Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics Recorded: Jan 20 2017 15 mins
    CloudPhysics takes the complexities of your virtual infrastructure inventory, performance, and configuration analysis and compels the evaluation nearly effortless. Learn how to use the On Premise IT Cost Calculator to derive the value of your current workloads and use the Cost Calculator for Microsoft Azure to make an informed comparison of the two scenarios.
  • How to Combine Hadoop & Spark with a Converged Data Platform How to Combine Hadoop & Spark with a Converged Data Platform Jack Norris, Senior Vice President of Data and Applications, MapR Recorded: Jan 20 2017 40 mins
    MapR provides the industry's only converged data platform that integrates the power of Hadoop and Spark with global event streaming, real-time database capabilities, and enterprise storage, enabling customers to harness the enormous power of their data. A majority of current customers report achieving payback in fewer than 12 months and realizing greater than 5X ROI.

    Join this webcast to learn how to:
    - Quickly and easily deploy a cloud-based, converged big data platform
    - Support hybrid environments and easily keep cloud and on-premises environments in sync
    - Design and deliver enterprise grade, production big data applications in the cloud
    - Help your enterprise achieve 5x ROI and harness the enormous power of your data
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Recorded: Jan 20 2017 46 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Doug Splinter & PJ Johnson, Technical Solutions Professionals, Microsoft Recorded: Jan 20 2017 41 mins
    Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect and respond to security threats.

    Join this webcast to learn more about:
    - Protecting against identity compromise and identity breaches before they cause damage
    - Ensuring device security while enabling mobile work for your users
    - The unique perspective Microsoft brings to cybersecurity
  • LiveAction: Gaining Deep Visibility Into The WAN Overlay LiveAction: Gaining Deep Visibility Into The WAN Overlay David Izumo, Principal Engineer, Technical Marketing, LiveAction & Manan Shah, Director of Product Management, Viptela Recorded: Jan 20 2017 38 mins
    Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.

    LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.

    This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:

    • Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
    • Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
    • Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
  • TFD: Network Engineer Roundtable on Deploying SD-WAN TFD: Network Engineer Roundtable on Deploying SD-WAN Panel of 8 Network Architects, moderated by Tech Field Day Recorded: Jan 20 2017 51 mins
    Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.

    SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:

    - Maturity of SD-WAN for prime-time deployment
    - Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
    - ROI and the Before/After picture
    - Most typical use-cases across industries
    - Best practices in deploying SD-WAN based on personal experiences
  • The move from N3 to HSCN The move from N3 to HSCN Mark Hall, Public Sector Director, Redcentric Recorded: Jan 20 2017 61 mins
    Over the course of this presentation Mark Hall discusses some of the key areas surrounding the move from N3 to the new healthcare network HSCN including timescales, benefits and much more. At the end of the presentation Mark will be available to answer any questions or concerns you have about the transition.
  • 5 Highest-Impact CASB Use Cases 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist at Netskope​ Recorded: Jan 19 2017 61 mins
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.
  • Taking A Design Approach to Bridge DevOps and Business Automation Taking A Design Approach to Bridge DevOps and Business Automation Justin Holmes Leader, Consulting Business Automation Practice, Red Hat Recorded: Jan 19 2017 61 mins
    Custom software development and business automation have historically provided 2 equal but distinct paths to bring high-quality products to market. Each has its own benefits and trade-offs. Business process management (BPM) and business rules management systems (BRMS) provide a lightweight, modular platform that can be tailored for your organizational structure and technical architecture.

    Red Hat® Consulting offers a Business Automation Practice—a design model that combines the rigor and security of software development with the speed and accessibility of business automation technology. The result? Businesses can develop better products, more quickly and fully evolve with DevOps.
  • Anuta: Network Orchestration for Managed Branch Services Anuta: Network Orchestration for Managed Branch Services Kiran Sirupa, Director of Marketing & Praveen Vengalam, Co-Founder and VP of Engineering, Anuta Networks Recorded: Jan 19 2017 36 mins
    SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
  • How to Build Engaging Apps on Xamarin with Azure Backend How to Build Engaging Apps on Xamarin with Azure Backend Mahdi Alirezaie, Technical Solutions Professional, Microsoft Corporation Recorded: Jan 19 2017 61 mins
    Whether you’re a new mobile developer or an experienced enterprise team lead, Microsoft’s Azure App Service and Xamarin give you everything you need to build engaging Android, iOS, and Windows apps. See how easy it is to create a cloud backend for your mobile app straight from the Azure Portal and add customization to your backend from authentication to special API controllers.

    Join this webcast to learn how to:
    - Deploy your first App Service
    - Understand how the .NET Azure client SDK works
    - Enhance your app with Authentication and Offline sync
  • General Dynamics IT: Integrating the Cloud into Your Security Program General Dynamics IT: Integrating the Cloud into Your Security Program Sallie Sweeney, Principal Cyber Solutions Architect, General Dynamics IT Recorded: Jan 19 2017 34 mins
    As more organizations migrate to the cloud, CISOs are faced with several challenges, such as: How do we securely migrate our mission-critical applications? What tools and methods are offered to secure our cloud? How will migrating to the cloud affect our overall security strategy? Learn how to effectively integrate the cloud into your security program and explore what role FedRAMP should play in your cloud security plan.
  • Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Sri Subramanian, Sr. Director of Product Management, Zscaler & David Klebanov, Director of Technical Marketing, Viptela Recorded: Jan 19 2017 47 mins
    Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.

    However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.

    Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:

    - Common use case scenarios for SD-WAN and cloud security
    - Real world deployment examples
    - Best practices for improving your security posture with cloud security
    - Zscaler and Viptela technical integration elements
  • New Containerization Capabilities for HPE Universal Discovery and CMDB New Containerization Capabilities for HPE Universal Discovery and CMDB Jon Furner, Results Positive and Ron Bocken, HPE Recorded: Jan 19 2017 42 mins
    Looking to reduce deployment costs and increase time to value? Don’t miss this opportunity to see and hear about the new container capabilities of HPE Universal Discovery and Universal CMDB solutions. In this webinar, you will receive an overview from Results Positive on how you can utilize the HPE Configuration Management System with new capabilities to discover containers and configuration items in your data center and simplify solution deployment time from days to minutes. Additionally, HPE will provide an overview of the HPE IT Operations Management Suite framework and how containers can be used to benefit overall total cost of ownership (TCO).

    Key takeaways from attending this webinar include:
    • How you can utilize new HPE UD/UCMDB Container capabilities
    • Common use cases for containerization with HPE UD/UCMDB
    • Understand the business benefits of containerization
    • Become aware of HPE ITOM Suite Framework

    Don’t miss out on this opportunity to learn the new containerization capabilities available for HPE UD/UCMDB.
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: Jan 19 2017 58 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society; Recorded: Jan 19 2017 60 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • Skype for Business: Concept to Completion, Part II Skype for Business: Concept to Completion, Part II John Hand - Global Microsoft Alliance Director | Dave Bottomley - Communications Solutions Engineer Recorded: Jan 19 2017 55 mins
    This session will follow on from Part I, taking a specific look at how performance management software, like Prognosis, can assist in the successful deployment of Skype for Business.
  • Enabling AWS and Azure Migrations with SD-WAN Enabling AWS and Azure Migrations with SD-WAN Rob McBride, Solutions Marketing, Viptela & Ariful Huq, Product Management, Viptela Recorded: Jan 19 2017 49 mins
    Gartner has highlighted that the differences in network services (such as routing, security and application delivery) between internal data centers and IaaS environments cause major issues during cloud migrations. Networking teams face many challenges migrating their workloads to AWS and Azure. These include:

    - Extending secure connectivity from the enterprise to the cloud is operationally complex
    - Cloud traffic flows sub-optimally through the centralized data center/DMZ, instead of directly from the branch or from a regional exit - this affects performance of applications
    - Implementing a unified WAN policy on disparate pieces of cloud infrastructure is difficult

    This webinar will dig deeper into the networking problems of cloud migrations. And how Software-Defined WAN (SD-WAN) technology makes this faster and simpler the networking teams. The following topics will be covered:

    - Extend your WAN seamlessly to AWS and Azure
    - Implement a unified WAN policy across the enterprise and cloud
    - Typical deployment scenarios for AWS and Azure
    - Real customer examples of public cloud migration
  • Using Storage Infrastructure as an Accelerator of DevOps Maturity Using Storage Infrastructure as an Accelerator of DevOps Maturity Josh Atwell, Developer Advocate, NetApp Recorded: Jan 19 2017 52 mins
    Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage is more capable than where we read and write data.

    In this session we’ll discuss the role and value extensible storage infrastructure has in accelerating software development activities, improve code quality, reveal multiple deployment options through automated testing, and support continuous integration efforts. All this will be described using tools common in DevOps organizations.
  • Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Hoo Shu Yee, Product Dir, Singtel & Ramesh Prabagaran, VP, Viptela,Inc. Recorded: Jan 19 2017 49 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless Recorded: Jan 19 2017 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Recorded: Jan 19 2017 64 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • Top Lessons Learned from DevOps Enterprise Summit 2016 Top Lessons Learned from DevOps Enterprise Summit 2016 Gene Kim, IT Ashish Kuthiala, HPE Recorded: Jan 19 2017 58 mins
    In this presentation, Gene Kim will share his top lessons learned studying how large, complex organizations are successfully adopting DevOps culture and practices. He will share specific case studies and observations, as well as other resources and specific recommendations for organizations embarking on DevOps transformation.
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Jan 24 2017 5:00 am UTC 60 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Are Hybrid Clouds in Tune with Future Business Growth? Are Hybrid Clouds in Tune with Future Business Growth? Agatha Poon 451 Research, Rajesh Awasthi Tata Communications Jan 24 2017 6:30 am UTC 60 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
  • How to Save on Oracle Licensing Fees by Replatforming with Dell EMC: Bart Sjerps How to Save on Oracle Licensing Fees by Replatforming with Dell EMC: Bart Sjerps Bart Sjerps - Principal Systems Engineer Jan 24 2017 11:00 am UTC 60 mins
    Database license fees drive over 80% of total system cost. Many organizations virtualize their applications, but Oracle is often an exception for a variety of reasons.
    You will learn why re-platforming Oracle databases on better hardware can drive down TCO by a significant amount. Bart will also cover technical challenges and benefits, as well as myths and facts about licensing Oracle on VMware, and how to deal with Oracle license audits and still stay compliant.
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud and Melanie Posey, Research Vice President for VotE- Cloud Jan 24 2017 4:00 pm UTC 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Introduction to Swordfish: Scalable Storage Management Introduction to Swordfish: Scalable Storage Management Richelle Ahlvers, Chair, SNIA Scalable Storage Mgt Technical Work Group, Principal, Storage Management Architect, Broadcom Jan 24 2017 6:00 pm UTC 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Created by SNIA’s Scalable Storage Management Technical Work Group (SSM TWG), SNIA Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting. This session will present an overview of SNIA Swordfish including the new functionality added in version 1.1 released in January 2017.
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Jan 24 2017 6:00 pm UTC 60 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • Assembling a Container Security Program Assembling a Container Security Program Securosis and Aqua Security Jan 24 2017 6:00 pm UTC 60 mins
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Future-Proof Your Private Cloud with Software-Defined Storage Future-Proof Your Private Cloud with Software-Defined Storage Rob Whiteley, VP of Marketing, Hedvig Inc. Jan 24 2017 7:00 pm UTC 45 mins
    Many large organizations either can’t or won’t go all-in on the public cloud. Regulatory compliance, legacy infrastructure, and costs drive these organizations to build private clouds. Do you invest in VMs or containers? Do you use OpenStack, Kubernetes, or Mesos to orchestrate your cloud? How will you bridge your private cloud with AWS, Microsoft Azure, or Google Compute Cloud? You need a flexible architecture that not only embraces all the above, but facilitate frictionless movement among them.

    Specifically, you’ll learn how you can use software-defined storage to:
    1. Support any hypervisor, container, or cloud platform – simultaneously.
    2. Plug into any cloud orchestration tool to automate your private cloud.
    3. Integrate public cloud – and not just bolt it on – when you’re ready.
    4. Create self-service storage and sandboxes for DevOps environments.
  • The Tools and Technology Behind Empowering a Digital Workforce The Tools and Technology Behind Empowering a Digital Workforce Ali Mazaheri, Microsoft & Burke Fewel, DocuSign Jan 24 2017 7:00 pm UTC 60 mins
    Thanks to digital transformation, the workforce has changed. Employees expect to be engaged in digital ways, with the ability to complete work while mobile, access insights easily, and collaborate with ease.

    HR and IT leaders need to co-strategize how to respond to the growing digital expectations of today’s employees and to increase employee satisfaction, promote cross-group knowledge sharing, and improve productivity.

    Join this webcast to:
    - Learn how HR and IT can work together to empower employees, with specific examples of organizations that are doing just that
    - See how DocuSign has helped HR organizations make key functions like hiring, onboarding, and benefits enrollment paper-free, saving these companies time, reducing errors, increasing compliance, and improving employees' and candidates’ experience
    - Hear how DocuSign helps meet the HR needs of global enterprises with more than 40 signing languages and ease of integration with HRIS (Human Resource Information System) solutions
  • How to Choose the Right Data Platform for Big Data Storage and Faster Apps How to Choose the Right Data Platform for Big Data Storage and Faster Apps Divya Mehra Principal Product Manager, Red Hat William Burns Senior Software Engineer, Red Hat Jan 24 2017 8:00 pm UTC 60 mins
    The convergence of mobile, social, big data, and cloud has increased demands on applications to react instantaneously to changes in data at a large scale. A delay of a few seconds can mean the difference between engaging or losing a customer.

    Application performance is highly correlated to how quickly an app can access and process a variety of data types. It's crucial that data platforms provide high performance as data changes, scales out linearly to handle large data sets, and maintains data integrity and security.

    Watch this webcast to learn about the market and data trends driving the need for computing and in-memory storage.
  • Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Michael Basilyan, Google Cloud Platform; Scott Jeschonek, Avere Systems; Jason Stowe, Cycle Computing Jan 24 2017 8:00 pm UTC 60 mins
    Google Cloud Platform, Avere Systems, and Cycle Computing experts will share best practices for advancing solutions to big challenges faced by enterprises with growing compute and storage needs. In this “best practices” webinar, you’ll hear how these companies are working to improve results that drive businesses forward through scalability, performance, and ease of management.

    In this webinar, you will learn:
    - How enterprises are using Google Cloud Platform to gain compute and storage capacity on-demand
    - Best practices for efficient use of cloud compute and storage resources
    - Overcoming the need for file systems within a hybrid cloud environment
    - Understand how to eliminate latency between cloud and data center architectures
    - Learn how to best manage simulation, analytics, and big data workloads in dynamic environments
    - Look at market dynamics drawing companies to new storage models over the next several years

    In just 60-minutes, you’ll be presented with a foundation to build infrastructure to support ongoing demand growth and have ample opportunity to ask direct questions to presenters.
  • Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Nelson Chen Jan 25 2017 2:00 pm UTC 30 mins
    Join Cogeco Peer 1 and our partners ZENEDGE for a 30 minute webinar on DDoS attacks and how to protect yourself against them.
  • Are Hybrid Clouds in tune with future business growth? Are Hybrid Clouds in tune with future business growth? Agatha Poon 451 Research, TJ Akhtar Tata Communications Jan 25 2017 4:00 pm UTC 60 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
  • Enterprise Applications and Persistent Storage with Docker Containers Enterprise Applications and Persistent Storage with Docker Containers Andrew Sullivan, Technical Marketing Engineer, NetApp Jan 25 2017 5:00 pm UTC 45 mins
    Docker® containers have emerged to provide the agility that development teams need while delivering the stability and reliability required by IT operations. Developers can bring existing applications into the Docker ecosystem while building new applications using microservice design principles. IT-operations teams can benefit from reduced complexity and faster deployment of containerized applications.

    Typically, Docker containers do not retain data after being restarted or retired. A container’s ephemeral nature presents challenges for containerizing many common Enterprise applications, from databases to home-grown tools, where data must be retained or when a container must share its data across multiple Docker hosts. Docker and NetApp solve these issues and more with the NetApp® Docker Volume Plugin (nDVP).

    The nDVP adds persistent storage capabilities to Docker containers, which gives developers the ability to enable data persistence in applications that use Docker container technology along with enterprise storage features such as transparent scalability, high availability, encryption, data deduplication, and seamless replication.
  • Navigating Your Journey to the Cloud – From POC to Business Reality Navigating Your Journey to the Cloud – From POC to Business Reality Ron Lunasin, Sr Director, Product Mgmt, Informatica Jan 25 2017 5:00 pm UTC 60 mins
    It is a well-known fact that cloud is becoming a strategic initiative for organizations, big and small. The question is – how do you get there? How do you efficiently manage all your data as you transform your business to a cloud-first organization? Today, you likely have a hybrid on premise/cloud model that started years ago with a simple migration project and now you have a mandate to deliver new projects in the cloud to maximize cloud economies. In this webinar we will discuss key use cases to consider throughout your journey to the cloud. We will share how a flexible hybrid data management platform can help you gain the full benefits of your existing investments, while adopting new technologies. Whether you have a cloud-first strategy or you are on a hybrid journey, we’ve got you covered.

    Join us to learn about key use cases you should consider throughout your journey to cloud, and the data management best practices that can help you turn digital disruption to your advantage to efficiently and quickly satisfy business requirements - as you want - at your pace.
  • How To Save 50% Or More On Storage Costs How To Save 50% Or More On Storage Costs Mark Pastor, Quantum Corporation, Krishna Subramanian, Komprise Jan 25 2017 6:00 pm UTC 60 mins
    For most organizations today, over half of their data is not active yet it consumes expensive storage and data protection resources. Quantum and Komprise have teamed together to show you how to know more about your data and to identify how you can store it more intelligently: to keep it protected and fully accessible but at much lower costs than the traditional approach.

    In 15 minutes you will be able to see how much money you can save on your next storage purchase, and we will even provide you a return on investment (ROI) analysis for your internal discussions.

    Join Quantum and Komprise for this joint webinar and learn:

    • How you can get analytics across your storage to know how data is being used
    • How to cut costs and see the ROI of implementing a simple active archive
    •How this strategy can help you leverage public cloud storage if desired

    We will give you a live demo so you can see how easy it is.
    Join us and qualify for a free analytics assessment in your environment!
  • Applied Analytics: Creating a Successful Analytical Solution Applied Analytics: Creating a Successful Analytical Solution Dr. Kyle H. Ambert, PhD, Lead Data Scientist, Artificial Intelligence & Analytics Solutions Group, Intel Jan 25 2017 6:00 pm UTC 60 mins
    Applied analytics requires scientists to be aware of both the intricacies of the statistical tools at their disposal as well as the domain-specific idiosyncrasies of their data in order to create a successful analytical solution. This webinar will discuss examples of characteristics of data that enable and disallow certain data science techniques.
  • Is a Cloud-Managed Network right for your Schools? Is a Cloud-Managed Network right for your Schools? Dan Rivera, Product Marketing Manager - K12 Jan 25 2017 6:00 pm UTC 30 mins
    Cloud networking solutions offer a great way to manage the growing demand of high-bandwidth campus Wi-Fi when resources and funds are scarce. However, not all cloud-based solutions are equal.

    Join us for a live webinar to learn what to expect from a cloud-managed network, how to avoid common pitfalls, and how to get E-rate-ready 5-year network management licensing. We will also show the benefits of Aruba’s cloud solution for K-12, along with a live demo!
  • Why Tier Certification Is Even More Meaningful in a Hybrid IT World Why Tier Certification Is Even More Meaningful in a Hybrid IT World Keith Klesner, Senior Vice President, North America, Uptime Institute Jan 25 2017 6:00 pm UTC 60 mins
    Data Centers are continuing to evolve and will remain at the core of digital infrastructure. Today’s global information economy depends on data centers like never before. Whether a data center is on premise, colocated or in the cloud, they are responsible for the entire online infrastructure of a company, and the data centers are crucial to business critical infrastructure. For more than 20 years, Uptime Institute has served as an independent advisory body to all stakeholders in the industry responsible for the performance and availability of IT systems. We’ve helped the world’s leading data center organizations design, build, maintain, and optimize their facilities, compute systems, and operations, while balancing costs, resources, performance, and efficiency in an ever changing technology landscape. Uptime has assisted hundreds of enterprises and service providers to ensure their data centers are ready to meet their business needs. Join us as we share our experiences and learnings for a hybrid IT world.

    Topics include:
    - The value of simplicity in data center design and construction for IT and facility operations
    - Concurrent maintainability as a “must have” as "live work or deferred maintenance" is no longer acceptable
    - Tier Certification as a risk management tool for project owners and data center services buyers
  • Top Considerations for Deploying SD-WAN in a Large Enterprise Top Considerations for Deploying SD-WAN in a Large Enterprise Steve Woo, Co-founder and VP of Products, Michael Wood, VP of Marketing Jan 25 2017 6:00 pm UTC 60 mins
    Very large and multinational enterprises require SD-WAN (Software-Defined Wide Area Network) solutions that enable them to deploy flexible, secure, high performance WAN connectivity that reliably scales to large numbers and various sizes of distributed branch locations and the cloud. Before embarking on an SD-WAN deployment journey across thousands of branches, you must consider the top factors that impact the efficiency, speed, and, ultimately, the success of your implementation.

    Join this webinar with Steve Woo and Mike Wood as they walk you through the key considerations involved in typical multiple thousand-site SD-WAN roll-outs - and the top best practices of a successful deployment.
  • Accelerate your DevOps & Mobile Apps with Real-Time Monitoring Accelerate your DevOps & Mobile Apps with Real-Time Monitoring James White, Technical Solutions Professional, Microsoft Corporation Jan 25 2017 7:00 pm UTC 60 mins
    For your mobile apps to be successful, you must think beyond simply getting your apps to market—you need to make sure your apps look, feel, and behave across a diverse device and platform landscape. This means monitoring real-time app and user behavior in the wild and quickly release updates and new features that keep your users coming back for more.

    Join this webcast to:
    - Connect your Xamarin apps to Visual Studio Team Services
    - Integrate with Xamarin Test Cloud to automatically test your apps on 2,000+ real devices
    - Start distributing and collecting feedback from your users with HockeyApp
  • Address Today's Data Growth while Cutting Costs with Quantum and Komprise Address Today's Data Growth while Cutting Costs with Quantum and Komprise Mark Pastor, Director of Archive and Technical Workflows, Quantum Corporation Jan 25 2017 9:30 pm UTC 30 mins
    See how you can get analytics across your storage into how data is growing and being used. Then understand the ROI of moving data to Quantum storage, the cloud, and how to transparently move data without any changes to users or applications.

    - Cut over 70% of costs
    - Watch a live demo
    - Qualify for a free assessment in your environment
  • 攻撃者の動向を踏まえた2017年のセキュリティ予測 攻撃者の動向を踏まえた2017年のセキュリティ予測 岩間 優仁 (いわま まさとみ)執行役副社長 ファイア・アイ株式会社 Jan 26 2017 8:00 am UTC 90 mins
    セキュリティご担当者様

    昨年2016年は、ランサムウェアが猛威をふるい、またクラウド・サービスを積極的に悪用する攻撃も目立ちました。IoTデバイスがハッキングを受け、大規模なDDoS攻撃により多くの企業が被害を受けたのは予測された通りでした。2016年は多くの企業の経営層にとってサイバー攻撃の脅威を強く感じた年になり、サイバーセキュリティがよりいっそうビジネス上の課題となった年でした。

    2017年は、引き続きランサムウェアが横行するだけでなく、拡大するIoTと、ICS等のサイバーを活用した社会インフラ・サービスへの攻撃が増加するとみられています。また検知が困難なスクリプト型マルウェアへの移行が続くことも予想されます。間違いなく、攻撃者は企業や組織を侵害するために新たな手口を模索し続けてくるでしょう。

    ファイア・アイでは、国家レベルの支援を受ける脅威グループの監視や、様々な業種におけるインシデント・レスポンスの豊富な経験をもとに、2017年のサイバーセキュリティ環境の変化について解説するWebセミナーを実施いたします。本Webセミナーでは、新しい手口による攻撃に対して強化すべきセキュリティ対策や対応策について、独自の視点と脅威解析情報をベースに解説いたします。是非この機会にご聴講ください。

    また本Webセミナーへのお問い合わせは、 marketing-jp@fireeye.comまでお願いいたします。

    当日、皆様とオンラインでお会いできることを楽しみにしております。
  • Big Room Planning: Harnessing the Power of Agile at Scale Big Room Planning: Harnessing the Power of Agile at Scale Jonas Högstrand & Andrew Sales Jan 26 2017 9:00 am UTC 60 mins
    Harnessing the Power of Agile at Scale with Big Room Planning

    Many organisations are already using agile methodologies like Scrum, but largely at an individual team level.
    But how do you ensure correlation and coordination between different agile teams? How do you ensure alignment between business strategy and execution level? And how do you provide business stakeholders with visibility to track the progress of ongoing projects and programmes – traditional and agile?
    The secret to succeeding with Enterprise Scale Agile is Big Room Planning; real-time collaboration, where teams identify risks early, untangle dependencies, and effectively plan their work aligned to business priorities and customer needs.

    In this webinar, Jonas Högstrand and Andrew Sales, will discuss:

    •What benefits organisations can achieve with greater levels of business agility
    •Why Big Room Planning is a core activity for succeeding with agile at scale and the agile behaviours it drives
    •How Big Room Planning works, who participates, what you do and why it’s worthwhile
    •How CA Agile Central supports Big Room Planning and provides visibility to track and steer the plans that are created

    Learn how to achieve faster time to market, improved quality, strategic alignment between IT and the business, and predictable delivery of features that delight customers.