Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Recorded: Oct 25 2016 60 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Recorded: Oct 25 2016 53 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 64 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Global Partner Evangelist Recorded: Oct 25 2016 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Recorded: Oct 25 2016 61 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Securing Hyperconverged Infrastructure Securing Hyperconverged Infrastructure Rohit Goyal, Nutanix Security PMM Recorded: Oct 25 2016 38 mins
    Security in the modern datacenter requires an evolved mindset and approach. In this technical webinar, Nutanix will provide deep insight into the latest security advancements engineered into the Nutanix enterprise cloud platform, and explain how these advancements can be leveraged to build the most secure environments for your applications and data. Join this webinar to learn security best practices and ask questions relevant to your organization.

    Nutanix offers defense in depth by embracing a security-first approach to platform design and development. The Nutanix enterprise cloud platform combines powerful features, including two-factor authentication and data at rest encryption, with a Security Development Lifecycle that is integrated into product development to help customers meet the most stringent security requirements. The Nutanix solution is certified across a broad set of evaluation programs to ensure compliance with the strictest standards.
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Recorded: Oct 25 2016 66 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • IP EXPO – On the Spot: Nick Burrows IP EXPO – On the Spot: Nick Burrows Nick Burrows, Proposition Development Director at Alternative Networks Recorded: Oct 25 2016 2 mins
    EM360° spoke to Nick Burrows, Proposition Development Director at Alternative Networks, who identifies some of the most common challenges that organisations face today, including low resistance to cybercrime; the inability to change; and a lack of resilience to disasters.
  • Ever Have Problems Validating Performances of Wired and Wi-Fi Networks, and Want Ever Have Problems Validating Performances of Wired and Wi-Fi Networks, and Want Bai Qing, Technical Director, SystemEngineer360 Pte Ltd Recorded: Oct 25 2016 45 mins
    Want to learn more about point-to-point performance testing of traffic streams across the network infrastructure by assessing its throughput, loss, latency, and jitter characteristics? Join our expert in this live webinar, who will introduce you to the OneTouch AT Analyzer's Wired & Wireless Performance Tests capabilities - a sure way to validate performances of wired and Wi-Fi networks.
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Recorded: Oct 21 2016 36 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Singapore Data Centre Colocation Market: Supply Metrics and Demand Trends Singapore Data Centre Colocation Market: Supply Metrics and Demand Trends Jabez Tan, Research Director, Data Centre Infrastructure, Structure Research Recorded: Oct 20 2016 30 mins
    This session will provide detailed data centre metrics on the supply/demand landscape for colocation providers operating in the Singapore market. We take it one step further by segmenting Singapore into three primary districts or sub-regions to capture the nuance in each data centre hub location. How much data centre square feet, critical power is currently available and utilized in Singapore? And more importantly how much revenue is being generated by these third party service provider data centres? Where is it now and where is it headed? We will unwrap our detailed revenue and capacity projections from 2016-2020 while providing analytical insight on the factors driving growth.
  • Big Data Storage: Options & Recommendations Big Data Storage: Options & Recommendations Jagane Sundar, WANdisco CTO Recorded: Oct 20 2016 51 mins
    Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices, including solid-state or spinning disk for clusters and enterprise storage for compatibility layers and connectors.

    In this webinar, our experts will review the storage options available to Hadoop architects and provide recommendations for each use case, an active-active replication option that makes data available across multiple storage systems.
  • 3 Critical Data Preparation Mistakes and How-to Avoid them 3 Critical Data Preparation Mistakes and How-to Avoid them Mark Vivien, Business Development, Big Data Recorded: Oct 20 2016 32 mins
    Whether you're just starting out or a seasoned solution architect, developer, or data scientist, there are most likely key mistakes that you've probably made in the past, may be making now, or will most likely make in the future. In fact, these same mistakes are most likely impacting your company's overall success with their analytics program.

    Join us for our upcoming webinar, 3 Critical Data Preparation Mistakes and How to avoid them, as we discuss 3 of the most critical, fundamental pitfalls and more!

    • Importance of early and effective business partner engagement
    • Importance of business context to governance
    • Importance of change and learning to your development methodology
  • Backup into the Cloud. Has the time come? Backup into the Cloud. Has the time come? Dave Elliott, Global Product Lead, Enterprise Cloud; Randy Serafini, Sr. Manager, Product Marketing, Veritas Recorded: Oct 20 2016 28 mins
    We all know that data is growing at a really fast rate for a variety of reasons. At the same time, budgets for storing and protecting that growing data are not changing, or not as quickly as the data is growing. The classic ‘do-more-with-less’ drumbeat in IT continues.

    With tape as the primary backup target, companies are facing many limitations which are becoming more and more problematic in a world where data security, compliance, and availability are critical.

    Hear from Dave Elliot (Google) and Randy Serafini (Veritas) as they discuss about cloud storage, backup, and some of key aspects of making the decisions on moving to the cloud as a backup destination.
  • Gen 4 Attacks: Web Behavior Analytics to Protect Websites Gen 4 Attacks: Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Recorded: Oct 20 2016 58 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • NVM Express Over Fabrics -- A Panel Discussion NVM Express Over Fabrics -- A Panel Discussion Brandon Hoff, Broadcom; Keith Deierling, Mellanox Technologies; Fazil Osman, Broadcom; Praveen Midha, Qlogic Recorded: Oct 20 2016 58 mins
    NVM Express(R) over Fabrics has the promise of unleashing the potential performance of NVMe(TM) drives in a scalable manner by leveraging the capabilities of mainstream high-performance interconnects. There are already several fabrics that have taken the lead in proposed deployments, and others that are being considered. This panel of technologists reviews the benefits of using different fabrics as the platform for this new initiative, and explores how what value they bring to the party for specific applications and workloads. Is one fabric the clear winner, or does the choice depend upon what the end-user is trying to accomplish?
  • Storage Performance Benchmarking: File Components Storage Performance Benchmarking: File Components Mark Rogov, EMC, Ken Cantrell, NetApp, Alex McDonald, NetApp Recorded: Oct 20 2016 61 mins
    The storage performance benchmarking dynamic duo, Mark Rogov and Ken Cantrell, are back. Having covered storage performance benchmarking fundamentals, system under test and most recently block components, this fourth installment of the Webcast series will focus on File Components.

    Register now to learn why the File World is different from the Block World. Mark and Ken will walk through the basic filesystem theory to how filesystem data layout affects performance, covering:

    • Why file?
    • Local vs. shared filesystems
    • Compare and contrast typical file performance use cases
  • Fast Track to Leveraging Object Storage Fast Track to Leveraging Object Storage Adrian Herrera, VP of Marketing & John Bell, Sr. Solutions Engineer Recorded: Oct 20 2016 53 mins
    You’ve heard about all the advantages of using object storage, but how can you get on the fast track and make it a reality? Caringo VP of Marketing Adrian Herrera and Sr. Solutions Engineer John Bell provide an overview of just how to make the jump to object storage so you can lower your overall storage TCO, increase productivity, and eliminate risk with no disruption to current processes or workflows.
  • Building A Superior XenDesktop Experience Building A Superior XenDesktop Experience Gunnar Berger, Citrix, Kenneth Wong, RPM Mortgage, Michael Thomason, Emory Health & Calvin Nieh, Pure Storage Recorded: Oct 20 2016 62 mins
    Learn how two customers have transformed end-user and VDI administrator productivity with Citrix XenDesktop and Pure Storage. Hear directly from Emory Healthcare and RPM Mortgage on how they have built and deployed a XenDesktop solution that delivers a superior end-user experience with management simplicity and a lower cost infrastructure.

    Featured Speakers:
    Gunnar Berger, CTO Office, Citrix
    Kenneth Wong, Sr. Network Engineer, RPM Mortgage
    Michael Thomason, Chief Technology Architect, Emory Health
    Calvin Nieh, Solutions Marketing, Pure Storage
  • IT Automation with NSX Network Virtualization and Security IT Automation with NSX Network Virtualization and Security Mark Schweighardt, Director of Product Marketing, VMware and Andrew Voltmer, Sr Product Line Manager, VMware Recorded: Oct 20 2016 57 mins
    Today, enterprises are being held back by their physical networking and security infrastructure. Manual configuration decreases an enterprise's speed, agility, and security and increases the risk of downtime and security incidents due to errors. In this session we will cover automation solutions for NSX network virtualization and security. We will discuss how enterprises are automating provisioning and configuration management for their networking and security infrastructure and achieving more speed, agility, and consistency—with much better economics for their operating expenses.
  • The Intelligent Approach to Storage & Virtualization The Intelligent Approach to Storage & Virtualization Peter McCallum Recorded: Oct 20 2016 56 mins
    How do IT organizations manage data and control costs across paradigms in a way that does not restrict or prohibit portability? How do IT organizations provide consistent core-to-edge insight, capabilities and data services regardless of the location, vendor or platform? As organizations move to Software-Defined Data Centers, new approaches are required to address long-standing challenges, such as the need for interoperability, insight, and common tools. Modernizing existing infrastructure results in IT organizations needing to achieve greater efficiencies, reduced downtime, lower costs, and improved simplicity in a way that only a software-defined approach can deliver.

    Addressing These Challenges With A Unique Architecture

    -Choose the right storage paradigm
    -For the right service-level
    -With the right performance and economic benefit

    It's time to break the cycle of vendor lock-in
  • Monitor with Discipline – Next Generation Data Centers Monitor with Discipline – Next Generation Data Centers Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Oct 20 2016 22 mins
    Next generation data centers are filling the industry with buzz worthy tech concepts like hybrid IT, clouds, software defined anything, containers and micro-services. These sometimes disparate constructs can solve the same problem in multiple ways. As such connected context will be key to effectively and efficiently managing application performance across these next generation data centers.

    In this session, we will be discussing how to monitor with discipline across next generation data centers.
    1. What are next generation data centers?

    2. How do IT organizations manage and optimize operational efficacy of these next gen data centers?

    - Connected context of key application performance metrics

    - DART-SOAR examples to meet the CIO’s SLA
  • Leveraging Next-Gen Security Analytics against Advanced Threats Leveraging Next-Gen Security Analytics against Advanced Threats Mike Hamilton, Sr Vice President of Products, Ziften Technologies & Dana Gardner, Principal Analyst, Interarbor Solutions Recorded: Oct 20 2016 48 mins
    Join this interview between Mike Hamilton, Sr VP of Products at Ziften Technologies & Dana Gardner, Principal Analyst at Interarbor Solutions to discover the latest security trends driving the need for predictive protection. Learn how leveraging next generation security analytics enables protection against advanced threats, such as human directed attacks, ransomware, cryptoware and unknown malware. The interview will provide insights into how businesses can meet their security goals with enterprise-wide visibility and instant analytics.