Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Enabling Event-Driven Microservices
    Enabling Event-Driven Microservices Jonathan Schabowsky Recorded: Jul 27 2017 9 mins
    Microservices are an incredible tool for modern solutions, especially when paired to today's cloud choices. Come watch this episode of Solace Sayss to learn more about the choices and challenges for microservice architectures
  • General Dynamics IT: 6 Steps to Implementing a Successful CX Program
    General Dynamics IT: 6 Steps to Implementing a Successful CX Program Tish Falco, Sr. Director, Customer Experience - General Dynamics IT Recorded: Jul 27 2017 37 mins
    As technology rapidly evolves, customers expect superior service, intuitive interactions with organizations and access to services in a way they prefer – at a time they are available and in a manner that fits their individual needs. More and more, organizations are adopting Customer Experience (CX) as a strategic initiative to better understand and deliver for their customers. Join us to learn how to successfully implement a customer experience program that will deliver an easy, effective and consistent experience for your customers and increase adoption internally.
  • Beginner's Guide to Public Sector Cloud Infrastructure
    Beginner's Guide to Public Sector Cloud Infrastructure Todd Bernhard, CloudCheckr Product Marketing Manager & Jonathan Morse, State Local Higher Education Account Executive Recorded: Jul 27 2017 63 mins
    Migrating to the cloud poses challenges for any organization, but there are particular concerns for the public sector. Government regulations like FedRAMP and the upcoming DFARS must be met, but security in the cloud is different than in the data center. Cloud providers use a Shared Responsibility Model, where they secure the physical infrastructure and the rest is up to the customer. In the public sector, budgets have to be justified... and used, at the risk of decreasing in the next year. Given the potential for Cloud Sprawl, without a Cloud Management Platform, expenses can get out of control.

    This webinar serves as a guide for public sector organizations looking to embrace the cloud. We will discuss the specific requirements of public sector organizations and explain the choices that will need to be made during such a migration. Topics covered include:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?
  • Built-in Guidance: Optimizing Public Cloud Costs
    Built-in Guidance: Optimizing Public Cloud Costs Tricia Pattee, VP of Product, HOSTING and Mike McCracken, VP of Advanced Solutions, HOSTING Recorded: Jul 27 2017 49 mins
    To take full advantage of platforms such as AWS or Azure, organizations need to be able to manage cost, compliance, security, policies, and overall visibility. Many are finding that this is a lot to tackle on their own.

    Join Tricia Pattee, Vice President of Product, and Mike McCracken Vice President of Advanced Solutions for this interactive seminar where they will discuss HOSTING’s built-in optimization solutions that prevent wasted spend and help maximize the move to public cloud.

    During the webinar, they will cover the following topics:

    - Understanding various clouds and discount options
    - Uncovering wasteful cloud spending (i.e. under-utilization)
    - AWS Reserved Instance savings
    - Leveraging built-in cloud services
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Recorded: Jul 27 2017 41 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Recorded: Jul 27 2017 19 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • Containers and Persistent Memory
    Containers and Persistent Memory Arthur Sainio, SNIA NVDIMM SIG Co-chair, SMART Modular, Chad Thibodeau, Veritas, Alex McDonald, NetApp Recorded: Jul 27 2017 55 mins
    Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.

    You’ll learn:
    •What SNIA is doing to advance persistent memory
    •What the ecosystem enablement efforts are around persistent memory solutions
    •How NVDIMMs are paving the way for plug-n-play adoption into containers environments

    Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
  • Running Spark on Kubernetes
    Running Spark on Kubernetes Eddie Esquivel, Solutions Engineer Recorded: Jul 27 2017 24 mins
    Apache Spark has established itself as a powerful distributed compute framework. Capable of performing SQL, machine learning, streaming analytics and batch processing all via a unified API. At the same time Kubernetes is gaining traction as an efficient way to manage and orchestrate containers for stand alone applications and more complicated distributed applications like Apache Spark.

    In this webinar we'll go through spinning up an Apache Spark cluster on Kubernetes and analyzing various patterns to interact with the Apache Spark cluster. We'll also discuss work that is happening in the open source community to make Apache Spark on Kubernetes a first class citizen.
  • Lenovo and Intel discuss how to make your data center more efficient
    Lenovo and Intel discuss how to make your data center more efficient Jeff Klaus General Manager, Intel Data Center Solutions - Chuck Weber Product Manager, Lenovo Enterprise Business Group Recorded: Jul 27 2017 57 mins
    Lenovo XClarityTM Energy Manager helps you reduce the cost of powering your data center. XClarity Energy Manager is an easy to use application that analyzes and controls power consumption and temperature for groups of servers. By analyzing power and temperature data, XClarity Energy Manager helps data center administrators establish policy-based control over data center energy optimization goals which can improve business continuity and energy efficiency. Join us to see how this this application improves operation processes by:

    •Monitoring energy consumption, estimating the power demand, and reallocating power to servers as needed.
    •Monitoring the temperature and cooling capacity of servers and datacenter spaces.
    •Sending notifications when certain events occur or when thresholds are exceeded.
    •Limiting the amount of energy that an endpoint or a group consumes using policies.
    •Optimizing energy efficiency by monitoring real-time inlet temperatures, identifying low-usage servers based on out-of-band power data, measuring power ranges for different server models, and evaluating how servers accommodate new workloads based on the availability of resources.
    •Reducing the power consumption to a minimum level to prolong service time during an emergency power event (such as a data-center power failure).

    Presenters
    Jeff Klaus
    General Manager, Intel Data Center Solutions
    Chuck Weber
    Product Manager, Lenovo Data Center Group
    George Clement
    Senior Application Engineer, Intel Data Center Solutions
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Recorded: Jul 27 2017 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 27 2017 61 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jul 27 2017 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • Deploying Cloud onRamp for AWS, Azure, and Office365
    Deploying Cloud onRamp for AWS, Azure, and Office365 David Klebanov, Director of Technical Marketing, Viptela Recorded: Jul 27 2017 38 mins
    Cloud transformation has been a top priority for enterprises, but the adoption is plagued with complex workflows and poor user experience. Even though enterprises onboard AWS or Azure, the workflows to establish connectivity, security and segmentation across VPC (and VNET) are fairly complex. On the other hand, for SaaS, the issue is primarily around user experience. Enterprises deploying Office365 are realizing that performance with Skype for Business and Sharepoint is not reliable. In this webinar we will take a further look at the wide-ranging capabilities the Viptela Cloud onRamp solution offers, and deploying it for AWS, Azure, and Office365.
  • Defining Enterprise Cloud Data Management for a hybrid world
    Defining Enterprise Cloud Data Management for a hybrid world James Humphrey, National Instruments and Forbes Analyst Joe McKendrick Recorded: Jul 27 2017 61 mins
    Is your company on a data-driven digital transformation journey?
    With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
    Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.

    In this webinar, you will learn:
    - Current digital transformation market trends driving the influence of cloud.
    - Role of hybrid data management
    - How National Instruments is growing at scale and reducing time to market for their products and services
    - How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Recorded: Jul 27 2017 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • CDCP (Certified Data Centre Professional) Course Sneak Peek
    CDCP (Certified Data Centre Professional) Course Sneak Peek Marco van Gink Recorded: Jul 27 2017 48 mins
    Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
  • How to Effortlessly Manage Tasks & Project Management Software Like a Pro
    How to Effortlessly Manage Tasks & Project Management Software Like a Pro Dale Howard, Director of Technical Solutions, Sensei Project Solutions Recorded: Jul 26 2017 68 mins
    Task Types and Effort Driven can be two of the most confusing features of Microsoft Project, both to novice users and to experienced users alike. For example, have you ever changed one number in Microsoft Project, and then the software changed another number in response, and you don’t know why?

    Guest expert Dale Howard will unlock the mysteries of Task Types and Effort Driven behavior in Microsoft Project, showing you how their behavior is logical, predictable, and meaningful.

    Join this webcast to:
    - Eliminate the confusion around these two Microsoft Project features
    - Harness the power of Task Types in your own projects
    - See how Effort Driven task statuses interact with each Task Type
  • Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps
    Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps Kamala Dasika, Pivotal and Roshan Kumar, Redis Labs Recorded: Jul 26 2017 43 mins
    As demands on your cloud-native applications rapidly change, how can you ensure that your database is responsive and highly available? The truth is that modern applications are usually still supported by monolithic shared databases and traditional operational practices. Pivotal and Redis Labs are collaborating to bring developers more agility and autonomy with a highly available, scalable, and high performance Redis database service for their cloud-native applications.

    Join Roshan Kumar from Redis Labs and Kamala Dasika from Pivotal as they discuss:

    - How Redis Labs supports real-time use cases for the modern enterprise
    - How Redis Enterprise provides seamless high availability and disaster recovery for Redis applications
    - How full life cycle management of your apps and Redis Enterprise via Pivotal Cloud Foundry enables dynamic scale, high performance and uptime
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Recorded: Jul 26 2017 58 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • The Showdown for Data Preservation: Iron Mountain vs. The Cloud
    The Showdown for Data Preservation: Iron Mountain vs. The Cloud Storage Switzerland, CloudLanes Recorded: Jul 26 2017 59 mins
    Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Recorded: Jul 26 2017 28 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • Webinar: MDM – From Master Data to Data Mastery
    Webinar: MDM – From Master Data to Data Mastery Featuring Guest Speaker Michele Goetz, Principal Analyst at Forrester Research Recorded: Jul 26 2017 49 mins
    To achieve digital transformation means businesses need to be data driven, insight rich, and intelligently powered. Companies that strategically invested in MDM consistently out perform both digital and non digitally focused organizations. Why? Because MDM brings understanding to the data across a complex hybrid ecosystem of data silos and platforms allowing digital enterprises to gather, orchestrate and syndicate data and insights anywhere at any time. The best practices, skills and technologies needed to power master data, are the foundational skills to scale the broader investment in information and analytic architecture. Michele Goetz, Principal Analyst at Forrester Research, will share how digital transformation is shaping MDM and how businesses are rethinking their MDM strategies for competitive advantage.

    • How MDM is at the center of driving stronger business outcomes
    • How MDM competencies lay the foundation for data mastery and deeper insight
    • How MDM technology is evolving to meet the new digital age and how to select your MDM capabilities
  • Practical Guide to Cloud Management Platforms
    Practical Guide to Cloud Management Platforms Cloud Standards Customer Council Recorded: Jul 26 2017 60 mins
    Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.

    This webinar will cover:

    •A review of CMP capabilities
    •How to operate and manage applications and data across hybrid cloud infrastructures
    •Available CMPs on the market today
    •Evaluation criteria for selecting a CMP to meet your needs
    •Deployment considerations
  • Nowości w Avamar 7.5
    Nowości w Avamar 7.5 Daniel Olkowski, Dell EMC Jul 28 2017 8:00 am UTC 75 mins
    2 tygodnie temu została ogłoszona najnowsza wersja Avamar 7.5.

    Zapraszam na krótką, 30 minutową sesję, w trakcie, której porozmawiamy o najważniejszych nowościach w Avamar 7.5.

    Avamar to oprogramowanie które świetnie się sprawdza w backupie:
    •Wirtualizacji (VMware, HyperV, OpenStack, …)
    •Baz danych (SQL, Oracle, …)
    •Systemów plików
    •Laptopów
    •Filer’ów (NetApp, Dell EMC, Oracle, …)
    •Zewnętrznej chmury
    •Środowisk mieszanych
    zapewniając disaster recovery, pełną automatyzację i prostą obsługę.

    Avamar 7.5 dostarcza nowych funkcjonalności w każdymn z powyższych obszarów.
    Zapraszam na poranną kawę w trakcie, której dowiesz się i porozmawiasz o wszystkich nowościach.
    Nie zabraknie demo!

    Piątek, 28 lipca, 10:00, 30 minut

    Zapraszam,
    Daniel Olowski
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • Web App Attacks: Stories from the SOC
    Web App Attacks: Stories from the SOC Paul Fletcher, Cyber Security Evangelist at Alert Logic Aug 1 2017 4:00 pm UTC 60 mins
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Aug 1 2017 4:00 pm UTC 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.

    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?

    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Aug 1 2017 5:00 pm UTC 45 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Everything You Wanted To Know About Storage-Turquoise: Where Does My Data Go
    Everything You Wanted To Know About Storage-Turquoise: Where Does My Data Go Rob Peglar, Symbolic IO, Scott Shadley, Micron, J Metz, Cisco, Chad Hintz, Cisco Aug 1 2017 5:00 pm UTC 75 mins
    In this, the seventh entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into the mysticism and magic of what happens when you send your data off into the wilderness. Once you click “save,” for example, where does it actually go?

    When we start to dig deeper beyond the application layer, we often don’t understand what happens behind the scenes. It’s important to understand multiple aspects of the type of storage our data goes to along with their associated benefits and drawbacks as well as some of the protocols used to transport it.

    In this webcast we will show you more about the following:

    •Volatile v Non-Volatile v Persistent Memory
    •NVDIMM v RAM v DRAM v SLC v MLC v TLC v NAND v 3D NAND v Flash v SSDs v NVMe
    •NVMe (the protocol)

    Many people get nervous when they see that many acronyms, but all too often they come up in conversation, and you’re expected to know all of them? Worse, you’re expected to know the differences between them, and the consequences of using them? Even worse, you’re expected to know what happens when you use the wrong one?

    We’re here to help.

    It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.

    Please join us on August 1st for another edition of the “Too Proud To Ask” series, as we work towards making you feel more comfortable in the strange, mystical world of storage.
  • Integrating Business Solutions for Always-on IT Security
    Integrating Business Solutions for Always-on IT Security Gabe Long, Sr Product Marketing Manager, Microsoft Aug 1 2017 6:00 pm UTC 60 mins
    In the age of cybercrime, threats, and breaches, it's more important than ever to secure your IT operations, devices, and infrastructure through an integrated approach.

    Now, for the first time ever, Microsoft is offering an integrated solution for your business that helps you achieve more together, anywhere it matters, with always-on security.

    In this webcast, you will:
    - Discover an integrated solution powered by Office 365 and Windows 10, designed for small and mid-size businesses.
    - Learn how you can connect with your remote coworkers and work on a document in real-time using Word, Outlook, OneDrive, and Skype for Business.
    - See how inking in Windows 10 enables you to take notes with OneNote.
    - Learn how you can easily set-up policies to protect company data across devices with Microsoft 365 Business.
  • Cloud Security Skillsets
    Cloud Security Skillsets TBD Aug 1 2017 6:00 pm UTC 60 mins
    Learn what skills are needed in today's world of Cloud Computing. The techniques used in the traditional datacenter aren't necessarily applicable to the Cloud. In this webinar, attendees will learn:

    - Differences between datacenter and cloud computing
    - The Shared Responsibility Model
    - Common mistakes
    - Helpful tools
  • Securing Critical Infrastructure with Advanced Cybersecurity Controls
    Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Aug 1 2017 6:00 pm UTC 45 mins
    The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

    Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

    In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.
  • Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality
    Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality Naveen Mishra, Ajay Sunder, Frost & Sullivan Aug 2 2017 7:00 am UTC 60 mins
    The need to embrace digital transformation in all possible scenarios is paramount to bring efficiencies and improve current business processes. The challenges of real-time data processing, high network speeds and latency can be overcome by using ICT technologies, i.e., Mobile Edge Computing/Fog Computing. These computing technologies bring compute and storage capabilities to the edge of the network and enable real-time and context-based business applications. All industry verticals can find relevant application areas that can benefit from computing at the edge of the network.
  • Combating Data Breaches: Proactive Defence during a Digital Transformation
    Combating Data Breaches: Proactive Defence during a Digital Transformation Ian Greenwood, Regional Sales Manager and Mark Penny, PKI Security Consultant, Professional Services EMEA, Thales e-Security Aug 2 2017 11:30 am UTC 60 mins
    Combating Data Breaches: Proactive Defence during a Digital Transformation
    Join Herjavec Group and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.
    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.
    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    Topics covered during the webinar:

     Complex and sophisticated data threat landscape

     GDPR at a glance

     Digital transformation ambitions and challenges

     Why adopt a data encryption strategy?

     Focus on how encryption and key management solutions can help you comply, secure and keep control of your data

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys Aug 2 2017 3:00 pm UTC 60 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
  • Webinar: Product Content Drives Brand Loyalty
    Webinar: Product Content Drives Brand Loyalty Featuring Guest Speaker George Lawrie, Vice President, Principal Analyst, Forrester Research Aug 2 2017 4:00 pm UTC 60 mins
    Retailers and brands today face more challenges than ever before in terms of collecting, normalizing, editing and syndicating consistent product content across channels and partners. The penalties for inaccurate or inconsistent content are severe.

    The webinar will discuss best practices for using connectors to deliver product content consistency across a network of partners and to drive customer satisfaction and long term profitability. We will examine some of the challenges of synchronizing content with partners and at the connectors from GS1 to product data feeds that help ensure a consistent rich experience for customers across channels.
  • Speed up your software development lifecycle using Kubernetes
    Speed up your software development lifecycle using Kubernetes Marco Ceppi, Product Strategy at Canonical and Luke Marsden, Head of Developer Experience at Weaveworks Aug 2 2017 4:00 pm UTC 60 mins
    For a complete cloud native application lifecycle Kubernetes needs some tools to "close the loop". The promise of the new way of doing things, is that you'll speed up your software delivery with microservices and devops teams. But how should you really do that?

    Join this webinar to discover:

    * Why you should try the Canonical Distribution of Kubernetes container solution and how to install it.
    * How to deploy, troubleshoot and manage your application using Weave Cloud
    Prometheus monitoring.
    * What is Prometheus monitoring, how it works, how to instrument your application using it and how you can get the most out of it.
    * How to speed up your software development lifecycle - ship features faster, fix problems faster.

    The webinar includes live demo’s and Q&A.
  • Why the Web Apps You're Worried About Least Could Be Your Most Critical Exposure
    Why the Web Apps You're Worried About Least Could Be Your Most Critical Exposure Misha Govshteyn, Founder and SVP Products at Alert Logic; Allison Armstrong, VP Product Marketing at Alert Logic Aug 2 2017 5:00 pm UTC 60 mins
    What’s the best way to breach your most critical cloud workloads? Compromise your least critical web applications while no one is watching.

    Join Alert Logic’s Founder and SVP of Products, Misha Govshteyn, as he shares what’s behind the rise in web app driven breaches and how Alert Logic’s managed security solutions help organizations focus on reducing their ever-changing attack surface.

    Hold your spot for this webinar and learn about:
    • Why bad actors are using your web apps for malicious gains
    • Better assessing your cloud attack surface and where to focus when developing and deploying web apps in the cloud
    • Using supervised machine learning to detect the most prolific and damaging attacks
    • Why full-stack security is critical to your cloud security strategy

    Register now to learn more.
  • Five Pitfalls When Operationalizing Data Science and a Strategy for Success
    Five Pitfalls When Operationalizing Data Science and a Strategy for Success Guest Speaker Mike Gualtieri, Forrester, Dormain Drewitz and Jeff Kelly, Pivotal Aug 2 2017 6:00 pm UTC 60 mins
    Enterprise executives and IT teams alike know that data science is not optional, but struggle to benefit from it because the process takes too long and operationalizing models in applications can be hairy.

    Join guest speaker, Forrester Research’s Mike Gualtieri and Pivotal’s Jeff Kelly and Dormain Drewitz for an interactive discussion about operationalizing data science in your business. In this webinar, the first of a two-part series, you will learn:

    - The essential value of data science and the concept of perishable insights.
    - Five common pitfalls of data science teams.
    - How to dramatically increase the productivity of data scientists.
    - The smooth hand-off steps required to operationalize data science models in enterprise applications.
  • Marrying IT with Education: Smart Learning in the Digital Age
    Marrying IT with Education: Smart Learning in the Digital Age Dominique Dennihy-Bailey, Lead Trainer, BrainStorm, Inc. Aug 2 2017 6:00 pm UTC 60 mins
    It's 2017 - technology is no longer just for IT teams and tech companies. We've already begun to see technology advancements in the classroom, medical facilities, transportation, and more.

    When it comes to preparing for the future and educating today's youth, learning success starts with equipping your faculty and staff with tools that facilitate planning.

    Year end is an opportunity to consolidate learning, build skills, and plan for what's next. Rediscover the tools that will allow your institution and students to be more successful and effective in how they work.

    Join this webcast to learn how you can:
    - Empower your faculty and staff with the technology they need
    - Leverage the tools that will empower your school and students
    - Utilize Office 365 to drive learning outcomes
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Windows 10: How to Protect your Data and Manage Compliance
    Windows 10: How to Protect your Data and Manage Compliance Ryan Sanders, Sales and Product Enablement Specialist & Daniel Reppmann, Director of Sales for Central and Eastern Europe Aug 2 2017 6:00 pm UTC 60 mins
    As we move closer to a Windows 10 world, businesses need to secure their data without slowing down their IT staff or employees. Forward-thinking businesses are realizing the security and productivity benefits of migrating to Windows 10 as drastic improvements to BitLocker Drive Encryption have made it a viable option for data protection and compliance.

    WinMagic's Director of Sales for Central and Eastern Europe, Daniel Reppmann, and Sales and Product Enablement Specialist, and Ryan Sanders discuss how to improve security without compromising mobility and productivity using BitLocker and SecureDoc - Together.

    Key Learnings:

    ·Learn the security advantages of Windows 10 and BitLocker Drive Encryption
    ·Understand potential security gaps and roadblocks to productivity
    ·Discover 5 ways that you can leverage the best of BitLocker with SecureDoc
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Eddie Esquivel, Solutions Engineer Aug 2 2017 8:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Technical Deep Dive: Modernizing Your Next-Gen IT Operations
    Technical Deep Dive: Modernizing Your Next-Gen IT Operations Grant Fenn, CEO, Downer Group & Matt Furse & Fai Lai, Digital Experts, Microsoft Aug 2 2017 11:00 pm UTC 39 mins
    Gain industry insights on harnessing Digital Transformation to drive the next generation of operational capabilities.

    Implementing a digital transformation strategy that can encompass platforms, systems, integrations and needs across organizations is vital. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations, including how to build a cloud architecture to support data, analytics and digital transformation from end to end.