Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Understanding your Big Data: From the Warehouse to the Cloud & Back Again
    Understanding your Big Data: From the Warehouse to the Cloud & Back Again Just Analytics, Andrea Gagliardi La Gala, Solution Architect & Darmadi Komo, Product Marketing Manager, Microsoft Recorded: Aug 16 2017 63 mins
    Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.

    In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.

    Learn how to:
    - Use Azure public cloud for big data
    - Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
    - Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
  • Securing BYOD Without MDM Hassles
    Securing BYOD Without MDM Hassles Shalmali Rajadyax, Product Manager at Bitglass Recorded: Aug 16 2017 50 mins
    With the increasing demand for BYOD in the workplace, many organizations are adopting Mobile Device Management (MDM) solutions. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortunately, Cloud Access Security Brokers (CASBs), like Bitglass, offer an easy-to-use alternative for securing corporate data stored in public cloud applications on both managed and unmanaged devices.

    Join this interactive webinar session to learn:
    - The challenges companies face while deploying MDM
    - Alternative solutions used to secure employee-owned devices without agents
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • Taming the Big Database Beast
    Taming the Big Database Beast Henry Baltazar, Research Director at 451 Research. Chandra Reddy, Vp of Marketing at Actifio Recorded: Aug 16 2017 56 mins
    Learn how to instantly clone and recover very large databases in the data center or in the cloud.

    The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
  • How to Leverage Cloud Storage for Hybrid VMware
    How to Leverage Cloud Storage for Hybrid VMware Storage Switzerland, ClearSky Data Recorded: Aug 16 2017 57 mins
    Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
  • IT Solutions from Cradle to Grave - An interview with William Choppa
    IT Solutions from Cradle to Grave - An interview with William Choppa IT Chronicles Media Recorded: Aug 16 2017 10 mins
    Bill Choppa talks to Carlos Casanova and Shane Carlson about Cradle to Grave IT Solutions
  • Mejore la experiencia digital de los clientes end to end
    Mejore la experiencia digital de los clientes end to end Ana Chong Rosales, Directora de Entrega de Servicios en BP Gurus Recorded: Aug 16 2017 59 mins
    Operación Saludable, la importancia de alinear el monitoreo hacia una correcta gestión de eventos.
    Se analizará cómo el monitoreo integral desde; infraestructura, aplicaciones y experiencia del usuario final en dispositivos móviles, proporciona la perspectiva correcta en el desempeño de sus servicios de TI y mejora la experiencia del usuario final.
  • Find What's Broken Fast With Splunk ITSI and Event Analytics
    Find What's Broken Fast With Splunk ITSI and Event Analytics Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Recorded: Aug 16 2017 62 mins
    The problem with data centers is that they generate a lot of events – from low-level disk warnings to critical network issues to service-level failures. While you can create manual rules to filter out some of the noise, this often isn’t enough. How do you navigate this flood of events and prioritize the ones that truly matter? How do you relate these critical events to the same core issue, and ensure everyone has the same understanding of the impacted service, relative priority and likely root cause?

    Watch this webinar to learn how you can use Splunk IT Service Intelligence and machine learning to:

    - Monitor real-time data and be alerted when an anomaly occurs
    - Automatically correlate data to generate highly qualified information, so you can take fast action
    - Enable users to investigate with context, priority and importance, so they are empowered to take actions faster
  • Considerations in Data Center Transformation
    Considerations in Data Center Transformation Tom Parker, Solutions Product Manager, Lenovo and Robert Campbell, Senior Global Technical Alliance Manager, VMWare Recorded: Aug 16 2017 43 mins
    VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.

    In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s ThinkSystem servers and infrastructure based on Intel® Xeon® Scalable processors. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
  • Evolving the WAN for the cloud, using SD-WAN and NFV
    Evolving the WAN for the cloud, using SD-WAN and NFV Mike Rivers, Director Cloud Computing - Enterprise Digital Platform, Interoute Recorded: Aug 16 2017 47 mins
    In this session, we'll look at:

    * How cloud adoption is causing problems for the traditional WAN.
    * The network challenges of delivering mixed, data centre and cloud applications in a hybrid environment.
    * The impact of latency on cloud applications and variable network performance.
    * How SD-WAN and NFV technology can address these challenges.
  • Manage the Future: Dell EMC presents Quest Vroom
    Manage the Future: Dell EMC presents Quest Vroom John O’Boyle – Quest Product Marketing Director, Andy Lawrie – Quest Data Protection Presales Recorded: Aug 16 2017 43 mins
    Quest VROOM accelerates the performance of your entire virtual infrastructure, transforms the application experience for users, and helps you control license and hardware costs. Go way beyond simple Hyper-V and VMware monitoring by maximizing resource utilization and improving virtual application performance across hybrid environments.
  • Using Software-Defined Storage for your Applications: A Best Practices Guide
    Using Software-Defined Storage for your Applications: A Best Practices Guide Shawn Meyers, Principal Architect, House of Brick Technologies Recorded: Aug 15 2017 55 mins
    Software-defined storage is quickly becoming mainstream and not having to deal with all of the headaches of storage management can be a wonderful thing.

    Placing your tier 1 database workloads onto software-defined storage is possible, but it needs to be done correctly. Tier 1 database workloads are typically the most I/O intensive systems in an environment. Consequently, there are additional considerations that need to be taken into account in order to ensure performance and redundancy for these critical workloads. It doesn’t matter if your workload is SQL Server or Oracle, or if you are running Hyper-V or VMware, the concepts are the same.

    In this session, we will walk through SDS, and cover topics including: sizing your workload, validating performance characteristics, and following recommended best practices for placing your most important applications on SDS.
  • [Talk] op 10 Barriers to DevOps - and how to overcome them
    [Talk] op 10 Barriers to DevOps - and how to overcome them Shashi Kiran, CMO, Quali Recorded: Aug 15 2017 52 mins
    his presentation will share key insights from a survey Quali conducted of 2045 professionals to gauge the state of DevOps and Cloud adoption. It reviews the top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This is an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
  • Integrated Security in Operations - An interview with Dennis Drogseth
    Integrated Security in Operations - An interview with Dennis Drogseth IT Chronicles Media Recorded: Aug 15 2017 9 mins
    Kirstie Magowan and Carlos Casanova talk to Dennis Drogseth about Integrated Security in Operations
  • Using REST API and Webhook Shims to Supercharge IT Operations
    Using REST API and Webhook Shims to Supercharge IT Operations John Dias, Senior Technical Marketing Manager Recorded: Aug 15 2017 66 mins
    Want to take vRealize Operations to the next level by integrating with ServiceNow, PagerDuty, Slack and more? You can do that! Join us to learn how easy (and fun!) it can be to explore using vRealize Operations extensibility with two powerful features.

    First, we will cover how you can use the REST Notification plugin in to send alert information to practically any system with a Web API including vRealize Automation and vRealize Orchestrator for ultimate automation power. All possible with Webhook Shims, an open source project available today.

    Next, we will take a look at the vRealize Operations REST API to discover how you can perform many different tasks without even opening the UI. This includes using PowerCLI for tasks such as looking at stats, alerts, object properties and more.

    If you want to know how vRealize Operations can feed and interact with other IT tools in your environment, this session is for you!
  • Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
    Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry Chris Rawles, Data Scientist and Jeff Kelly, Pivotal Recorded: Aug 15 2017 42 mins
    The Internet of Things (IoT) holds promise for both consumers and enterprises alike. To succeed, any IoT project must concern itself with how to ingest machine and sensor data, how to build actionable models, and how to react to the output of models in real-time.

    Join Pivotal Data Scientist Chris Rawles, as he illustrates how to build and operationalize an IoT application running on Pivotal Cloud Foundry that scores and reacts to streaming data in real-time. In this webinar, you will learn how to:

    - Collect streaming IoT data
    - Build and train machine learning models in real-time
    - Score streaming data in real-time in an application

    We look forward to having you join us.

    The Pivotal Team
  • Stopping Ransomware at the Door (and Every Other Threat)
    Stopping Ransomware at the Door (and Every Other Threat) Paul Zindell, Security Specialist, Sophos Recorded: Aug 15 2017 47 mins
    From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Organizations need innovative endpoint protection that won’t impact performance while at the same time protect against these targeted threats.
    Join us for a live webcast as we discuss the latest in ransomware trends.

    Topics will include:

    · Prevent: stop ransomware before it strikes by addressing the attack methods used by APTs
    · Detect: quickly and easily detect and isolate attacks
    · Respond: laser in on critical alerts and address them with simple security intelligence
  • Meetup: Architecting for operational sustainability with Kubernetes
    Meetup: Architecting for operational sustainability with Kubernetes Ranga Rajagopalan Recorded: Aug 15 2017 55 mins
    Container Networking and Application Services meet up with Avi Networks CTO, Ranga Rajagopalan and guest speaker Craig McLuckie from Heptio.
  • Inventing the Future: Mobile-First Learning
    Inventing the Future: Mobile-First Learning Dan Rivera, Aruba Product Solutions Manager, K12 & Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO Recorded: Aug 15 2017 62 mins
    Learning is transforming! With new technology being introduced into the classroom at breakneck speeds, it may seem impossible to stay ahead of the curve. While mobile learning, collaborative environments and cloud-based apps put a higher demand on the wired and wireless infrastructure, the advent of IoT puts stress on the network like never before. With a projected 30 billion new IoT devices coming in the next three years, what do you need to do to prepare your network?

    Join us to learn how Cypress Fairbanks ISD began Inventing the Future. During the webinar we will discuss:

    •Creating future-ready educational environments
    •Key Trends in K12
    •Challenges – The Solvable, the Difficult and the Wicked
    •EdTech Developments

    Speakers
    Dan Rivera, Aruba Product Solutions Manager, K12
    Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO
  • Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation
    Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation Ross Rexer, Liz Alexander, Meghan Lockwood Recorded: Aug 15 2017 47 mins
    With ServiceNow launching their new Platform upgrade, you might be in the midst of deciding whether or not this upgrade will lure you in (if you don’t have the Portal yet, you might want to think about that!).

    But more than just a binary, “should I or shouldn’t I upgrade” decision, ServiceNow’s major releases are an opportunity for companies to take a strategic look at their ServiceNow strategy.

    This webinar will talk you through:
    - Upgrades and major releases to help you think BIG
    - What you should strategically consider about Jakarta (including the quick wins)
    - Hidden pockets of value in your ServiceNow Roadmap
  • Making Sense of Software-Defined Everything
    Making Sense of Software-Defined Everything Ben Woo, Principal Analyst, Neuralytix Recorded: Aug 15 2017 38 mins
    How up to date is your datacenter? Is it a traditional monolithic datacenter? Is it converged or hyper-converged? Is it cloud ready? Are you ready for the next generation Datacenter 4.0? This webinar answers looks at the various generations of data centers and helps you to decide which generation of data center is right for you by examining the pros and cons of the different approaches.
  • Tutorial 1: Deploying production-ready container apps
    Tutorial 1: Deploying production-ready container apps Ranga Rajagopalan Recorded: Aug 15 2017 40 mins
    App teams are excited about using microservices architectures and containers. Running a few containers in a development environment with a few open source tools is very different from running large clusters with thousands of containers supporting production applications. In this three-part tutorial, Avi Networks CTO, Ranga Rajagopalan explains step-by-step with examples, the services needed and practical considerations in deploying production-ready, container-based applications.

    Episode 1:
    In this episode, Ranga will cover the concept of a Service Mesh for an OpenShift - Kubernetes cluster along with the following:
    Need for an ingress controller and an intra-cluster traffic manager
    How to deploy a service mesh in a kubernetes cluster
    Real-life examples of a service mesh deployment
    Best practices and lessons learned from production deployments

    Register for the upcoming episodes in this tutorial series for on-demand access to the videos.
    Episode 2: https://attendee.gotowebinar.com/register/7441307064554961155
    Episode 3: https://attendee.gotowebinar.com/register/6587591261168317699


    About Ranga Rajagopalan:
    Over the last 15 years, prior to co-founding Avi Networks, Ranga has been an architect and developer of several high-performance distributed operating systems as well as networking and storage data center products. Before his current role as CTO, he was the Senior Director at Cisco’s Data Center business unit, responsible for platform software on the Nexus 7000 product line. Joining Cisco through the acquisition of Andiamo where he was one of the lead architects for the SAN-OS operating system, Ranga began his career at SGI as an IRIX kernel engineer for the Origin series of ccNUMA servers.
  • [Panel] Software-Defined in the Digital Transformation Era
    [Panel] Software-Defined in the Digital Transformation Era Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks Aug 17 2017 2:00 pm UTC 60 mins
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • Preparing for GDPR: Are identity management and authentication core to GDPR?
    Preparing for GDPR: Are identity management and authentication core to GDPR? Sian John, Symantec & Enza Iannopollo, Forrester Aug 17 2017 2:00 pm UTC 45 mins
    You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.

    You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
    Other topics will include:

    •Identifying gaps in your strategy
    •How to prioritise remediation and investments
    •How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Aug 17 2017 3:00 pm UTC 90 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Software-Defining More than Just the WAN
    Software-Defining More than Just the WAN Robert McBride, Director of Enterprise and Telco Solutions Aug 17 2017 3:00 pm UTC 45 mins
    Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?

    Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.

    In this webinar, you will come to understand:

    •Implications of security due to SD-WAN-enabled direct Internet access
    •Operational and financial benefits of virtualizing the full branch
    •How SD-WAN is only one part of your next-generation branch and WAN architecture
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Aug 17 2017 4:00 pm UTC 60 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework
    Detecting a Healthcare Breach with the NIST Cybersecurity Framework Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Aug 17 2017 5:00 pm UTC 60 mins
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • Automated Security for Jenkins
    Automated Security for Jenkins Matthew Barker, Solutions Architect, Twistlock Aug 17 2017 5:00 pm UTC 30 mins
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software
    Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software Storage Switzerland, Maxta Aug 17 2017 5:00 pm UTC 60 mins
    In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.

    Attendees will learn how each deployment model overcomes these challenge:

    1. Ease of initial evaluation and testing
    2. How to transition to hyperconvergence while having current servers
    3. How to avoid hypervisor lock-in
    4. How to build a future proof hyperconverged architecture
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Aug 17 2017 6:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Aug 17 2017 6:00 pm UTC 60 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • TechTalk Cost Management Live Demo
    TechTalk Cost Management Live Demo Todd Bernhard, CloudCheckr Product Marketing Manager and Shannon Houpt, Account Executive, California & Australia Aug 17 2017 6:00 pm UTC 60 mins
    Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.

    Additionally, CloudCheckr makes recommendations based on analytics to better utilize resource, upgrade or downgrade instances and more. The results are that customers typically report saving 30% on their cloud spend.

    In this webinar, users will experience the CloudCheckr app in a live demo, with focus on:

    - Cost Savings Dashboard
    - Reserved Instance Right-Sizing Report
    - Utilization Best Practices
  • The Foundation for Data Center Modernization and Open Source Operations
    The Foundation for Data Center Modernization and Open Source Operations Dan Courcy, Red Hat Enterprise Linux, Andre Pitanga, Service Delivery Manager, Red Hat Aug 17 2017 6:00 pm UTC 45 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Aug 17 2017 9:00 pm UTC 60 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Aug 18 2017 5:00 pm UTC 30 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • Defend Against WannaCry
    Defend Against WannaCry Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42 Aug 21 2017 10:00 am UTC 30 mins
    What you need to know and how to defend against it.

    Hours after WanaCrypt0r first emerged , the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.

    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Follow Alex Hinchliffe on a video interview during which he will cover this pervasive threat, and how it exploits vulnerabilities and spreads across networks.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • Analytics Nightmares and How You Can Prevent Them
    Analytics Nightmares and How You Can Prevent Them Meta S. Brown, Author, Data Mining for Dummies and President, A4A Brown, Inc. Aug 22 2017 3:00 pm UTC 60 mins
    Analytics risks can keep you up at night. What if…
    · We make a big investment and don’t break even?
    · Management doesn’t trust the results?
    · Analysts cross data privacy boundaries?

    What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.

    In this presentation, you will learn:
    · What causes most analytics failures
    · How you can diminish risk and maximize returns through strong analytics process
    · Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
  • How to Stay Ahead of Today's Ransomware Realities
    How to Stay Ahead of Today's Ransomware Realities Ken Westin, Security Specialist, Splunk Aug 22 2017 3:00 pm UTC 75 mins
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Aug 22 2017 4:00 pm UTC 60 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • Performance Benchmarking Big Data Platforms in the Cloud
    Performance Benchmarking Big Data Platforms in the Cloud Reynold Xin, Co-founder and Chief Architect at Databricks Aug 22 2017 5:00 pm UTC 60 mins
    Performance is often a key factor in choosing big data platforms. Over the past few years, Apache Spark has seen rapid adoption by enterprises, making it the de facto data processing engine for its performance and ease of use.


    Since starting the Spark project, our team at Databricks has been focusing on accelerating innovation by building the most performant and optimized Unified Analytics Platform for the cloud. Join Reynold Xin, Co-founder and Chief Architect of Databricks as he discusses the results of our benchmark (using TPC-DS industry standard requirements) comparing the Databricks Runtime (which includes Apache Spark and our DBIO accelerator module) with vanilla open source Spark in the cloud and how these performance gains can have a meaningful impact on your TCO for managing Spark.

    This webinar covers:
    Differences between open source Spark and Databricks Runtime.
    Details on the benchmark including hardware configuration, dataset, etc.
    Summary of the benchmark results which reveal performance gains by up to 5x over open source Spark and other big data engines.
    A live demo comparing processing speeds of Databricks Runtime vs. open source Spark.

    Special Announcement: We will also announce an experimental feature as part of the webinar that aims at drastically speeding up your workloads even more. Be the first to see this feature in action. Register today!
  • Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy
    Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy Todd Bernhard, CloudCheckr Product Marketing Manager Aug 22 2017 6:00 pm UTC 60 mins
    The Cloud Economy represents a drastic change in how enterprises perform computing. But it's not totally unprecedented. Simultaneously with the advent of the Cloud First mentality is the Gig Economy.

    People don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't automatically reserve a hotel on a trip. They can use AirBnB. What lessons can we learn from the Gig Economy that apply to the Cloud Economy? What pitfalls can we avoid?

    During this webinar we will discuss:
    - Financial savings promised by the new economic model
    - New challenges presented
    - How to mitigate against such challenges
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Aug 22 2017 6:00 pm UTC 30 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Aug 22 2017 6:00 pm UTC 90 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Aug 22 2017 6:00 pm UTC 60 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Accelerating Multi-Cloud Deployments
    Accelerating Multi-Cloud Deployments Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks Aug 23 2017 10:00 am UTC 45 mins
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.

    New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.