Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
No matter what level of modernization you are evaluating, any effort should start with a solid foundation. A standardized environment based on enterprise-ready, open-source operating system—Red Hat® Enterprise Linux®—and a hardware platform based on Intel ® is key to the modern data center.
Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux® to improve efficiency, and create a consistent foundation across current and cloud-future IT environments.
Tectonic 1.6.4 continues the push to breaking open the cloud market. The features included in this release increase the portability of applications across hybrid cloud environments. CoreOS is providing an enterprise ready Kubernetes solution with automated operations that enable a cloud "as a service" operational model regardless of the underlying infrastructure, whether bare-metal, private IaaS, or public IaaS.
Rob Szumski, Tectonic product manager at CoreOS, leads this webinar through the changes in the Tectonic 1.6.4 release. He'll go over the features included from Kubernetes 1.6.4 and how Tectonic is including operators for etcd other tools.
Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?
In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.
Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:
•Ensures data is only available to the right users, irrespective of location (including cloud), organization or device
•Provides protection throughout the data lifecycle
The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
The cloud has upended the way your customers want to adopt applications and underlying infrastructures. It’s important that your business stays ahead of this transformation. Your customers are looking to you as their trusted managed services advisor to “make it work.” Join us to learn best practices for transitioning your customers to the cloud.
Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.
In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
The average cost of a data breach has risen to $4 million, with costs incurred for litigation, brand or reputation damage, lost sales—and in some cases—complete business closure.*
Your organization can stay ahead of threats with Office 365 Threat Intelligence, which leverages the Microsoft Intelligent Security Graph to analyze billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from our Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. It provides information about malware families, including breach information with details down to the actual lines of code that are used for certain types of malware.
Join this webinar to understand how your organization can become more secure through the powerful new features of Office 365 Threat Intelligence, including:
- Interactive and intuitive tools to analyze prevalence and severity of threats in near real-time
- Real-time and customizable threat alert notifications
- Remediation capabilities for suspicious content
Cohesity is one of the rising stars in the world of data management. They have flipped the data protection market on its ear. In this CEO Series webcast, Arun Taneja, Founder and Consulting Analyst of Taneja Group will interview Mohit Aron, CEO of Cohesity, to understand the concept of Hyperconverged Secondary Storage and why it matters to the industry. We will explore the advantages it provides for your data protection, test/dev, and data analytics workloads and how Cohesity is different from other solutions on the market. It is time to say goodbye to the old, staid methods of protecting data. The traditional methods simply don’t make sense in the new world of Big Data, Multi and Hybrid cloud and web-scale applications. Join the webcast for a whirlwind tour of new ideas and methods in this space.
In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.
He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
William Fellows, 451 Research Vice President will be hosting the webinar with UShareSoft CTO James Weir, as well as Cloudsoft's Co-founder & CTO, Alex Heneveld on the topic of Automating for Agility, Control and Consistency in a Multi-Cloud Environment.
Wif will present insights into the use of cloud and digital transformation setting the scene for James and Alex to drill down into the role of DevOps in delivering effectively.
The DevOps culture shift is amplified with tools that give each stakeholder immediate value with the combined power of UForge and Cloudsoft AMP delivering:
oRepeatable, reliable deployments of any system anywhere
oQuantify what works. Test in hybrid cloud and multiple locations. Record performance.
oModels of stacks and blueprints that everyone can understand, share, source control, reproduce, test and audit.
Find out more about 451 Research, Cloudsoft and UShareSoft.
Be the first to hear about Cisco and NetApp’s exciting new FlexPod solution. This revolutionary design couples operational simplicity, guaranteed QoS, and granular scale-out with FlexPod’s proven architecture. The new solution will appeal to Infrastructure buyers, as well as, Cloud and Virtualization buyers who are building next generation data centers.
•Learn how the solution can provide you with proven performance, agility and value through the latest NetApp and Cisco technologies
• Experience how FlexPod converged infrastructure can reduce risk, deliver faster time to market and improve business outcomes
• See how NetApp technology simplifies storage management and scales on demand
Cloud Foundry is an open source platform for deploying and managing cloud applications. Cloud Foundry CTO, Chip Childers, will provide an overview of the Cloud Foundry platform, its various use cases, and core project updates. Chip will discuss the technical benefits of the platform, highlight the technical direction of the project, explain focus areas for 2017, and provide highlights from the Cloud Foundry Summit, June 13-15 in Santa Clara, CA.
See how Netflix built its analytics in the cloud with Tableau and Amazon Web Services
Building out a data platform doesn't have to be like building a House of Cards, and our friends at Netflix know this better than anyone else. With 86 million members and counting, and more than 700 billion events per day, Netflix has had to expand their data capabilities by developing a scalable and flexible analytics platform built on Tableau and AWS.
Attend this webinar to hear from Albert Wong, analytics expert at Netflix, to see how they simplified their data stack by building a data lake/data warehouse strategy which allows Netflix to collect and store massive amounts of data, supporting thousands of Tableau users with managed data.
You'll learn about:
How to set up effective analytics on top of enormous data sets
How Netflix serves large groups of people with governed data
The details of Netflix's data lake/data warehouse strategy
How Netflix manages Hadoop with Tableau
How can you better embrace multiple cloud and non-cloud IT environments in order to accelerate your digital business?
How can you succeed in a multi-cloud world? We’ve gathered a range of experts opinions including the analyst perspective, the Vodafone view and a Vodafone customer CEO’s outlook.
William Fellowes, Analyst, 451 Research
Neville Roberts, CEO, Planixs
James Griffin, Cloud Evangelist, Vodafone
Key talking points:
-Common challenges of managing IT environments
-What challenges enterprises face in different countries
-How to select the right cloud for the right application
-Choosing the right cloud vendors
-How to manage these environments simply and securely
Hear from Vodafone’s key customer Planixs (http://www.planixs.com) on:
- How they manage multi cloud environments
- The key things they consider when selecting vendors
Institutions today are faced with the challenge of integrating technology into the classroom while teaching students of all learning styles and abilities—including students with disabilities. The Office 365 suite provides students and educators with tools to adapt course work, problem solve from different perspectives, and create a more equitable space for learning in the era of digital transformation.
Join this webcast to:
- Discover the built-in accessibility functionality of Office 365
- Learn how to accommodate impairments in vision, learning, mobility and dexterity, hearing and deafness, and language
- Empower all your students to achieve more
This webcast is part of our Microsoft in education virtual productivity webcast series. Sign up for this session, or the entire series today!
Apstra Operating System (AOS) 1.2 marks a significant milestone for network operations. New operational tooling -- out-of-the-box as well as user-created in Python -- means network engineers will get more done while making fewer mistakes.
Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premises security solutions. In this webinar, we will discuss cloud access security brokers (CASBs) and how they can help financial services firms solve their security, compliance, and deployment concerns.
What you’ll learn:
- Understand the specifics of how a CASB can provide comprehensive security for financial institutions that use cloud apps.
- Find out how to select a security solution that can solve the compliance problems faced by financials.
- Learn about what is needed for smooth security solution deployment (and employee buy-in).
Despite billions of dollars invested in cyber security measures, companies are still falling behind when it comes to cyber attack prevention. Case in point, The recent malware campaign “WannaCry” that was able to infect more than 300 thousand systems in short duration of time. This is a testimony to the fact that investments in proactive, rather than reactive defense strategy is acutely needed. Current cyber range solutions are often siloed efforts that takes weeks to set up and cover limited scenarios.
Addressing these problems requires a new approach with on demand self-service environments to train incident response teams in a holistic manner across the entire organization and simulate a comprehensive set of attacks on IT infrastructure.
In this webinar you will learn how you can use the power of Quali sandboxes and Ixia Breaking Point solution in creation of a Cyber Range training environment to
-Rapidly provision full-stack, real-world cyber threat environments
-Generate thousands of unique attacks mixed with a large variety of real life traffic profiles
-Reports and grades that measures trainees abilities to neutralize attacks while maintaining traffic continuity.
How to easily interpret the value of billions of connected things which are creating zettabytes of data.
We often speak of "the" Internet of Things, as if there is only one. But, really, every organization is unique, and every organization, including yours, has its very own Internet of Things.
Your organization’s Internet of Things will spin out data from a large variety of sources, with some recently converted from analog to digital outputs. Layer upon the need to perform analytics to make sense of the data, and now you have a new challenge for IT and Line-of-Business operations. What are you going to do?
This session will highlight the road map for IoT during the next 12 to 24 months, identifying which applications will be popular, and what it will mean to manage their business outcomes.
The focus of the news media has been on massive DDoS attacks, with recent headlines proclaiming attacks in excess of 500Gbps. In this webinar, DDoS testing expert and NimbusDDOS founder Andy Shoemaker will demonstrate in a live DDoS attack how even a tiny attack can cause significant outage, including:
1. How a small gap can be responsible for a big outage
2. A demo of a live attack on a site
3. Methods you can use to identify and fix these risk areas
4. How to detect all layer 7 attacks automatically
Building and scaling new business models to gain insights from disparate data faster, while reducing IT costs, requires an architecture that can go from prototype to petabyte scale as your needs evolve. Google BigQuery’s serverless architecture can help ensure that your enterprise data warehouse withstands growth at any scale. Informatica helps you unlock the power of hybrid data with high performance, highly scalable data management solutions that efficiently move and manage large volumes of data to Google BigQuery. Join us to get a peek under the hood and see what makes Informatica and Google BigQuery the best combination for modernizing your data architecture.
This webinar provides a detailed comparison between open source Apache Cassandra managed by Instaclustr and proprietary technologies such as DataStax Enterprise. The aim is to highlight the operational and cost benefits associated with deploying open source Apache Cassandra and other data management technologies including Apache Spark. This webinar will also discuss the modern business approach to open source and enterprise software deployment and the pitfalls associated with technology lock in.
The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
Ostatnie wersje NetWorkera to dużo nowości w obszarze backupu środowisk wirtualnych.
Zapraszam na krótką 30 minutową sesję w trakcie której poruszymy wszystkie możliwości NetWorkera dotyczące backupu/odtwarzania infrastruktury VMware:
Nie zabraknie demo!
IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.
In this webinar, you’ll learn:
- How to identify if an IoT solution will work for your use case.
- What others in healthcare are using IoT for.
- The challenges of IoT in healthcare
From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.
In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:
• Why the status quo for transportation data collection is no longer good enough
• The types of Massive Mobile Data that are useful for transportation and urban planning
• Algorithmic processing techniques that are critical for making this data useful
• Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
• A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts
Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
For decades, traditional relational databases have been the primary choice for data storage and persistence. These database systems continue to rely on monolithic architectures and were not designed to take advantage of cloud infrastructure. These monolithic architectures present many challenges, particularly in areas such as cost, flexibility, and availability.
In 2016, Amazon Web Services Premier Partner, 2nd Watch, performed an analysis on the amount of AWS billing data that they had collected, and the number of payer accounts they had processed over the course of the previous year. The results of that analysis revealed that their single MS SQL server instance could no longer support the rapid pace at which the company continues to grow and on-board new clients.
Join AWS Premier Partner, 2nd Watch, for a live webinar on Migrating Microsoft SQL Server to Amazon Aurora on Monday, June 26 at 10am PST / 1pm EST and hear how they successfully migrated their Microsoft SQL Server to Amazon Aurora to help them meet customer demands and prepare for future growth.
Industry-leading security analysts have identified publicly available S3 storage buckets on at least one high profile site. While this is a legitimate concern, it presents a timely opportunity for all cloud administrators to revisit their own security policies and take action. Security breaches can rapidly burn through budgets—and destroy businesses.
While public cloud providers provide the foundational security services, the responsibility is on organizations and end users to ensure their cloud infrastructure is secure. CloudCheckr’s Best Practice Checks enable proactive security monitoring and automation to prevent hacks through available S3 buckets, vulnerable ports, and more. Join us to learn tools and tips to keep your cloud secure:
- Best Practice Checks that can detect such concerns before they become an issue
- Fix Now automation tools that can
- Regulatory tools to ensure compliance with security standards
Join us for a mini deep-dive into Automation & Microservices in the context of enabling Agile development.
We will discuss what a transition from a Monolithic to a Microservices Architecture looks like and share perspectives and best practices on Project Methodologies, Automation, Tooling and deploying code.
Duration: 30 minutes
Mark Duhm, Hyperscale Practice Lead, Datapipe Europe
Hiten Mistry, Senior Solution Architect
Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.
This webinar discusses:
- Why Enterprise and Service Provider networks require segmentation
- What is SD-WAN segmentation
- How VeloCloud segmentation is implemented and optimized
For most enterprises dealing with increased security threats, limiting machine data collection is not an option. But with finite IT budgets, few organizations can continue to absorb the high costs of scaling high-end Network Attached Storage (NAS) or moving to and expanding a block-based storage footprint. Join this webinar to discover options for more cost-effective solutions that enable large-scale machine data ingestion and fast data access for security analytics.
- The common challenges companies see when scaling security workflows
- Why a high-performance cache works to solve these issues
- How to integrate cloud into processing and storage for additional scalability and efficiencies
Presenters will build an actionable framework in just thirty minutes and then take questions.
The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.
Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.
This webinar will address:
Solutions, support & decisions
40G or 25G lanes?
Preterminated vs field-terminated cables
Duplex or Parallel transmissions
Singlemode, multimode or wideband multimode fiber?
Attendees with earn one BICSI Continuing Education Credit for attending.
Migrating to the cloud can transform an organization. But is your organization ready? It can be a struggle to translate buzz words into a successful paradigm shift from a legacy server/data center model to purchasing in a cloud broker model. And, if your move is not properly planned and effectively executed, your cloud initiative may result in unexpected cost overruns, or worse. A successful roadmap is not just about planning and migration, it’s also about aligning your organization to most effectively use the cloud.
In this live webinar, TierPoint Vice President of Professional Services, Matt Brickey and Dell EMC’s Director of Data Mobility, Peter Molnar, will share their combined expertise, including client use cases, derived in helping hundreds of clients “cloudify” their applications and data, and leverage the cloud to full advantage.
Join Matt and Peter as they answer key questions about creating a successful cloud roadmap, including:
- How to assess your organization’s cloud readiness
- How to evaluate which workloads are the best candidates for the cloud
- In a multi-cloud world, which cloud(s) are right for your organization?
- Crucial migration planning considerations and milestones
The latest version of Data Center Automation (DCA) Suite version is now available. DCA is an end-to-end lifecycle management solution for servers, databases and middleware. Now, DCA comes with new features—container-based deployment, unified compliance, and ChatOps collaboration.
Join Nisarg Shah, Director Product Management, as he discusses the latest release, answers your questions, and shares the new DCA UI.
• See the DCA Suite—provisioning, patching, compliance, open API orchestration
• Learn how container-based deployment delivers quick time-to-value
• Discover why automated compliance and remediation matters
• Hear about unified compliance—not just for servers, but across applications
• Understand how ChatOps helps collaboration in the enterprise
• See a demo: DCA compliance in action—PCI compliance scan, auto-remediation, visual compliance dashboard
SD-WAN brings a new set of WAN capabilities to the enterprise from the ability to leverage any type of transport to centralized policy control to the cloud-enabled architecture. SD-WAN has become a no-brainer for greenfield deployments. However,, most enterprise roll-outs are brownfield: companies do not want to rip and replace their existing network, instead they prefer to incrementally migrate their WAN to SD-WAN architecture. Hence, successful migration to SD-WAN requires thorough planning. In this webinar, you will learn:
- Key considerations for developing migration plan to SD-WAN (on-premise vs hosted controller, site survey, WAN transport, network services)
- How to implement SD-WAN routing strategy
- How to run acceptance test and plan for site cut-over
The minimum investment to meet cloud compliance obligations is $200,000 per year, and the fees for not complying can start at $100,000. So while the investment is worthwhile, many companies are unable to achieve such standards due mainly to budget constraints and a lack of expertise.
Join Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success at Allgress, and Jeff Bennett, CEO of Allgress for the webinar, Compliance as a Crisis: Managing Compliance in the Cloud. During the live event, they will discuss the following:
•Public cloud (AWS and Azure) compliance considerations
•Compliance standards and common industry trends
•SecComp cloud best practices
•Factors that contribute to a Compliance Crisis
We’ll also demo a couple new solutions such as an industry-leading compliance dashboard and a (free) Compliance Posture Evaluation tool recently launched to provide you with actionable items for passing an audit.
Are you prepared to handle exponential growth in data volume?
How you access, manage, protect, and utilize your data is the challenge. Gartner reports the data volume is set to grow 800% over the next 5 years.
Nasuni offers a complete Azure-based enterprise file storage system to handle this data volume growth. The IT goal hasn’t changed. How to accomplish it has. The debate is not hardware versus the cloud. It’s how to create an intelligent file infrastructure that utilizes the cloud.
Join this webcast to learn how to:
- Store data centrally in one self-protecting global file system
- Make your data accessible anywhere, anytime
- Scale your storage at unheard-of cost efficiency
Digital transformation can help businesses modernize products, enter new markets and drive change. In the Internet of Things (IoT) era, it's becoming increasingly important to modernize your legacy applications in order to transcend the digital transformation, as well as enhance security of your IoT solutions and connected device authentication across multiple platforms.
Learn how Azure's IoT cloud solutions took these companies from ground-up to the cloud without costly infrastructure investments.
Grant Fenn, CEO of Downer Group, talks about how a venerable business in the engineering and infrastructure management services industry harnessed Digital Transformation to drive the next generation of operational capabilities.
With customers spanning a broad range of industries, including public and private transport, energy, infrastructure, communications and resources sectors, it's vital for Downer Group to implement a digital transformation strategy that can encompass platforms, systems, integrations and needs across the board. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations.
Your customers are creating data at a rapid pace. The data can be overwhelming if not properly managed, categorized, and visualized. Businesses fall short at every stage, and often all three. This webinar will cover how to get to customer insights easier, quicker and at scale, minus infrastructural challenges. Speakers from Just Analytics and Microsoft will discuss how to create a big data journey that leads actionable insight with examples from the real world.
For enterprises to embrace the full power of digital transformation, both technology and business leaders must work together to ensure they leverage the power of the cloud to stay ahead of the game. Join this webinar to discover ways to not let your big data make a big mess.
Learn more about Just Analytics' consulting practice journey towards being data-focused and customer-centric using Microsoft's Big Data and Data Warehouse technologies.
Understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns. Learn how Just Analytics helps their customers tackle cultural challenges in data centric decision making.
Sean Helm, General Manager of the Snowden Group, talks about how Azure helped Snowden modernize their products, drive leading edge services to their customer and realize additional revenue streams by entering new markets.