Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • An interview with Michael Ludwig
    An interview with Michael Ludwig IT Chronicles Media Recorded: Aug 22 2017 11 mins
    10 in Tech hosts Carlos Casanova and Shane Carlson sat down with Michael Ludwig from Blazent at Knowledge17 where they discussed discovery, the CMDB and data quality. Getting the CMBD right is critical to success in a ServiceNow implementation. Listen to this episode to find out how Blazent deals with data quality and the CMDB.
  • Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy
    Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 22 2017 28 mins
    The Cloud Economy represents a drastic change in how enterprises perform computing but it's not totally unprecedented. Running simultaneously in parallel with the advent of the Cloud First mentality, is the Gig Economy.

    In the Gig Economy people don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't habitually reserve a hotel room on a trip. They can use AirBnB. What lessons can cloud leaders learn from the Gig Economy that apply to the Cloud Economy and what pitfalls can we avoid?

    Cloud Professor Todd Bernhard will address these lessons in our next webinar, Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy. During this live webcast we’ll discuss:

    - Financial savings promised by the new economic model
    - New challenges presented
    - How to mitigate against such challenges
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Aug 22 2017 34 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Recorded: Aug 22 2017 41 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Recorded: Aug 22 2017 24 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Performance Benchmarking Big Data Platforms in the Cloud
    Performance Benchmarking Big Data Platforms in the Cloud Reynold Xin, Co-founder and Chief Architect at Databricks Recorded: Aug 22 2017 47 mins
    Performance is often a key factor in choosing big data platforms. Over the past few years, Apache Spark has seen rapid adoption by enterprises, making it the de facto data processing engine for its performance and ease of use.


    Since starting the Spark project, our team at Databricks has been focusing on accelerating innovation by building the most performant and optimized Unified Analytics Platform for the cloud. Join Reynold Xin, Co-founder and Chief Architect of Databricks as he discusses the results of our benchmark (using TPC-DS industry standard requirements) comparing the Databricks Runtime (which includes Apache Spark and our DBIO accelerator module) with vanilla open source Spark in the cloud and how these performance gains can have a meaningful impact on your TCO for managing Spark.

    This webinar covers:
    Differences between open source Spark and Databricks Runtime.
    Details on the benchmark including hardware configuration, dataset, etc.
    Summary of the benchmark results which reveal performance gains by up to 5x over open source Spark and other big data engines.
    A live demo comparing processing speeds of Databricks Runtime vs. open source Spark.

    Special Announcement: We will also announce an experimental feature as part of the webinar that aims at drastically speeding up your workloads even more. Be the first to see this feature in action. Register today!
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Recorded: Aug 22 2017 68 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • Analytics Nightmares and How You Can Prevent Them
    Analytics Nightmares and How You Can Prevent Them Meta S. Brown, Author, Data Mining for Dummies and President, A4A Brown, Inc. Recorded: Aug 22 2017 49 mins
    Analytics risks can keep you up at night. What if…
    · We make a big investment and don’t break even?
    · Management doesn’t trust the results?
    · Analysts cross data privacy boundaries?

    What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.

    In this presentation, you will learn:
    · What causes most analytics failures
    · How you can diminish risk and maximize returns through strong analytics process
    · Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
  • How to Stay Ahead of Today's Ransomware Realities
    How to Stay Ahead of Today's Ransomware Realities Ken Westin, Security Specialist, Splunk Recorded: Aug 22 2017 76 mins
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • Smart Load Balancer vs Legacy Load Balancer: Overprovisioning
    Smart Load Balancer vs Legacy Load Balancer: Overprovisioning Chris Heggem Recorded: Aug 21 2017 1 min
    Capacity planning is painful and expensive if you use legacy load balancers. Never over-provision again. Visit https://avinetworks.com/.
  • Accenture partners with SAP to leverage the power of the cloud | ISV Partnership
    Accenture partners with SAP to leverage the power of the cloud | ISV Partnership Camilla Dahlen, SAP | Tobias Bloch, Accenture Recorded: Aug 21 2017 4 mins
    Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP and Tobias Bloch, VP Sales, North America at Accenture discuss the benefits of SAP’s ISV Partner Program, including the strength and seamlessness of go-to-market opportunities. Accenture is partnering with SAP to bring the power of SAP Cloud Platform to their customers.
  • PwC partners with SAP to leverage analytics capabilities to manage Risk and Comp
    PwC partners with SAP to leverage analytics capabilities to manage Risk and Comp Camilla Dahlen, SAP | Elizabeth McNichol, PwC Recorded: Aug 21 2017 3 mins
    PwC helps organizations and individuals create the value they're looking for. PwC leverages GRC technology to help clients manage risk with analytics. Elizabeth McNichol, Partner Risk and Compliance, PwC and Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP discuss the benefits of SAP’s ISV Partner Program and SAP’s portfolio to manage large data sets.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Recorded: Aug 21 2017 76 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
  • An interview with Brian Uhelski
    An interview with Brian Uhelski IT Chronicles Media Recorded: Aug 21 2017 9 mins
    10 in Tech hosts Shane Carlson and Kirstie Magowan talked with Brian Uhelski from Accorio at Knowledge17. Brian talked about setting vision and strategy and how important this is to a successful ServiceNow implementation. Do one thing and do it really well. Brian stressed the importance of being involved in the community as this helps customers to make the right decisions.
  • Defend Against WannaCry
    Defend Against WannaCry Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42 Recorded: Aug 21 2017 22 mins
    What you need to know and how to defend against it.

    Hours after WanaCrypt0r first emerged , the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.

    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Follow Alex Hinchliffe on a video interview during which he will cover this pervasive threat, and how it exploits vulnerabilities and spreads across networks.
  • DDoS Attacks and Application Hacks
    DDoS Attacks and Application Hacks Jonathan George, Jonathan Binick, Scott Altman, Martin Brewer, David Remington Recorded: Aug 18 2017 59 mins
    Are you prepared to deal with attacks against your network or applications?
    Join us for an interactive panel discussion and challenge our experts with the questions that keep you up at night.
    During this panel, you will learn:
    •How to bolster your defenses and ensure mitigation consistency through a Managed Service model
    •How to protect your applications and your organization
    •What questions you should be asking as you develop your plan
    Featured F5 Speakers:
    •Jonathan George – Senior Product Marketing Manager
    •Scott Altman – Director, Business Development Silverline
    •David Remington – Security Solution Architect
    •Martin Brewer – Senior Manager, Product Management
    •Jonathan Binick – Manager, Security Operations Center
  • Easier Cloud Migration: 5 Rules to Follow & A Few to Break
    Easier Cloud Migration: 5 Rules to Follow & A Few to Break Marty Scholes, Solutions Marketing Manager, Robert Haynes, Senior Solutions Marketing Manager Recorded: Aug 18 2017 41 mins
    Join our solution architects as they illustrate the rules for an easier cloud migration as well as rules that you should break. 

    In this webcast you will learn:
    - Advantages of moving your applications to the cloud vs re-architecting them entirely
    - Key factors to consider and rules to follow for a successful migration of enterprise apps
    - Specific use cases on how to maintain control and visibility without sacrificing security, availability, or performance of your apps
  • The State of Application Delivery: Resulting on the Future of App Services
    The State of Application Delivery: Resulting on the Future of App Services Lori Mac Vittie, Principal Technical Evangelist, Cindy Borovick, Business Intelligence Director Recorded: Aug 18 2017 42 mins
    We are living in an application-centric world. They have become pervasive in our personal and business lives. And for many—applications ARE the business. Because your organization relies on apps to drive customer engagement, employee productivity, and revenue, they need to perform without fail. Today, there are a wide variety of application services designed to enhance security, improve performance, and ensure reliability, but what is the right strategy for your business?

    Utilizing data from our State of Application Delivery report, we’ll discuss:
    - The most critical security services to reduce risk in multi-cloud deployments
    - If IoT will introduce new application service requirements
    - How organizations are using programmability to achieve OpEx reductions
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Recorded: Aug 18 2017 21 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • An interview with Britt Champeau
    An interview with Britt Champeau IT Chronicles Media Recorded: Aug 18 2017 8 mins
    ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Recorded: Aug 17 2017 34 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • CloudArray auto-tiering for VMware
    CloudArray auto-tiering for VMware Richard Colarusso and Nicos Vekiarides Recorded: Aug 17 2017 48 mins
    While flash storage benefits performance of VMware environments in many ways, flash capacity can be strained by Virtual Machine (VM) sprawl in development, test or even production deployments. Unlike traditional archiving, which takes VMs offline, object and/or cloud storage can alleviate capacity strain with a scalable, elastic online storage tier for idle or inactive VMs. With CloudArray auto-tiering for VMware, we introduce a new option for administrators that seamlessly automates the task of migrating VMs between local flash and cloud storage based on storage utilization attributes. CloudArray features such as compression and deduplication provide optimized cloud capacity usage and cost.
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • TechTalk: Cost Management Live Demo
    TechTalk: Cost Management Live Demo Todd Bernhard, CloudCheckr Product Marketing Manager and Shannon Houpt, Account Executive, California & Australia Recorded: Aug 17 2017 54 mins
    NOTE: Start viewing this webinar at 3 minutes in, due to audio issues. Thanks!

    Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.

    Additionally, CloudCheckr makes recommendations based on analytics to better utilize resource, upgrade or downgrade instances and more. The results are that customers typically report saving 30% on their cloud spend.

    In this webinar, users will experience the CloudCheckr app in a live demo, with focus on:

    - Cost Savings Dashboard
    - Reserved Instance Right-Sizing Report
    - Utilization Best Practices