Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • CDCP (Certified Data Centre Professional) Course Sneak Peek
    CDCP (Certified Data Centre Professional) Course Sneak Peek Marco van Gink Jul 27 2017 2:00 pm UTC 45 mins
    Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Jul 27 2017 3:00 pm UTC 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • Defining Enterprise Cloud Data Management for a hybrid world
    Defining Enterprise Cloud Data Management for a hybrid world James Humphrey, National Instruments and Forbes Analyst Joe McKendrick Jul 27 2017 4:00 pm UTC 60 mins
    Is your company on a data-driven digital transformation journey?
    With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
    Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.

    In this webinar, you will learn:
    - Current digital transformation market trends driving the influence of cloud.
    - Role of hybrid data management
    - How National Instruments is growing at scale and reducing time to market for their products and services
    - How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Jul 27 2017 5:00 pm UTC 30 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 27 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • Containers and Persistent Memory
    Containers and Persistent Memory Arthur Sainio, SNIA NVDIMM SIG Co-chair, SMART Modular, Chad Thibodeau, Veritas, Alex McDonald, NetApp Jul 27 2017 5:00 pm UTC 75 mins
    Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.

    You’ll learn:
    •What SNIA is doing to advance persistent memory
    •What the ecosystem enablement efforts are around persistent memory solutions
    •How NVDIMMs are paving the way for plug-n-play adoption into containers environments

    Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
  • Lenovo and Intel discuss how to make your data center more efficient
    Lenovo and Intel discuss how to make your data center more efficient Jeff Klaus General Manager, Intel Data Center Solutions - Chuck Weber Product Manager, Lenovo Enterprise Business Group Jul 27 2017 5:00 pm UTC 60 mins
    Lenovo XClarityTM Energy Manager helps you reduce the cost of powering your data center. XClarity Energy Manager is an easy to use application that analyzes and controls power consumption and temperature for groups of servers. By analyzing power and temperature data, XClarity Energy Manager helps data center administrators establish policy-based control over data center energy optimization goals which can improve business continuity and energy efficiency. Join us to see how this this application improves operation processes by:

    •Monitoring energy consumption, estimating the power demand, and reallocating power to servers as needed.
    •Monitoring the temperature and cooling capacity of servers and datacenter spaces.
    •Sending notifications when certain events occur or when thresholds are exceeded.
    •Limiting the amount of energy that an endpoint or a group consumes using policies.
    •Optimizing energy efficiency by monitoring real-time inlet temperatures, identifying low-usage servers based on out-of-band power data, measuring power ranges for different server models, and evaluating how servers accommodate new workloads based on the availability of resources.
    •Reducing the power consumption to a minimum level to prolong service time during an emergency power event (such as a data-center power failure).

    Presenters
    Jeff Klaus
    General Manager, Intel Data Center Solutions
    Chuck Weber
    Product Manager, Lenovo Data Center Group
    George Clement
    Senior Application Engineer, Intel Data Center Solutions
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Deploying Cloud onRamp for AWS, Azure, and Office365
    Deploying Cloud onRamp for AWS, Azure, and Office365 David Klebanov, Director of Technical Marketing, Viptela Jul 27 2017 5:00 pm UTC 45 mins
    Cloud transformation has been a top priority for enterprises, but the adoption is plagued with complex workflows and poor user experience. Even though enterprises onboard AWS or Azure, the workflows to establish connectivity, security and segmentation across VPC (and VNET) are fairly complex. On the other hand, for SaaS, the issue is primarily around user experience. Enterprises deploying Office365 are realizing that performance with Skype for Business and Sharepoint is not reliable. In this webinar we will take a further look at the wide-ranging capabilities the Viptela Cloud onRamp solution offers, and deploying it for AWS, Azure, and Office365.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Jul 27 2017 5:00 pm UTC 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Running Spark on Kubernetes
    Running Spark on Kubernetes Eddie Esquivel, Solutions Engineer Jul 27 2017 5:00 pm UTC 60 mins
    Apache Spark has established itself as a powerful distributed compute framework. Capable of performing SQL, machine learning, streaming analytics and batch processing all via a unified API. At the same time Kubernetes is gaining traction as an efficient way to manage and orchestrate containers for stand alone applications and more complicated distributed applications like Apache Spark.

    In this webinar we'll go through spinning up an Apache Spark cluster on Kubernetes and analyzing various patterns to interact with the Apache Spark cluster. We'll also discuss work that is happening in the open source community to make Apache Spark on Kubernetes a first class citizen.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Jul 27 2017 5:30 pm UTC 60 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Built-in Guidance: Optimizing Public Cloud Costs
    Built-in Guidance: Optimizing Public Cloud Costs Tricia Pattee, VP of Product, HOSTING and Mike McCracken, VP of Advanced Solutions, HOSTING Jul 27 2017 6:00 pm UTC 45 mins
    To take full advantage of platforms such as AWS or Azure, organizations need to be able to manage cost, compliance, security, policies, and overall visibility. Many are finding that this is a lot to tackle on their own.

    Join Tricia Pattee, Vice President of Product, and Mike McCracken Vice President of Advanced Solutions for this interactive seminar where they will discuss HOSTING’s built-in optimization solutions that prevent wasted spend and help maximize the move to public cloud.

    During the webinar, they will cover the following topics:

    - Understanding various clouds and discount options
    - Uncovering wasteful cloud spending (i.e. under-utilization)
    - AWS Reserved Instance savings
    - Leveraging built-in cloud services
  • General Dynamics IT: 6 Steps to Implementing a Successful CX Program
    General Dynamics IT: 6 Steps to Implementing a Successful CX Program Tish Falco, Sr. Director, Customer Experience - General Dynamics IT Jul 27 2017 6:00 pm UTC 45 mins
    As technology rapidly evolves, customers expect superior service, intuitive interactions with organizations and access to services in a way they prefer – at a time they are available and in a manner that fits their individual needs. More and more, organizations are adopting Customer Experience (CX) as a strategic initiative to better understand and deliver for their customers. Join us to learn how to successfully implement a customer experience program that will deliver an easy, effective and consistent experience for your customers and increase adoption internally.
  • From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture
    From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture Matthias Krohnen, Manager IT, Miles & More GmbH, Torben Jaegar, Solution Architect, Red Hat; Pagop, Sales Specialist, Red Hat Jul 27 2017 6:00 pm UTC 45 mins
    With over 29 million participants, Miles & More is the largest frequent flyer program in Europe. Expanding this travel rewards program into other markets required a fundamental change to the company's IT infrastructure, as the previous legacy environment was hard to maintain and not scalable. Miles & More chose to move to a microservices-based architecture built on Red Hat OpenShift. With this new environment, the company can support innovation and deploy new microservices into production within 5 days with zero downtime. Learn more about how Miles & More modernized their application development environment and process.
  • Beginner's Guide to Public Sector Cloud Infrastructure
    Beginner's Guide to Public Sector Cloud Infrastructure Todd Bernhard, CloudCheckr Product Marketing Manager & Jonathan Morse, State Local Higher Education Account Executive Jul 27 2017 6:00 pm UTC 60 mins
    Migrating to the cloud poses challenges for any organization, but there are particular concerns for the public sector. Government regulations like FedRAMP and the upcoming DFARS must be met, but security in the cloud is different than in the data center. Cloud providers use a Shared Responsibility Model, where they secure the physical infrastructure and the rest is up to the customer. In the public sector, budgets have to be justified... and used, at the risk of decreasing in the next year. Given the potential for Cloud Sprawl, without a Cloud Management Platform, expenses can get out of control.

    This webinar serves as a guide for public sector organizations looking to embrace the cloud. We will discuss the specific requirements of public sector organizations and explain the choices that will need to be made during such a migration. Topics covered include:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?
  • Nowości w Avamar 7.5
    Nowości w Avamar 7.5 Daniel Olkowski, Dell EMC Jul 28 2017 8:00 am UTC 75 mins
    2 tygodnie temu została ogłoszona najnowsza wersja Avamar 7.5.

    Zapraszam na krótką, 30 minutową sesję, w trakcie, której porozmawiamy o najważniejszych nowościach w Avamar 7.5.

    Avamar to oprogramowanie które świetnie się sprawdza w backupie:
    •Wirtualizacji (VMware, HyperV, OpenStack, …)
    •Baz danych (SQL, Oracle, …)
    •Systemów plików
    •Laptopów
    •Filer’ów (NetApp, Dell EMC, Oracle, …)
    •Zewnętrznej chmury
    •Środowisk mieszanych
    zapewniając disaster recovery, pełną automatyzację i prostą obsługę.

    Avamar 7.5 dostarcza nowych funkcjonalności w każdymn z powyższych obszarów.
    Zapraszam na poranną kawę w trakcie, której dowiesz się i porozmawiasz o wszystkich nowościach.
    Nie zabraknie demo!

    Piątek, 28 lipca, 10:00, 30 minut

    Zapraszam,
    Daniel Olowski
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • Web App Attacks: Stories from the SOC
    Web App Attacks: Stories from the SOC Paul Fletcher, Cyber Security Evangelist at Alert Logic Aug 1 2017 4:00 pm UTC 60 mins
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Aug 1 2017 4:00 pm UTC 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.

    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?

    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.