Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Implementing Command and Control with Cloud Intelligence Implementing Command and Control with Cloud Intelligence Jon Gallant, Developer Technical Evangelism & Development and Pamela Cortez, Program Manager Evangelist, Microsoft Sep 30 2016 6:00 pm UTC 60 mins
    Take control of your Internet of Things (IoT)!

    Join this webcast to learn how to:
    •Select options for getting your data out of IoT Hub for further processing with Machine Learning and Data Analytics systems
    •Understand the two-way communication of your system
    •Start wrapping up your full IoT solution, including IoT analytics and IoT data integration
  • How the Digital Enterprise can survive and thrive in today’s digital economy How the Digital Enterprise can survive and thrive in today’s digital economy Valentin Hamburger, EMEA Solutions Specialist for VMware at Hitachi Data Systems Oct 4 2016 9:00 am UTC 60 mins
    Since the year 2000, 52% of fortune 500 companies no longer exist. Digital transformation is essential for organizations to survive and thrive in the digital economy. IT needs to transform into a digital enabler to create new revenue streams, improve operational efficiencies and drive superior customer experience. However, there is a growing gap between business expectations and IT's ability to execute in order to realize efficient economic transformation. A new approach is needed.
    Join us to find out how a Programmable Data Center is emerging as the IT foundation for digital transformation.
  • Cyber Crime – Why Are You a Target Cyber Crime – Why Are You a Target Richard Cassidy, UK Cyber Security Evangelist Oct 4 2016 2:00 pm UTC 60 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyber attack.

    Register for this impactful webinar presented by Richard Cassidy, UK Cyber Security Evangelist at Alert Logic as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data.

    In this webinar, we will take a look at:
    • The ever-changing threat landscape, and how it affects your business
    • Tactics, techniques and procedures (TTPs) used by cyber criminal actors
    • Strategies and tools for mitigating the risk of cyber attack
    • Insight into Real-life case studies
  • Cloud Customer Architecture for e-Commerce Cloud Customer Architecture for e-Commerce Cloud Standards Customer Council (CSCC) Oct 4 2016 3:00 pm UTC 60 mins
    The Cloud Standards Customer Council has published a new reference architecture that details how to support e-Commerce solutions using cloud computing. The architecture describes the flows and relationships between business capabilities and architectural components for e-Commerce applications that use cloud computing infrastructure, platforms and/or services. This presentation will outline key considerations for building out advanced e-Commerce capabilities and determining how best to instantiate an e-Commerce system using private, public or hybrid cloud deployment models.
  • The Consequences of Infinite Storage Bandwidth The Consequences of Infinite Storage Bandwidth Fritz Kruger, Engineering Fellow and Chief Hardware Architect, SanDisk Oct 4 2016 4:00 pm UTC 30 mins
    Overall increases in CPU and DRAM processing power are falling behind the massive acceleration in available storage and network bandwidth.Storage management services are emerging as a serious bottleneck.What does this imply for the datacenter of the future?How will it affect the physical network and storage topologies?And how will storage software need to change to meet these new realities?
  • Creating the next generation of DevOps Creating the next generation of DevOps Aaron Kalin, Caffeine Powered Server Fox, dnsimple.com Oct 4 2016 5:00 pm UTC 60 mins
    It can be difficult to hire people with the exact skills you want or need for your DevOps team. Just look at the job boards! There’s tons of competition and not nearly enough people to meet the demand. With a total size of 8 employees, DNSimple decided to take a different approach by starting an apprenticeship program to train people with little to no experience in DevOps.

    In this webinar, Aaron Kalin of DNSimple goes over the lessons learned in budgeting, hiring, and onboarding their first ever apprentice along with why and how you might want to start a similar program at your company. Aaron will conclude with an update of where their apprentice is now and answer any questions you might have.

    Join us to learn:

    - Ways to change your hiring practices to be more inclusive and increase diversity
    - How to go about starting an apprenticeship program at your company and who is currently running programs
    - The benefits of having a DevOps apprenticeship program at your company
  • How Zadara Storage Keeps You Agile in Uncertain Times How Zadara Storage Keeps You Agile in Uncertain Times Doug Jury, VP Solution Sales & Bob Sarubbi, VP Americas Sales at Zadara Oct 4 2016 5:00 pm UTC 60 mins
    Now more than ever, it is imperative to stay agile and ahead of the competition. In times of uncertainty, it is vital to be flexible and agile to adapt to unexpected changes in your requirements. Learn how Zadara Storage can help you implement an “immortal storage solution” with the flexibility, scalability, and agility of the cloud while enjoying economics of pay-as-you-go Storage-as-a-Service (STaaS).
  • Embedded Analytics to Bridge the Last Mile to Business Value Embedded Analytics to Bridge the Last Mile to Business Value Hyoun Park, Blue Hill Research and Haarthi Sadasivam, Looker Oct 4 2016 5:00 pm UTC 60 mins
    For analytics to make a meaningful organizational impact, organizations have to effectively embed analytics into key business tasks and decisions such as sales operations, ecommerce, workforce management, product and service workflows, revenue recognition, and financial performance. Blue Hill's research, including interviews, case studies, surveys, and vendor briefings, consistently show that effective analytic usage requires embedding analytics into a variety of workflows in a repeatable, scalable, and consistent fashion that leads to real-time visibility. Although this may seem to be a straightforward task, Blue Hill finds that a majority of companies fail to meet this standard of flexible and value-driven embedded analytics for a variety of reasons, including the following:

    Internal analytics cannot be easily scaled to serve organization-wide data or users
    Analytics cannot be easily configured or customized to meet specific user needs
    Companies lack a repeatable process for embedding analytics for similar data processes
    End users can't get the right data sources connected to the right analytic tasks
    Key analytic views are not directly connected to the current version of the truth

    In this webinar, Blue Hill Research will provide guidance on the key reasons that traditional BI deployments, even those created based on historical "best practices" for analytics, fail to achieve these goals and the benefits associated with supporting embedded analytics as an ongoing Sixth Sense to improve business performance rather than a never-ending series of one-off requests.
  • Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Patrick Arnold, Patrick Huff, Alex Weinert Oct 4 2016 5:30 pm UTC 60 mins
    There are a number of security-related questions that come up often in our conversations with clients and industry professionals. We have invited the Avaleris VP, IT Security & Emerging Technologies and three leading security experts from Microsoft to answer these questions and discuss the most pressing identity-driven security issues faced in the industry today. In this panel webinar, hear from Patrick Arnold, Senior Global Director - Enterprise Cybersecurity Group at Microsoft, Patrick Huff, Senior Director, Advanced Service Delivery at Microsoft, and Alex Weinert, Group Program Manager at Microsoft, on issues such as: “If Microsoft gets attacked, what happens to my cloud security products?” and “What is the best way to protect against cyber espionage?”. All attendees are invited to submit their own security questions in advance of the panel and during the live session.
  • Personalize Financial Services with Advanced Analytics Personalize Financial Services with Advanced Analytics Steve Borg and Kevin Orbaker, Microsoft Oct 4 2016 8:00 pm UTC 60 mins
    Do you know the 'next best action' to take for your customer?

    Customers today are inundated with choices. And yet 40% of customers believe financial services is an undifferentiated market. To gain a competitive edge, financial services organizations have the opportunity to differentiate their offerings through process and personalization scenarios.

    Integrating more and better data elegantly and efficiently helps financial services make better recommendations to their clients and customers. And yet, it's not possible to provide these personalized services without the help of sophisticated computer systems. The right technology can help financial services collect structured and unstructured customer data from across many systems, then apply mathematical algorithms to find meaningful patterns. These patterns can suggest a 'next best action' an organization can take to provide better customer service and sales.

    Join this webcast to learn how to:
    •Increase customer satisfaction and optimize customer service with personalized 'next best action'
    •Prevent customer churn with an Advanced Analytics solution
    •Use Advanced Analytics to grow revenue per customer
  • The challenges of the Communication Service Providers at the age of OTT & cloud The challenges of the Communication Service Providers at the age of OTT & cloud lior barak Oct 5 2016 1:00 pm UTC 45 mins
    In this webinar we will discuss the challenges of Communication Service Providers (CSPs) in the age of Over the Top (OTT) and Cloud services and the potential solutions to address those challenges.
    We will explain in details how CSPs can address future trends such as growing demand for L3 and mixed of L2+L3 connectivity , and the loss of revenue, which forcing them to reduce OPEX and CAPEX.
  • The Making of the Nextcloud Box: Building a consumer device in just a few months The Making of the Nextcloud Box: Building a consumer device in just a few months Frank Karlitschek, Founder of Nextcloud Oct 5 2016 4:00 pm UTC 60 mins
    In this webinar, Nextcloud founder, Frank Karlitschek, will tell the story of the Nexcloud box, a secure self-hosted cloud and IoT platform that lets consumers take back control over their personal data. He'll go into detail about how they brought the device to consumers in just a few months and why they chose to use Ubuntu snaps to deliver Nextcloud to customers.

    Frank Karlitschek is the founder of Nextcloud, founder of ownCloud, free Software Developer, former KDE e.V. board member, photographer and founder of openDesktop .org - read more here http://karlitschek.de/about/
  • Cloud Management Platforms-The State of the Market in 2016 and Beyond Cloud Management Platforms-The State of the Market in 2016 and Beyond William Fellows, VP and cofounder of 451 Research, Mark Jamensky, EVP of Products at Embotics Oct 5 2016 5:00 pm UTC 60 mins
    Faced with growing pressure for faster provisioning times, easier-to-use platforms, and better visibility into digital and virtual assets, IT organizations are recognizing the value of incorporating a cloud management platform (CMP) into their broader cloud strategy.

    While there are clear benefits to implementing a CMP, it can be daunting to figure out which platform can properly manage your public, private, and hybrid resources. 451 Research data shows organizations will be using more than one cloud service which increases complexity with each additional cloud.

    Join William Fellows, VP and cofounder of 451 Research, along with guest speaker Mark Jamensky, EVP of Products at Embotics, as they dissect the key takeaways and findings of 451’s CMP market study of technology buyers at 166 US enterprise. This webinar will examine the growing need for a CMP in today's market, factors to consider when deciding to move to a CMP, and how to ensure successful deployment in your organization.
  • Multi-Cloud Management - How to effectively manage multiple cloud environments Multi-Cloud Management - How to effectively manage multiple cloud environments Brent Brightwell, SVP Strategy, DoubleHorn Oct 5 2016 5:00 pm UTC 30 mins
    The digitization of businesses and the way that IT supports the needs of these businesses has changed significantly over time. Today, different IT workloads can be deployed on different types of cloud services, depending upon the business requirements. As a result, many IT departments are moving their infrastructure to the cloud and multi-cloud virtual environments. A multi-cloud management platform allows enterprises to manage workloads and applications across all cloud deployment models, including public, private, and hybrid. Using the right platform for this workload enables enterprises to drive favorable business results. The multi-cloud approach facilitates transition to the IT-as-a-Service (ITaaS) model, where IT departments act as service brokers and support organizations in optimizing their IT infrastructure consumption. In this webinar, we'll discuss the key features of a multi-cloud management platform and also discuss the benefits, challenges, and opportunities in the existing market.
  • Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Kelley Bray, Employee Trust and CustomerONE at Symantec Oct 5 2016 5:00 pm UTC 60 mins
    Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.

    In this webinar we will discuss:

    - Symantec’s Employee Trust Program

    - How we go beyond basic security awareness training to continuously cultivate our security culture.
  • The Keys to a Secure Hybrid Cloud Environment The Keys to a Secure Hybrid Cloud Environment Paul Fletcher, Cyber Security Evangelist, Alert Logic Oct 5 2016 6:00 pm UTC 60 mins
    Despite increasing cloud adoption in IT departments, many organizations are still concerned with data security. Those concerns are amplified by the loss of physical control over data and the potential for mismanagement of those assets when migrating to the cloud. As a result, this is often the top barrier to cloud deployment. However, with cloud innovations growing exponentially, the new wave of security solutions is breaking down those barriers.

    In this webinar, Alert Logic cyber security evangelist, Paul Fletcher, will provide you with insight on how to get over hybrid cloud security hurdles and discuss:

    • Common misconceptions surrounding hybrid cloud security
    • Key strategies to secure a hybrid cloud environment
    • Solutions to security threats within multiple hybrid cloud environments
  • Multi-layered online attacks: IT security strategies to protect your company Multi-layered online attacks: IT security strategies to protect your company Paul Mazzucco, TierPoint- Chief Security Officer; Deepak Patel, Imperva - Director, Security Strategy Oct 5 2016 6:00 pm UTC 60 mins
    The latest hacking strategies include attacking targets from multiple fronts using DDoS attempts, malware and other techniques at the same time. Automation, including widespread use of compromised systems, hired botnets and IoT (Internet of Things) devices, is on the rise.

    Join us to learn more about multi-layered attacks and how intelligence and automation are making them significantly more powerful. You will also learn tips to help your organization mitigate the risks.

    Key Learnings:
    · How bots are simplifying automation creating an even bigger volumetric attack force.
    · How DDoS attacks are often a smoke screen to other malware attacks happening.
    · Strategies for protecting your organization against multi-layer attacks.
  • Best Practices for Project Management and Planning Best Practices for Project Management and Planning Gus Cicala, Microsoft Oct 5 2016 6:00 pm UTC 60 mins
    Best practices for project planning: bringing together the process and the tools to start projects right!

    This webcast will outline the best practices for Project Planning and align them to the capabilities of the Microsoft Project scheduling engine.

    We will cover the basic steps to build an optimized plan, so that everything that is known within the project scope is appropriately reflected into an achievable plan.

    Included will be:
    •The best practices for project scope definition to build the appropriate foundation for an effective project schedule.
    •The organizing principles necessary to create an effective a Work Breakdown Structure in Microsoft Project.
    •The fundamentals for linking tasks to enable Project to use the appropriate logic when building the schedule; this will include how to use leads and lag, predecessor/successor relationships, and constraints.
    •The application of resource management practices to bring credibility to the plan assure that the resources necessary to meet the schedule are available when needed and at the capacity needed.
    •A review of the various options for baselining the schedule, cost, and labor to ensure the project plan is prepared for the control and execution stages of the project.
  • Cloud Security and Manageability on a Personal Level Cloud Security and Manageability on a Personal Level Microsoft Oct 5 2016 8:00 pm UTC 60 mins
    Help your employees take personal responsibility for IT security!

    From biometrics to multi-factor authentication, how do you help your employees be protected at a personal level?

    We’ll explore how you can go beyond mere password strength to help prevent your employees' identities and your business from being compromised. Join this webcast to learn how cloud services and operating systems are designed with security in mind, while preserving natural, friendly user interactions.

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • CA Briefings Part 2 - Step 1: Protect the Front Door CA Briefings Part 2 - Step 1: Protect the Front Door Carol Alexander, Sr. Dir Security, CA Technologies; Rob Marti, Princ, Prod. Mgr, CA.; Brandon Dunlap Oct 6 2016 5:00 pm UTC 75 mins
    Making it easy for your customers to engage with you requires frictionless security. Begin by ensuring you have modern single sign-on and authentication to provide compelling, simple, yet non-intrusive environments for your customers. Join CA and (ISC)2 on October 6, 2016 at 1:00PM for Part 2 of our Briefings series where we'll examine how to employ analytics to streamline the path to your applications, address hybrid environments (both SaaS and on premise) and ensure AA and SSO are meeting continually emerging challenges of the digital enterprise.
  • What's Wrong with Disaster Recovery as a Service (DRaaS) and How to Fix it What's Wrong with Disaster Recovery as a Service (DRaaS) and How to Fix it George Crump, Storage Switzerland Oct 6 2016 5:00 pm UTC 60 mins
    Typical disaster recovery plans leverage backup and or replication to move data out of the primary data center and to a secondary site. Historically the secondary site is another data center the organization maintains. But now organizations look to the cloud to become a secondary site, leveraging the cloud as a backup target and even a place to start their applications in the event of a failure. The problem is this approach merely simulates a legacy design and presents some significant recovery challenges.

    Join Storage Switzerland and ClearSky Data for a live webinar to discuss how organizations might be able to re-invent disaster recovery using the cloud.
  • Intro to Containers, Container Storage Challenges and Docker Intro to Containers, Container Storage Challenges and Docker Chad Thibodeau, Principal Product Manager, Veritas, Keith Hudgins, Tech Alliances, Docker, Alex McDonald, Chair SNIA-CSI Oct 6 2016 5:00 pm UTC 75 mins
    Containers are the latest in what are new and innovative ways of packaging, managing and deploying distributed applications. In this webcast, we’ll introduce the concept of containers; what they are and the advantages they bring illustrated by use cases, why you might want to consider them as an app deployment model, and how they differ from VMs or bare metal deployments.

    We’ll follow up with a look at what is required from a storage perspective when using Docker, one of the leading systems that provides a lightweight, open and secure environment for the deployment of containers. Finally, we’ll round out our Docker introduction by presenting the takeaways from DockerCon, an industry event for makers and operators of distributed applications built on Docker, that took place in Seattle in June of this year.

    Join us for this discussion on:
    •Application deployment history
    •Containers vs. virtual machines vs. bare metal
    • Factors driving containers and common use cases
    • Storage ecosystem and features
    • Container storage table stakes
    •Introduction to Docker
    •Key takeaways from DockerCon 2016
  • Simplifying Remediation Management in the Cloud Simplifying Remediation Management in the Cloud John-Michael Scott, Microsoft Oct 6 2016 6:00 pm UTC 60 mins
    Whether government is mandating action or industry is self-managing cleanup, remediation projects are complex, multi-location, and sometimes multi-year actions. PPM tools can help simplify these projects so that you can achieve oversight over all phases of the project in order to reduce costs and ensure regulatory compliance. All this is made possible by leveraging the following capabilities:

    Centralizing remediation activities
    •Manage full lifecycle of all remediation activities, including inspections, audits, drills, exercises, investigations, compliance checks, and contingency plans
    •Evaluate and manage HSSE impacts of remediation situations
    •Maintain oversight over state laws and regulatory requirements for resolution of and completion of cleanup

    Enabling access for relevant stakeholders
    •Open up your project to partners and external suppliers to provide updates and submit additional tasks
    •Review site assessments or characterization reports and approve cleanup and site sampling plans
    •Forecast costs and durations necessary in the determination of activity completion

    Collaborating with stakeholders at any time or place
    •Manage all key documents, change orders, risks, issues, and key meta data in one place
    •Collaborate with managers, project engineers, and environmental consultants from the office or in the field
    •Reduce rework by creating an automated business process interacting with all stakeholders

    Driving insights and enabling more effective exception-driven management
    •Create efficient reporting for all stakeholders
    •Summarize report statistics, trends, and performance in comprehensive online dashboards
    •Leverage data analysis and predictive analytics to project impact, future cost, total performance, and more

    This webcast is part of the Microsoft Project in manufacturing series.
  • Overcome Outdated Processes and Automate IT Risk & Compliance Overcome Outdated Processes and Automate IT Risk & Compliance Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51° Oct 6 2016 6:00 pm UTC 60 mins
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Oct 6 2016 6:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.