save costs, and also enjoy extensive identity, data, service, and network protections that are not available in Windows 7.

    With Windows as a Service, we’re beginning the journey to simplify the delivery and management of Windows, while providing the most flexible management and deployment options today. With One Windows, we have one app platform, one security model, and a flexible management approach that can reduce complexity and save costs.

    Join this webcast to:
    - Refresh your memory on what Windows as a Service means, and understand how it applies to your own business
    - Get an overview of the management features and integrations in Windows 10 that make it simpler but also more flexible, such as In-Place Upgrade, Dynamic Provisioning, Azure Active Directory, and Mobile Device Management
    - Learn more about App-V and UE-V, which makes management of applications and settings more streamlined
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Ray Wong, Sr. Solutions Engineer for EMEA, VeloCloud Networks Mar 7 2017 9:00 am UTC 45 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    Challenges enterprises face during SD-WAN migration
    Key considerations for a successful SD-WAN deployment
    Step-by-step guide to transition from a traditional WAN to SD-WAN

    Ray Wong, Sr. Solutions Engineer for EMEA at VeloCloud, uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment in Europe, Africa, and the Middle East.
  • The State of National Security & The Evolving IT Threatscape The State of National Security & The Evolving IT Threatscape Iveta Topalova, WW Public Sector Architect Manager Mar 7 2017 4:00 pm UTC 30 mins
    National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.

    In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.

    Join this discussion to:
    - Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
    - See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
    - Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens
  • How to Leverage APIs & Microservices to Accelerate Legacy Modernization How to Leverage APIs & Microservices to Accelerate Legacy Modernization Matt Serna, Mike O'Meara and Dmitriy Kuznetsov Mar 7 2017 4:00 pm UTC 60 mins
    As agile upstarts continue to displace established incumbent companies, the imperative to adopt (and adapt to) modern technologies and platforms - cloud, big data, IoT, mobile - has never been greater.

    All too often, legacy systems, which form the backbone of many enterprises, can stand in the way of the implementation and adoption of these technologies. As the number of digital transformation initiatives and the speed with which they must be delivered intensifies, IT leaders are being overwhelmed by the sheer number of requests for data feeds from legacy systems. Moreover, existing legacy interfaces, developed in a world of daily, batch calls, are not fit for purpose for today's digital channels requiring real-time data causing additional pain.

    Join Matt Serna, Manager Industry Marketing, Mike O'Meara, VP of Infoview Systems, and Dmitriy Kuznetsov, VP of Integration and Cloud Services, Infoview Systems for an in depth look at a specific customer use-case.

    Listeners will learn:

    - Best practices for leveraging Anypoint Platform as part of a broader legacy modernization initiative
    - How to enable AS/400 and other legacy systems to consume external APIs [DEMO]
    - How to leverage Anypoint Platform and the MuleSoft-Certified AS/400 connector to expose AS/400 data and services via APIs [DEMO]
  • Scality | Quantum Webinar Scality | Quantum Webinar Phillip Tribble - Scality & Greg Holick - Quantum Mar 7 2017 6:00 pm UTC 60 mins
    Organizations face complexities when it comes to using and managing archived storage on tape or in the cloud. Common struggles include balancing growth, costs, capacity, and data retrieval. One particularly effective way to address these challenges is to tier data from existing storage devices to object storage solutions like the Scality RING.
  • Why Application Performance Management Needs Better Database Monitoring Why Application Performance Management Needs Better Database Monitoring Mike Kelly, SelectStar CTO & Milan Hanson, Forrester Senior Analyst Mar 7 2017 6:00 pm UTC 60 mins
    There's a lot of emphasis going into tracking the customer's transaction performance through all of the factors that might slow it down. Today there is lots of emphasis on looking into the source code, looking at APIs, looking into the network, looking into the servers, VMs, and containers on-prem or in the cloud. But let's not forget an essential component that's not getting a lot of attention: databases. Customer obsession and performance management depend as much today as ever -- maybe more -- on databases. And they're not getting any simpler! Complex distributed databases like Hadoop, Cassandra, and NoSQL require monitoring and management that's very different and much more complex -- monitoring that integrates into the APM systems and analytics required to achieve customer obsession.

    In this webinar, join guest speaker, Forrester Senior Analyst Milan Hanson, who will discuss the importance of customer experience, customer obsession and the technological and cultural shift this creates. Following Milan, SelectStar General Manager Mike Kelly will highlight key trends driving database monitoring and management, including how it relates to application performance.
  • Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Chris Grossmeier, Director of Product Management Mar 7 2017 6:00 pm UTC 45 mins
    Clear the fog around Google Cloud Platform (GCP) hybrid cloud costing. See how to save costs in a hybrid cloud or GCP cloud migration as CloudPhysics rightsizes, and then calculates costs for your running infrastructure. Segment workloads based on real performance and configurations—then map into Google options for greatest savings. Evaluate hosting scenarios: on-premises vs. hybrid cloud vs. dedicated cloud hosting. We’ll address asset utilization, rightsizing, and licensing for migration. Be the company hero with rich operational and cloud costing analysis.
  • Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Jim Davis, Senior Analyst of Service Providers at 451 Research; Dave Nuti, VP of Business Development at Aryaka Mar 7 2017 6:00 pm UTC 60 mins
    The biggest challenge facing global enterprises today is the ability to deliver fast and reliable performance of mission-critical applications to worldwide users, especially when they work in cloud and SaaS environments. The move to cloud has exposed some of the limitations to MPLS networking services. Is it time to replace (or augment) MPLS with SD-WAN?

    Join Jim Davis, Senior Analyst of 451 Research, and Dave Nuti, Vice President of Business Development at Aryaka, as they present their latest findings on the best practices for delivering fast and reliable application performance using a global SD-WAN. Attend this special webinar to learn:

    •The current challenges with data and application delivery faced by global enterprises, including striking a balance between performance, cost, and deployment flexibility
    •Why legacy networks, such as MPLS and the public Internet, do not work for application delivery in today’s global environment
    •The best practices to improve application performance using a global SD-WAN-as-a-service
  • How Digital Transformation is Accelerating High Performing Supply Chains How Digital Transformation is Accelerating High Performing Supply Chains Barbara Giamanco, Donniel Schulman & Brett Cooksey Mar 7 2017 7:00 pm UTC 60 mins
    According to Accenture, every high performing supply chain is a digital supply chain.

    They go on to say that, “Digital technology is disrupting traditional operations and now every business is a digital business. The impact on supply chain management is particularly great. Businesses cannot unlock the full potential of digital without reinventing their supply chain strategy.”

    It's time to learn how to reinvent your organization's supply chain to unlock even more business potential.

    Join this webcast to:
    - Learn how the modern buyer is causing a transformation of the traditional supply chain
    - See how digital technology can drive organizational change
    - Understand how disruptive technologies—social media, mobile, cloud and analytics—cause the emergence of a digital supply network
    - Appreciate the business advantages of a digital supply chain
    - Recognize the difference between an enhanced supply chain verses a re-invented network

    This webcast is part of our Microsoft Dynamics 365: Business Applications webcast series. Sign up for this session, or the entire series today!