Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Automating Application Delivery across Hybrid Multi-Cloud
    Automating Application Delivery across Hybrid Multi-Cloud
    Blake Connell, Director of Product Marketing at Citrix & Ken Ross, Director Product Management at Citrix Recorded: May 23 2019 47 mins
    As applications move into the cloud from traditional data centers, they are not only moving to one but multiple clouds, diversity is king to prevent lock-in. They are also living in a hybrid fashion leaving some components on premises while others move to the cloud. This new reality requires a strategic solution to maintain control. This webinar provides solution to the challenges faces with visibility, management, and insight. How do I ensure the security of my applications? Where can we improve performance? How do control updates? You will leave this session prepared to confidently move your applications to the cloud but do it with a solid strategy.
  • Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Enterprise Class Data Protection for customers of all sizes with IDPA DP4400
    Marc Mombourquette and Michael Carcerano, Dell EMC Recorded: May 23 2019 50 mins
    Enterprise Class Data Protection for Customers of All Sizes with IDPA DP4400

    Existing data protection solutions targeted at the mid-size orgs sacrifice comprehensive coverage, efficiency, and support in the name of simplicity. The IDPA DP4400, including the new 8-24TB option, delivers a converged data protection solution that is the perfect mix of simplicity and power for SMB organizations and remote office/branch office (ROBO) environments. In addition, it offers the lowest cost-to-protect and is guaranteed under the Future-Proof Loyalty program.

    In this webinar, you’ll learn how Dell EMC’s IDPA DP4400 is not only receiving plaudits from industry experts, but also winning the trust of new and existing customers. According to IDC, both IDPA revenue and unit shipments have grown by more than 10x from 2017 to 2018 with an annual run rate exceeding $100 million in just six quarters in the market.

    The IDPA DP4400 is a turnkey data protection appliance tailor-made for mid-size organizations. It offers complete backup, deduplication, replication, recovery, search & analytics, system management—plus, cloud readiness with disaster recovery and long-term retention to the cloud—all in a convenient 2U appliance.

    Come learn how your organization can benefit from all that IDPA DP4400 has to offer.


    Presented by:
    Marc Mombourquette - Product Marketing, Dell EMC
    Michael Carcerano – Product Management, Dell EMC
  • Right Tool for the Job: Using Qubole Presto for Interactive and Ad-Hoc Queries
    Right Tool for the Job: Using Qubole Presto for Interactive and Ad-Hoc Queries
    Goden Yao, Product Manager at Qubole Recorded: May 23 2019 58 mins
    Presto is the go-to query engine of Qubole customers for interactive and reporting use cases due to its excellent performance and ability to join unstructured and structured data in seconds. Many Qubole customers use Presto along with their favorite BI tools, such as PowerBI, Looker and Tableau to explore data and run queries.

    Two key criteria to look for in a query engine for interactive analytics are performance and cost. You want best-in-class performance to meet the short deadlines of interactive workloads, while reducing and/or controlling costs.

    Qubole Presto is a cloud-optimized version of open source Presto, with enhancements that improve performance, reliability and cost. In this webinar, we’ll cover:

    - When to use Presto versus other engines like Apache Spark
    - How to enable self-service access to your data lake
    - The key advantages of Qubole Presto over Open Source Presto
    - Live demo of running interactive and ad hoc queries using Qubole Presto
    - How customers like iBotta, Tivo and Return Path leverage Qubole Presto
  • Make the most of your APM/NPM Tools with AIOps
    Make the most of your APM/NPM Tools with AIOps
    Jason Trunk & Iain Armstrong, BigPanda Recorded: May 23 2019 43 mins
    Like most enterprises, you've likely invested in best-in-class APM and NPM tools.

    But now, do you find that your NOC and IT Ops teams are

    - Sifting through thousands of APM and NPM alerts to determine business impact in real-time?
    - Endlessly tweaking thresholds and suppressing alerts to catch disruptions, problems and outages in time?
    - Constantly living with the fear of missing important alerts?

    Join Jason Trunk and Iain Armstrong from BigPanda as they explain how to use AIOps to help you unlock the full value of your APM and NPM investments. Help your NOC and IT Ops teams finally take full advantage of the deep monitoring data generated by these tools.
  • The Vertica Management Console: Four Use Cases for Optimal Resource Management
    The Vertica Management Console: Four Use Cases for Optimal Resource Management
    Joe Walsh and Jeff Healey, Vertica Recorded: May 23 2019 55 mins
    Did you know that you can provision, manage, and monitor multiple Vertica clusters, all from a single, unified console? DBAs rely on the Vertica Management Console to optimally manage Vertica resources, ensuring data engineers and data analysts experience the performance they require as they derive insight from growing data volumes.

    Join us to learn the top four use cases for the Vertica Management Console. Specifically, you will learn how the Vertica Management Console can enable your organization to effectively manage system resources across all your users to deliver optimal query performance, understand query optimization paths and resource usage, plan and triage queries by looking at historical system data, and receive timely alerts to keep Vertica running optimally.
  • Enable the Edge:  Orchestration and Automation for Edge Computing
    Enable the Edge: Orchestration and Automation for Edge Computing
    David Carrera, Scientific Director, NearbyComputing Recorded: May 23 2019 57 mins
    Industry is seeking simple mechanisms to unleash the potential of Internet of Things (IoT) and 5G at the core of their business operations. This necessarily implicates the use of Edge Computing technologies, which are needed in several key industrial use cases. But even though the emergence of the Edge Computing revolution is imminent, the move toward new edge computing solutions is today limited by the following critical problems: 1) key companies of the industry will NOT engage in an entire transformation or evolution of their IT core systems until new advanced mechanisms are developed} to provide them with a tight control of OPEX; and 2) the current business models do not foresee the additional revenue required to cover the vast expense of deploying edge computing solutions at scale, and therefore there is a need for innovative tools and platforms provide transparent management of the increased heterogeneity, and seamless interoperability.
    In this session, we will introduce the NearbyComputing Platform, an orchestration framework, designed to help companies overcome the above-mentioned limitations to adopt the Edge Computing paradigm. Through the unique model-driven approach and seamless interoperability of our solution, companies across diverse sectors (CSPs, Oil & Gas, Industry 4.0, Smart Cities) see their operational costs reduced by simplifying the management of their infrastructure, automating complex processes and introducing new high-value services that could not be deployed before.
  • See Intel Data Center Manager for HPC Clusters in Action
    See Intel Data Center Manager for HPC Clusters in Action
    Ofer Lior, EMEA Business Development Manager and Dror Shenkar, Chief Architect Recorded: May 23 2019 55 mins
    In this webinar, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO.

    We will demonstrate some of the benefits of Intel® DCM managing your HPC Cluster:
    • Collects real-time accurate power and thermal consumption data that gives you the insights needed to manage your HPC clusters power usage and hotspots.
    • Monitors granular sub-component failure analysis and out of band real-time utilization data (CPU, disk, and memory). It reduces MTTR, increases uptime, and predictive component-level health management.
    • Intel® DCM SDK can be integrated into HPC job scheduler to optimize power performance while scheduling jobs in the HPC environment.
    • And more....
  • Architectures innovantes avec Commvault & CISCO
    Architectures innovantes avec Commvault & CISCO
    Dominique Renard Recorded: May 23 2019 24 mins
    Architectures innovantes avec Commvault & CISCO, autour de Commvault HyperScale basée sur Cisco UCS, comment protéger vos données et workload stockées dans Cisco HyperFlex et AzureStack
  • Intelligent Operations and Automation
    Intelligent Operations and Automation
    KC Phua, Director Technical Experts APAC, Data Management & Protection, Global Field and Industry Solutions, Hitachi Vantara Recorded: May 23 2019 51 mins
    Digital transformation is happening. Data infrastructure is transforming. It is the nerve center of your DATA.

    This DATA infrastructure is becoming more complex and more critical to business, and the load on both that infrastructure and the people running it has never stopped growing.

    Automation is a crucial enabler to this transformation, and will become a major competitive area for infrastructure vendors.

    In this webinar, we will discuss and share -

    • How to approach automation and develop automation strategy.
    • The way it is being affected by artificial intelligence and machine learning.
    • Use cases explaining how automated operations can improve IT efficiency & responsiveness.
  • Cloudflare Speed Week Recap
    Cloudflare Speed Week Recap
    Derek Yee, Director of Product Marketing @ Cloudflare & Anand Guruprasad, Solutions Engineer @ Cloudflare Recorded: May 23 2019 41 mins
    Join us for this 45-minute webinar where we will do a recap of the announcements made during Cloudflare’s inaugural Speed Week. Cloudflare released several new products that are designed to improve the web experience for our customers. We’ll explore each of the announcements that include:

    - How Cloudflare Argo is getting smarter and faster
    - How HTTP/2 requests can be handled and prioritised more effectively
    - Simplify image management, and reduce the number of image variants needed for mobile and other display types
    - Improving the load times of progressive images with HTTP/2 prioritisation
    - Optimising the delivery of live video stream content with reduced lag
    - Supporting a lightweight, faster JavaScript framework

    We have also specially invited Harshad Rotithor, Chief Architect of Carousell, to share on how the smartphone and web-based marketplace for buying and selling new and used goods, has successfully leveraged on Cloudflare's products and services to improve its APAC business performance.

    If web performance matters to you, and you ever needed a reason to try Cloudflare, this webinar is especially for you. Learn how we’re different, and how we’re challenging the status quo, believing that fast is never fast enough.

    Register today!
  • Solving The Problem Of TLS Visibility
    Solving The Problem Of TLS Visibility
    John Wagnon Recorded: May 22 2019 12 mins
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • Quick Intro to Network Analytics and Telemetry with Anuta ATOM
    Quick Intro to Network Analytics and Telemetry with Anuta ATOM
    Anuta Networks Recorded: May 22 2019 1 min
    Anuta ATOM is the single source of truth for configuration and operational data across multiple domains. Administrators and external applications can query the data, generate reports, perform compliance checks or schedule a periodic inventory of the infrastructure.
  • Seven Steps to a Successful AWS Cloud Migration
    Seven Steps to a Successful AWS Cloud Migration
    Ashrith Mekala, Head of Engineering at Cloudwick Recorded: May 22 2019 31 mins
    Cloud migration is more about processes than data. Even seemingly simple tasks like file distribution can require complex migration steps to ensure that the resulting cloud infrastructure matches the desired workflow. Most cloud benefits, from cost savings to scalability, are justifiable. But a proven methodology, a complete understanding of the risks, careful planning and flawless execution are necessary to realize those returns.

    Join presenter Ashrith Mekala, Head of Engineering at Cloudwick, as he shares his experience as a big data solutions architect who has successfully guided dozens of enterprises through the AWS cloud migration process. Attendees can apply these learnings to refine their own processes, avoid the risks, and optimize the benefits of current and planned cloud migrations.

    Topics include:

    – Migration models - forklift, hybrid, native
    – Framework - data migration, data validation and app integration
    – Methodology - including pre-migration state and cloud cost assessment using Pepperdata
    – GAP analysis and project planning
    – Moving from pilot to production
    – Key transition tasks and on-going support
  • Apples, Oranges, and eDiscovery Pricing
    Apples, Oranges, and eDiscovery Pricing
    Ashish Prasad and Todd Haley Recorded: May 22 2019 36 mins
    Achieving Greater Savings and More Efficiency in eDiscovery through Alternative Billing and Operational Solutions

    eDiscovery practitioners are always seeking to obtain the best efficiency and most cost-effective solution for their data management and electronic discovery needs. With the consolidation of providers and the increasing growth of data volumes, this can be a challenging proposition and, between the traditional per gigabyte models and the growing subscription-based pricing models, it can be hard to develop an “apples-to-apples” comparison.

    This expert presentation led by industry eDiscovery experts Ashish Prasad and Todd Haley will help industry professionals understand and more appropriately consider the pros and cons of different models of pricing for eDiscovery services in the areas of forensics, processing, hosting, review, and consulting.

    Webcast Highlights:

    + Defining Pricing Models
    + How Subscription-Based Models Save Costs
    + Apples-to-Oranges: Can a real comparison be made?
    + How Pricing Differs by Service

    Presenting Experts:

    + Ashish Prasad

    As VP and GC of HaystackID. Ashish is regarded as among the leading experts on discovery in the US. He has served as Litigation Partner, Founder and Chair of the Mayer Brown LLP Electronic Discovery and Records Management Practice, Founder and CEO of Discovery Services LLC, and VP and GC of eTERA Consulting. Over the past decade, Ashish has authored over two dozen articles, and given over 100 legal education seminars, on eDiscovery issues before judges, practicing lawyers and industry groups in the US, Europe, and Asia.

    + Todd Haley

    As VP of Strategic Solutions for HaystackID, Todd provides consulting and operational guidance to help legal departments and law firms address matters related to the planning, management, and execution of eDiscovery. An IT expert with expertise in managed services, Todd has served in IT and leadership positions with multiple law firms and technology integrators.
  • CSA Study: Security Challenges in Cloud Environments
    CSA Study: Security Challenges in Cloud Environments
    John Yeoh, Global VP of Research (CSA) & Yitzy Tannenbaum Product Marketing Manager (AlgoSec) Recorded: May 22 2019 61 mins
    Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.

    In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.

    Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).

    We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:

    • Workloads being used in or moved to the cloud and how they are being deployed/migrated
    • Types of cloud platforms being used by companies
    • Common security challenges faced by companies when moving workloads to the cloud
    • Methods of managing risk and vulnerabilities in the cloud environment
    • Causes of network or application outages and the amount of time it took to remediate
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer Recorded: May 22 2019 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Defensive Security Techniques You Can Use Now
    Defensive Security Techniques You Can Use Now
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant Recorded: May 22 2019 60 mins
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • How to Migrate Legacy Backups to the Cloud with Commvault
    How to Migrate Legacy Backups to the Cloud with Commvault
    Matt Tyrer and Paolo Iacoviello - Commvault Recorded: May 22 2019 33 mins
    Time to turn off your legacy backup! Commvault moves that old data to the cloud.

    Are you still paying maintenance on old backup systems just because you aren’t sure what to do with those backup and archive data sets that still need to be kept for compliance or retention requirements? What if you could migrate those backups and archives directly to the cloud while preserving the important metadata such as the original retention date stamps and times?

    Join Commvault to learn how to move backups and archives out of legacy systems – and store those datasets and workloads directly in cloud storage.

    Our technical subject matter experts will explain how the Commvault platform can automatically capture legacy backups and archives for cloud migration. Learn how to move backups to the cloud from any of these systems:

    Veritas NetBackup
    Veritas BackupExec
    IBM Spectrum Protect, previously called Tivoli Storage Manager (TSM)
    Dell EMC NetWorker
    Dell EMC Avamar
    Microsoft Data Protection Manager (DPM)
    Microfocus Data Protector, previously HP Data Protector

    You don’t need to keep that old system running in the corner “just in case.” Learn how to streamline your IT workload, provide better data availability, and include your legacy backups in enterprise search.
  • How ATOS Uses PlateSpin Migrate
    How ATOS Uses PlateSpin Migrate
    Stephan Riebroek, Jo de Baer Recorded: May 22 2019 52 mins
    This webinar is brought to you by the Vivit Automation and Cloud Builders Special Interest Group (SIG).

    In this webinar, you will learn all about Micro Focus PlateSpin; what it is and how can this tool be used to migrate workload from one place to another. The speaker will also explain how the migration to different platforms is setup. After attending this webinar, you will know:

    • The core principles of 'lift-and-shift" server migration
    • How ATOS is using PlateSpin to successfully migrate customer applications to the cloud and other platforms
    • What major features were recently added to PlateSpin and what the future road map looks like
  • New Landscape of Network Speeds
    New Landscape of Network Speeds
    David Chalupsky, Intel; Craig Carlson, Marvell; Peter Onufryck, Microchip; John Kim, Mellanox Recorded: May 21 2019 66 mins
    In the short period from 2014-2018, Ethernet equipment vendors have announced big increases in line speeds, shipping 25, 50, and 100 Gigabits-per -second (Gb/s) speeds and announcing 200/400 Gb/s. At the same time Fibre Channel vendors have launched 32GFC, 64GFC and 128GFC technology while InfiniBand has reached 200Gb/s (called HDR) speeds.

    But who exactly is asking for these faster new networking speeds, and how will they use them? Are there servers, storage, and applications that can make good use of them? How are these new speeds achieved? Are new types of signaling, cables and transceivers required? How will changes in PCIe standards keep up? And do the faster speeds come with different distance limitations?

    Watch this SNIA Networking Storage Forum (NSF) webcast to learn how these new speeds are achieved, where they are likely to be deployed for storage, and what infrastructure changes are needed to support them.
  • Connecting Core to Edge: Investigating Two Multicloud Deployment Use Cases
    Connecting Core to Edge: Investigating Two Multicloud Deployment Use Cases
    Dominic Romeo – Director Product Management | TierPoint and Will Pittman – Ecosystem Director | Megaport Recorded: May 21 2019 60 mins
    Analyst firm Gartner predicts that by 2022, more than 50% of enterprise-generated data will be created and processed outside of the data center or cloud, up from less than 10% in 2019.

    As a result, businesses are increasingly leveraging both hyperscale data centers and cloud deployments closer to the edge to support their IT strategies and digital transformation initiatives.

    Rapid growth in multicloud IT deployments is driving an increased need to consider options for connectivity. Dedicated, fast, and globally-reaching connectivity is key to bringing the cloud closer to the edge where businesses reside and need services.

    Join TierPoint and Megaport for an in-depth look at two multicloud use cases. Our experts will give their insights into how the demand for both hyperscale and edge computing can be combined with cloud connectivity to make cloud strategies a reality.
  • Achieving uCPE success with ADVA and Intel
    Achieving uCPE success with ADVA and Intel
    Prayson Pate, CTO, ADVA Edge Cloud & Sab Gosal, Segment Director, Communications Infrastructure Devices, Intel Recorded: May 21 2019 55 mins
    The uCPE market is hot right now because it enables cloud-centric deployment of services like SD-WAN, firewall, IoT, and micro-cloud. But service providers and enterprises are concerned about performance, scalability and complexity. This webinar will talk about the trends and opportunities for uCPE, how ADVA and Intel can address the challenges, and some real-world use cases for uCPE.
  • Cloud Vision 2020: The Future of the Cloud
    Cloud Vision 2020: The Future of the Cloud
    Jeff Behl, Chief Product Officer at LogicMonitor and William Fellows Research Vice President and Founder of 451 Research Recorded: May 21 2019 58 mins
    Your cloud journey is underway. That’s a fact. So what’s next and how can you best prepare your organization for long term success? Cloud Vision 2020: The Future of the Cloud from LogicMonitor provides answers. Compiled from the predictions of more than 300 industry influencers, this report outlines of the future of the cloud and contains valuable insights and tips for IT leaders preparing for and continuing on in their transition to the cloud.

    Join Jeff Behl, LogicMonitor Chief Product Officer and William Fellows, VP of Research for 451 Research’s Cloud Transformation Channel as they reveal the survey results and discuss ramifications for the market.

    Cloud Vision 2020: Future of the Cloud Webinar will cover:
    -Will Enterprises ever be 100% in the cloud?
    -What trends are actually driving cloud engagement today?
    -What will the drivers to the cloud be in 2020?
    -Which cloud vendors will gain/lose market share?
    -How can these findings be applied to your cloud strategy?

    Learn why Forbes, USA Today, and TechRepublic are talking about LogicMonitor’s Cloud Vision 2020 study. Follow the conversation on Twitter, using the hashtag #CloudVision2020
  • Achieve 70% Cheaper Cloud Architectures for Retail
    Achieve 70% Cheaper Cloud Architectures for Retail
    Adam Dagnall, SE, Cloudian Recorded: May 21 2019 51 mins
    Learn how UK retailers save 70% of Data Storage costs w/ Cloudian feat. an exclusive Intel keynote.

    Slash Backup & Data Protection costs and eliminate ingress/egress charges by:

    • Repatriating workloads from AWS
    • Re-optimising Hadoop Big Data workloads
    • Saving 70% – 80% of storage costs for Splunk with Splunk SmartStore
    • Tiering data from Pure Storage Flash array to free up capacity trapped with Snaps

    Join our webinar on 21 May at 14:00.
  • Endpoint Security with Dell Technologies
    Endpoint Security with Dell Technologies
    CJ Breaux - Systems Engineer, Dell EMC May 24 2019 5:00 pm UTC 60 mins
    On average, it takes an organization 108 days to detect a security breach. Endpoint security solutions must work with the way employees work today. They not only need to do the job of protecting data and preventing threats, but they should also enable worker productivity – not hinder it. Join us to learn how you can prevent, detect, and respond to threats faster and more efficiently with Dell SafeGuard and Response.
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer May 27 2019 8:00 am UTC 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Intel and Maguay introduce Intel DCM for HPC Clusters
    Intel and Maguay introduce Intel DCM for HPC Clusters
    Ofer Lior, EMEA Business Development Manager and Dror Shenkar, Chief Architect May 28 2019 9:00 am UTC 60 mins
    In this webinar, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO.

    We will demonstrate some of the benefits of Intel® DCM managing your HPC Cluster:

    • Collects real-time accurate power and thermal consumption data that gives you the insights needed to manage your HPC clusters power usage and hotspots.
    • Monitors granular sub-component failure analysis and out of band real-time utilization data (CPU, disk, and memory). It reduces MTTR, increases uptime, and predictive component-level health management.
    • Intel® DCM SDK can be integrated into HPC job scheduler to optimize power performance while scheduling jobs in the HPC environment.
    • And more.
  • The Yin and Yang Relationship of Networking and Security
    The Yin and Yang Relationship of Networking and Security
    Patrick Grillo, Senior Director, Security Solutions, Fortinet May 28 2019 9:00 am UTC 45 mins
    When something is so fundamentally part of something else, it’s difficult to imagine them not being mentioned in the same breath. All too often however, networking and security are not.

    Whether for historical or organisational reasons, security is typically layered on top of the network with little to no integration between them. While you can say that there is security in the network the open question is “How Effective is it”.

    This session will focus on an architectural approach where the network and security are fully integrated rather than layered, eliminating weak links in the security chain and provide consistent end to end protection and visibility.
  • Integrated Data Protection Appliance DP4400 available in new Capacity Points
    Integrated Data Protection Appliance DP4400 available in new Capacity Points
    Steve Caltagirone, Dell EMC’s EMEA Product Line Manager for Data Protection May 28 2019 10:00 am UTC 60 mins
    Organizations today, especially small- and medium-sized businesses and ROBO environments, are faced with increased complexity data growth, application diversity, increased numbers of users, and resource constraints – driving the need for solutions that enable them to do more with less. Dell EMC – understanding the needs of SMB and ROBO – has just announced the availability of an 8-24TB version of its popular Dell EMC Integrated Data Protection Appliance (IDPA) DP4400. This lower capacity version of IDPA DP4400 is ideal for smaller organizations and remote offices and still allows the ability to grow in place up to 96TB.

    The IDPA DP4400 is a converged, integrated data protection appliance: It offers complete backup, deduplication, replication, recovery – plus, cloud readiness with disaster recovery and long-term retention to the cloud - all in a convenient 2U appliance. All these features are now available in 8 TB-24 TB Usable Capacity.

    Join the webcast & hear from Steve Caltagirone, Dell EMC’s EMEA Product Line Manager for Data Protection how you can benefit from the recently launched Dell EMC Entry Level IDPA.
  • What's New with Service Virtualization 10.5?
    What's New with Service Virtualization 10.5?
    Koustubh Warty and Jeffrey Hughes May 28 2019 3:00 pm UTC 60 mins
    Service Virtualization is releasing version 10.5 with exciting new features including a huge focus on Developers - enabling the ease of use with Enhanced APIs, the New Eclipse Plugin, SVAsCode and the Jenkins Plugin. In addition, we have significantly enhanced our docker implementation to support Kubernetes, new database support for PostgreSQL and last but not the least customer driven reporting enhancements. These new features, along with others, will help your testing teams adopt and improve their Continuous Testing journey with the eventual goal of Digital Transformation. Join Jeff Hughes and Koustubh Warty for a complete discussion and demonstration of the latest features of SV 10.5.
  • 5G: Dynamically Sliced, Differentially Priced
    5G: Dynamically Sliced, Differentially Priced
    Manish Singh, Sr. VP - Network Services at Tech Mahindra May 28 2019 3:00 pm UTC 60 mins
    Tech Mahindra has geared up to support CSPs in their migration to 5G. As a Global SI (Systems Integrator), we are an Innovation Orchestrator closely collaborating with our ecosystem partners of innovators and disruptors. Network of the Future will be dynamically sliced and differentially priced. Network Slicing will enable CSPs to create different logical networks, on a shared Telco Cloud infrastructure, with varying capabilities that best meet the varying requirements of different applications. Throughput, latency, security, mobility requirements can all vary from application to application. Furthermore, economic models across MBB, MIoT and uRLLC will greatly vary and in turn will put varying demands on the network.
  • Customer Service Today: How ServiceNow is Revolutionizing Customer Experience
    Customer Service Today: How ServiceNow is Revolutionizing Customer Experience
    Ajay Gautam, Richard Norton, Meghan Lockwood May 28 2019 5:00 pm UTC 60 mins
    On Tuesday, May 28th, CSM Practice Lead, Ajay Gautam, and ServiceNow Architect, Richard Norton, are teaming up for a ServiceNow Customer Service Webinar to teach you how to revolutionize your customer experience.

    - Find out what your customers are looking for
    - Learn about customer frustrations (and how to prevent them) plus the customer journey and business drivers
    - Get insight on how ServiceNow CSM can help you
    - Review a handful of CSM use cases we see with our clients
  • AI, Automation, & its impact on IT
    AI, Automation, & its impact on IT
    Kevin Surace, CEO & CTO of Appvance.ai May 28 2019 6:00 pm UTC 62 mins
    Artificial Intelligence has arrived in the workplace. As an emerging software technology, IT will most likely own the AI and robotic process automation rollouts across their companies. Tune in to hear Kevin Surace, CEO & CTO of Appvance.ai, discuss the very latest insights and gossip around AI and automation including what you need to know to be successful, which fields are showing success with AI and automation, and how you can guarantee a win.

    Presenter Information
    Kevin Surace is a Silicon Valley innovator, serial entrepreneur, and CEO. Kevin has been featured by Businessweek, Time, Fortune, Forbes, CNN, ABC, MSNBC, FOX News, and has keynoted hundreds of events, from INC5000 to TED to the US Congress. He was INC Magazines’ Entrepreneur of the Year, a CNBC top Innovator of the Decade, World Economic Forum Tech Pioneer, Chair of Silicon Valley Forum, Planet Forward Innovator of the Yearnominee, featured for 5 years on TechTV’s Silicon Spin, and inducted into RIT’s Innovation Hall of Fame.

    Mr. Surace led pioneering work on the first cellular data smartphone (AirCommunicator), the first plastic multichip semiconductor packages, the first human-like AI virtual assistant (Portico), soundproof drywall, high R-value windows, AI-driven building management technology, AI-driven QA automation, and the window/energy retrofits of the Empire State Building and NY Stock Exchange. Kevin is CEO of Appvance.ai, sits on 7 boards and has been awarded 28 US patents.
  • What Your Storage Vendor Isn’t Telling You About S3
    What Your Storage Vendor Isn’t Telling You About S3
    John Bell, Sr. Consultant & Eric Dey, Director of Product May 28 2019 6:00 pm UTC 60 mins
    While the S3 protocol has become the de facto choice for cloud and object storage, there can be important details that your storage vendor isn’t telling you. Are there bottlenecks or scaling problems waiting for you in a year or two? Should you be asking for more than "just S3" for unlocking value from your data? Our experts discuss these secret details and explain how Caringo’s storage solution gives you S3 along with the other pieces necessary to meet your evolving storage needs.
  • Preparing for your journey to the Cloud – Assessment to Business Case.
    Preparing for your journey to the Cloud – Assessment to Business Case.
    Tim Lawrence, UKCloud & Mark Melvin, Shaping Cloud May 29 2019 10:00 am UTC 60 mins
    So you’ve decided you’d like to reap the benefits of Data Centre Modernisation, reducing costs, increasing your operational agility and spending more time focusing on your core business. But you may be left wondering what you need to do, what approaches you can take and some of the key pitfalls to avoid.

    Without a coherent plan, your use of cloud is tactical and piecemeal. It’s difficult to keep control of these new cloud services whilst also keeping your existing IT afloat. In effect things are getting worse and you need them to get better.

    That’s why here at UKCloud we have our Professional Services team – a handpicked group of our experienced multi-cloud experts who can make the process of creating a pragmatic, business-led and coherent cloud adoption plan a breeze.

    Learn more by registering for our upcoming webinar, hosted by Cloud Transformation expert, Tim Lawrence and joined by Mark Melvin from Shaping Cloud, will guide you through this process and help you begin your transformation journey with confidence.

    Agenda

    *How cloud is not the answer to everything.
    *Why the strategy and business case are critical to get the outcome you are looking for.
    *Customer Case Study.
    *An overview of how cloud assessments are performed.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE May 29 2019 10:00 am UTC 45 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.
  • SAP Systems integration with Cloud: how to install Linke AWS Connector for SAP
    SAP Systems integration with Cloud: how to install Linke AWS Connector for SAP
    Guillem Torres - Solution Architect and SAP Expert & Gerard Lagalina - SAP ABAP Analyst. May 29 2019 2:00 pm UTC 75 mins
    Companies that are carrying out their digital transformation find essential to streamline their daily management operations and, at the same time, take advantage of the simplicity, flexibility and efficiency of cloud environments.

    In this context, our new solution AWS Connector for SAP, officially certified by SAP and AWS, help SAP companies to extract, analyze and modify the data on their SAP systems on the AWS cloud platform at a big scale, through the integration of Datalakes, Data Repositories or Machine Learning.

    Join our webinar and learn all the advantages that this product can bring as well as participate on a live demo where we will show you step by step:

    -How to easily install the Addon in real time.
    -How to configure the Addon to connect with an AWS account.
    -The 3 main product use scenarios:
    > SAP Data Archiving,
    > SAP Document Storage (Archivelink Compatible)
    > SAP Data Extraction to S3 (Datalake)
  • Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
    Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
    Doug Hurd, Security Technical Alliances at Cisco and Yonatan Klein, Director of Product Management at AlgoSec May 29 2019 2:00 pm UTC 60 mins
    Many enterprises are moving to Cisco’s next generation firewall, Firepower, which offers unique capabilities - including Next Gen IPS powered by Snort and Advanced Malware Protection (AMP). However, migrating current security policy to Cisco Firepower is often complex, time-consuming and prone to errors. A single mistake could, potentially, cause outages, compliance violations and security gaps.

    In this webinar Doug Hurd, Security Technical Alliances at Cisco and Yonatan Klein, Director of Product Management at AlgoSec, will explore the benefits of Cisco Firepower, how to simplify and accelerate the migration process with AlgoSec, the challenges associated with managing the holistic network, and how AlgoSec can help manage security policies across your disperse network.

    Join this live webinar to hear how to:
    • Utilize a broader set of management and policy optimization features
    • Make the most out of Cisco Firepower’s features and capabilities
    • Automate policy optimization and migration from an existing firewall to Firepower
    • Manage both platforms with a common tool throughout the migration process
    • Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
    • Reduce risks and ensure continuous compliance across the entire enterprise environment
  • Uptime Institute 2019 Data Center Industry Survey Results
    Uptime Institute 2019 Data Center Industry Survey Results
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer May 29 2019 4:00 pm UTC 60 mins
    The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
  • Teradici Desktop Access – Updates on our Latest Releases
    Teradici Desktop Access – Updates on our Latest Releases
    Arjen van der Meulen - Director of PM, Edna Menon - Sr. Product Mgr. & Paul Barrett - Systems Specialist, Teradici May 29 2019 5:00 pm UTC 45 mins
    Teradici recently announced General Availability new releases of all our PCoIP products and components, including PCoIP Zero Client firmware, Remote Workstation Card firmware, and Management Console software that are part of our Desktop Access Plan.
    Learn about new capabilities and participate in a live Q&A with Arjen van der Meulen, Director of Product Management; Edna Menon, Senior Product Manager; and receive a live demo from Paul Barrett, Systems Specialist, Global Support Services.
    This webinar will cover everything you need to learn about the new features in:
    •PCoIP Zero Client Firmware 5.5.2
    •PCoIP Zero Client Firmware 6.3.0
    •PCoIP Remote Workstation Card Agent for Windows 19.05
    •PCoIP Management Console Enterprise 19.05
    Bonus: Learn about Tech Previews for 4K UHD resolution support for PCoIP Zero Clients with PCoIP Remote Workstation Cards and Redhat Package Manager (RPM) support with the Management Console, as well as some tips on how to benefit best from our support portal!
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon May 29 2019 5:00 pm UTC 60 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • Solving The Problem Of TLS Visibility
    Solving The Problem Of TLS Visibility
    John Wagnon May 29 2019 5:00 pm UTC 11 mins
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • Mobile Device Management 101
    Mobile Device Management 101
    Veronica Batista 
Manager, Global Business Development SMB May 29 2019 6:00 pm UTC 35 mins
    Join us to learn more about Mobile Device Management basics. We'll talk through what's possible with MDM and your Apple devices, best practices for enrollment and management, and discuss the value of the App ecosystem to provide the best experience for your end users or customers.
  • The Power of Business Friendly Analytics, Everywhere Business is Done
    The Power of Business Friendly Analytics, Everywhere Business is Done
    Cameron O'Rourke, Director, GoodData May 29 2019 6:00 pm UTC 55 mins
    In this friendly yet fast-paced webinar, Cameron O'Rourke, will show you the full-range of GoodData embedded business intelligence (BI) capabilities — from data intake to creating analytics, as well as building dashboards, embedding, and managing large-scale analytic deployments.

    Learn why 50% of the Fortune 500 uses GoodData to power their enterprise and customer-facing applications and find out how you can get started. This is your chance to see the whole platform, end-to-end, and get answers to any questions you may have.

    We will cover:
    - How analytics for every user is fundamentally different.
    - Scaling analytics.
    - Analytics for developers.
    - Why choose GoodData for embedded, white-label, or OEM analytics?

    This webinar is appropriate for:
    - Anyone seeking to learn more about how to scale their analytics strategy for the enterprise.
    - Anyone evaluating analytics and data management solutions.

    Duration:
    Approximately 45 minutes with additional time for Q&A.
  • RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    Alan Kerr, Senior Solutions Architect at StablePath & Jim Barnes, Director of IT at RSD May 29 2019 6:00 pm UTC 60 mins
    REGISTER NOW to hear the Storage Success Story of RSD, Refrigeration Supplies Distributor and DataCore partner, StablePath.

    The webinar is on May 29th at 2 pm EST. Learn More.

    Meet Refrigeration Supplies Distributor, the largest independently owned refrigeration parts and HVAC equipment wholesaler in the western United States. RSD recently celebrated 112 years in business.

    Meet DataCore partner, StablePath. This California based DataCore reseller has nearly two decades of experience in the IT industry. They have built their solid reputation leveraging best-of-breed technology and services.

    With the help of StablePath, RSD strives to set the mark for customer service. Having a world-class IT infrastructure is a critical element in achieving 100% customer satisfaction!

    ​​The RSD Challenge. Before implementing DataCore software-defined storage, RSD was running production data, including its business-critical ERP system on EMC storage and Veeam backups on tape. However, having a dual-controller single-disk array configuration would cause IT to run into problems, slowness and experience failures continually. They needed a faster solution.

    The StablePath Solution for RSD. A large part of the RSD infrastructure upgrade involved virtualizing the ERP system among others, and a key consideration was the performance needed to power this business-critical asset. The ERP provider ran initial tests with DataCore software-defined storage for RSD, and the results were shocking—not only did it meet the existing performance needs, but it also sped up the system significantly. Plus, their Veeam backups ran 3X faster than before. As a result, RSD experienced:

    Increased Performance, Zero Downtime
    Faster Backups and Comprehensive Disaster Recovery

    Also, remember, all attendees will have the chance to win a $200 gift card.

    See you on the webinar!
    -DataCore Team

    If you have any questions, reach out to us at Info@DataCore.com or +1.954.377.6000.
  • An Introduction to KSQL & Kafka Streams Processing with Ticketmaster
    An Introduction to KSQL & Kafka Streams Processing with Ticketmaster
    Dani Traphagen, Sr. Systems Engineer, Confluent + Chris Smith, VP Engineering Data Science, Ticketmaster May 29 2019 10:00 pm UTC 63 mins
    In this all too fabulous talk with Ticketmaster, we will be addressing the wonderful and new wonders of KSQL vs. KStreams.

    If you are new-ish to Apache Kafka® you may ask yourself, “What is a large Apache Kafka deployment?” And you may tell yourself, “This is not my beautiful KSQL use case!” And you may tell yourself, “This is not my beautiful KStreams use case!” And you may ask yourself, “What is a beautiful Apache Kafka use case?” And you may ask yourself, “Am I right about this architecture? Am I wrong?” And you may say to yourself, “My God! What have I done?”

    In this session, we’re going to delve into all these issues and more with Chris Smith, VP of Engineering Data Science at Ticketmaster.

    Watch now to learn:
    -Ticketmaster Apache Kafka Architecture
    -KSQL Architecture and Use Cases
    -KSQL Performance Considerations
    -When to KSQL and When to Live the KStream
    -How Ticketmaster uses KSQL and KStreams in production to reduce development friction in machine learning products
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC May 30 2019 6:00 am UTC 60 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software May 30 2019 8:00 am UTC 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software May 30 2019 4:00 pm UTC 20 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.