Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Briefings Part 2 - How Government Agencies Can Harness the power of A. I.
    Briefings Part 2 - How Government Agencies Can Harness the power of A. I. Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 39 mins
    With the eruption of connected devices and the Internet of Things, cybersecurity professionals have a lot on their plates. More connected devices equates to more traffic, more attack routes, more attempts at cybersecurity breaches, and a lot more data that needs to be analyzed. As the volume of intrusions and breaches multiple, Artificial Intelligence (A.I.) may be able to provide a tool to gain defensive advantage for government agencies. Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government as they discuss how to leverage these collaborative and cognitive solutions to help prevent, detect, and respond to today’s cybersecurity threats impacting your agency.
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack
    Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 41 mins
    A recent research study conducted by Meritalk on the use of Artificial Intelligence (A.I.) asked federal cybersecurity professionals to share their views on the use of AI to enhance a cybersecurity analyst’s ability to identify and understand sophisticated threats, by tapping into unstructured data and correlating it with local cybersecurity offenses. What are the cybersecurity implications within the Federal Government for the rise of A.I.? What role can A.I. play in incident response? Can it help prepare agencies for real-world cyber attack scenarios? Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government for an examination of the recent study and results.
  • Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN
    Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN Stein Ericsson, Manager, Global Network Operations at Freeport-McMoRan and Rachna Srivastava, Sr. Director Product Marketing Recorded: Nov 17 2017 41 mins
    Freeport-McMoRan faced immense connectivity and bandwidth issues in its copper mines located in remote locations. Moreover, this S&P 500 company was also looking to revolutionize their IT infrastructure by bringing secure access to cloud-based applications on Microsoft Azure.

    Join this webinar to hear directly from the experts at Freeport-McMoRan on how it leveraged VeloCloud SD-WAN to greatly improve user experience with assured Application Performance and simplified access to Microsoft Azure.

    Attend this webinar to learn:
    - How Freeport-McMoRan quadrupled its bandwidth to support terabyte-sized file transmissions
    - Dramatically improved the network user-experience with VeloCloud SD-WAN
    - How legacy issues, such as non-performing circuits, can easily be fixed and optimized with VeloCloud SD-WAN
    - How Virtual VeloCloud Edge can easily run on Microsoft Azure to optimize access to cloud applications
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Software Defined Technologies: Building tomorrow’s digital infrastructure
    Software Defined Technologies: Building tomorrow’s digital infrastructure Phil Lees, Chief Technical Officer, WhiteSpider Recorded: Nov 17 2017 49 mins
    To create greater competitive advantage and better customer experience, organisations need to build their digital capabilities with innovative solutions and initiatives.

    WhiteSpider is an expert in Software Defined Technologies - the building blocks of a digital infrastructure - and one of Cisco's leading partners in designing and delivering Application Centric Infrastructure

    In this webinar we will be looking at how Software Defined Technologies are supporting organisations as they create digital capabilities through:

    1. Enabling Scalability and Agility: Be able to rapidly scale, and react quickly to the changes in business requirements.
    2. Delivering intelligence: Detailed, predictive and actionable analytics
    3. Developing automation: Solutions that enable orchestration and automation reducing the need for, and cost of, human intervention.
    4. Promoting collaboration: Simplifying and unifying the communication between IT and Business.

    We will be looking at specific examples of where WhiteSpider has enabled these capabilities through solutions we have delivered in Motor Racing, Healthcare and Manufacturing.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Differentiate Fintech Services with Microservices
    Differentiate Fintech Services with Microservices Eric Greenfeder, Chief Architect, Primitive Logic Recorded: Nov 16 2017 53 mins
    This topic will focus on how small and mid-sized banks can focus on owning and managing key customer touch points in an efficient manner using a microservices pattern. It will demonstrate how to leverage 3rd party commodity services without being locked into a vendor’s platform.
  • Datavail Accelerates AWS Adoption for Sony DADC New Media Solutions
    Datavail Accelerates AWS Adoption for Sony DADC New Media Solutions Sivakumar Thangavelu, Senior SQL Server DBA, Datavail Bill Timm, Solutions Architect, AWS Blaine Baker, Manager, Application Recorded: Nov 16 2017 53 mins
    Customers seeking to move their Microsoft SQL Server databases to the Amazon Elastic Compute Cloud (Amazon EC2) environment rely on Datavail for solutions that include remote database migration, administration, support, maintenance, and management services. Among the challenges customers face when transitioning their SQL Servers to Amazon Web Services (AWS) are concerns about lack of control, understanding the risks involved, and security and compliance. Customers choose to operate SQL on EC2 because they can manage their own database support for all maintenance areas. It is also customizable, meets high performance needs for replication and discovery, and is highly available. They work with Datavail because their monitoring, measurement, and support services are always available.

    Sony DADC New Media Solutions, a large digital media company, discovered they could migrate their SQL Servers to AWS and run them using an Amazon EC2 solution allowed them to replicate their SQL Server environments in multiple AWS Availability Zones (AZ), meaning that if a node failed in one AZ, it could be replicated in another to ensure almost no downtime and improved performance.

    Join us to Learn:

    Best practices for providing highly available database solutions using EC2 on AWS

    Gain insight into scenarios which migrating SQL Servers to AWS and using EC2 is the recommended course of action

    How Sony DADC New Media Solutions reduced their Storage dependency by migrating to AWS using solutions and architecture from Datavail
  • Post-Soviet Bank Heists: A Hybrid Cybercrime Study
    Post-Soviet Bank Heists: A Hybrid Cybercrime Study Abdullah Sheikh, AD, Customer Solutions, Singtel & Thanassis Diogos, Incident Response Team Leader, Trustwave SpiderLabs Recorded: Nov 16 2017 59 mins
    Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.

    The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • The Breakthrough of Container Adoption & Persistent Storage in the Cloud
    The Breakthrough of Container Adoption & Persistent Storage in the Cloud Martin Buhr, Google and Ashok Rajagopalan, Datera Recorded: Nov 16 2017 44 mins
    Join Google and Datera to learn how you can reap the benefits of the cloud without losing performance as Containers become the new paradigm using Datera Elastic Fabric Storage System and Kubernetes for Container Orchestration.

    Containers are rapidly maturing. As container adoption continues to grow beyond stateless applications to stateful workloads such as MySQL, Kafka, Cassandra, and Couchbase, the need for persistent storage is foundational. To make business workloads adoption grow on container platforms, it is imperative to simplify persistent storage provisioning and consumption.

    In this webinar, Google Product Manager, Strategic Initiatives, Google Cloud Platform Martin Buhr joins Datera’s Head of Product Ashok Rajagopalan to discuss:

    - How stateful applications can be automated to scale
    - New storage solutions and deployment models that provide agility, and
    - Flexibility - the benefits of deploying and using persistent storage
  • Why you need to stop copying data forever.
    Why you need to stop copying data forever. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Nov 16 2017 56 mins
    Whether you keep your enterprise data in the cloud, on-prem or in a hybrid environment, chances are, you’re making more copies than you’d like to.
    Of course, you must meet data protection requirements. Unfortunately, what sounds like a two-step process – store the data and back it up – often multiplies into many more steps with many more copies. And every time you duplicate your data, you increase your costs.

    In this webcast, we’ll look at why this is and what your options are to stop copying data and start accessing it.
  • Key Vendors for Managing $40+ Billion in SaaS Costs
    Key Vendors for Managing $40+ Billion in SaaS Costs Hyoun Park Recorded: Nov 16 2017 32 mins
    Recommended audience: CIO, CFO, Chief Procurement Officers, Finance Directors and Managers, Controllers, IT Procurement, Procurement Directors and Managers, Sales and Marketing Operations Directors and Managers

    In this webinar, Amalgam introduces a new set of solutions focused on enterprise SaaS expense management, a $40 billion+ global market that is largely unmanaged at this point.

    Amalgam estimates that less than 5% of SaaS spend is currently centrally managed. The other 95% is hiding in expense reports and one-off accounts that escape corporate control. No rules, no buik discounts, no disputes, no contract enforcement or negotiations.

    Stop the insanity! Learn which vendors to consider to manage an expense that may now represent $5,000 or more per employee in your organization.
  • Security Checklist for Data Migration from On-prem to AWS
    Security Checklist for Data Migration from On-prem to AWS Mike Schuricht, VP Product Management, Bitglass Recorded: Nov 16 2017 42 mins
    Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical data and workloads. Services like S3 and RDS, for example, store massive volumes of sensitive data that enterprises must protect.

    In this webinar, we explore key security issues faced by enterprises during data migration from on-prem to AWS, how cloud access security brokers (CASBs) are evolving to protect IaaS with granular access controls, real-time-DLP, encryption/tokenization, and more. Learn how a CASB can help enterprises achieve compliance and protect data across apps deployed in AWS.
  • Unified Data Management: The Best of Data Lakes, Data Warehouses and Streaming
    Unified Data Management: The Best of Data Lakes, Data Warehouses and Streaming Jason Pohl, Software Engineer at Databricks, and Bharath Gowda, VP of Product Marketing at Databricks Recorded: Nov 16 2017 61 mins
    Current data management architectures are a complex combination of siloed, single-purpose tools. There are data lakes for low cost storage, but are difficult to use for data discovery, data warehouses that are reliable and optimized for fast queries, but come at a cost when having to scale, and various streaming and batch systems to shuffle data between them, often times resulting in data integrity issues.

    Businesses have to create a patchwork of different tools, skillsets, and expertise just to solve one fundamental problem: How can I make data-driven decisions faster?

    Join this webinar to learn how Databricks Delta — a new unified data management system — takes advantage of the the scale of a data lake, the reliability and performance of a data warehouse, and the low-latency updates of a streaming system, all in a unified and fully managed fashion.

    This webinar will cover:
    -How the need to process batch and streaming data creates challenges for enterprises with complex data architectures.
    -How Databricks Delta takes the best of data warehouses, data lakes and streaming systems to provide a highly scalable, performant, and reliable data management system.
    -A live demonstration of Databricks Delta to showcase how easy it is to cost-efficiently scale without impacting query performance.
  • Microservices AMA: Load Balancing and Service Discovery
    Microservices AMA: Load Balancing and Service Discovery Charles Pretzer, Technical Architect; Floyd Smith, Technical Marketing Writer Recorded: Nov 16 2017 61 mins
    Learn how NGINX Plus supports service discovery and load balancing in the NGINX Microservices Reference Architecture (MRA).

    More specifically, join this webinar to learn:

    - Get the latest answers to your questions about implementing microservices
    - Learn about the challenges others are facing in development and deployment
    - Ask questions about converting monolithic apps to microservices
    - Get an update on the NGINX Microservices Reference Architecture
  • Exchanging Cyber Threat Intelligence: There has to be a better way
    Exchanging Cyber Threat Intelligence: There has to be a better way Dr. Larry Ponemon, Founder, Ponemon Institute; Krupa Srivatsan, Infoblox; Tom Gorup, Rook Security; B. Dunlap (Moderator) Recorded: Nov 16 2017 62 mins
    Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against them on their own. More and more companies are using multiple threat intelligence sources and reaching out to their peers for threat intelligence data. In fact, 66% of respondents in the recent 2017 Ponemon survey, “The Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way”, report that threat intelligence could have prevented or minimized the consequences of a cyber attack or data breach. Join Infoblox and (ISC)2 on November 16, 2017 at 12:00pm (Noon) Eastern where our panel will discuss top trends that describe the current state of threat intelligence sharing, how threat intelligence sharing and usage has changed from previous years and best practices to using threat intelligence effectively to counter attacks.
  • How Prometheus 2.0 adds serious muscle for monitoring millions of containers
    How Prometheus 2.0 adds serious muscle for monitoring millions of containers Chris Ricci and Frederic Branczyk Recorded: Nov 16 2017 41 mins
    Prometheus has long been a darling of the open source container monitoring space. Prometheus is built-in and preconfigured with CoreOS Tectonic, helping make it the most advanced enterprise ready Kubernetes distribution on the market. With the release of Prometheus 2.0, we're seeing new features which simultaneously simplify, speed up, and improve the scalability of the solution.

    Tune in for an overview and Q&A with lead Prometheus developer, Frederic Branczyk. We'll be discussing what the major advancements in the Prometheus storage layer mean to you, migrating to Prometheus 2.0, and more.
  • Design tricks for great dashboards
    Design tricks for great dashboards Andy Cotgreave - Technical Evangelism Director, Tableau Recorded: Nov 16 2017 66 mins
    Successful dashboards require you to think like a designer. In this webinar, data visualisation expert Andy Cotgreave will look at ideas and theories from the world of design, and show how you can apply them to your dashboards. Whether you make functional, operational dashboards, or beautiful persuasive pieces of work, this webinar will help frame your approach.
  • Hedvig Introduction with CEO & Founder Avinash Lakshman
    Hedvig Introduction with CEO & Founder Avinash Lakshman Avinash Lakshman, Eric Carter Recorded: Nov 16 2017 51 mins
    Intro webinar and demo featuring Hedvig CEO and co-founder Avinash Lakshman. Learn how software-defined storage transforms your data center and delivers more agile and lower cost data management for VMware and Docker, spanning on premises and public cloud.
  • Symantec Endpoint Protection Mobile (Video)
    Symantec Endpoint Protection Mobile (Video) Symantec Recorded: Nov 15 2017 5 mins
    4 Min Product Demo Video

    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • DevOps & Automation: How to Modernize Enterprise Workflows
    DevOps & Automation: How to Modernize Enterprise Workflows Walter Bentley, Red Hat Automation Practice Lead Branden Pleines, Consultant, Automation Practice Recorded: Nov 15 2017 65 mins
    The promise of workflow modernization through automation is great — speed, efficiency, and productivity are the hallmarks. But, the process to get there can be complex: How do you prioritize and modernize those designated workflows as you move to new platforms or implement new processes and ways of working? With workflow modernization, your organization can become fully cross functional, enabling all teams to collaborate to create automation content.

    In this webinar, we’ll show you the strategic approach to workflow automation and provide actionable guidance on to make operations more repeatable, predictable, and automated. You’ll learn how to:

    - Bring a DevOps mindset and approach to the network
    - Create fully automated workflows that are interchangeable between projects
    - Extend the power of Ansible automation across the enterprise
  • How the Internet is Changing the Enterprise Network
    How the Internet is Changing the Enterprise Network Forrester's Andre Kindness & Kentik's Avi Freedman Recorded: Nov 15 2017 62 mins
    Cloud, SaaS, APIs, WAN, CDNs, customers, and users ㄧ enterprises increasingly rely on the internet to supply and deliver their business ㄧ and the internet is subsequently adding new complexities to enterprise networks. While managing each internet dependency can be difficult, the greater challenge is making sense of the breadth and depth of data these dependencies collectively produce. Fortunately, network traffic data can provide complete visibility into how your business is performing ㄧ across the internet, and overall.

    Many of today’s fastest-growing enterprises are already using network data to achieve digital transformation, boost customer retention, and enhance network performance to gain an edge over their competition. In this webinar, guest speaker and Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will reveal:

    - Top myths enterprises believe about the internet
    - The impact of internet-connected things on the business
    - How to use network analytics and monitoring for business visibility
    - Real-world examples of organizations who leverage their network data to drive business results