Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Avito – Big Data Warehouse Best Practice with HPE Vertica Avito – Big Data Warehouse Best Practice with HPE Vertica Nikolay Golov, Data Warehouse Architect, Avito and Carlo Arioli, Big Data Marketing Manager, HPE Live 60 mins
    Avito, based in Moscow, is Russia’s fastest growing e-commerce site and portal. It uses Big Data technology to monitor and improve the placement of advertisements, and to better understand how their users are adapting to online business.

    In this webinar, Nikolay Golov, Data Warehouse Architect at Avito, who has over 10 years’ experience for banks, retail and e-commerce, will share the lessons they have learned when implementing and expanding their HPE Vertica-based analytics infrastructure over the past 4 years.

    This will include identifying the risks and demonstrating how those risks can be efficiently and effectively overcome with the right technology stack: HPE Vertica, which processes data from dozens of heterogeneous data sources and monetizes it through Machine Learning.

    Join this webinar to learn more.
  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • Introducing Fibre Channel NVMe Introducing Fibre Channel NVMe Craig Carlson, FCIA Board of Directors, Cavium, J Metz, FCIA Board of Directors, Cisco Recorded: Feb 16 2017 58 mins
    NVMe is one of the most interesting new developments to happen to storage in the past several years, and NVMe over Fabrics extends these capabilities over a Storage Area Network. Given that 80% of all existing Flash storage solutions deployed are interconnected with Fibre Channel (FC), many questions have arisen about what it is, how it works, and why someone might want to consider using Fibre Channel for NVMe-based solutions.

    In this technical webinar, we’re going to be addressing some of these fundamental questions:

    - How does Fibre Channel and NVMe work together?
    - How is NVMe over Fabrics different from “traditional” Fibre Channel?
    - What changes do I have to make to my Fibre Channel environment in order to get NVMe over Fabrics to work?
    - What would an NVMe over Fibre Channel (FC-NVMe) architecture look like?
    - What advantages would I get using Fibre Channel in an NVMe solution?

    Check out this live webinar to learn more about this exciting new technology from the people who are developing it.
  • Keeping Applications Compliant and Secure Using ARA Keeping Applications Compliant and Secure Using ARA Keith Puzey, CA Technologies Recorded: Feb 16 2017 25 mins
    Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?

    In this 30-minute webcast:
    -Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
    -Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
    -See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.

    At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit, Product Marketing Manager, Kanen Clement,Senior Systems Engineer, ExtraHop Networks Recorded: Feb 16 2017 20 mins
    ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today introduced a new version of its award-winning ransomware mitigation offering that, for the first time, allows enterprises to recover ransomware-encrypted files without a backup. The ransomware offering incorporates the ExtraHop platform's proprietary Precision Packet Capture capability, allowing companies to detect ransomware attacks in-progress and recover lost files in minutes, creating an end-to-end solution that puts control back in the hands of the enterprise.

    In this Webinar Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Unlock real-time predictive insights from the Internet of Things Unlock real-time predictive insights from the Internet of Things Sam Chandrashekar, Program Manager, Microsoft Recorded: Feb 16 2017 60 mins
    Continuous streams of data are generated in every industry from sensors, IoT devices, business transactions, social media, network devices, clickstream logs etc. Within these streams of data lie insights that are waiting to be unlocked.

    This session with several live demonstrations will detail the build out of an end-to-end solution for the Internet of Things to transform data into insight, prediction, and action using cloud services. These cloud services enable you to quickly and easily build solutions to unlock insights, predict future trends, and take actions in near real-time.

    Samartha (Sam) Chandrashekar is a Program Manager at Microsoft. He works on cloud services to enable machine learning and advanced analytics on streaming data.
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Bridging the Data Silos Bridging the Data Silos Merav Yuravlivker, Chief Executive Officer, Data Society Recorded: Feb 15 2017 48 mins
    If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?

    Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
  • Using APIs to Create Custom Data Storage Visualizations Using APIs to Create Custom Data Storage Visualizations Michael Murray, Developer Advocate, Qumulo; Tommy Unger, Data Visualization Lead, Qumulo Recorded: Feb 15 2017 26 mins
    As data footprints in research organizations increase into the petabyte scale, so does the need to understand and visualize how that data is being used.

    While data-aware scale-out NAS gives you powerful insights into your data, you can take this one step further by building custom visualizations using our programmable REST API.

    Watch this webinar to learn how to:

    - Understand the usage patterns of your data to best manage your storage environment

    - Create interesting visualizations of your organization’s data using a programmable REST API

    - Use the Qumulo QPI with common data scientist tools such as Python’s Jupyter Notebook
  • Build an Agile and Elastic Big Data Pipeline Build an Agile and Elastic Big Data Pipeline Deba Chatterjee Director of Products, Robin Systems Recorded: Feb 15 2017 55 mins
    To stay competitive in today's global economy, organizations need to harness data from multiple sources, extract information and then make real-time decisions. Depending on the industry and the organization, Big Data encompasses information from multiple internal and external sources. Capturing, integrating and preparing this data for downstream analysis is often time-consuming and presents a big challenge. Today, organizations are struggling to cobble together different open source software to build an effective data pipeline that can withstand the volume as well as the speed of data ingestion and analysis. Robin relieves customers from the pains of building and maintaining a data pipeline and helps enterprises to make the most of Big Data.

    In this webinar, we will focus on how Robin’s containerization platform can be used to:

    - Build an agile and elastic data pipeline
    - Deploy, scale, and manage the most complex big data applications with just a single click of a button
    - Deal with variety, velocity, and volume of enterprise Big Data
  • Mainframe Security 101: What Your CISO Needs To Know Mainframe Security 101: What Your CISO Needs To Know Jeff Cherrington, Senior Director of Mainframe Security Product Management, CA Technologies Recorded: Feb 15 2017 59 mins
    The mainframe is mission essential in the application economy and hosts the majority of the world’s corporate data, processes over 2.5 billion mobile transactions per day and touches 55% of all applications. And while the connected mainframe drives significant business value, it also brings sophisticated threats and looming regulations along with it.

    Join Jeff Cherrington, Senior Director of Mainframe Security Product Management at CA Technologies for an overview of the mainframe security landscape, examine how the mainframe fits into the overall enterprise security strategy, and best-practices on how to secure the most sensitive and regulated data in the business - from access control to data protection to compliance.
  • LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 62 mins
    LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

    This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

    - An explanation of LPWAN technology and how it works
    - When to use (and not use) LPWAN technology
    - What issues such networks solve
    - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
    - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
    - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
    - Sample use cases
    - Business models that use LPWAN networks for energy management, asset management, and others
    - How to make money as both a user and deployer of LPWAN networks
    - What returns on investment can be expected and suggested metrics for measurement

    Speakers:
    Yann Gabay, Co-founder and Board Member, CONNIT
    Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
    Brian Ray, CTO and Founder, Link Labs
    Jeffrey Siegel, CMO, nwave

    This webcast is NOT BICSI accredited.
  • Chasing Shadows: Session 2 - Ansible Tower Chasing Shadows: Session 2 - Ansible Tower Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 15 2017 33 mins
    Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.

    Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
  • Top 10 Reasons: MS SQL Server on VMAX All-Flash Top 10 Reasons: MS SQL Server on VMAX All-Flash Bryan Walsh, Udgith Mankad, Scott Delandy, and Rajib Ghosh Recorded: Feb 15 2017 53 mins
    Join our team of experts for a panel discussion on the “Top 10 Reasons: VMAX All-Flash for MS SQL Server”. In this Valentine’s Day special webinar, you will fall in love with the combination of Microsoft SQL Server and Dell EMC’s VMAX All-Flash. Our product and solutions specialists will tackle topics including performance, reliability, compression, resiliency, QoS, replication, consolidation, and database repurposing. Reserve your seat at the table, today!
  • ScaleIO Software-Defined Storage Deployment Choices: Hyper-converged / Two-layer ScaleIO Software-Defined Storage Deployment Choices: Hyper-converged / Two-layer Srinath Alapati Recorded: Feb 14 2017 48 mins
    In the world of software-defined storage (SDS), the array is no more. Which begs the question – where exactly do I run my software-defined storage service? There are two SDS operating models – hyper-converged and two-layer. Which you choose is more than a technology decision. It impacts your organizational design, your operational procedures, and maybe even your internal politics. Learn about these deployment models for SDS and the associated impacts in this session.
  • FileFly and DFSR (Distributed File System Replication) Support FileFly and DFSR (Distributed File System Replication) Support Glen Olsen, Product Manager Recorded: Feb 14 2017 48 mins
    Caringo Product Manager Glen Olsen takes an in-depth look at how FileFly 2.0 supports Microsoft Distributed File System Replication and how you can protect your organization’s data with limitless tiering.
  • Strategies for Successful Data Preparation Strategies for Successful Data Preparation Raymond Rashid, Senior Consultant Business Intelligence, Unilytics Corporation Recorded: Feb 14 2017 33 mins
    Data scientists know, the visualization of data doesn't materialize out of thin air, unfortunately. One of the most vital preparation tactics and dangerous moments happens in the ETL process.

    Join Ray to learn the best strategies that lead to successful ETL and data visualization. He'll cover the following and what it means for visualization:

    1. Data at Different Levels of Detail
    2. Dirty Data
    3. Restartability
    4. Processing Considerations
    5. Incremental Loading

    Ray Rashid is a Senior Business Intelligence Consultant at Unilytics, specializing in ETL, data warehousing, data optimization, and data visualization. He has expertise in the financial, manufacturing and pharmaceutical industries.
  • Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering John Kim & Rob Davis, Mellanox, Mark Rogov, Dell EMC, Dave Minturn, Intel Recorded: Feb 14 2017 64 mins
    Buffers, Queues, and Caches, oh my! Buffers and Queues are part of every data center architecture, and a critical part of performance – both in improving it as well as hindering it. A well-implemented buffer can mean the difference between a finely run system and a confusing nightmare of troubleshooting. Knowing how buffers and queues work in storage can help make your storage system shine.

    However, there is something of a mystique surrounding these different data center components, as many people don’t realize just how they’re used and why. In this pod of the “Too Proud To Ask” series, we’re going to be demystifying this very important aspect of data center storage. You’ll learn:

    •What are buffers, caches, and queues, and why you should care about the differences?
    •What’s the difference between a read cache and a write cache?
    •What does “queue depth” mean?
    •What’s a buffer, a ring buffer, and host memory buffer, and why does it matter?
    •What happens when things go wrong?

    These are just some of the topics we’ll be covering, and while it won’t be exhaustive look at buffers, caches and queues, you can be sure that you’ll get insight into this very important, and yet often overlooked, part of storage design.
  • Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Cheryl O'Neil - Dir. Prod. Mktg.; Kedar Dhuru - Sr. Prod. Mgr.; Ido Tzang - System Architect Recorded: Feb 14 2017 39 mins
    Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
  • ETL and big data: Building simpler data pipelines ETL and big data: Building simpler data pipelines Paul Scott-Murphy Recorded: Feb 14 2017 61 mins
    In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.

    But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, whether on-premises or to the cloud, they are building systems that look an awful lot like ETL.
  • How Adform delivers digital advertising for top brands, million times per second How Adform delivers digital advertising for top brands, million times per second Stefan Sommer, Director Enterprise Integrations, Adform Recorded: Feb 14 2017 49 mins
    Over 10.000 large advertisers rely daily on Adform global advertising infrastructure to create millions of personalized experiences for top brands across websites, mobiles and digital media. The supporting platform handles over a million requests per second, each of which requires complex statistics, modeling and decisions to be calculated on a large number of datasets including each user’s digital journey touchpoints, CRM data and 3rd party demographic profiles. Vertica Analytic Database is making this possible using the best of open-source innovation from Hadoop, Kafka and Spark with the simplicity of SQL.

    Stefan Sommer is responsible for Data at Adform and will deep dive into how it all works, performs and scales on more than 1000 servers distributed globally with emphasis on Vertica which has been at the core for several years.

    Why attend?
    • Discover how Adform analyzes users’ insights and delivers an advanced web experience in real time
    • Learn how the Vertica Analytical Database simplifies scoring of advanced machine learning models for CRM applications in nano seconds from data stored on Hadoop
    • Get answers to your own questions during the live Q&A
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem - Director, Product Marketing, Identity Protection Recorded: Feb 13 2017 43 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    - The status of the two-factor authentication market and what we can expect in the years to come
    - The enterprise risk issues of using social media credentials to access to corporate resources
    - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Feb 21 2017 5:00 pm UTC 60 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Feb 21 2017 6:00 pm UTC 60 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Securing The Multi-Dimensional Cloud Securing The Multi-Dimensional Cloud Ronen Shpirer, Security Solutions Architect, Fortinet Feb 22 2017 10:00 am UTC 45 mins
    Software is eating the world – driving digital transformation and changing the way businesses do business. Cloud is a core enabler in every enterprise’s digital transformation voyage - facilitating innovation, agility and cost efficiency.

    But harnessing the power of the cloud creates a multi-dimensional environment where applications, data and information are borderless and yet, regardless of their changing location and existence, must be protected and secured as part of the enterprise overall security strategy and posture.

    This session will provide an overview of the unique security challenges in a multi-dimensional cloud environment, and the solution framework required for empowering and securing digital transformation.
  • Chasing Shadows: Session 3 - Accelerating Service Delivery Chasing Shadows: Session 3 - Accelerating Service Delivery Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Feb 22 2017 4:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Feb 22 2017 6:00 pm UTC 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • How to Manage Storage and Data Capacity at Scale with Real-Time Visibility How to Manage Storage and Data Capacity at Scale with Real-Time Visibility Mike Krasnow, Product Manager, Qumulo Feb 22 2017 6:00 pm UTC 30 mins
    Sportvision, the media company behind the iconic 1st & Ten® yellow line in football broadcasts, offers a broad range of rich sports entertainment and analysis products that rely on vast amounts of video and metadata.

    When struggling with storage capacity and data management at scale, the company turned to Qumulo to gain the necessary visibility into data usage and performance.

    Watch this video case study and learn how Qumulo helps Sportsvision:

    - Gain unmatched real-time visibility into data and usage at the file-level
    - Receive insight into performance consumption to ensure adequate IOPS
    - Scale incrementally, allowing the company to simply grow storage capacity and performance by adding more nodes
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • The Fundamentals of Testing Ethernet Technology. Part #2 The Fundamentals of Testing Ethernet Technology. Part #2 Diong Ming Cheng, Application Engineer, EXFO Feb 23 2017 6:00 am UTC 60 mins
    The surge in web-based, bandwidth-intensive applications has created new opportunities to deliver increasingly advanced services at higher speeds, alongside cutting-edge technologies. With its unmatched scalability and cost-effectiveness, Ethernet/IP has become the underlying technology of data communications and should be well understood by all players in the telecommunications industry.

    This 2-part webinar series addresses the fundamentals of testing Ethernet technology, as well as the tools and standards required in effectively turning up and troubleshooting next-generation Ethernet services.
    In this 2-part webinar series, we will delve deeper into the following topics:

    Webinar #2: February 23, 2017

    Birth certificates: A summary and troubleshooting basics
    +Ideal Birth Certificate testing
    +Troubleshooting
    -What is unique about 100G testing?
    -VLAN scan
    -Through Mode
    -The impact on quality of service (QoS) experience

    Get the insights you need to achieve faster Ethernet service turn-up with first-time-right results!
  • The Forgotten Link: Identifying the Weak Point in Your Network The Forgotten Link: Identifying the Weak Point in Your Network Jim Frey, Director of Marketing Feb 23 2017 4:00 pm UTC 60 mins
    There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.

    This webinar will:
    - Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
    - Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
    - Introduce an engineered solution from Berk-Tek that will solve this emerging problem.
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Feb 23 2017 4:00 pm UTC 15 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Feb 23 2017 5:00 pm UTC 60 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Feb 23 2017 5:00 pm UTC 60 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • Solving Issues with Microsoft Windows File Server Bloat Solving Issues with Microsoft Windows File Server Bloat Tony Barbagallo, VP of Product Feb 23 2017 6:00 pm UTC 60 mins
    Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
  • What's New in CA APM What's New in CA APM Janelle Shaw, Joshua Napier Feb 23 2017 6:00 pm UTC 60 mins
    Modern application technologies make it possible to provide a better user experience than ever before. With elevated end-user expectations, the difference between success and failure is an organization's ability to efficiently harness the power of complex application architectures to meet customers demands. An application performance management solution that sees through the data deluge to answer critical questions is more important today than ever before.

    In this webcast, we will explore:
    -Application performance management's role in modern IT organizations
    -CA Application Performance Management's role in providing stellar end-user experience
    -New innovations within CA Application Performance Management
  • Data retention best practices in the brave new world of privacy Data retention best practices in the brave new world of privacy Gavin Siggers, Director of Professional Services, Iron Mountain and David Kemp, EMEA Specialist Business Consultant, HPE Feb 28 2017 5:00 pm UTC 45 mins
    Broadening privacy regulations strain data retention policies, creating confusion from obtaining consent to the deletion of personal data. In the first of the three-part webcast series, Making Compliance Your Policy, HPE and Iron Mountain experts examine the upcoming European General Data Protection Regulation (GDPR) and the best practices that records and information managers can bring to the table for a risk-based approach to privacy compliance.

    This webinar will discuss:
    • How to prepare now for the rigor of the GDPR
    • Implications the GDPR has for records and data retention
    • How to achieve transparency
  • A View of the World's Largest & Fastest Growing Data Center Hotspots A View of the World's Largest & Fastest Growing Data Center Hotspots Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the Northern Virginia Datacenter Market with 451 Research and Iron Mountain

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Getting Started with Hyperconverged Infrastructure Getting Started with Hyperconverged Infrastructure Sushant Rao, Sr. Director Product & Solutions Marketing, DataCore Software Feb 28 2017 7:00 pm UTC 45 mins
    Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.

    But, is HCI right for you? What use cases make sense for HCI?

    Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:

    - Use cases suitable for HCI
    - Criteria to evaluate HCI products
    - Pros and cons of different vendors’ HCI
    - Avoiding the missteps of early adopters
  • Going the Full Hadoop for BI: Why & How EBates Did It Going the Full Hadoop for BI: Why & How EBates Did It Mark Stange-Tregear, Analytics, Ebates, Dan Kogan, Product Marketing, Tableau, Dan Wilson, Parter Channel, Cloudera Feb 28 2017 7:00 pm UTC 60 mins
    How do you manage data and deliver insights when data volumes are exploding? Does this modern data challenge require more than a ‘traditional’ approach?

    With 30 million+ members globally and hundreds of terabytes of data, Ebates' BI Team moved to a non-traditional approach as a matter of necessity. They defined what a non-traditional approach looks like and kept their Tableau business users happy.

    In this webinar, EBates BI leader, Mark Stange-Tregear, will share why and how his team successfully transitioned from traditional BI on a traditional data-warehouse, to "all in" self-service BI on Hadoop.

    Join us for this live presentation to learn:

    1) Why: Why he chose to run BI on Hadoop at Ebates.
    2) How: How Ebates made the transition; the plan, challenges and end-goals.
    3) What: What he actually did, what he achieved, and lessons learned
  • Multicloud Strategies for Greater Business Impact Multicloud Strategies for Greater Business Impact Enrico Fuiano Sr. Solutions Marketing Manager – Cisco Mar 1 2017 5:00 pm UTC 60 mins
    Cisco has developed the Cisco Business Cloud Advisor (BCA) framework in collaboration with IDC. We analyzed over 6,100 organizations across 31 countries. Cisco BCA helps you continuously improve your multicloud environment following proven and vendor agnostic methodologies. The combination of BCA, our vast cloud portfolio and our rich partner ecosystem can fuel your digital transformation journey.  
  • Operatonal Simplicity in the Datacenter with Containers Operatonal Simplicity in the Datacenter with Containers Cody Hill, Lead Systems Engineer Platform 9 and Ashok Rajagopalan, Head of Product Datera Mar 1 2017 6:00 pm UTC 60 mins
    Join Platform9 and Datera to learn how their software solutions can provide the DevOps agility, and operational simplicity of the cloud for containers. Mainstream adoption of stateful applications have been foundational for containerized applications to get widely deployed.

    With Datera Elastic Data Fabric and Platform9 Managed Kubernetes, customers can manage any application on Containers.

    You will learn:

    How to automate provisioning
    How this solution simplifies operations and management
    How to save costs with elasticity
  • Testing at the Edges Testing at the Edges Franklin Webber, Training and Technical Content Lead Mar 1 2017 6:00 pm UTC 60 mins
    As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.

    In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.

    Join us to learn:
    - How to test recipes that are powered by search and data bags
    - How to test resource guards
    - How to test helper methods

    Who should attend:
    Chef users with experience using ChefSpec, InSpec, and Test Kitchen