Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Stream Video to Your Global Users Securely and Confidently
    Stream Video to Your Global Users Securely and Confidently
    Derek Yee, PMM, Cloudflare | Cavin Kindsvogel, Stream Product Specialist, Cloudflare | Jon Levine, Stream PM, Cloudflare Recorded: Dec 11 2018 31 mins
    CDNs have played a significant role in successful video delivery, especially across OTT services, publishing, ad tech, gaming, and sporting sites. Cloudflare is building a better Internet, which includes delivering a fast, secure and reliable video experience for consumers anywhere in the world. Cloudflare offers a high performing distribution network that can meet the evolving needs of companies delivering video.

    Join us for this 45-minute webinar where we cover the following:

    - The foundations of building a resilient network to support high traffic video content
    - Advances in Cloudflare’s caching infrastructure for better streaming performance
    - How Cloudflare Workers provides video providers increased control of content distribution and visibility to user analytics
  • The Future of Work: Under the hood with Dropbox Business
    The Future of Work: Under the hood with Dropbox Business
    Dropbox Product Managers and Product Marketing Managers Recorded: Dec 11 2018 28 mins
    Here at Dropbox, we take your work seriously. That’s why we build products that help you get your best work done. Now, for the first time, we’re giving you an inside look at how customer feedback and user research are helping us take the work out of work.

    Watch our three-part webinar series to hear how we build easy-to-use products for:

    Part 1: Mobile work. How do we design a mobile app that lets people get real work done on the go—without creating an expectation of round-the-clock responsiveness? Hear the research behind our latest mobile app and insights on the future of mobile work.

    Part 2: Unblocking workflows with Dropbox previews. You might not always have the right software needed to open and view your files. At Dropbox we solved this problem for our users with a best-in-class previews platform. Even if you work with massive design and media files, we’ve got you covered.

    Part 3: Coordinating work with timelines in Dropbox Paper. The nature of teamwork is changing. Increasingly, coordination is a part of everyone’s job. That’s why we built Dropbox Paper, a collaborative workspace that brings collaboration and coordination together. Learn how we approach the work of managing work with timelines, Paper's newest feature.
  • Emerging Memory Poised to Explode
    Emerging Memory Poised to Explode
    Moderator: Alex McDonald, SNIA SSSI Co-Chair; Presenters: Tom Coughlin, Coughlin Associates & Jim Handy, Objective Analysis Recorded: Dec 11 2018 58 mins
    Join SSSI members and respected analysts Tom Coughlin and Jim Handy for a look into their new Emerging Memory and Storage Technologies Report. Tom and Jim will examine emerging memory technologies and their interaction with standard memories, how a new memory layer improves computer performance, and the technical advantages and economies of scale that contribute to the enthusiasm for emerging memories. They will provide an outlook on market projections and enabling and driving applications. The webcast is the perfect preparation for the 2019 SNIA Persistent Memory Summit January 24, 2019.
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Recorded: Dec 11 2018 48 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Data Intelligence Drives Digital Business Success
    Data Intelligence Drives Digital Business Success
    Marcus MacNeill, SVP, Product Management, ASG Technologies Recorded: Dec 11 2018 39 mins
    In the digital era, an organization’s business strategy is inextricably linked to its data strategy.

    Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.

    In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Recorded: Dec 11 2018 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • What’s New in Network Operations Management
    What’s New in Network Operations Management
    Jon Kies, Product Marketing Manager and Nisarg Shah, Product Management Director, Micro Focus Recorded: Dec 11 2018 62 mins
    Join us for an exciting and informative look at the latest release of Micro Focus Network Operations Management.

    Network Operations Management (NOM)—the leading management tool for enterprise networks—is built on the core capabilities of Network Node Manager I and Network Automation. It integrates fault, performance, configuration, and compliance of physical, virtual, wireless, and software-defined network infrastructures.

    Learn about NOM’s latest enhancements for diagnostic analytics, the scheduled out-of-service feature, integration with Micro Focus Operations Bridge, and more.

    You will also get a sneak preview of the new NOMX User Interface—our next-generation customizable and persona-based experience that unifies network data from monitoring, automation, compliance, and orchestration into actionable insights.
  • How smart companies use voice and bots to get and keep more customers
    How smart companies use voice and bots to get and keep more customers
    Bharath Kadaba, Chief Innovation Officer, Intuit Recorded: Dec 11 2018 60 mins
    The landscape of voice and chatbot-to-customer interactions is blowing up. Whether it’s a trusted AI assistant like Alexa or Google Home, or an integrated voice or chatbot tool within a brand interface like Kayak’s customer service experience, customers are increasingly willing to engage with brands via voice chat.

    AI assistants are getting smarter, and becoming capable of helping consumers sort through the avalanche of choices available in every decision, from buying phone plans to toothbrushes. And your marketing efforts will have to shift priorities in a major way to capture the attention of these newly connected customers as assistants get smarter and customers learn they can rely on their results.

    To hear about actual voice chat use cases, the differences between integrated bots and AI assistants, and how to leverage voice and bots for amaze-and-delight experiences right now, don’t miss this VB Live event!

    Register here for free.

    Attend this webinar and learn:
    * How bots and voice are uniquely positioned to help customers make purchasing decisions
    * How brands can address the advantages of integrated bots and an AI trusted assistant like Alexa
    * The best ways to leverage voice and bots to optimize the customer experience
    * What's next for voice and bots

    Speakers:

    * Bharath Kadaba, Chief Innovation Officer, Intuit
    * Ryan Lester, Director, Customer Engagement Technologies, LogMein
    * Matthias Keller, Chief Scientist & SVP Technology, Kayak
    * Russ Tar, VP EMEA, Artificial Solutions
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Bold360 by LogMeIn
  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Dec 11 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Recorded: Dec 11 2018 50 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
  • How to harness big data for maximum business value
    How to harness big data for maximum business value
    Tom Barber, Founder & CEO, Spicule and Carmine Rimi, Ubuntu Product Manager, Canonical Recorded: Dec 11 2018 46 mins
    Modern software is becoming increasingly complex as data streams from a variety of sources, creating an opportunity for organisations to automate and gather this information into valuable insights. Spicule and Canonical have come together to power these real-time analytics, bringing you the easy to use, customisable, flexible data platforms developed by Juju experts, that can be modelled and deployed on any cloud based application through open source technologies.

    In this webinar we will cover:

    Actionable steps to providing interactive real-time analytics over huge datasets with Druid

    How other organisations are improving their businesses with Spicule & Ubuntu

    Running analytics through Apache Superset user interface or embedding into your own application
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Recorded: Dec 11 2018 38 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid

    Speakers:

    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani Recorded: Dec 11 2018 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • Key Considerations for Stretching Your Storage Budget
    Key Considerations for Stretching Your Storage Budget
    Donna Pizarro, Product Manager, Storage; Bill Coker, VP, Hardware Business Unit; Bill Raftery, SVP Global Storage Solutions Recorded: Dec 11 2018 41 mins
    Storage Admins are continually challenged by the revolution in today's storage technology; the expansive growth of storage needs and the balance of getting the best performance and extended life of the storage product to stretch an existing budget.

    Want to learn more? Join us for an informative discussion where we’ll discuss:
    •Available N-1 options for hybrid systems
    •Options you should consider when purchasing a pre-owned N-1 hybrid
    system
    •The pros and cons of purchasing a N-1 storage solution
    •How to save by extending the life of the asset
    •Why performance assessments and health checks are necessary, what is
    involved and what objectives should be expected
  • The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    Kara Gillis Recorded: Dec 11 2018 34 mins
    You’ve heard about the top trends in IT - but how do you use this information to take meaningful action? How do you encourage collaboration between the business, developers, and operations? How do you up-level IT as a service provider that reduces manual processes and troubleshooting without context to focus on strategic initiatives that impact important KPIs? By avoiding these 8 mistakes IT practitioners makes!

    In this webinar, we’ll talk through avoiding:

    -Friction between IT and the business
    -Cumbersome and difficult root cause analysis
    -Not preparing for Incident response
    -And many others!

    You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate maximum scale, and maybe how Splunk can help!
  • AWS Cloud Backup: Why it's crucial and how to save on spending (NA)
    AWS Cloud Backup: Why it's crucial and how to save on spending (NA)
    Sebastian Straub - Systems Engineer at N2WS and Jessica Eisenberg - Customer Success at N2WS Recorded: Dec 11 2018 60 mins
    In AWS, your data is your responsibility– but securing your cloud shouldn’t mean sacrificing your IT budget.

    Join our session to learn how the NEW N2WS Backup and & Recovery 2.4 empowers enterprises to satisfy data protection demands while reducing storage costs and addressing varying data backup lifecycle needs.

    You will hear more about:

    •Reducing archival costs by up to 40% and retaining data for longer with low-cost storage tiers
    •Automating processes with greater ease by leveraging the N2WS enhanced RESTful API
    •Eliminating the need for manual configuration during the recovery process with N2WS VPC Capture + Clone
    •PLUS a live Q+A …and more!


    Can’t wait to see you,
    The N2WS team
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Recorded: Dec 11 2018 55 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Dell EMC IDPA DP4400 : Simply powerful data protection
    Dell EMC IDPA DP4400 : Simply powerful data protection
    Daniel Olkowski, DPS SE Recorded: Dec 11 2018 60 mins
    Dell EMC IDPA DP4400 : Simply powerful data protection
  • AWS Cloud Backup: Why it's crucial and how to save on spending (EMEA)
    AWS Cloud Backup: Why it's crucial and how to save on spending (EMEA)
    Sebastian Straub - Systems Engineer at N2WS; Alex Thomson - Director of Sales at N2WS Recorded: Dec 11 2018 63 mins
    In AWS, your data is your responsibility– but securing your cloud shouldn’t mean sacrificing your IT budget.

    Join our session to learn how the NEW N2WS Backup and & Recovery 2.4 empowers enterprises to satisfy data protection demands while reducing storage costs and addressing varying data backup lifecycle needs.

    You will hear more about:

    •Reducing archival costs by up to 40% and retaining data for longer with low-cost storage tiers
    •Automating processes with greater ease by leveraging the N2WS enhanced RESTful API
    •Eliminating the need for manual configuration during the recovery process with N2WS VPC Capture + Clone
    •PLUS a live Q+A …and more!


    Can’t wait to see you,
    The N2WS team
  • SD-WAN Migration Strategies for Varying Network Architectures
    SD-WAN Migration Strategies for Varying Network Architectures
    Ray Wong, Principal Systems Engineer at VeloCloud, now part of VMware Recorded: Dec 11 2018 48 mins
    In this webinar, we go a level deeper into SD-WAN Migration by focusing on its architecture and its ability to adapt to the varied network requirements of global enterprises. Topics will also include best practices and recommendations for a successful SD-WAN transformation for both regional and worldwide deployments.
  • Advanced Application Defence Against Advanced Threats
    Advanced Application Defence Against Advanced Threats
    David Warburton - Senior Threat Research Evangelist, F5 Networks Recorded: Dec 11 2018 70 mins
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organisation protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    F5 is announcing Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market. In this webinar you will learn how Advanced WAF can:

    • Provide strong, adaptable security for every app, whether on-premises or in the cloud
    • Defend web and mobile apps against malicious bots and exploits
    • Prevent account takeover and stop large scale credential theft and abuse
    • Protect apps from layer 7 denial of service attacks

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Digital transformation from industry leaders' eyes: Harvard Business Review
    Digital transformation from industry leaders' eyes: Harvard Business Review
    Marty Wesley, Portfolio Marketing Manager, Red Hat Recorded: Dec 10 2018 25 mins
    Digital transformation may be a trite catch-all phrase for customers of varying sizes and challenges, but its implications are real. In a recent Harvard Business Review report (published Aug 2018), only 13% of respondents rated their ability to confront digital transformation as very effective. The vast majority of respondents understand its implications and relate to the importance of addressing technology, process, and culture in parallel, but struggle to implement strategies to address it, with culture as the leading inhibitor.

    In this session, we’ll discuss what industry leaders consider critical digital transformation capabilities, where organizations are struggling with adoption, what success looks like, and how many organizations are measuring the efficacy of efforts.
  • AWS Cloud Backup: Why it's crucial and how to save on spending (APAC)
    AWS Cloud Backup: Why it's crucial and how to save on spending (APAC)
    Sebastian Straub - Systems Engineer at N2WS; Alex Thomson - Director of Sales at N2WS Recorded: Dec 10 2018 55 mins
    In AWS, your data is your responsibility– but securing your cloud shouldn’t mean sacrificing your IT budget.

    Join our session to learn how the NEW N2WS Backup and & Recovery 2.4 empowers enterprises to satisfy data protection demands while reducing storage costs and addressing varying data backup lifecycle needs.

    You will hear more about:

    •Reducing archival costs by up to 40% and retaining data for longer with low-cost storage tiers
    •Automating processes with greater ease by leveraging the N2WS enhanced RESTful API
    •Eliminating the need for manual configuration during the recovery process with N2WS VPC Capture + Clone
    •PLUS a live Q+A …and more!

    Can’t wait to see you,
    The N2WS team
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Recorded: Dec 10 2018 35 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • The 2019 Security Strategy from the former CSO of Facebook and Uber
    The 2019 Security Strategy from the former CSO of Facebook and Uber
    Joe Sullivan, Chief Security Officer of Cloudflare & Tim Fong, Head of Security Solutions Recorded: Dec 10 2018 42 mins
    How are you planning to secure your employees, your company, and your customers in 2019?

    Prior to joining Cloudflare as its Chief Security Officer (CSO) in 2018, Joe Sullivan spent 5+ years as CSO for Facebook and 2.5 years as CSO for Uber. He also previously held security and legal roles at PayPal and eBay and served on the Obama Administration as a member of the Commission on Enhancing National Cybersecurity.

    With over a decade of experience from some of the world’s most influential companies, Joe will share the core strategies he is taking to help protect Cloudflare and, as a result, its 12M domains who rely on its services for security and performance.


    Register now to learn:

    - Major security risks to prepare for in 2019
    - The three areas Cloudflare is using its own products to secure the company
    - The plan to improve internal discipline around “incident response”
    - The critical shift in thinking and strategy around the world becoming “borderless”
    - The “security maturity model” to evaluate and plan the security roadmap

    If you and your team are in the middle of planning how to maintain and improve your security posture for 2019, sign up to attend now. Registrants will also get a copy of the actual Security Maturity Model you can use with your own team.
  • AWS Security: Securing AWS Workloads with Palo Alto Networks
    AWS Security: Securing AWS Workloads with Palo Alto Networks
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks Dec 12 2018 9:30 am UTC 60 mins
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • Dell EMC Data Domain/DPS Webinar
    Dell EMC Data Domain/DPS Webinar
    Graeme Sutherland–Senior pre sales architect, Sal DeMasi–DPS Specialist Teknicor Dec 12 2018 2:30 pm UTC 60 mins
    Graeme Sutherland will be presenting an overview of the product and DPS as a whole and Sal DeMasi will be presenting a demonstration of key attributes of the appliance.

    There will be time at the end of the webinar for questions and also the opportunity to have a 1-1 Demonstration if you feel this will be of benefit to you.

    We hope you enjoy the webinar and if you have any questions please feel free to ask.
  • The alchemy of data
    The alchemy of data
    Chris Wigget, Director Insights and Analytics, Britehouse a division of Dimension Data Dec 12 2018 3:00 pm UTC 60 mins
    Information is the heart of the modern organisation. For many years now business intelligence has been at the forefront of taking data and attempting to turn it into actionable insights.

    The truth is that traditional business intelligence approaches are not able to provide the digital organisation with the level of insight that the modern business environment demands.

    In this talk we’ll examine how traditional business intelligence is failing the modern, agile organisation, how simply embracing ‘the next big thing’ can backfire, and why organisations find themselves in this situation.

    We’ll also show how advanced analytics can help companies escape the information swamp and start turning the data they have into the information they need.
  • Prognosis for UC Live Demo [December 2018]
    Prognosis for UC Live Demo [December 2018]
    Chuck Geisler, Senior Solutions Engineer Dec 12 2018 4:00 pm UTC 45 mins
    Join us for a live demo of Prognosis for UC, hosted by a Senior Solutions Engineer.
  • DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Dec 12 2018 4:00 pm UTC 60 mins
    Let's wrap up 2018 with a recap of last year's major events, and a forecast on what's coming next year.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Director of Prod Marketing- Cloud and Darshant Bhagat, Director of Product Management, Citrix Dec 12 2018 4:00 pm UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into:

    - Protection of applications from on-premise to the cloud
    - Hypervisor protection of servers before the threat hits the operating system
    - Device and user protection from external threats

    Learn how to proactively counter internal and external threats through analytics.
  • Architecting Streaming Analytics Apps for Rapid Business Value
    Architecting Streaming Analytics Apps for Rapid Business Value
    Sid Choudhury, VP Product, YugaByte Dec 12 2018 4:00 pm UTC 60 mins
    Real-time streaming applications are driving revenue growth in verticals such as retail, IoT, telecommunications, financial services and SaaS. However, architecting the data infrastructure that powers such applications for rapid business value remains a complex challenge.

    In this talk, we will review the key components of a streaming data pipeline and highlight the desired characteristics from each component in the context of reliability, scalability and performance.

    A real-world IoT Fleet Management application built on Confluent Kafka as the data ingestion layer, KSQL or Apache Spark as the stream processing layer, YugaByte DB as the operational data store and Spring Boot as the Analytics Dashboard framework will be used to demonstrate how the desired business goals can be achieved with ease.
  • Benefits of NVMe™ SSDs in Client Implementations
    Benefits of NVMe™ SSDs in Client Implementations
    Cameron Brett, Toshiba and Jonmichael Hands, Intel Dec 12 2018 5:00 pm UTC 60 mins
    NVM Express® over PCI Express® SSDs is the mainstream solution in the client space because it is low cost and has a smaller form factor than HDDs, while touting high performance and low power usage. Evolving to meet the needs of consumers, NVMe™ implementations touch various markets like gaming, content creation, workstations, mobile, media creation and more. Join Jonmichael Hands of Intel and Cameron Brett of Toshiba for this NVM Express, Inc. hosted webcast to learn more about real-world examples and how NVMe specifications continue to evolve to support client needs.

    In this webcast, attendees will learn more about the benefits of selecting NVMe enabled products like Intel SSDs and Toshiba SSDs. The webcast explores the client benefits that have surfaced with the different iterations of the NVMe specifications from NVMe 1.2 to NVMe 1.3 to the upcoming NVMe 1.4. Attendees will receive an in-depth overview of critical NVMe features including easier management of power/thermals, NVMe’s enablement in small form factors like M.2 and BGA, boot partitions and host controlled thermal management and namespace write protection.

    About the Presenters

    Cameron Brett is Director of Marketing, SSD and Storage Solutions, Toshiba Memory America, Inc. and a member of the NVMe Marketing Workgroup.

    Jonmichael Hands is a Product Marketing Manager at Intel and the NVMe Marketing Workgroup Co-Chair.
  • 2018: The Year in Data Security Panel Discussion
    2018: The Year in Data Security Panel Discussion
    Todd Thorsen, Sr Mgr, Security; Michelle Killian, Sr Mgr, Security Risk and Compliance; and Nathan Hunstad, Dir, Security Dec 12 2018 6:00 pm UTC 60 mins
    The data security world changes so quickly it can be hard to keep up with the latest threats to corporate data. With countless stories of breaches, phishing scams, insider threats, government whistleblowers and cyber warfare, 2018 was the year all eyes turned to security teams and their role within an organization. In this webinar, a panel of security experts will recap the year in data security, with critical lessons learned, tips for security teams, a few fun stories and more.

    Join us to hear from your security peers about what they learned in 2018 and what they expect from the year to come.
  • Best Practices for Protecting Enterprise Data
    Best Practices for Protecting Enterprise Data
    John Burke, CIO and Principal Research Analyst, Nemertes Research Dec 12 2018 6:00 pm UTC 53 mins
    Thanks to cloud computing, the proliferation of endpoints, the emergence of new technologies and paradigms like IoT and Blockchain, enterprise data protection has undergone a paradigm shift. The challenge is no longer simply to classify and lock down structured data in protected on-premise environments. Today enterprise data managers need to protect data of all sorts (structured, unstructured, ephemeral, and permanent) wherever it resides: On the cloud, in end users’ endpoint devices, and in IoT networks and analytics platforms.

    Moreover, it’s a challenge that must be addressed: effective data management is in the critical path for most, if not all, of today’s most important strategic initiatives, including Digital Transformation, Zero Trust Security, and the move towards Agile and DevOps business processes. Without solid data management and protection, all these initiatives will fail.

    This webinar draws from Nemertes’ groundbreaking research into the foundational technologies of Digital Transformation, Security, and Risk Management to deliver best practices for protecting data. Based on our unique Nemertes Maturity Model ™, we’ll show what companies are doing to protect data in current and future environments. Attendees will learn how to position themselves on the maturity model, and come away with a series of customized next for moving towards better data protection in their environments.
  • Real Life Secrets and Best Practices of Processing Real-Time Data
    Real Life Secrets and Best Practices of Processing Real-Time Data
    Darren Chinen, Senior Director Data & AI, Malwarebytes and Priya Balakrishnan, Sr. Director of Product Marketing, Redis Labs Dec 12 2018 6:00 pm UTC 56 mins
    Malwarebytes, the industry-leading anti-malware, and internet security software company, also leads in innovative threat intelligence. One such tool is the interactive remediation map, a worldwide security vulnerability.

    Join us to learn how Malwarebytes uses Redis Enterprise at the heart of their data streams to centralize and visualize data in real-time, providing global information on threats detected, how a virus is conceived and the eventual spread through the world. In this talk, Darren Chinen, Sr. Director, Data and AI at Malwarebytes, will illustrate their use of Redis Enterprise. In this webinar, you will learn to:

    - Drive analytics for heat maps and their threat intelligence tool
    - Capture global malware records and real-time streams and drive stateful transformation
    - Efficiently cache large amounts of data for interactive exploration of malware
  • Kubernetes & Conda: The Machine Learning Killer Combo
    Kubernetes & Conda: The Machine Learning Killer Combo
    Elizabeth Winkler, Director of Product Management @ Anaconda Dec 12 2018 7:00 pm UTC 30 mins
    The rush to adopt machine learning practices has become ubiquitous in every industry. Enterprise data scientists want their AI models to be deployed into production to propel their organizations forward. Meanwhile, IT is looking for ways to enable their data scientists to build, train, and deploy their models in a way that does not compromise the security of their organizations, while making efficient use of resources like costly GPU clusters.

    Anaconda, the creator of Conda, has adopted Kubernetes as the standard for building and deploying ML models at speed and scale in Anaconda Enterprise. Learn why in this presentation from Anaconda Director of Product Management Elizabeth Winkler.

    Elizabeth Winkler has devoted her career to building SaaS products that leverage natural language processing and machine learning to extract meaning out of massive amounts of data. She is currently the Director of Product Management at Anaconda, the most popular Python data science platform. Previously, she built products at Atlassian, Salesforce, Spredfast, and a medley of startups.

    Elizabeth was born and raised in Mexico City and has lived in Paris, Milan, and San Francisco before calling Austin home. She is an avid world traveler and a polyglot fluent in English, French, and Spanish and quasi-fluent in Italian.
  • Threats on the Horizon – What to Look for & How to Prepare
    Threats on the Horizon – What to Look for & How to Prepare
    Bob Rudis, Chief Data Scientist & Michelle Martinez, Senior Threat Intelligence Analyst Dec 12 2018 8:00 pm UTC 45 mins
    Wondering what the top threats are for 2019? Join Rapid7 experts for a discussion of the top threats our team is tracking for the new year. Through extensive research and the engagements of our managed detection and response team, Bob Rudis and Michelle Martinez will share their research to help you protect your organization in the new year. 



    Some of the topics our experts will cover include: 


    1. The most prevalent threats we are tracking for 2019
    2. Top cybersecurity incidents of 2018 and how we expect those to impact 2019
    3. Key takeaways to help you put our research into practice at your organization
  • Automating Apache Kafka
    Automating Apache Kafka
    Ben Slater, Chief Product Officer, Instaclustr Dec 12 2018 10:00 pm UTC 45 mins
    Instaclustr recently extended their managed service for Apache Cassandra to include support for Apache Kafka, this presentation will walk through the key challenges and lessons learned in extending Instaclustr’s provisioning and management system for Kafka.

    Specific details will include: benchmarking, choosing appropriate cloud provider configurations, and security configuration.
  • Containers: accelerating your move to a next-gen, on-demand digital data centre
    Containers: accelerating your move to a next-gen, on-demand digital data centre
    Nathan Vandenberg, General Manager – Data Centre, Dimension Data & Sean Bedford, Cloud Engineer, Google Dec 12 2018 11:00 pm UTC 60 mins
    Your enterprise is on a journey to become an on-demand digital business. Your data centre must be able to adapt and scale to achieve your desired digital outcomes. Emerging technology such as containers can unlock a myriad of operational and cost benefits to accelerate your move to a next-generation data centre.

    A 451 Research report commissioned by Dimension Data* found that 52% of enterprises are using container technology to transform that way work is done in their data centre.

    Containers solve the problem of portability and getting software to operate reliably when moved from one computing environment to another. In a next-generation data centre, containers achieve benefits including automation of workload provisioning, ability to scale and orchestration across technology.

    Join Dimension Data and Google on this webinar to find out how your business can take advantage of the opportunities presented by containers. We’ll discuss how containers work, the difference between virtualisation and containers, existing barriers in this space, how you can extend containers to the cloud and the benefits for your business.
  • Cisco Unified Communications Troubleshooting December 2018
    Cisco Unified Communications Troubleshooting December 2018
    Senior solutions Engineer APAC, Africa, Middle East Dec 13 2018 6:00 am UTC 45 mins
    Join our APAC Cisco Unified Communications webinar, hosted by an IR Solutions Engineer with live Q&A.
  • Lightboard Lessons: Introducing the F5 Advanced WAF
    Lightboard Lessons: Introducing the F5 Advanced WAF
    John Wagnon - Senior Solution Developer - DevCentral, F5 Networks Dec 13 2018 9:00 am UTC 70 mins
    The F5 Advanced Web Application Firewall (WAF) provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. In this video, John outlines many of the exciting features offered in the F5 Advanced WAF.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Dec 13 2018 10:00 am UTC 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • ¿Por qué deberías pensar en un data lake virtual?
    ¿Por qué deberías pensar en un data lake virtual?
    Anastasio Molano, Senior VP. Denodo Dec 13 2018 10:00 am UTC 75 mins
    ¿Qué es un data lake virtual y qué ventajas ofrece a los usuarios de negocio y a los data scientists?

    Las arquitecturas lógicas (basadas en la conexión a los repositorios de información y no en la replicación masiva de datos), son la evolución natural del ecosistema analítico moderno, según los principales analistas de la industria.

    En este webinar presentamos el concepto del data lake virtual, una arquitectura lógica en la que el data lake tradicional expande sus capacidades al funcionar en conjunto con una capa de abstracción basada en virtualización de datos.

    El data lake virtual aporta flexibilidad, acelera los proyectos de Big Data en la organización y mejora la gobernanza de datos. Además, puede ser utilizado por más variedad de usuarios y no solo los científicos de datos.

    Descubre cómo convertir un data lake en el sistema de provisión del dato y maximizar los beneficios para toda la empresa.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Dec 13 2018 10:00 am UTC 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Marketplace & Data Virtualization: révolutionnez accès & gestion de vos données
    Marketplace & Data Virtualization: révolutionnez accès & gestion de vos données
    Sihem Merah, Ingénieure avant-vente, Denodo Dec 13 2018 10:00 am UTC 60 mins
    Avec les volumes énormes de données brassés par les entreprises aujourd’hui et la multiplicité des sources de données, comment savoir quelles données sont disponibles pour l’analyse ? Comment puis-je y accéder ? La donnée est-elle de qualité et la plus pertinente ?

    Pour répondre à ces questions, une solution : mettre en place une Data Services Marketplace, un lieu unique où utilisateurs métier comme développeurs peuvent rechercher et accéder aux données mises à leur disposition en tant que service. Les bénéfices sont multiples : meilleure agilité, data intégration et quality.

    Dans ce webinar, nous vous expliquerons pourquoi et comment, à l’instar de clients comme Anadarko et Guardian Life, votre entreprise peut la mettre en place et en bénéficier.

    Les points clés abordés :

    - Qu’est-ce qu’une data marketplace. Les bénéfices à la loupe.

    - La Data Virtualization comme fondement de la data marketplace: comment elle assure la connectivité à vos sources de données, l’abstraction et la modélisation de vue métier

    - Les points d’attention : sécurité et confidentialité, performance et qualité, data gouvernance

    - Cas clients : Anadarko (compagnie pétrolière américaine) et Guardian Life (4ème plus grosse mutuelle de santé américaine). Comment ils ont créé leurs data services marketplaces en utilisant la data virtualization

    - Démo : Comme dans Google ou Amazon, recherchez, explorez, validez et requêtez les jeux de données disponibles dans votre entreprise, tout en respectant la sécurité
  • Zscaler's wealth of capabilities
    Zscaler's wealth of capabilities
    Yogi Chandiramani Dec 13 2018 10:00 am UTC 60 mins
    Zscaler constantly innovates its offering and capabilities with the objective to provide best security protection and user experience. Zscaler 5.6 was released in October 2018 and brings a wealth of new capabilities. During this session, you will learn how to best leverage the investment you have made int he Zscaler platform. Our experts will be covering all new security features such as Company Risk Score, Threat Insights Plugin, Threat Library, SCIM authentication and many more.
  • Trends in 2019: Using AI and IoT to Make the World a Better Place
    Trends in 2019: Using AI and IoT to Make the World a Better Place
    Wael Elrifai, VP for Solution Engineering, Hitachi Vantara Dec 13 2018 4:00 pm UTC 60 mins
    Wael Elrifai, co-author of the book, “The Future of IoT”, shares his experience of recent changes in IoT technology, new terminology, and the complex challenges of scaling from sensor technologies to whole smart cities. Wael also explains how his passion for sustainable development and innovation come together to achieve good.
  • Next-Generation Security: Containers
    Next-Generation Security: Containers
    Johna Till Johnson Dec 13 2018 4:00 pm UTC 60 mins
    Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development.

    But are they taking the right steps to secure those containers?

    This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in launching their container security initiatives.