Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
In a world where your most sensitive business content is being shared with more people outside of your organization, you fear losing visibility and control. Join us for this special edition webinar to learn how Syncplicity extends your enterprise security polices to protect your sensitive documents as they move beyond your corporate boundaries, giving you back security, visibility, and control.
2014 was a watershed year for cybersecurity as DDoS attacks reached a tipping point in terms of complexity, pace and scale. Today, operations and online performance are often already impacted before an attack is even detected, leaving organizations struggling to contain the damage while fighting to get ahead of persistent malicious traffic.
Join security experts from Radware and Limelight Networks on May 6 as we take a closer look at the latest research on the global threat landscape, share real world experiences from Radware’s Emergency Response Team and offer proven defensive strategies.
As digital content and providing high quality online experiences globally become critical to business success, vulnerabilities are mounting. The pressure is on to find new ways to detect and mitigate attacks before they can cause outages and impact the bottom line. In this session we’ll discuss:
• What you can expect from the latest generation of attacks
• Why the Internet pipe is the number one point of failure
• Why attacks are now split between the network and application layers
• What new threats are being introduced by the Cloud, the Internet of Things and SDN
• How situation-aware detection and mitigation in the cloud can protect against the largest and most complex DDoS attacks
This is an excellent opportunity to learn what it takes to protect your organization against costly disruptions in the face of rapidly changing, increasingly sophisticated cyber-attacks. A live Q&A session will follow the presentation.
Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.
It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.
Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
- How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
- Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
- How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.
Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.
Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.
Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
Following our overview session, Andy Ebbs, discusses how you can overcome these challenges with migrations without business disruption. And, as an example, he demonstrates a full server migration from ESX to Hyper V which takes just 5 minutes using Double-Take Move.
A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.
Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.
Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.
Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.
Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.
Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
The CFO of Belnick decided to run his entire business from one technology platform. Do you want to see how he did it?
Join the webinar to learn how to move off of disparate systems of information (Excel, Access, databases) from multiple departments to keep your whole company on the same page and efficient. You will hear this from an actual customer who wants to share his story.
Learn how to leverage AWS capabilities better to operate more securely and safely in the cloud.
In a recent talk at AWS Pop-up Loft in San Francisco, John Martinez highlights the top 10 security best practices compiled from both AWS and Security practitioners over several years protecting large-scale AWS deployments.
You will come away with actionable steps that you can implement right away to help ensure your success on AWS… and discover most of these controls are very easy to implement.
Richard Stiennon, Chief Research Officer at IT Harvest, sits down with Tim Prendergast, CEO and co-founder of Evident.io, to talk public cloud security and compliance and why an automated DevOps style approach is now required to keep up with the velocity of change in public cloud deployments.
Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
If you didn't make it to the HIMSS15 healthcare IT conference, but want to hear about the hot topics and key takeaways from this year's many informative sessions, mark this webinar on your calendar to get up to speed! This year's event was full of new and innovative technology solutions for the healthcare industry.
Naveen Sarabu, Product Manager for Liaison Healthcare, was there and will be sharing some of the new trends and technologies he saw for the following hot topics:
Provider & patient engagement
Health Information Exchange
Clinical & business intelligence
Changing payment models
Mobile, connected health & telehealth
Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
Johan and Cliff will answer your cloud security questions including:
•What are key challenges that IT leaders face when planning for a cloud migration?
•What security factors should you consider when considering a hosted vs. on-premises solution?
•As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
•How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
We all know the value that a well-built connectivity adapter brings to the table, don’t we? But have you ever imagined that developing connectivity adapters can be that easy – just a piece of cake?
If you are hungry to know more, watch this webinar to learn first-hand from Itelligence, an SAP partner, about their experience in developing a Salesforce.com adapter with SAP HANA Cloud Integration's adapter SDK.
The power of the cloud brings both opportunities and challenges to the enterprise. IT professionals are looking to embrace the power of software, to transform their existing infrastructure into an efficient, optimized, scalable, software-defined data center, that gives them the management control and capability they need to drive their businesses forward. At the same time, they want to build on existing experience and knowledge, whilst pushing forward with new technologies, skills and certifications.
In this webinar, Matt McSpirit will outline the key essentials for future-proofing IT infrastructure and explore the role of the Microsoft Cloud Platform (with technologies like Windows Server, System Center and Azure) in achieving the vision of tomorrow's software-defined data center.
Julie Craig, Research Director at Enterprise Management Associates, and Reza Shafii, MuleSoft Senior Director of Product Management, discuss some of the common questions and pitfalls businesses have when developing their API strategy.
The way Business Users consume services is changing, “Central IT” has an opportunity to increase the value provided to their Business Users. New trends in brokering services are surfacing along with a great diversification in Service Providers across IaaS, PaaS and SaaS solutions, managed and un-managed, that can be leveraged. Come join us in reviewing the steps involved in becoming a Service Provider to your Business through IT-as-a-Service enablement from a Managed Cloud Service Provider perspective.
Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.
In particular, the panel will discuss:
•Whether Big Data necessarily increases the risk of a security breach
•How to assess the risks associated with different types of Big Data solutions
•How to avoid data breaches in a Big Data environment
When purchasing IT security products and services, it is important to understand not only the initial costs associated with purchase and implementation of the products, but also the ongoing impact to your budget. So how much should be spent on IT Security?
Don't miss this webinar as Forrester Consulting gives a benchmark of how CISOs will find a significant improvement in their 2015 budgets. This webinar will also outline the key findings of the Alert Logic-commissioned Total Economic Impact study, so you can evaluate the potential financial impact of Alert Logic solutions on your organization.
Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
Vous en saurez plus sur :
-Les changements observés dans les techniques d’attaques
-La vitesse d’exécution des nouvelles attaques
-Les cibles privilégiées et les enjeux financiers
-Les tendances à suivre (social media, IoT…)
Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
The inbox is a very crowded place where your brand's emails fight for
attention. Mere personalization isn't enough to be relevant. Savvy
consumers want more than just their name on the top of an email - they want meaningful content that reaches them in the right context, including where they are, when they need it, and with messaging that speaks directly to who they are.
Join guest speaker, Forrester Research's Shar VanBoskirk, for an enlightening look at what her most recent research has uncovered. She'll discuss:
- What email marketers are doing right (and what some are doing wrong).
- Creating contextually relevant emails with the data you have at hand,
to send smarter, better performing emails.
- The value of performing an email marketing review and the valuable
tool we'll provide to guide you.
Discover the latest Server, Cloud and Container technologies released in Ubuntu 15.04
Ubuntu 15.04 was released April 23rd and contains a host of new features to support scale out applications with containers and OpenStack.
- Adds LXD, a new hypervisor with incredible density and speed
- First release of snappy Ubuntu Core for cloud container hosts and smart devices
- OpenStack “Kilo” - Ubuntu leads with choice of SDNs, easy install and management
- Updated developer tools for cloud and IoT
Join Ubuntu Product Managers Dustin Kirkland and Mark Baker on May 7, 2015 5:00pm (BST) to see about what’s new in 15.04 and how you can get working with OpenStack.
When customers ask for support of a given API, can a vendor survive if they ignore these requests? A strategy many vendors are taking is to support multiple APIs with a single implementation. Besides the Swift API, many support the S3 defacto and CDMI standard APIs in their implementation. Join this Webcast to learn:
•What is needed for these APIs to co-exist in an implementation?
•Basic operations are nearly identical between APIs, but what about semantics that have multiple different expressions such as metadata?
•Best practices and tips to implementing multiple protocols in your cloud storage solution
Salesforce Spring '15 brought the highly anticipated Duplicate Alerts and Blocking. Provided by Data.com as a standard CRM feature, you are now able to keep duplicate records from getting into Salesforce, improving your data quality and helping you get better sales and marketing results. Learn how to quickly get started using this new capability, along with how to take advantage of advanced duplicate management features.
Andy Louca, Head of CRM & Business Information at Thomson Reuters will share how they are successfully using this new capability along with Data.com as part of their overall data quality strategy.
Andy Louca, Head of CRM & Business Information, Thomson Reuters
Brett Stineman, Director, Product Marketing, Salesforce
Join us to learn how to:
• Get started with Duplicate Alerts and Blocking now
• Leverage advanced Duplicate Management features
• Improve your overall data quality to realize the full potential of CRM
Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.
Getting sales and marketing on the same page isn’t always easy — and unfortunately, misalignment between sales and marketing teams can negatively impact your company’s bottom line. But imagine two teams that are united by shared goals, objectives, and tools. Even better, imagine two teams that are working together and winning together.
Sales Cloud Engage, a new solution from Salesforce Pardot, empowers sales and marketing teams to sell more effectively than ever. In this 30-minute webinar, you’ll be among the first to see Sales Cloud Engage and learn how you can turn your sales and marketing teams into the ultimate power couple by:
- enabling sales teams with marketing-approved templates and one-click nurturing campaigns — right from within Salesforce
- enhancing sales campaign performance by identifying which content resonates best with segmented audiences
- providing real-time sales alerts of important prospect activities, and more.
Join us this week for a special 30-minute live session on RingCentral’s new, comprehensive Contact Center solution. You’ll see how this new offering brings greater efficiency and effectiveness to call center teams and managers. It integrates seamlessly into RingCentral Office and Salesforce.com Customer service and support agents can engage customers with Voice, email, chat, SMS. Agents stay organized with the visual call flow editor and managers receive real-time reporting and historical dashboards.
Tune in every Friday for RingCentral Live. We’ll show you the latest innovations and features available on the RingCentral platform and share best practices on leveraging cloud communications for your business.
This session also features a live demo of RingCentral Office and an open Q&A session.
Mit innovativen Speicherlösungen liefert Hitachi Data Systems die Bestätigung ihrer Produktphilosophie, die die wichtigsten Interessen vieler Unternehmen vor Augen hat: Senkung der Investitionskosten bei erhöhter Funktionalität, Eindämmung der Betriebskosten bei Personal und Schulungsaufwand, Kosteneffizienz beim Abruf dedizierter Services bei Bedarf, Enterprise Funktionalitäten zu einem auch für kleine Unternehmen bezahlbaren Preis. Hier sind Methoden und Instrumente gefragt, die zukunftsorientiert sind und Unternehmen unterstützen mit weniger mehr zu erreichen. Mit den neuesten Modellen der bewährten Virtual Storage Platform - Familie
VSP G200, VSP G400, VSP G600 und VSP G800 kann HDS je nach Unternehmensgröße und -Anforderung die gleichen Funktionalitäten anbieten. Das integrierte Virtualization Operating-System liefert bei allen Systemen native Virtualisierung von Speichersystemen und aktiven Speicher an mehreren Standorten
Join IDC’s leading cloud analyst, Richard Villars, to learn about the latest cloud market trends – what cloud technologies organizations are using today, what the tradeoffs are and the role of hybrid cloud.
Hear Toby Owen, VP Product at Peer 1 Hosting, explain why the ability to combine virtual and bare metal environments to build True Native Hybrid CloudTM solutions is key to enabling your business to remain agile while supporting and accelerating growth.
Plus get an overview of the On Demand Cloud Platform™ from Peer 1 and how it can enable you to create True Native Hybrid environments.
The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
· Protect and secure your Windows 2003 Servers after EOS
· Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
· Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
With sales over of £550m (with nearly 50% going to SME’s) in 3 years G-Cloud could and should be considered one of the UKs greatest start-ups. The next round of applications (G-Cloud 7) begin shortly following the General election. Attend this webinar to learn more about how you can apply to join this exciting framework.
Businesses rely more and more on technology that touches their customers directly. This is especially true in remote branch locations like stores or restaurants. Whether it is digital signage for advertising in the product aisle, swiping a customer loyalty card at the gas pump, or simply taking a credit card at check out, when the network connection is down you are losing money and upsetting customers.
Wireless and satellite technologies can provide very high reliability and surprisingly cost effective alternative routing solutions to your terrestrial network. Discover how these solutions could work to your advantage across your remote locations.
If you’re using or considering cloud, you should also be considering security in the cloud. Join our webinar where we will talk through seven practical best practice ideas for ensuring security in any cloud environment, from securing code and creating access management policies to understanding your cloud providers security model and where you need to assume security responsibility.
We will explore real-world data about security incident threats identified in Alert Logic’s Cloud Security Report. This will help you understand the types of attacks happening in the cloud today, how the threat landscape has evolved as cloud adoption has accelerated in the last several years, but also how you can secure your organisation and avoid them.
· 7 Practical actions you can take today for your cloud security
· Understand the threat landscape
· Insight into 2-3 recent high-profile breaches
This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
Analysts project 6X more growth in cloud than traditional IT, but most of your enterprise customers run less than 1/3 of their apps in the cloud today. What’s it going to take for them to migrate the rest to your platforms? In this webinar, cloud and managed hosting experts share experiences and best practices to help drive new revenue opportunities enabled by flash storage.
-Enterprise application trends and how to drive more applications to your cloud & hosting platforms
-How to differentiate your services for competitive advantage
-Where new profit centers may await and where other service providers are placing application and technology bets for maximum revenue growth
Baffled by how to use Supermarket? Confused by the many different tools that can be used to upload cookbooks to Supermarket? Want an insider's tour of Supermarket features and best practices? Come to this webinar and you will walk away with a thorough understanding of the features of Supermarket, how to make full use of those features, and how to integrate them into your Chef Workflow.
The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.
Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.
Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.
The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.
Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
Join us for a live demo - Many companies offer VoIP for businesses, but only ShoreTel Sky includes a variety of advanced, easy-to-use applications to fully unify corporate communications while guaranteeing call quality and service. We take the time to learn about your environment, requirements and infrastructure to custom design a scalable communications platform that fits your current and potential future needs.
Making “Cents” of Your Contact Center Channels: Determining if your contact center is the best bet for a multichannel environment, and how to go about implementing it efficiently.
As customer service channels continue to evolve, the debate continues when (and whether) companies should employ a multichannel contact center. Deploying a multichannel contact center can be a strong strategic move for enterprises, but should be done with care, making sure to mitigate risks and effectively address challenges before they arise.
Join our guest Forrester Research analyst Ian Jacobs as he walks through how to determine if your contact center environment should implement a multichannel contact center, or keep efforts on the voice channel they already know best.
Attendees will learn:
How your contact center software can enable, or hinder, your multichannel efforts
How and when companies should evolve their contact center beyond voice
How to deal with top challenges when building a multichannel contact center environment
Technology can do amazing and complex things, especially in this day and age. But, sometimes modern technology can be applied to solve simple, relatable everyday challenges with fantastic results. Listen in to learn how today's cutting edge IoT & wearables technology can be deployed to drive significant business results including vast improvements in customer service, patient health care, and more. The opportunity is upon us to revolutionize service ethics across many industries in ways unavailable to us before IoT & wearables converged in these simple ways.
Hear use cases in:
FC, FCoE, NAS, iSCSI, DCB, traditional LAN, internet/WAN, HPC, clusters, clouds, server virtualization, storage virtualization, network virtualization, and more are all colliding in your data center. Redundancy, resiliency, security, I/O consolidation, network convergence, dynamic application distribution, and thin provisioning with high levels of service are desired at all layers and all data center sizes across a broad spectrum of use cases. You worry about operational separation, buying decisions, investment protection, cost and energy savings, and evolving standards while maintaining very high levels of service and security. Is the technology evolving to a dream come true or a nightmare? If that doesn’t keep you up at night nothing will.
This session from SNIA will untangle, define, and illustrate the main ideas and concepts behind Data Center Evolution and Network Convergence to give context and a solid foundation for discussions with your vendors, as well as for your further reading and investigation. The point of view taken for this presentation is that of the network and transport characteristics in the face of the changes taking place.