Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Avito – Big Data Warehouse Best Practice with HPE Vertica Avito – Big Data Warehouse Best Practice with HPE Vertica Nikolay Golov, Data Warehouse Architect, Avito and Carlo Arioli, Big Data Marketing Manager, HPE Recorded: Feb 21 2017 45 mins
    Avito, based in Moscow, is Russia’s fastest growing e-commerce site and portal. It uses Big Data technology to monitor and improve the placement of advertisements, and to better understand how their users are adapting to online business.

    In this webinar, Nikolay Golov, Data Warehouse Architect at Avito, who has over 10 years’ experience for banks, retail and e-commerce, will share the lessons they have learned when implementing and expanding their HPE Vertica-based analytics infrastructure over the past 4 years.

    This will include identifying the risks and demonstrating how those risks can be efficiently and effectively overcome with the right technology stack: HPE Vertica, which processes data from dozens of heterogeneous data sources and monetizes it through Machine Learning.

    Join this webinar to learn more.
  • Introducing Fibre Channel NVMe Introducing Fibre Channel NVMe Craig Carlson, FCIA Board of Directors, Cavium, J Metz, FCIA Board of Directors, Cisco Recorded: Feb 16 2017 58 mins
    NVMe is one of the most interesting new developments to happen to storage in the past several years, and NVMe over Fabrics extends these capabilities over a Storage Area Network. Given that 80% of all existing Flash storage solutions deployed are interconnected with Fibre Channel (FC), many questions have arisen about what it is, how it works, and why someone might want to consider using Fibre Channel for NVMe-based solutions.

    In this technical webinar, we’re going to be addressing some of these fundamental questions:

    - How does Fibre Channel and NVMe work together?
    - How is NVMe over Fabrics different from “traditional” Fibre Channel?
    - What changes do I have to make to my Fibre Channel environment in order to get NVMe over Fabrics to work?
    - What would an NVMe over Fibre Channel (FC-NVMe) architecture look like?
    - What advantages would I get using Fibre Channel in an NVMe solution?

    Check out this live webinar to learn more about this exciting new technology from the people who are developing it.
  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • Keeping Applications Compliant and Secure Using ARA Keeping Applications Compliant and Secure Using ARA Keith Puzey, CA Technologies Recorded: Feb 16 2017 25 mins
    Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?

    In this 30-minute webcast:
    -Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
    -Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
    -See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.

    At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit, Product Marketing Manager, Kanen Clement,Senior Systems Engineer, ExtraHop Networks Recorded: Feb 16 2017 20 mins
    ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today introduced a new version of its award-winning ransomware mitigation offering that, for the first time, allows enterprises to recover ransomware-encrypted files without a backup. The ransomware offering incorporates the ExtraHop platform's proprietary Precision Packet Capture capability, allowing companies to detect ransomware attacks in-progress and recover lost files in minutes, creating an end-to-end solution that puts control back in the hands of the enterprise.

    In this Webinar Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • Unlock real-time predictive insights from the Internet of Things Unlock real-time predictive insights from the Internet of Things Sam Chandrashekar, Program Manager, Microsoft Recorded: Feb 16 2017 60 mins
    Continuous streams of data are generated in every industry from sensors, IoT devices, business transactions, social media, network devices, clickstream logs etc. Within these streams of data lie insights that are waiting to be unlocked.

    This session with several live demonstrations will detail the build out of an end-to-end solution for the Internet of Things to transform data into insight, prediction, and action using cloud services. These cloud services enable you to quickly and easily build solutions to unlock insights, predict future trends, and take actions in near real-time.

    Samartha (Sam) Chandrashekar is a Program Manager at Microsoft. He works on cloud services to enable machine learning and advanced analytics on streaming data.
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Using APIs to Create Custom Data Storage Visualizations Using APIs to Create Custom Data Storage Visualizations Michael Murray, Developer Advocate, Qumulo; Tommy Unger, Data Visualization Lead, Qumulo Recorded: Feb 15 2017 26 mins
    As data footprints in research organizations increase into the petabyte scale, so does the need to understand and visualize how that data is being used.

    While data-aware scale-out NAS gives you powerful insights into your data, you can take this one step further by building custom visualizations using our programmable REST API.

    Watch this webinar to learn how to:

    - Understand the usage patterns of your data to best manage your storage environment

    - Create interesting visualizations of your organization’s data using a programmable REST API

    - Use the Qumulo QPI with common data scientist tools such as Python’s Jupyter Notebook
  • Build an Agile and Elastic Big Data Pipeline Build an Agile and Elastic Big Data Pipeline Deba Chatterjee Director of Products, Robin Systems Recorded: Feb 15 2017 55 mins
    To stay competitive in today's global economy, organizations need to harness data from multiple sources, extract information and then make real-time decisions. Depending on the industry and the organization, Big Data encompasses information from multiple internal and external sources. Capturing, integrating and preparing this data for downstream analysis is often time-consuming and presents a big challenge. Today, organizations are struggling to cobble together different open source software to build an effective data pipeline that can withstand the volume as well as the speed of data ingestion and analysis. Robin relieves customers from the pains of building and maintaining a data pipeline and helps enterprises to make the most of Big Data.

    In this webinar, we will focus on how Robin’s containerization platform can be used to:

    - Build an agile and elastic data pipeline
    - Deploy, scale, and manage the most complex big data applications with just a single click of a button
    - Deal with variety, velocity, and volume of enterprise Big Data
  • Bridging the Data Silos Bridging the Data Silos Merav Yuravlivker, Chief Executive Officer, Data Society Recorded: Feb 15 2017 48 mins
    If a database is filled automatically, but it's not analyzed, can it make an impact? And how do you combine disparate data sources to give you a real-time look at your environment?

    Chief Executive Officer Merav Yuravlivker discusses how companies are missing out on some of their biggest profits (and how some companies are making billions) by aggregating disparate data sources. You'll learn about data sources available to you, how you can start automating this data collection, and the many insights that are at your fingertips.
  • Mainframe Security 101: What Your CISO Needs To Know Mainframe Security 101: What Your CISO Needs To Know Jeff Cherrington, Senior Director of Mainframe Security Product Management, CA Technologies Recorded: Feb 15 2017 59 mins
    The mainframe is mission essential in the application economy and hosts the majority of the world’s corporate data, processes over 2.5 billion mobile transactions per day and touches 55% of all applications. And while the connected mainframe drives significant business value, it also brings sophisticated threats and looming regulations along with it.

    Join Jeff Cherrington, Senior Director of Mainframe Security Product Management at CA Technologies for an overview of the mainframe security landscape, examine how the mainframe fits into the overall enterprise security strategy, and best-practices on how to secure the most sensitive and regulated data in the business - from access control to data protection to compliance.
  • LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 62 mins
    LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

    This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

    - An explanation of LPWAN technology and how it works
    - When to use (and not use) LPWAN technology
    - What issues such networks solve
    - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
    - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
    - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
    - Sample use cases
    - Business models that use LPWAN networks for energy management, asset management, and others
    - How to make money as both a user and deployer of LPWAN networks
    - What returns on investment can be expected and suggested metrics for measurement

    Speakers:
    Yann Gabay, Co-founder and Board Member, CONNIT
    Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
    Brian Ray, CTO and Founder, Link Labs
    Jeffrey Siegel, CMO, nwave

    This webcast is NOT BICSI accredited.
  • Chasing Shadows: Session 2 - Ansible Tower Chasing Shadows: Session 2 - Ansible Tower Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 15 2017 33 mins
    Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.

    Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
  • Top 10 Reasons: MS SQL Server on VMAX All-Flash Top 10 Reasons: MS SQL Server on VMAX All-Flash Bryan Walsh, Udgith Mankad, Scott Delandy, and Rajib Ghosh Recorded: Feb 15 2017 53 mins
    Join our team of experts for a panel discussion on the “Top 10 Reasons: VMAX All-Flash for MS SQL Server”. In this Valentine’s Day special webinar, you will fall in love with the combination of Microsoft SQL Server and Dell EMC’s VMAX All-Flash. Our product and solutions specialists will tackle topics including performance, reliability, compression, resiliency, QoS, replication, consolidation, and database repurposing. Reserve your seat at the table, today!
  • ScaleIO Software-Defined Storage Deployment Choices: Hyper-converged / Two-layer ScaleIO Software-Defined Storage Deployment Choices: Hyper-converged / Two-layer Srinath Alapati Recorded: Feb 14 2017 48 mins
    In the world of software-defined storage (SDS), the array is no more. Which begs the question – where exactly do I run my software-defined storage service? There are two SDS operating models – hyper-converged and two-layer. Which you choose is more than a technology decision. It impacts your organizational design, your operational procedures, and maybe even your internal politics. Learn about these deployment models for SDS and the associated impacts in this session.
  • FileFly and DFSR (Distributed File System Replication) Support FileFly and DFSR (Distributed File System Replication) Support Glen Olsen, Product Manager Recorded: Feb 14 2017 48 mins
    Caringo Product Manager Glen Olsen takes an in-depth look at how FileFly 2.0 supports Microsoft Distributed File System Replication and how you can protect your organization’s data with limitless tiering.
  • Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Cheryl O'Neil - Dir. Prod. Mktg.; Kedar Dhuru - Sr. Prod. Mgr.; Ido Tzang - System Architect Recorded: Feb 14 2017 39 mins
    Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
  • ETL and big data: Building simpler data pipelines ETL and big data: Building simpler data pipelines Paul Scott-Murphy Recorded: Feb 14 2017 61 mins
    In the traditional world of EDW, ETL pipelines are a troublesome bottleneck when preparing data for use in the data warehouse. ETL pipelines are notoriously expensive and brittle, so as companies move to Hadoop they look forward to getting rid of the ETL infrastructure.

    But is it that simple? Some companies are finding that in order to move data between clusters for backup or aggregation purposes, whether on-premises or to the cloud, they are building systems that look an awful lot like ETL.
  • Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering John Kim & Rob Davis, Mellanox, Mark Rogov, Dell EMC, Dave Minturn, Intel Recorded: Feb 14 2017 64 mins
    Buffers, Queues, and Caches, oh my! Buffers and Queues are part of every data center architecture, and a critical part of performance – both in improving it as well as hindering it. A well-implemented buffer can mean the difference between a finely run system and a confusing nightmare of troubleshooting. Knowing how buffers and queues work in storage can help make your storage system shine.

    However, there is something of a mystique surrounding these different data center components, as many people don’t realize just how they’re used and why. In this pod of the “Too Proud To Ask” series, we’re going to be demystifying this very important aspect of data center storage. You’ll learn:

    •What are buffers, caches, and queues, and why you should care about the differences?
    •What’s the difference between a read cache and a write cache?
    •What does “queue depth” mean?
    •What’s a buffer, a ring buffer, and host memory buffer, and why does it matter?
    •What happens when things go wrong?

    These are just some of the topics we’ll be covering, and while it won’t be exhaustive look at buffers, caches and queues, you can be sure that you’ll get insight into this very important, and yet often overlooked, part of storage design.
  • Strategies for Successful Data Preparation Strategies for Successful Data Preparation Raymond Rashid, Senior Consultant Business Intelligence, Unilytics Corporation Recorded: Feb 14 2017 33 mins
    Data scientists know, the visualization of data doesn't materialize out of thin air, unfortunately. One of the most vital preparation tactics and dangerous moments happens in the ETL process.

    Join Ray to learn the best strategies that lead to successful ETL and data visualization. He'll cover the following and what it means for visualization:

    1. Data at Different Levels of Detail
    2. Dirty Data
    3. Restartability
    4. Processing Considerations
    5. Incremental Loading

    Ray Rashid is a Senior Business Intelligence Consultant at Unilytics, specializing in ETL, data warehousing, data optimization, and data visualization. He has expertise in the financial, manufacturing and pharmaceutical industries.
  • How Adform delivers digital advertising for top brands, million times per second How Adform delivers digital advertising for top brands, million times per second Stefan Sommer, Director Enterprise Integrations, Adform Recorded: Feb 14 2017 49 mins
    Over 10.000 large advertisers rely daily on Adform global advertising infrastructure to create millions of personalized experiences for top brands across websites, mobiles and digital media. The supporting platform handles over a million requests per second, each of which requires complex statistics, modeling and decisions to be calculated on a large number of datasets including each user’s digital journey touchpoints, CRM data and 3rd party demographic profiles. Vertica Analytic Database is making this possible using the best of open-source innovation from Hadoop, Kafka and Spark with the simplicity of SQL.

    Stefan Sommer is responsible for Data at Adform and will deep dive into how it all works, performs and scales on more than 1000 servers distributed globally with emphasis on Vertica which has been at the core for several years.

    Why attend?
    • Discover how Adform analyzes users’ insights and delivers an advanced web experience in real time
    • Learn how the Vertica Analytical Database simplifies scoring of advanced machine learning models for CRM applications in nano seconds from data stored on Hadoop
    • Get answers to your own questions during the live Q&A
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem - Director, Product Marketing, Identity Protection Recorded: Feb 13 2017 43 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    - The status of the two-factor authentication market and what we can expect in the years to come
    - The enterprise risk issues of using social media credentials to access to corporate resources
    - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Feb 21 2017 5:00 pm UTC 60 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Feb 21 2017 6:00 pm UTC 60 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Chasing Shadows: Session 3 - Accelerating Service Delivery Chasing Shadows: Session 3 - Accelerating Service Delivery Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Feb 22 2017 4:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Power Data-Driven Growth With Hybrid Cloud Power Data-Driven Growth With Hybrid Cloud Ingo Fuchs, Senior Manager Hybrid Cloud, NetApp Feb 22 2017 6:00 pm UTC 45 mins
    In this webinar you will learn how to power data-driven growth for your organization by effectively leveraging the opportunities offered by hybrid cloud, as well as how to connect cloud environments through a data fabric.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • The Fundamentals of Testing Ethernet Technology. Part #2 The Fundamentals of Testing Ethernet Technology. Part #2 Diong Ming Cheng, Application Engineer, EXFO Feb 23 2017 6:00 am UTC 60 mins
    The surge in web-based, bandwidth-intensive applications has created new opportunities to deliver increasingly advanced services at higher speeds, alongside cutting-edge technologies. With its unmatched scalability and cost-effectiveness, Ethernet/IP has become the underlying technology of data communications and should be well understood by all players in the telecommunications industry.

    This 2-part webinar series addresses the fundamentals of testing Ethernet technology, as well as the tools and standards required in effectively turning up and troubleshooting next-generation Ethernet services.
    In this 2-part webinar series, we will delve deeper into the following topics:

    Webinar #2: February 23, 2017

    Birth certificates: A summary and troubleshooting basics
    +Ideal Birth Certificate testing
    +Troubleshooting
    -What is unique about 100G testing?
    -VLAN scan
    -Through Mode
    -The impact on quality of service (QoS) experience

    Get the insights you need to achieve faster Ethernet service turn-up with first-time-right results!
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Feb 23 2017 4:00 pm UTC 15 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • Account-Based Marketing: A Constellation of Multivendor Offerings Account-Based Marketing: A Constellation of Multivendor Offerings Keith Dawson Feb 23 2017 4:00 pm UTC 60 mins
    Join 451 Research to learn how account-based marketing (ABM) is taking on new prominence in the marketing technology stack. In this webinar we’ll examine how ABM has developed into a key methodology for aligning marketing and sales teams in B2B environments. Critical to its evolution have been advances in data science and machine learning, which allow marketers to find and target leads more accurately and with better relevance. Vendors across the martech landscape are developing features that augment ABM practices; in this discussion we will talk about the practicalities of fitting ABM into existing marketing automation frameworks, and how vendors can differentiate their offerings and clarify the landscape for buyers.
  • The Forgotten Link: Identifying the Weak Point in Your Network The Forgotten Link: Identifying the Weak Point in Your Network Jim Frey, Director of Marketing Feb 23 2017 4:00 pm UTC 60 mins
    There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.

    This webinar will:
    - Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
    - Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
    - Introduce an engineered solution from Berk-Tek that will solve this emerging problem.
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Feb 23 2017 5:00 pm UTC 60 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • What's New in CA APM What's New in CA APM Janelle Shaw, Joshua Napier Feb 23 2017 6:00 pm UTC 60 mins
    Modern application technologies make it possible to provide a better user experience than ever before. With elevated end-user expectations, the difference between success and failure is an organization's ability to efficiently harness the power of complex application architectures to meet customers demands. An application performance management solution that sees through the data deluge to answer critical questions is more important today than ever before.

    In this webcast, we will explore:
    -Application performance management's role in modern IT organizations
    -CA Application Performance Management's role in providing stellar end-user experience
    -New innovations within CA Application Performance Management
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Mar 16 2017 5:00 pm UTC 30 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Solving Issues with Microsoft Windows File Server Bloat Solving Issues with Microsoft Windows File Server Bloat Tony Barbagallo, VP of Product Feb 23 2017 6:00 pm UTC 60 mins
    Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
  • Data retention best practices in the brave new world of privacy Data retention best practices in the brave new world of privacy Gavin Siggers, Director of Professional Services, Iron Mountain and David Kemp, EMEA Specialist Business Consultant, HPE Feb 28 2017 5:00 pm UTC 45 mins
    Broadening privacy regulations strain data retention policies, creating confusion from obtaining consent to the deletion of personal data. In the first of the three-part webcast series, Making Compliance Your Policy, HPE and Iron Mountain experts examine the upcoming European General Data Protection Regulation (GDPR) and the best practices that records and information managers can bring to the table for a risk-based approach to privacy compliance.

    This webinar will discuss:
    • How to prepare now for the rigor of the GDPR
    • Implications the GDPR has for records and data retention
    • How to achieve transparency
  • A View of the World's Largest & Fastest Growing Data Center Hotspots A View of the World's Largest & Fastest Growing Data Center Hotspots Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the Northern Virginia Datacenter Market with 451 Research and Iron Mountain

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Operatonal Simplicity in the Datacenter with Containers Operatonal Simplicity in the Datacenter with Containers Cody Hill, Lead Systems Engineer Platform 9 and Ashok Rajagopalan, Head of Product Datera Mar 1 2017 6:00 pm UTC 60 mins
    Join Platform9 and Datera to learn how their software solutions can provide the DevOps agility, and operational simplicity of the cloud for containers. Mainstream adoption of stateful applications have been foundational for containerized applications to get widely deployed.

    With Datera Elastic Data Fabric and Platform9 Managed Kubernetes, customers can manage any application on Containers.

    You will learn:

    How to automate provisioning
    How this solution simplifies operations and management
    How to save costs with elasticity
  • Everything You Wanted To Know about Storage But Were Too Proud To Ask: iSCSI Pod Everything You Wanted To Know about Storage But Were Too Proud To Ask: iSCSI Pod J Metz, Cisco, Loy Evans, Cisco, Rob Davis, Mellanox, Alex McDonald, NetApp Mar 2 2017 6:00 pm UTC 75 mins
    One of the most used technologies in Data Centers today is the storage protocol iSCSI. With the increasing speeds for Ethernet, the technology is more and more appealing because of its relative low cost to implement. However, like any other Storage Technology, there is more here than meets the eye.

    In this webcast, we will be focusing entirely on iSCSI. We’ll start by covering the basic elements that will make your life easier if you are considering using iSCSI in your architecture. In particular we will be talking about:

    •iSCSI Definition
    •iSCSI offload
    •Host-based iSCSI
    •TCP offload

    Like nearly everything else in storage, there is more here than just a protocol. If you are interested in making the most of your iSCSI solution, this webcast is for you.
  • Going Beyond with Arcserve UDP Hardware Snapshots Going Beyond with Arcserve UDP Hardware Snapshots Gary Sussman, Kervin Myrtil Mar 2 2017 7:00 pm UTC 60 mins
    Software-based snapshots for VMware & Hyper-V host servers can significantly burden virtual machine performance. The solution, utilize Arcserve UDP hardware storage snapshot copies for high-performance backup without sacrificing virtual machine performance.
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime. Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink. Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Jim Davis, Senior Analyst of Service Providers at 451 Research; Dave Nuti, VP of Business Development at Aryaka Mar 7 2017 6:00 pm UTC 60 mins
    The biggest challenge facing global enterprises today is the ability to deliver fast and reliable performance of mission-critical applications to worldwide users, especially when they work in cloud and SaaS environments. The move to cloud has exposed some of the limitations to MPLS networking services. Is it time to replace (or augment) MPLS with SD-WAN?

    Join Jim Davis, Senior Analyst of 451 Research, and Dave Nuti, Vice President of Business Development at Aryaka, as they present their latest findings on the best practices for delivering fast and reliable application performance using a global SD-WAN. Attend this special webinar to learn:

    •The current challenges with data and application delivery faced by global enterprises, including striking a balance between performance, cost, and deployment flexibility.
    •Why legacy networks, such as MPLS and the public Internet, do not work for application delivery in today’s global environment
    •The best practices to improve global application performance using an SD-WAN as a service