Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Build user-friendly cloud apps more productively with SAP Cloud Platform
    Build user-friendly cloud apps more productively with SAP Cloud Platform Christian Baader, Platform Partner Ecosystem, SAP Global Channels and Platform GTM / Keith Fischer, SAP Design - Build Live 75 mins
    Dear Sir/Madam,

    In today’s world of digitization there is an increasing dependence on sophisticated business software to rapidly evolve and deliver an intuitive user experience – not just to keep training and support cost low but – most importantly – to keep employee motivation up.   

    If you are interested in driving down application development costs and time by up to 50% while vastly improving user adoption and relevancy, join us for this exciting webinar opportunity July 20 2017!

    Find out how, as an SAP partner in the Build engagement model, you can rapidly prototype, build, and monetize functionally rich applications for the integrated business processes of SAP’s 350,000 customers - based on SAP Cloud Platform.

    SAP Cloud Platform is a platform-as-a-service (PaaS) that enables you to:

    • Rapidly build and deploy business applications in the cloud for faster time to value.
     
    • Securely integrate with your SAP and third-party (non-SAP) cloud and on-premise systems for greater agility and productivity.
     
    • Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction.
     
    • Leverage our digital channels and flexible license options to market your packaged solution to 350,000 SAP customers.

    Join us on this webcast and learn about the partner experience and how you can benefit from the features of SAP Cloud Platform and the Build engagement within the SAP PartnerEdge program.
     
    Webcast Details:
    Date: Thursday, July 20, 2017
    Time: 10 a.m.to 11 a.m. EST (60 minutes)

    To find out more about the SAP PartnerEdge program and SAP Cloud Platform, visit our Application Development Partner Center. 
  • Getting Started with Windows on AWS
    Getting Started with Windows on AWS Julien Lepine, Principal Solutions Architect, Amazon Web Services Recorded: Jul 20 2017 46 mins
    In our first Windows webinar, find out about the benefits of migrating your Windows workloads to AWS. During the session, we will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to architect, deploy, and manage your Windows platforms on AWS.
  • Turn It Up To 14! From the #1 selling server manufacture the new 14th Generation
    Turn It Up To 14! From the #1 selling server manufacture the new 14th Generation Mark Maclean Recorded: Jul 20 2017 59 mins
    Dell EMC has launched our most cutting-edge portfolio of PowerEdge servers ever to help customers drive IT Transformations. The newly designed 14th generation of the Dell EMC PowerEdge server portfolio forms a secure, scalable compute platform that is the ideal foundation for software-defined data center initiatives, hyper converged infrastructure “HCI” , analytics and tradition x86 server workload acceleration. The new portfolio delivers innovation in many areas including:

    - Scalable business architecture - new intel CPU family & new server designs optimized for a wide variety of existing and emerging workload requirements
    - Management leadership with intelligent automation - via new idrac9 with expanded APIs and the all-new OpenManage™ Enterprise console enable IT staff to spend more time on higher priority work
    - Integrated security - protects customers’ businesses and data for the life of the server
  • Getting Started with Microsoft SQL Server on AWS
    Getting Started with Microsoft SQL Server on AWS Julien Lepine, Principal Solutions Architect, Amazon Web Services Recorded: Jul 20 2017 45 mins
    In this webinar, we will explain how running SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery.
  • Tame your Unstructured Data with Next Generation Scale-Out Storage
    Tame your Unstructured Data with Next Generation Scale-Out Storage Dr Stefan Radtke, EMEA CTO, Unstructured Data and Analytics Recorded: Jul 20 2017 49 mins
    How We Improved the #1 Scale-Out NAS Platform

    Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World in May. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
  • How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS
    How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS Alert Logic - Ryan Holland, Dir. of Cloud Arch.; AWS - Patrick McDowell, Partner SA; Retail Insights – Orion Newman, VP of IT Recorded: Jul 19 2017 44 mins
    Learn about AWS customer Retail Insights’ several security and compliance needs when protecting their AWS environment and how Alert Logic helped develop a comprehensive security strategy by understanding their security posture, gaining visibility into their environment and proactively protecting against threats and attacks. Attendees will gain a deep understanding of securing the full application stack and the value of having a security solution tightly integrated with AWS.
  • Pivotal Cloud Foundry 1.11—CredHub, Container Networking & Spring Boot Actuator
    Pivotal Cloud Foundry 1.11—CredHub, Container Networking & Spring Boot Actuator Jared Ruckle, Mukesh Gadiya and Pieter Humphrey, Pivotal Recorded: Jul 19 2017 75 mins
    Pivotal Cloud Foundry 1.11 is now generally available. Join Jared Ruckle and Pieter Humphrey for a deeper look at new capabilities, along with a Q&A about many of the new product features, including:

    CredHub Bootstrapping
    - A new way to manage and secure credentials for Pivotal Cloud Foundry

    Container Networking
    - Create app-level security policies and run modern apps in a "zero trust" environment

    Volume Services
    - Bring stateful apps to Pivotal Cloud Foundry

    New Spring Boot Actuator
    - Integrations with Apps Manager to ease troubleshooting

    PCF Metrics 1.4
    - New custom metrics tracking as a result of a tighter integration with Spring Boot

    Attend this webinar and learn how to get the most from the enhancements to Pivotal Cloud Foundry 1.11, the leading multi-cloud app development platform.
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • 5 Best Practices for Governing Your Content in the Cloud
    5 Best Practices for Governing Your Content in the Cloud Paul Falor, CIO & VP of Strategic Alliances, North Highland Company & Josh Rosenberg, Sr. PMM, Information Governance, Box Recorded: Jul 19 2017 46 mins
    The way we work as an organization is no longer changing.  It has already changed.  People access content from all kinds of devices, across different locations.  Business content is being created and viewed both inside and outside of your organization.  But how do you effectively protect the way it's shared and managed while meeting your compliance needs?  Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats. 
     
    Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.  
     
    Learn about:
    ·  Key considerations for a cloud-first data governance strategy
    ·  Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
    ·  How to use SaaS technology to empower your users while effectively governing their content
  • Advanced SD-WAN: Powering the Cloud-Connected Enterprise
    Advanced SD-WAN: Powering the Cloud-Connected Enterprise Brad Casemore, IDC and Derek Granath with Rolf Muralt from Silver Peak Recorded: Jul 19 2017 57 mins
    Today’s cloud-connected enterprise demands a new WAN architecture, an SD-WAN, to meet the performance and security requirements for SaaS and IaaS. As SD-WAN technology evolves, new levels of automation, security and architectural simplification have emerged. First-packet application classification is an advanced capability that automatically steers trusted SaaS and web traffic directly to the internet and unknown or suspicious traffic to a next-generation firewall for additional security inspection.

    Further advancements harness machine learning and AI to enable adaptive, application-centric traffic handling and pervasive security. With automation, machine learning, and AI, the Self-Driving WAN can be realized.
  • Integrating Threat Isolation with SWG and SMG (10:00am PT / 1:00pm ET)
    Integrating Threat Isolation with SWG and SMG (10:00am PT / 1:00pm ET) Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass Recorded: Jul 19 2017 32 mins
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Top 4 Cloud Networking Pitfalls to Avoid When Deploying SaaS
    Top 4 Cloud Networking Pitfalls to Avoid When Deploying SaaS Richard Weekes, Cloud Systems Engineering Leader at MicroStrategy, Sree Kannan, Sr. Director of Marketing at Aviatrix Recorded: Jul 19 2017 64 mins
    Public cloud providers like Amazon AWS enable software providers to build and offer software-as-a-service. These SaaS providers are often plagued by networking challenges owing to multi-tenant requirements, different connectivity types and strict security & compliance requirements. There has to be a simpler way to solve networking requirements for the cloud other than the legacy hardware-based networking solutions.

    Join us in this webinar to hear from a cloud expert, Richard Weekes, Enterprise Analytics & Mobility Provider, Microstrategy, where he architected an elegant cloud networking solution to address the 4 common pitfalls for SaaS providers.

    In this webinar, you will learn:

    . The most common top 4 networking pitfalls in the cloud that hinders SaaS providers
    . How to avoid these common pitfalls that are seen with the legacy hardware-based networking solution
    . How Aviatrix overcomes the pitfalls with a software-only solution built natively in the cloud
  • How to Protect Your Cloud Instance with Incapsula
    How to Protect Your Cloud Instance with Incapsula Farzam Ebadypour, Senior Sales Engineer, Imperva Incapsula, Robert Hamilton, Director, Product Marketing, Imperva Incapsula Recorded: Jul 19 2017 41 mins
    More than 90 percent of companies use cloud services. As more companies move their apps and data to the public cloud, the risk of web threats increases.

    Adding security to your cloud services such as AWS, Azure and Google Cloud Platform can help reduce exposing your enterprise to DDoS attacks and other threats. Find out how Incapsula WAF and DDoS mitigation can help to:

    - Mitigate risks to your network
    - Increase visibility to security events
    - Save cost and brand reputation
  • Why your VR game is virtually useless without data
    Why your VR game is virtually useless without data Kiyoto Tamura, VP Marketing, Treasure Data Recorded: Jul 19 2017 60 mins
    The reality is virtual, but successful VR games still require cold, hard data. For wildly popular games like Survios’ Raw Data, the first VR-exclusive game to reach #1 on Steam’s Global Top Sellers list, data and analytics are the key to success.

    And now online gaming companies have the full-stack analytics infrastructure and tools to measure every aspect of a virtual reality game and its ecosystem in real time. You can keep tabs on lag, which ruins a VR experience, improve gameplay and identify issues before they become showstoppers, and create fully personalized, completely immersive experiences that blow minds and boost adoption, and more. All with the right tools.

    Make success a reality: Register now for our latest interactive VB Live event, where we’ll tap top experts in the industry to share insights into turning data into winning VR games.

    Attendees will:
    * Understand the role of VR in online gaming
    * Find out how VR company Survios successfully leverages the Exostatic analytics infrastructure for commercial and gaming success
    * Discover how to deploy full-stack analytics infrastructure and tools

    Speakers:
    Nicolas Nadeau, President, Exostatic
    Kiyoto Tamura, VP Marketing, Treasure Data
    Ben Solganik, Producer, Survios
    Stewart Rogers, Director of Marketing Technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Treasure Data
  • Insights from the 2017 Gartner Magic Quadrant for NGFW
    Insights from the 2017 Gartner Magic Quadrant for NGFW Navneet Singh, Director, Product Marketing Recorded: Jul 19 2017 40 mins
    Hear from Palo Alto Networks experts on key take aways from the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls.

    For the sixth time, Palo Alto Networks is in the leader quadrant.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • Are You Ready for What’s Next in Hyper Converged Infrastructure?
    Are You Ready for What’s Next in Hyper Converged Infrastructure? Gabe Chapman: Sr. Manager, NetApp HCI GTM and Cindy Goodell: Sr. Product Marketing Manager, NetApp HCI Recorded: Jul 19 2017 39 mins
    Initial versions of HCI solutions were designed to reduce the complexity of deploying storage and compute resources. To achieve simplicity, vendors had to make trade-offs that created performance, flexibility and consolidation limitations that affected how and where HCI could be utilized in your enterprise datacenter. NetApp HCI is the first enterprise-scale hyper converged infrastructure to be designed specifically to solve for these first-generation challenges.

    Join us for this webinar to learn how NetApp HCI enables you to confidently deploy a hyper converged infrastructure in the core of you most demanding datacenters by:
    •Delivering unique Quality of Service limits that allow the granular control of every application.
    •Scaling compute and storage resources independently so you only buy what you use.
    •Integrates into the NetApp Data Fabric for enhanced data portability, visibility and protection.
  • What's new in JFrog Products!
    What's new in JFrog Products! Mansimran Singh & Shlomi Kriheli Recorded: Jul 18 2017 55 mins
    Spend an hour with JFrog to learn about the new and cool features that just released in the latest releases of our products. Learn about how you can leverage these features to accelerate your delivery pipeline. We will talk about new features in Artifactory that were released after version 5.1 such as: JFrog Access, Event-based pull replication, SHA256 support, Azure blob storage support, SAML SSO and other security improvements and some UI improvements.
  • The Power of ElasticSearch on Apache Cassandra
    The Power of ElasticSearch on Apache Cassandra Vincent Royer of Strapdata, Creator of Elassandra, & Jason Downey Recorded: Jul 18 2017 42 mins
    Instaclustr, the Open Source-as-a-Service company, has recently released Elassandra and Kibana support through our Managed Service. Elassandra gives you the power of Elasticsearch to search your data directly from Cassandra – without developing custom integration or synchronisation code. This secondary index also provides the availability and cross-region replication benefits of Cassandra.

    In this 30 minute webinar, Vincent Royer of Strapdata, the creator of Elassandra, and Instaclustr will walk you through the basic architecture and features of Elassandra and Instaclustr’s managed service offering for Elassandra and Kibana.
  • Pervasive Intelligence: The IoT Computing Continuum
    Pervasive Intelligence: The IoT Computing Continuum Christian Renaud, Research Director, Internet of Things Recorded: Jul 18 2017 49 mins
    Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Recorded: Jul 18 2017 15 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Container-Driven Continuous Delivery: Maximizing your Application Pipeline
    Container-Driven Continuous Delivery: Maximizing your Application Pipeline Red Hat Recorded: Jul 18 2017 38 mins
    In order for businesses to stay agile, developers must be able to deploy applications quickly, efficiently, and in a streamlined manner. Creating automated continuous integration and delivery (CI/CD) pipelines is a widely accepted process to accelerate the release process, and is critical to success in adopting OpenShift.

    But, what should a minimal viable pipeline have? What does a good pipeline look like? What are the right tools for building a pipeline? In this interactive session, we’ll look to answer these questions so you’ll walk away with an understanding of how to create container-driven continuous delivery that works for your organization.
  • Closing with CloudCheckr - A Guide for Azure CSP Partners
    Closing with CloudCheckr - A Guide for Azure CSP Partners Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 18 2017 17 mins
    Azure CSP Partners face new business challenges as legacy IT environments move to the cloud. These changes increase the complexity of billing clients with accuracy and efficiency. However, with the right cloud management platform, CSPs can gain the ability to focus on their core competencies and less on business operations like monthly billing, invoicing, and chargebacks.

    During this webcast, CloudCheckr Product Manager Todd Bernhard will review how the right tools can help Azure CSP partners increase profits, add value, and close more deals with more robust proposals. Specifically:

    - Opportunities to win business with pre-engagement analysis

    - Strategies and best practices to earn higher profitability and margins

    - How to automate invoicing and billing processes at scale
  • Accelerate AI and HPC Workload Delivery with Composable Cloud Infrastructure
    Accelerate AI and HPC Workload Delivery with Composable Cloud Infrastructure John Abbott, 451 Research. Chris Orlando, ScaleMatrix. Michael J. McManus PhD, Intel Recorded: Jul 18 2017 50 mins
    Join Intel, ScaleMatrix, and 451 Research for an insightful webinar covering the challenges and solutions to the adoption of Artificial Intelligence workloads: Deep Learning, Machine Learning and HPC, in the Cloud. High Performance Computing is a fundamental tool used in analytics and research; and on average, can provide an ROI as high as $515 per $1 of investment. However, HPC could deliver even greater value if we could overcome key technical barriers associated with different workloads driving separate systems with specialized hardware and software for each workload. These challenges lead to increased acquisition and management costs and are often responsible for reducing efficiency.

    Learn how ScaleMatrix’ high-density data centers and cloud delivery capabilities along with Intel’s Scalable Systems Framework have overcome these challenges with tight system integration, increased density, and balanced compute, memory, network/fabric and storage in a composable, cloud-delivered architecture, specifically designed to address the various AI and HPC requirements associated with compute intense workloads like Genomic Analytics, Molecular Dynamics, and Machine Learning.

    The ScaleMatrix Artificial Intelligence Cloud solution using Intel’s Scalable System Framework employs heterogeneous blocks of compute nodes that can be readjusted to match workload demand. It is easily scaled to meet any size customer need, offers ease of use, faster delivery times, and lower TCO by simplifying and improving core infrastructure. Technologies highlighted include the Intel® Xeon and Xeon Phi processors, Intel® Arria FPGA, Intel® SSD’s, and Intel® Omni-Path Architecture. Whether you’re focused on Image Processing, Convolutional Neural Networks, Alignment Algorithms, or DNA Sequencing, you’ll hear from Intel and ScaleMatrix experts how their joint solution can improve your HPC workload performance in an economical way. Complementary trial details will be presented.
  • Broadcast under attack: Protecting content and defending infrastructure
    Broadcast under attack: Protecting content and defending infrastructure IBC365 | Channel 4 | Sundog Media Toolkit | EY Jul 20 2017 3:00 pm UTC 60 mins
    Cyber attacks are on everyone’s agenda but with so much at stake just how should Broadcast, Media and Entertainment players protect themselves in an increasingly hostile world?

    High profile attacks on broadcast and media players are on the increase. But what does the threat landscape look like? What are the new attack surfaces and how should broadcasters and media companies approach cybersecurity?

    Speakers:

    Brian Brackenborough, CISO, Channel 4
    Richard Welsh, CEO, Sundog Media Toolkit & VP of Education, SMPTE
    Cameron Brown, Cyber Expert, Legal Forensic
  • Improve business performance with Optimised Internet
    Improve business performance with Optimised Internet Hoo Shu Yee, Singtel Sr. Product Director and Nick Hawkins, Akamai Sr. Director Product Management Jul 20 2017 4:00 pm UTC 45 mins
    Internet is a convenient, cost-efficient means to connect your branch offices and to access public cloud applications. It is also an integral part of any enterprise’s hybrid WAN architecture. However, its unreliable and unpredictable performance may hamper employee productivity.

    Join us in this webinar to learn about:
    • Some of the challenges enterprises face with Internet connectivity
    • How Internet connectivity can be optimised to improve branch offices’ connectivity and to access cloud applications

    So, think small, because a branch office could bring you closer to market domination when it is well connected to the rest of the world by reliable, business-grade Internet.
  • The Economics of Serverless Computing
    The Economics of Serverless Computing Owen Rogers Jul 20 2017 4:00 pm UTC 60 mins
    Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
  • Simplifying Your Cloud Journey with SaaS
    Simplifying Your Cloud Journey with SaaS Frank Hane, Technical Alliances, Platform9, Chris Wright, Product Manager, Platform9 Jul 20 2017 5:00 pm UTC 60 mins
    Choosing amongst various cloud solutions can be a daunting task - deploying those solutions can be even more difficult with considerations to be made on many moving parts: hardware, software, technical expertise, budget availability, timelines, and much more. In this webinar, we’ll focus on a popular open-source cloud computing solution, OpenStack, and how a SaaS model to deployment can be beneficial for IT environments of all sizes.
  • The State of Cloud Security
    The State of Cloud Security Eric Hibbard, Hitachi Data Systems, Mark Carlson, Co-Chair SNIA Tech Council, Toshiba Jul 20 2017 5:00 pm UTC 75 mins
    Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.

    Topics covered will include:

    Summary of the standards developing organization (SDO) activities:
    - Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
    Securing the Cloud Supply Chain:
    - Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
    Emerging & Related Technologies:
    - Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
  • Supermicro Launches New X11 Family of Server and Storage Solutions
    Supermicro Launches New X11 Family of Server and Storage Solutions Michael McNerney Vice President Software Solutions and Network Security at Supermicro Jul 20 2017 5:00 pm UTC 60 mins
    Supermicro has released a comprehensive line of new X11 generation server and storage solutions featuring the new Intel® Xeon® Scalable processor family with the strongest support for NVMe storage and 100G/25G Ethernet in the industry.

    Supermicro’s new X11 generation solutions are engineered to unleash the full performance and rich feature sets on the new Intel® Xeon® Scalable processor family, supporting more cores and higher TDP envelopes of 205 watts and higher, increased to six memory channels with higher bandwidth, and more PCI-E 3.0 lanes with up to 100G/40G/25G/10G Ethernet, 100G EDR InfiniBand and integrated Intel® Omni-Path Architecture networking fabrics. The elevated compute performance, density, I/O capacity, and efficiency are coupled with industry’s most comprehensive support for NVMe NAND Flash to deliver up to 16 million IOPS for unprecedented application responsiveness and agility. Customers can select the Server, Storage, Blade, Network, or Workstation systems optimized for their applications, as well as the performance, memory, storage, and I/O profiles that are optimally matched to their workloads, at attractive price points.

    Register for this webinar to hear Michael McNerney, Vice President Software Solutions and Network Security, speak about Supermicro’s latest and broadest portfolio of new Ultra, BigTwinTM, SuperBlade®, and SuperStorage products optimized for today’s latest technology innovations. He will also be sharing critical insights on how Supermicro workload optimized server solutions deliver the highest performance, efficiency, and scalability in demanding customer environments from cloud to big data and hyper-converged solutions, and efficiently power mission-critical Enterprise workload
  • Multi-cloud is the new normal and hybrid cloud is inevitable.
    Multi-cloud is the new normal and hybrid cloud is inevitable. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 20 2017 5:00 pm UTC 60 mins
    As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
  • Securing Your Public Cloud Infrastructure
    Securing Your Public Cloud Infrastructure Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza Jul 20 2017 5:00 pm UTC 60 mins
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • Overcoming the Top 3 Challenges of the Storage Status Quo
    Overcoming the Top 3 Challenges of the Storage Status Quo Storage Switzerland, Panzura Jul 20 2017 5:00 pm UTC 60 mins
    Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can't meet the unstructured data demands of the mobile workforce or distributed organizations. In this webinar, George Crump, Lead Analyst at Storage Switzerland and Brian Wink, Director of Solutions Engineering at Panzura will expose the hidden gotcha's of the storage status quo and explore how to manage unstructured data in the cloud.
  • Get Ready for DFARS - A CloudCheckr Workshop
    Get Ready for DFARS - A CloudCheckr Workshop Patrick Gartlan, CloudCheckr CTO Jeff Bennett, Allgress President/COO Tim Sandage, AWS Sr. Security Partner Strategist Jul 20 2017 6:00 pm UTC 60 mins
    The clock is ticking on the latest cloud compliance mandate: NIST Special Publication 800-171, otherwise known as DFARS (Defense Federal Acquisition Regulation Supplement). Any organization or contractor that holds or processes unclassified Department of Defense (DoD) data must ensure that they comply with the new DFARS clause.

    December 31, 2017 is the ultimate deadline by which to prove compliance, so action is recommended as soon as possible.

    In this webinar, Patrick Gartlan (CloudCheckr CTO), Jeff Bennett (Allgress President/COO), and Tim Sandage (AWS Sr. Security Partner Strategist) will lead an interactive workshop on what DFARS regulation means for your business, specifically:

    ✔ Specific requirements of the DFARS regulation

    ✔ Key controls that CloudCheckr provides to help you meet DFARS requirements

    ✔ Tools from Allgress that map DFARS requirements to CloudCheckr features
  • Ensuring Data Protection with NIST Cybersecurity Framework
    Ensuring Data Protection with NIST Cybersecurity Framework Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Jul 20 2017 6:00 pm UTC 30 mins
    When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

    Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

    Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

    • Identify sensitive data, where it is and who is accessing it

    • Protect that data by establishing policies which prevent exposure

    • Detect threats to which could extrapolate data by several means

    • Respond to threats with automated actions

    • Recover after a threat to produce reports to prove compliance

    Register Today
  • The Open Innovation Labs Experience: Redefining DevOps Culture
    The Open Innovation Labs Experience: Redefining DevOps Culture Justin Holmes, App Dev Architect, Red Hat; Øystein Bedin, PaaS Infrastructure Architect, Open Innovation Labs, Red Hat Jul 20 2017 7:00 pm UTC 45 mins
    DevOps is foundational to the world’s highest-performing information technology organizations. But more than anything else, DevOps is about culture, and culture can be elusive. To help our customers experience how a DevOps culture can accelerate their innovative ideas, Red Hat launched it's Open Innovation Labs. In this session, Justin Holmes and Øystein Bedin from Open Innovation Labs will share their story building a DevOps culture for the Labs' core team.

    In this session, you'll learn about:

    - Behaviors and processes to enable collaboration between development and operations.
    - How tools like Ansible by Red Hat and Red Hat OpenShift can help facilitate communication between team members.
    - How Open Innovation Labs provide an environment for Red Hat customers to experience the unique advantages of a DevOps culture.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Jul 21 2017 6:00 pm UTC 30 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Retailers:Evolve Customer Experience Strategies to adapt to Consumer Behaviour
    Retailers:Evolve Customer Experience Strategies to adapt to Consumer Behaviour Raj Mistry,Group Vertical Sales Director and Rob Allman,Group General Manager, Customer Experience, Dimension Data Jul 24 2017 3:30 pm UTC 45 mins
    Retailers are faced with the challenge of fast evolving consumer buying processes. Today and in the future consumers have greater choice in terms of how when and where they buy. Consumers expect an omnichannel experience across all available touch points with retailers.

    According to the 2017 Customer Experience Benchmarking Report, 85% of retail and consumer goods organisations recognise CX as a competitive differentiator. Join us for this webinar where we’ll be discussing the retail specific findings from the report.
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 24 2017 5:00 pm UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Jul 24 2017 6:00 pm UTC 60 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Jul 25 2017 9:00 am UTC 45 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Does your data security create more pain than it solves? 5 steps to get it right
    Does your data security create more pain than it solves? 5 steps to get it right Raju Verranna, Pre Sales Engineer Jul 25 2017 9:30 am UTC 45 mins
    Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?

    Key learning:
    1. Increase security and compliance, while maintaining user-friendliness
    2. Deploy encryption without interrupting normal business processes
    3. Ease the daily burden of your data security administration
  • Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform
    Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform Dave Rudzinsky, SVP & CIO; Jim McDaniel, VP, Strategic Accounts; Matt Serna, Manager, Industry Marketing Manager Jul 25 2017 3:00 pm UTC 60 mins
    Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?

    Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.

    Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.

    Attendees will learn:

    - How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
    - The strategic role that delivery partners can play in supporting cloud migration initiative
    - How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Jul 25 2017 3:00 pm UTC 60 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • What Even the Best Firms Miss About Customer Service
    What Even the Best Firms Miss About Customer Service Ellen Daley, Vikas Nehru, Nitin Badjatia Jul 25 2017 5:00 pm UTC 75 mins
    Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.

    While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.

    Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Jul 25 2017 5:00 pm UTC 60 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Storage Management for Today’s HPC Demands
    Storage Management for Today’s HPC Demands Mark Pastor, Quantum Corporation, Addison Snell, Intersect360 Research Jul 25 2017 6:00 pm UTC 60 mins
    The world of high-performance computing continues to expand with the proliferation of analytics, AI and other HPC processes. This expanding base of HPC users places demands on data storage infrastructure that are more balanced between performance, economics and ease of deployment than the requirements found in traditional HPC environments.

    In this webinar we will discuss how these requirements are shaping today’s HPC storage infrastructure.
  • From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift
    From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift Zohaib Khan, Practice Lead, App Modernization & Migration, Red Hat; Malik Sayed, Sr. Manager, Digital Architecture, Verizon Jul 25 2017 6:00 pm UTC 45 mins
    Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.

    In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.