Hi [[ session.user.profile.firstName ]]

Data Center Management

  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • Quantifying Risk in Today’s Computing Infrastructures
    Quantifying Risk in Today’s Computing Infrastructures
    Vincent Rais, Director of Resiliency Services, Uptime Institute and Todd Traver, Vice President, IT Optimization and Strategy Recorded: Aug 21 2019 62 mins
    The complexity of today’s hybrid environments increases risk – what do you need to look for?

    Despite the promised simplicity provided by the cloud and other technologies, the majority of IT loads still run inside enterprise data centers, leading to challenges in managing workloads across the hybrid architectures emerging between these facilities and the cloud. We’ll discuss what we are seeing, along with the challenges, focus areas and important critical success factors necessary to reduce risk and provide resiliency and uninterrupted application availability.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Recorded: Aug 21 2019 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Tech Tuesday: Data Resilience & Recovery in Swarm Object Storage
    Tech Tuesday: Data Resilience & Recovery in Swarm Object Storage
    John Bell, Sr. Consultant & TW Cook, VP of Engineering & Support Recorded: Aug 20 2019 35 mins
    When it comes to protecting data, object storage provides significant advantages. In this educational webinar, we will discuss how Swarm Object Storage provides:

    --Continuous, built-in data resilience that can be configured to withstand massive hardware failure
    --Constant availability of data while maintaining 95% storage utilization for content
    --Automated data recovery eliminating the need for error-prone and time-consuming manual management
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Recorded: Aug 20 2019 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Recorded: Aug 20 2019 58 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks
  • Modern Streaming Data Stack with Kinetica & StreamSets
    Modern Streaming Data Stack with Kinetica & StreamSets
    Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSets Recorded: Aug 20 2019 60 mins
    Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.

    Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.

    During this webinar, we will discuss:

    -The modern data architecture required for dealing with extreme data
    -How StreamSets enables continuous data movement and transformation across the enterprise
    -How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
    -A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
  • Level Up with Dell Technologies
    Level Up with Dell Technologies
    Paul Zonfrillo and Mark Green, Strategic Pathways and Neil Swoyer, Dell EMC Recorded: Aug 20 2019 5 mins
    Are you an IT professional looking to get more of your initiatives funded?
    •Level Up teaches attendees how to connect your technology strategy to business outcomes.
    •Learn how to craft and deliver an effective pitch to business executives
    • Elevate the perception of IT within the business
  • Micro Detail.  Macro Intelligence.
    Micro Detail. Macro Intelligence.
    Tom Foottit, Senior Director, Product Management, Accedian Recorded: Aug 20 2019 36 mins
    Why granular, high quality data is critical for optimal end-user experience in the 5G era.
  • Cisco IT: A Transformational Journey to Multi-Cloud Operations | Multi-Cloud
    Cisco IT: A Transformational Journey to Multi-Cloud Operations | Multi-Cloud
    Becky Ransdell, Cisco IT Recorded: Aug 20 2019 24 mins
    When your digital platform is the lifeline of the core business serving a run-rate of $2M/min, the role of IT Ops matters! Cisco shares their digital transformation journey with practical insights on services enabled, services planned, and the underpinning architectural evolution towards an AIOps model for multi-cloud.



    Learning Objectives:

    In this session, you will:

    Hear Cisco IT’s multi-year journey

    Discover key use cases for bringing data together from many sources into a common data model

    Understand how Cisco is building a unified solution for next-gen application management

    Learn how they are adopting a software-defined data center as part of their multi-cloud strategy

    Gain insights into how they plan to leverage a real-time data lake to drive automations
  • Introducing Events and Stream Processing into Nationwide Building Society.
    Introducing Events and Stream Processing into Nationwide Building Society.
    Rob Jackson, Head of Application Architecture at Nationwide Building Society Recorded: Aug 20 2019 49 mins
    Open Banking regulations compel the UK’s largest banks, and building societies to enable their customers to share personal information with other regulated companies securely. As a result companies such as Nationwide Building Society are re-architecting their processes and infrastructure around customer needs to reduce the risk of losing relevance and the ability to innovate.

    In this online talk, you will learn why, when facing Open Banking regulation and rapidly increasing transaction volumes, Nationwide decided to take load off their back-end systems through real-time streaming of data changes into Apache Kafka®. You will hear how Nationwide started their journey with Apache Kafka®, beginning with the initial use case of creating a real-time data cache using Change Data Capture, Confluent Platform and Microservices. Rob Jackson, Head of Application Architecture, will also cover how Confluent enabled Nationwide to build the stream processing backbone that is being used to re-engineer the entire banking experience including online banking, payment processing and mortgage applications.
  • Data Quality in Banking:Turning Regulatory Compliance into Business Value
    Data Quality in Banking:Turning Regulatory Compliance into Business Value
    David Burk, Financial Services Expert & Steve Shissler, Syncsort Recorded: Aug 20 2019 53 mins
    Regulatory compliance – and avoiding the stringent fines for noncompliance – is a top concern for banks around the world. Yet, the fast pace of change, and the complexity of regulations, make adhering to these mandates harder than ever. The prerequisite to comply with all these regulations is high-quality, trusted data to ensure effective governance and reporting. By adopting robust data quality practices, not only does your bank benefit by staying compliant, it also reaps the rewards of better business decisions, higher operational efficiency, better customer service and more.

    Join us with Financial Services expert David Burk for a discussion on:
    • The background for regulatory reporting and key financial regulations
    • Understanding how data quality helps institutions succeed with regulatory reporting compliance
    • How regulatory reporting improves data for other business decisions
    • How financial institutions leverage Trillium DQ to deliver quality data
  • Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Scott Tye (AE), Jenny Ngo (SE), Sridhar Devarapalli (PM) Recorded: Aug 20 2019 49 mins
    Security threats have become more sophisticated and in combination with new application and cloud deployment models adding to existing complexity have caused more than 3/4 of organizations to be victims of successful cyber attack - don't become the next victim!

    Join this session to learn common use cases and best practices for implementing VM microsegmentation in the hybrid cloud world. Nutanix engineers cover design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
  • Facilitating Secure DevOps
    Facilitating Secure DevOps
    Herb Mehlhorn Recorded: Aug 19 2019 23 mins
    The unyielding demand facing all IT professionals today is to accelerate the ability to meet the needs of the business. Achieving that goal requires deploying applications for your internal and external constituents at a faster rate while meeting stricter and stricter compliance and security requirements. This webinar provides insight into how Layer7 SiteMinder can support that goal today and how it will evolve to simplify that support in the future.
  • IoT, AI & The Drive to Innovate
    IoT, AI & The Drive to Innovate
    Kim Naess, Lead Analytics Architect EMEA, Hitachi Vantara Recorded: Aug 19 2019 28 mins
    Hear about the importance of data, IoT and the foundations of AI
  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    adam Dagnall, James Clark Recorded: Aug 16 2019 29 mins
    Register here to join our free webinar!

    By using Splunk SmartStore you can easily decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
  • Accelerating Data-Centric Transformation with Workload Optimized Solutions
    Accelerating Data-Centric Transformation with Workload Optimized Solutions
    Patti Shaffner Jordan, Director, Data Center Solutions Mktg & Chris Peters, Program Director, Intel Select Solutions, Intel Recorded: Aug 15 2019 51 mins
    Intel® Select Solutions are pre-defined, workload optimized solutions designed to minimize the challenges of data center infrastructure evaluation and deployment. Solutions are validated by OEMs/ODMs, certified by ISVs, and verified by Intel. Intel develops these solutions in extensive collaboration with hardware and software partners and with the world’s leading data center and service providers. Every Intel Select Solution is a tailored combination of Intel's data-centric compute, memory, storage, and network technologies that delivers predictable, trusted, and compelling performance.

    Join this webinar to gain an overview of Intel Select Solutions and learn about our broad portfolio across data-centric workloads from AI to analytics to hybrid cloud and network.
  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Modernize Cybersecurity Threat Detection
    Modernize Cybersecurity Threat Detection
    Nathan Necaise - VP of Data Sciences Emerging Services - Optiv Recorded: Aug 15 2019 55 mins
    The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.

    During this webinar, we will discuss:

    -Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
    -Show customer examples and demonstrate how they are leading to transformative effects
    -How to optimize security architectures that use technologies like Splunk using StreamSets
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Cameron Joyce, Principal Solutions Architect at Datrium Recorded: Aug 15 2019 56 mins
    Many enterprises have chosen Datrium’s next-generation disaggregated HCI solutions. Do your systems need a refresh? Fortunately, EqualLogic customers can take advantage of Datrium Automatrix and get primary storage, backup, disaster recovery, mobility, and encryption in a single data management platform. Join us for our upcoming webinar where you will learn how to:

    - Get zero storage management overhead with a simple VM-centric approach and no LUNs or volumes
    - Independently scale performance and capacity for maximum flexibility and no disruption to production systems
    - Protect your data with built-in backup, blanket encryption, and erasure coding
    - Take advantage of optional disaster recovery orchestration, including runbook automation, and recover from ransomware instantly with low RTO data mitigation plans
    - Use industry-leading snapshot and replication capabilities
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Moving Beyond SIEM
    Moving Beyond SIEM
    Shashwath Hegde, Solutions Architect, APAC Aug 22 2019 5:00 am UTC 40 mins
    The overall objective of the SOC is stop or reduce the impact of cyber-attacks and this objective is lost in the midst of a cloud of confusing claims and statements about a SIEM. Although, a SIEM is central to SOC operations, a mechanical approach in its adoption has failed to provide any real value.

    Join Shashwath Hegde, Solution Architect, for this webinar, as he discusses a shift in mindset in thinking beyond a SIEM and adopting a platform approach and cite practical examples from the field that helps stop the bad guys.
  • Kristin Demo Test
    Kristin Demo Test
    Kristin Casey, Director Marketing, WWT Aug 22 2019 5:00 am UTC 7 mins
    This is to demo the BT platform to the team so everyone can see how it works. We want to make sure it doesn't have the same challenges we have with webex event center.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Meraki Automation – Multi-Org Management
    Meraki Automation – Multi-Org Management
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Aug 22 2019 3:00 pm UTC 45 mins
    Meraki’s Dashboard is a great and powerful tool for network management and monitoring but it’s limited by the very thing that makes it powerful; it has to be everything to everyone and that granularity can make it overwhelming to use on a day-to-day basis. All enterprises, large and small, have their own way of doing things and this pertains to network management and monitoring as well. In this session, you’ll be introduced to APIs, code, and tools that will allow an organization to build out dynamic interactions with the Meraki platform that aligns with the way that their teams do the business of networking.
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Aug 22 2019 4:00 pm UTC 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Aug 22 2019 5:00 pm UTC 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Control Your Digital Transformation with IT4IT Value Streams
    Control Your Digital Transformation with IT4IT Value Streams
    Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro Focus Aug 22 2019 5:00 pm UTC 60 mins
    Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?

    The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.

    Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.

    Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Adam Dagnall, James Clark Aug 23 2019 10:00 am UTC 60 mins
    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.

    Cloudian is Part of the Splunk Technology Alliance Program
  • Exploring Petabyte-scale Storage for Unstructured Data
    Exploring Petabyte-scale Storage for Unstructured Data
    Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GM Aug 27 2019 4:30 am UTC 47 mins
    Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?

    Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 1:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Create a Foundation for Agency Innovation with Dell Technologies
    Create a Foundation for Agency Innovation with Dell Technologies
    Ryan Vance, John Abrams and Al Ford, Dell Technologies Aug 27 2019 2:00 pm UTC 60 mins
    We empower U.S. government agencies with the people, process and technology to protect our nation’s digital future. Come learn how our data center solutions can fit any agency’s need for transformation from the edge to core to cloud. In addition, we will also discuss how data analytics provides you with the opportunity to increase your speed to decision as well as accuracy to decision. Our speaker will also share examples in which an intelligence layer is being added to the data or data analytics capabilities, which include: cyber, RPA, inferencing and multi-INT.

    Register for this webinar today to learn more!

    Click the "Attend" button and select from the "Add to Calendar" options. Open the calendar reminder and click on the link to register through GoToWebinar.

    Go to the URL below to test your system.
    https://support.logmeininc.com/gotowebinar/system-check-attendee
  • PREMIER uCPE Solutions
    PREMIER uCPE Solutions
    Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVA Aug 27 2019 3:00 pm UTC 60 mins
    While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
  • Fibre Channel and Security
    Fibre Channel and Security
    Nishant Lodha, Marvell; Brandon Hoff, Broadcom; J Metz, Cisco Aug 27 2019 5:00 pm UTC 75 mins
    Fibre Channel has long been known to be a very secure protocol for storage. Even so, there is no such thing as a “perfectly secure” technology, and for that reason it’s important to constantly update and protect against threats.

    The sheer variety of environments in which Fibre Channel fabrics are deployed makes it very difficult to simply rely only on physical security. In fact, it’s possible to access different storage systems by different users, even when spanned over several sites. Fibre Channel enables security services to specifically address these concerns, and prevent misconfigurations or access to data by non-authorized people and machines.

    This webcast is going to dive deep into the guts of security aspects of Fibre Channel, looking closely at the protocols used to implement security in a Fibre Channel fabric. In particular, we’re going to look at:

    •The definitions of the protocols to authenticate Fibre Channel devices
    •What are the different classes of threats, and what are the mechanisms to protect against them
    •What are session keys and how to set them up
    •How Fibre Channel negotiates these parameters to insure frame-by-frame integrity and confidentiality
    •How Fibre Channel establishes and distributes policies across a fabric

    Please join us to learn more about the technical considerations that Fibre Channel brings to the table to secure and protect your data and information.
  • Recipes for Success How to Build Continuous Ingest Pipelines
    Recipes for Success How to Build Continuous Ingest Pipelines
    Arvind Prabhakar - Co-Founder and CTO - StreamSets Aug 27 2019 5:00 pm UTC 62 mins
    Modern data infrastructures are fed by vast volumes of data, streamed from an ever-changing variety of sources. Standard practice has been to store the data as ingested and force data cleaning onto each consuming application. This approach saddles data scientists and analysts with substantial work, creates delays getting to insights and makes real-time or near-time analysis practically impossible.
  • Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    John Huckle, John Beasley, Marci Parker, Meghan Lockwood Aug 27 2019 5:00 pm UTC 60 mins
    Does your ServiceNow strategy hold-up to the demanding needs of IT, your Customers, and your employees in 2020?

    With ServiceNow expanding beyond IT in recent years with Customer Service Management and HR Service Delivery, we see clients building strategic roadmaps that cross the entire enterprise.

    In this webinar, you'll learn how roadmaps are changing (and how to effectively communicate ServiceNow's value to your executives), roadmap examples from our clients with varying levels of maturity, the keys to success like governance and organizational change management, and what you can still accomplish in 2019.

    Don't miss out on this opportunity - register for the webinar today.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 6:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Data Engineering Pitfalls and How to Avoid Them
    Data Engineering Pitfalls and How to Avoid Them
    Jorge Villamariona & Minesh Patel from Qubole Aug 28 2019 9:00 am UTC 45 mins
    Successful data engineering requires a wide range of technical skills to build and maintain diverse data pipelines. Whether your data engineering team builds traditional data pipelines that feed business intelligence reports and dashboards or leading edge streaming applications, data users throughout your organization rely on your ability to create consistent and reliable pipelines to feed any and all business applications.

    In this webinar you will learn how to avoid some of the most common data engineering pitfalls such as:

    -- Data team misalignment
    -- Not fully understanding your data customers
    -- Not using the right tools for the job
    -- Always pursuing home-grown solutions

    This webinar will cover simple, yet practical solutions for these simple but way too common challenges often faced by data engineering teams.
  • Top 10 Awesome Features in Vertica
    Top 10 Awesome Features in Vertica
    Pavel Savyuk and Jeff Healey, Vertica Aug 28 2019 3:00 pm UTC 60 mins
    Anyone that uses Vertica knows that it’s fast – really fast. But, beyond its signature high performance, which other powerful features can help you stand out from the pack with your data-driven initiatives?

    Join us for this Webcast to learn all about 10 awesome features that will help you derive even more value from Vertica and increase the productivity of your data engineering team.

    From data management to database design to an end-to-end Machine Learning workflow and more, the list of powerful Vertica features is endless. But, we’ll cover our top 10, collected from hundreds of engagements with top analytical leaders. Bring your list of top Vertica features and join the discussion!
  • SD-WAN: Key Benefits & Deployment Best Practices [EMEA]
    SD-WAN: Key Benefits & Deployment Best Practices [EMEA]
    Steve Liput SD-WAN Business Development Manager, Juniper Networks Aug 29 2019 9:00 am UTC 44 mins
    SD-WAN is the biggest trend in enterprise networking, with almost every business exploring how they can deploy SD-WAN.

    In this webinar, you will learn about:
    • The key drivers for SD-WAN
    • Essentials features for a SD-WAN solution
    • The requirements of enterprise buyers
    • How service providers can position a managed service against other competitors
  • The CoreSite Interconnect Gateway: The Key to Digital Transformation
    The CoreSite Interconnect Gateway: The Key to Digital Transformation
    Brian Eichman, CoreSite Aug 29 2019 3:00 pm UTC 20 mins
    In the era of the hybrid cloud, data and applications are scattered across many locations, including on-premises, colocation facilities, and public cloud services. To enable digital data-driven business strategies, hyperconnected data centers are essential. In this webcast, you will learn how to implement hyperconnected data centers for digital transformation. And you will learn how the CoreSite Interconnect Gateway provides direct connectivity, eliminates complexity, increases functionality, optimizes workloads, and provides redundancy, while enabling you to avoid vendor lock-in.
  • Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst Aug 29 2019 3:00 pm UTC 60 mins
    Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.

    APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.

    Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:

    •Insights into attribution and shared tactics between espionage and financially motivated operations
    •Supply chain compromises attributed to APT41 activity
    •Unique malware capabilities and techniques
    •Details on connections to identified personas
  • [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center
    [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center
    Robin Gareiss, President & Founder, Nemertes Research Aug 29 2019 3:00 pm UTC 60 mins
    Intelligent Customer Experience Series [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center

    Contact centers are changing--drastically and swiftly. If you're not keeping pace--or exceeding it--you'll be at a competitive disadvantage.

    Learn what successful companies are doing with areas such as agent experience, interaction channels, and emerging technologies.

    Based on Nemertes' brand new, detailed, Customer Experience research study with 518 organizations, this webinar will explain the five crucial items that must be on your priority list to ensure your contact center is positioned to deliver successful customer experiences.