Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Podcast - Scale-out NAS vs. Distributed Storage Podcast - Scale-out NAS vs. Distributed Storage Charlie Hodges, Storage Switzerland Recorded: Feb 20 2017 13 mins
    They seem to solve the same problem – meeting the constantly growing performance and capacity demands of the enterprise. But Scale-out NAS and Distributed Storage are different. Join our next LIVE podcast to learn what Scale-out NAS and Distributed Storage are, how they are different and which one is right for you. Attendees to the live podcast will be able to ask questions and get answers in real-time. NO REGISTRATION REQUIRED!
  • Hitachi HCP Removes Data Silos Hitachi HCP Removes Data Silos Ray Ford – CTO, Accident Exchange Recorded: Feb 20 2017 4 mins
    Accident Exchange, part of the AIS group, is a provider of mobility services for people that experienced a car accident. With large volumes of data in various formats to maintain the company recognized the potential compliance challenges ahead. Accident Exchange in partnership with Hitachi Data Systems implemented Hitachi Content Platform (HCP) providing them the capability to more securely store and abstract data.

    Learn how Accident Exchange can now prove authenticity, automate and abstract data from different sources in multiple files and formats all within one platform to achieve greater compliance. HCP is the key to removing data silos.
  • Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Todd Furst and Rich Ross, Technical Solutions Professionals, Microsoft Recorded: Feb 17 2017 44 mins
    Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.

    Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.

    Join this webcast to learn how to:
    - Implement disaster recovery for all your major IT systems
    - Unify data management, security, and protection
    - Provide protection for your data and applications, no matter where they reside
    - Extend on-premises backups storage and data archiving solutions to the cloud
  • Understanding IT Governance & Security in your Dev, Test & Cloud Environments Understanding IT Governance & Security in your Dev, Test & Cloud Environments Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Recorded: Feb 17 2017 66 mins
    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Analyzing Data in Google BigQuery with Tableau Analyzing Data in Google BigQuery with Tableau Babu Elumalai, Big Data Technical Lead, Google; Ross Perez, Sr. Product Marketing Manager, Tableau Recorded: Feb 17 2017 45 mins
    Customers have been using Tableau and BigQuery to store and analyze large volumes of data for years, but BigQuery has recently released significant updates that will help Tableau customers find even more insight in their data.

    Watch this webinar to learn:

    - How expanded standard SQL support can help you work more efficiently
    - Best practices for efficiency with Tableau and BigQuery
    - How to connect to BigQuery and create a visualization with Tableau
  • Nowości w backupie Dell EMC. Nowości w backupie Dell EMC. Daniel Olkowski, Dell EMC Recorded: Feb 17 2017 49 mins
    W grudniu Dell EMC ogłosił nowych wersję kluczowych rozwiązań w obszarze backupu/odtwarzania:
    1.NetWorker
    2.Avamar
    3.Boost for Applications
    Zapraszam na 30 minutową sesję w czasie której dotkniemy najważniejszych zmian i najciekawszych funkcjonalności.
  • Big Data, Predictive Analytics & Sales Performance: The 3 Keys to Success Big Data, Predictive Analytics & Sales Performance: The 3 Keys to Success Barbara Giamanco, Social Centered Selling, Peter Mollins, Knowledge Tree, & Melissa Treier, Information Builders Recorded: Feb 16 2017 58 mins
    The era of big data and predictive analytics is clearly upon sales and marketing professionals, representing a transformative paradigm shift for sales and marketing teams. No longer can salespeople rely on relationships and other soft factors to target and close business. Marketing has to move beyond one-off campaigns and brand advertising.

    Big data and predictive analytics technologies represent the opportunity to turn the tables. In other words, sales and marketing can finally become more about math than magic.

    Join this discussion with Barbara Giamanco, CEO of Social Centered Selling, Peter Mollins, VP Marketing, Knowledge Tree, and Melissa Treier, VP Product Sales, Information Builders. You will learn how to:

    - Justify big data and predictive analytics as part of your organization's sales and marketing strategy
    - Leverage insights from big data to accurately target high-value prospects in marketing campaigns, keep existing customers on board through account-based marketing strategies, and expand existing opportunities
    - Improve sales forecasting accuracy using more than "gut feel," relying on real-time sales data visualizations
  • Deliver Real Value with Open Source Business Optimization Technology Deliver Real Value with Open Source Business Optimization Technology Geoffrey De Smet, founder and project lead, OptaPlanner Recorded: Feb 16 2017 63 mins
    The world is full of scheduling problems: employees to shifts, delivery routes to vehicles, aircraft and crews to flights, and manufacturing jobs to machines, just to name a few. Solving these problems optimally is often key to a businesses’ success, and yet the technology and knowledge needed to do it is often only available to the largest of enterprises. Until now.

    Red Hat® JBoss® BRMS includes a business resource planner based on the popular OptaPlanner open source project. It offers a range of powerful optimization algorithms that enable regular Java™ developers to quickly build solvers for many common optimization problems.

    Watch this webcast with the OptaPlanner to:
    - Work through some actual examples and use cases whose solutions demonstrate business benefits.
    - Leave equipped with tools and resources to start solving your own business planning problems.
    - Discover how digital transformation and open source are changing the face of business and IT operations
  • Apache Hadoop: The New Enterprise Data Platform for Big Data Apache Hadoop: The New Enterprise Data Platform for Big Data Jennifer Wu, Director of Product Management, Cloudera and Daniel Karuppiah Director of Product Marketing Microsoft Recorded: Feb 16 2017 66 mins
    The emergence of Big Data has driven the need for a new data platform within the enterprise. Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.

    Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.

    Join this webcast to:
    - See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
    - Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
    - Review common use cases for Cloudera on Azure
    - Discover customer benefits and success stories
    - Learn how to deploy and start recognizing value with Cloudera on Azure
  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • From Node to Node: How to Optimize Cassandra Database Performance From Node to Node: How to Optimize Cassandra Database Performance Mike Kelly, CTO, SelectStar Recorded: Feb 16 2017 30 mins
    Because of its high performance, availability and scalability, Apache Casssandra has quickly become a preferred NoSQL open-source database of choice. Even though it’s highly reliable, there are some issues that can arise and cause major issues to your environment – such as running out of node space or dealing with latency issues. Gaining visibility into key metrics with the option to drill-down to root-cause issues can offer the visibility that you need to keep Cassandra operating at peak performance.

    In this 30-minute webinar, SelectStar’s Mike Kelly will highlight:
    · How you can optimize the performance of your nodes
    · Key metrics to track within your Cassandra environment
    · Top methods to optimize your Cassandra database performance
  • Disaster Recovery as-a-Service, the Killer App in the Cloud! Disaster Recovery as-a-Service, the Killer App in the Cloud! Swen Conrad, ocean9 | David Torres, SUSE Recorded: Feb 16 2017 58 mins
    A group of researchers from the University of Massachusetts Amherst and AT&T Labs stated: “… [that] running DR services using public cloud shown[ed] cost reductions of up to 85% … .”

    Join this webinar by SUSE and Ocean9 to understand how to leverage public cloud like Amazon Web Services or Microsoft Azure for delivering Disaster Recovery as-a-Service (DRaaS) and achieving such infrastructure cost savings. We will cover both DRaaS concepts as well as show an actual cloud service implementation for a demanding enterprise class workload with SAP HANA.

    8 years after this quote was published by the team of researchers, now it is prime time to leverage leading public cloud capabilities in the enterprise.
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Synchronizing with HPE ALM for Traceability Across Toolsets Synchronizing with HPE ALM for Traceability Across Toolsets Mark Ford, TIAA Recorded: Feb 16 2017 50 mins
    If your Dev teams are storing their requirements as User Stories in one tool and your QA teams are storing their Test Cases in HPE ALM, then chances are you have no traceability between the two. And what about Test Defects created in HPE ALM? How can you trace those back to the original User Story requirement? I’ll show you how we solved this dilemma using Tasktop to synchronize User Stories to HPE ALM Requirements, pass the User Story id throughout the HPE ALM lifecycle from Requirement to traced Test Case to linked Defect, and how we will synchronize the Test Defects back to our Dev tool and link them back to the User Story for full round trip traceability.

    This session is suitable for all levels including VPs, Directors, Dev and QA managers, practitioners, and technical resources. I will cover the following:
    Why Requirement and Defect traceability is important to us
    The challenges faced that prompted our solution
    Detailed explanation of how we implemented the solution
    The benefits realized
  • Shift-Left Security: How to Automate Security into Your Pipeline Shift-Left Security: How to Automate Security into Your Pipeline Benjy Portnoy, Aqua Security Recorded: Feb 16 2017 37 mins
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • Think beyond GDPR – Integrate your cyber defences Think beyond GDPR – Integrate your cyber defences Sunil Choudrie & Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?

    As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.

    Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
  • SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant Symantec Recorded: Feb 16 2017 5 mins
    Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • How to Set up an IoT Hub: Managing & Communicating with your Devices How to Set up an IoT Hub: Managing & Communicating with your Devices Jeremy Foster, Senior Technical Evangelist, Microsoft Recorded: Feb 15 2017 26 mins
    The Internet of Things (IoT) is here to stay, and it's bigger and better than ever.

    There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.

    That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.

    Join this webcast to learn how to:
    - Conceptualize why you might need a cloud-based hub solution
    - Easily set up an IoT Hub in Azure
    - Create simulated devices and communicate to your hub
  • Best Practices for Protecting Your Applications on Azure Best Practices for Protecting Your Applications on Azure Vince Bryant, Cloud Platform Partner Executive Recorded: Feb 15 2017 35 mins
    Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

    Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

    • Five things you must consider when securing applications running on Azure or multi-cloud deployments 
    • Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
    • Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments
  • Introduction to SQL Server on SUSE Linux Enterprise Server Introduction to SQL Server on SUSE Linux Enterprise Server Travis Wright, Eamonn Colman, David Rocha, Jeff Lindholm Recorded: Feb 15 2017 58 mins
    The next version of Microsoft SQL Server is coming to Linux and is already in preview. In this session, Travis Wright, Principal Program Manager from Microsoft, will provide an introduction to SQL Server and how it runs on SUSE Linux Enterprise Server and container platforms. The scope of the first release on Linux and schedule will be covered and deployment, configuration, high availability, storage, and performance/scale will be topics for a more technical drill in.
  • StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage Charlie Hodges, Storage Switzerland Recorded: Feb 15 2017 46 mins
    Join us for our next live podcast. We will provide analysis on the latest news like:
    * Carbonite buying DoubleTake
    * Violin Memory being bought at auction
    * StorageCraft buying Exablox
    * Datto buying OpenMesh

    Will also review our recent briefings including:
    * Talon
    * Vembu
    * Actifio
    * Zoolz
    * Bluelock
    * HubStor

    In this episode’s deep dive our analyst team will discuss the pros and cons of Amazon and Google cloud storage. NO REGISTRATION REQUIRED!
  • Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Ronnie Sternberg, SafeDK, Kimm Yeo, HPE Recorded: Feb 15 2017 57 mins
    The use of Software Development Kits (SDKs) continues to be on the rise in mobile apps. In the last six months, we’ve seen a jump of more than 12% in the use of SDKs for creating mobile apps. These off-the-shelf services, from advertising, analytics, social, and more, are helpful in the mobile development process. They offer unique functionality and simplify the coding, while saving time and money. But SDKs are not really YOUR code. You work hard to ensure your users’ experience, safety and privacy in your own code, but can you guarantee the same for the code from these guest SDKs? What about the test implications and impact on user engagement and retention?

    Join us to hear about:
    Key trends and findings for Mobile SDKs
    2 major domains of risk introduced when using SDKs and associated real-life stories
    How you can achieve a 5 star rating using HPE Mobile Center and SafeDK
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Feb 21 2017 5:00 pm UTC 60 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Microservices with OpenShift: Experience from the fields Microservices with OpenShift: Experience from the fields Sébastien Pasche, Security Architect Feb 21 2017 5:00 pm UTC 60 mins
    Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Kangwarn Chinthammit, Director of Deployment, VeloCloud Networks Feb 21 2017 6:00 pm UTC 45 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    - Challenges enterprises face during SD-WAN migration
    - Key considerations for a successful SD-WAN deployment
    - Step-by-step guide to transition from a traditional WAN to SD-WAN

    Kangwarn Chinthammit uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment.
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Feb 21 2017 6:00 pm UTC 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Feb 21 2017 7:00 pm UTC 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Security Myths Debunked: Running Your Business In the Cloud Security Myths Debunked: Running Your Business In the Cloud Adrian Sanabria, Senior Analyst, Information Security at 451 Research & Aaron Newman, CEO & Founder at CloudCheckr Feb 21 2017 7:00 pm UTC 60 mins
    Organizational efficiency and convenience were the initial appeal of the cloud: add servers when you need them, get rid of them when you don't. Offering businesses the ability to automatically scale with workload and application needs, the cloud offers endless potential to grow at scale. As cloud technology continues to evolve and diversify—from public to private, hybrid to multi-cloud—the use cases and potential benefits have also expanded. And, unlike traditional IT, cloud performance and capacity drivers also tend to improve infrastructure security. During this webinar, we'll explore:

    *Using cloud security as a competitive advantage for your business
    *How focus on performance, agility, and efficiency in cloud mutually benefits security
    *The changes in thinking and design necessary to unlock the cloud’s potential for improving security
    *Practical strategies for automation, monitoring, mitigation and incident response

    Join 451 Research and CloudCheckr for an exclusive webinar to discuss trends, challenges, and opportunities for organizations looking to leverage the true potential of the cloud.

    About CloudCheckr:
    CloudCheckr is a unified cost and security automation platform that gives you visibility, insight, and automation for your AWS environment. CloudCheckr delivers a suite of products for cloud operations, security and finance teams for Cost Management, Security and Compliance, Utilization and Inventory.
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Feb 21 2017 8:00 pm UTC 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Feb 21 2017 9:00 pm UTC 60 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Chaitanya Singh Rathore, Pre Sales Engineer Feb 22 2017 9:30 am UTC 60 mins
    Economies hit annually with billions through cybercrime & implications of cybercrime within the pharmaceutical and healthcare industry go beyond the obvious financial damage because of the:

    •Intellectual property
    •Lack of right Data Security strategy to protect against cyber-attacks
    •Insiders rather than external hackers who hold large amounts of valuable IP and trade secrets (DuPont breach in 2012)

    Key learnings:
    •The best way to protect sensitive information, including Patent Files, Legal filings, Prescription Records, Insurance Records, and Sales Details from breaches
    •How to secure private data from theft or loss to reduce liability
    •How to manage a multi-device complex IT environment with ease
  • How Healthy is Your Storage System? How Healthy is Your Storage System? Neil Hopwood, Sr. Systems Engineer All Flash Technologies Feb 22 2017 11:00 am UTC 60 mins
    Join this webinar to see how your existing environment performs and what the potential improvements could be.

    Topics:
    • Flash Assessment including the VTV follow-up
    • The new Unity All-Flash platform overview
    • How this overlays the current VNX range
    • Use cases and application integration
    • iCDM overview and how it differentiates Dell EMC from the rest of the market
  • Chasing Shadows: Session 3 - Accelerating Service Delivery Chasing Shadows: Session 3 - Accelerating Service Delivery Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Feb 22 2017 6:00 pm UTC 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Feb 22 2017 6:00 pm UTC 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Feb 22 2017 6:00 pm UTC 45 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud Sanjay Mishra - Talligent, Frank Rego - SUSE Feb 22 2017 6:00 pm UTC 45 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Feb 22 2017 7:00 pm UTC 60 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • The Data Warehouse in the Age of Digital Transformation The Data Warehouse in the Age of Digital Transformation Neil Raden, Principal Analyst, Hired Brains Research Feb 22 2017 7:00 pm UTC 60 mins
    In the past years of Big Data and digital transformation “euphoria”, Hadoop and Spark received most of the attention as platforms for large-scale data management and analytics. Data warehouses based on relational database technology, for a variety of reasons, came under scrutiny as perhaps no longer needed.

    However, if there is anything users have learned recently it’s that the mission of data warehouses is as vital as ever. Cost and operational deficiencies can be overcome with a combination of cloud computing and open source software, and by leveraging the same economics of traditional big data projects - scale-up and scale-out at commodity pricing.

    In this webinar, Neil Raden from Hired Brains Research makes the case that an evolved data warehouse implementation continues to play a vital role in the enterprise, providing unique business value that actually aids digital transformation. Attendees will learn:

    - How the role of the data warehouse has evolved over time
    - Why Hadoop and Spark are not replacements for the data warehouse
    - How the data warehouse supports digital transformation initiatives
    - Real-life examples of data warehousing in digital transformation scenarios
    - Advice and best practices for evolving your own data warehouse practice
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • SQL Server 2016: Just a Few of Our DBA's Favorite Things SQL Server 2016: Just a Few of Our DBA's Favorite Things Rodney Landrum, Consulting Services Manager, Ntirety Feb 22 2017 8:00 pm UTC 60 mins
    Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates his favorite new features of the latest Microsoft SQL Server 2016 Service Pack 1.

    During the webinar, Rodney will touch on the following:

    • A demo of his favorite new features in SQL Server 2016 and SP1 including:
    o Query Store
    o Database Cloning
    o Dynamic Data Masking
    o Create or Alter
    • A review of Enterprise features that are now available in standard edition
    • New information in Dynamic Management Views and SQL Error Log that will make your DBAs job easier.
  • Best Practices for Combining DevOps, Cloud and IaaS on Azure Best Practices for Combining DevOps, Cloud and IaaS on Azure David Hansford, Technical Solutions Professional, Microsoft Feb 22 2017 9:00 pm UTC 60 mins
    In today's day and age, it's more important than ever to work at the forefront of cutting edge cloud technologies and continue to inspire and empower your IT organizations.

    Microsoft Azure IaaS (Infrastructure-as-a-Service) empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

    Join this webcast to learn how to:
    - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
    - Develop cutting edge “born in the cloud” applications
    - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.