Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Your All-Flash Cloud: Consolidated and Simplified Your All-Flash Cloud: Consolidated and Simplified Sunil Moolchandani, Cohesity and Ravi Venkat, Pure Storage Recorded: Sep 29 2016 35 mins
    Whether a datacenter refresh or new build, IT is moving toward all-flash storage for their business critical cloud infrastructure, and consolidating their secondary storage for all other workloads. But with a growing number of vendor choices, whom can you trust to provide a complete storage solution, from primary through secondary? Pure Storage and Cohesity have partnered to develop tight integration between all-flash primary and hyperconverged secondary storage platforms, to simplify your overall storage environment.

    Join experts from Pure Storage and Cohesity to learn:

    -Which of your secondary workloads, including data protection, file archive, and test/dev, can be consolidated into Cohesity
    -How the integration between Pure and Cohesity simplifies day to day operations
    -Why many Pure and Cohesity joint customers bet on this combination - and are taking advantage of their investment.

    Featured Speakers:
    Sunil Moolchandani, Director of Product Management, Cohesity
    Ravi Venkat, Data Center Architect, Pure Storage
  • How Not to Get Hacked How Not to Get Hacked Microsoft Recorded: Sep 29 2016 60 mins
    Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.

    Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.

    Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.

    This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
  • Intro to Microsoft Azure's Internet of Things (IoT) Intro to Microsoft Azure's Internet of Things (IoT) Jeremy Foster, Senior Technical Evangelist, Microsoft Recorded: Sep 29 2016 26 mins
    The Internet of Things (IoT) is already a huge deal and it's only going to get bigger

    There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.

    That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.

    Join this webcast to learn how to:
    •Conceptualize why you might need a cloud-based hub solution
    •Easily set up an IoT Hub in Azure
    •Create simulated devices and communicate to your hub
  • Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Jesse McKenna, Director of Product Management, Cyber Security Recorded: Sep 29 2016 58 mins
    The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?

    This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
  • Network Performance Management for Cloud & Digital Operations Network Performance Management for Cloud & Digital Operations Jim Frey, Kentik VP Strategic Alliances Recorded: Sep 29 2016 41 mins
    Traditional network performance management (NPM) was designed in the pre-cloud days of monolithic applications running in centralized data centers. But in the cloud and digital business era, applications are more distributed, and network traffic patterns are more complex and reliant on Internet transit. Cloud-friendly NPM for digital operations requires a different approach, one that can collect pervasive performance data from cloud environments, integrate unsummarized NetFlow and Internet path data, and offer Big Data insights to assure optimal user experience. Join this webinar to learn how to get this integrated insight for cloud and Internet-facing applications.
  • Managing the End User Experience with GPU-Powered Insights Managing the End User Experience with GPU-Powered Insights Sumanta Chakraborty, GRID Product Manager, NVIDIA and Bala Vaidhinathan, CTO, eG Innovations Recorded: Sep 29 2016 70 mins
    GPU technology improves Citrix virtual desktops and applications, but to truly deliver an immersive user experience that scales, organizations need to manage the complete GPU deployment lifecycle – from designing the infrastructure, to managing and optimizing a production environment, to responding to user issues dynamically, in real-time.

    eG Innovations in partnership with NVIDIA is delivering comprehensive monitoring capabilities that enable IT to better manage all aspects of the user experience, tapping into new GPU-sourced insights that aid in design right-sizing, proactive infrastructure optimization and help desk issue remediation. This new joint solution integrates eG Enterprise with NVIDIA GRID software to provide actionable insights through host-level, guest-level, and application-level analytics.

    Attend this webinar to learn how to deliver complete lifecycle management of the end user experience for GPU-powered applications and desktops.
  • Lightboard Series: Episode 3 - The Future of Business Now: Automation Lightboard Series: Episode 3 - The Future of Business Now: Automation Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Recorded: Sep 29 2016 23 mins
    Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.

    The delivery of IT services and applications has historically been a slow, manual, error-prone process. In this session, discover:

    - How the VMware NSX network virtualization platform automates your networking and security operations, increasing the speed, agility, and consistency of your business, without compromising on security
    - With NSX and vRealize Automation, we’ll show you how to reduce manual operations of network and security services, making it is possible to deliver end-to-end services that include applications, VMs, networks, security policies and load balancers
    - We’ll also demonstrate an incident response scenario. In this, we’ll show you how security automation allows the shift away from a very manual ticket driven process to a faster and more efficient automated response

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • Service Assurance in 2020: Fully orchestrated assurance & a path to get there Service Assurance in 2020: Fully orchestrated assurance & a path to get there Marcus Friman, Netrounds; Kaela Loffler, Netrounds Recorded: Sep 29 2016 33 mins
    Network functions virtualization (NFV) has promised us many things- lower capital and operational costs, increased interoperability with best of breed vendors, and at the same time decreased vendor lock-in, and lastly, but most importantly, faster time to revenue for new services with enhanced, agile service creation and platform awareness capabilities. But what exactly does a completely automated network with fully orchestrated assurance look like and what are the benefits that programmable service assurance solutions will bring you?

    This webinar will describe the challenges and limitations with test and assurance today and one suggested transformation route to achieving a fully programmable, actively assured network, allowing you to take advantage of the operational cost savings and the ability to deploy new services faster promised by NFV.
  • 6 Basics of Successful AV Deployment with HDBaseT Over Category Cabling 6 Basics of Successful AV Deployment with HDBaseT Over Category Cabling Todd Harpel, Berk-Tek and Bill Lauby, Leviton Recorded: Sep 29 2016 62 mins
    High Definition Video is prevalent in our everyday lives. From the board room to the classroom, the sports bar to the sports stadium, the demand for dynamic audio-visual content is rapidly increasing. Traditional methods of transporting content to displays are a thing of the past. This presentation explores technologies and methods for connecting A/V sources to HD displays using twisted pair cabling and provides guidance for successful deployment.

    By attending this presentation, you will learn:
    - Cabling system requirements needed to support a high density digital AV distribution environment
    - Alternative methods and equipment that can be used to extend the reach of an HDMI connection

    * One BICSI CEC will be provided after viewing this presentation up until April 15, 2017*
  • Reality Check for Digital Wallet Security Reality Check for Digital Wallet Security Hannah Preston (Hannah.Preston@ca.com), Solution Strategist, Payment Security, CA Technologies & D.J. Murphy, CNP Recorded: Sep 29 2016 25 mins
    Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.

    As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?

    Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.

    Learn the "must haves" for any digital wallet solution:
    • Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
    • Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
    • Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
  • Modern Cybersecurity:  Enhancing Your Recovery Capabilities to Better Survive Modern Cybersecurity: Enhancing Your Recovery Capabilities to Better Survive Jim Shook Recorded: Sep 28 2016 47 mins
    Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.

    In this webcast you will learn about:
    -Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
    -Why new threats require a new focus
    -Cybersecurity frameworks and best practices
    -Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
    -Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
  • Software-Defined WAN:  A Disruptive Intersection Software-Defined WAN: A Disruptive Intersection Rory Browne, Network Architect, Network Platforms Group, Intel Corporation Recorded: Sep 28 2016 38 mins
    Today, Communications service providers face real challenges in terms of their ability to innovate and deliver new services with greater speed and agility and at lower costs. Software-Defined WAN (SD-WAN) is fast becoming a disruptive intersection of cloud, telco and enterprise. SD-WAN offers an alternative to delivering managed services with centralized configuration, management, and optimization of Enterprise applications across the WAN. According to IDC, SD-WAN is projected to be a $6B market by 2020, with an estimated compound annual growth rate of 100 percent.

    In this webinar, viewers will learn about the technologies that enable SD-WAN and the value proposition for enterprises and communications service providers. They’ll also hear about specific deployment options where SD-WAN delivers benefits over traditional methods.
  • China, India set to emerge as cloud powerhouses: The why, how, and when China, India set to emerge as cloud powerhouses: The why, how, and when Agatha Poon Recorded: Sep 28 2016 75 mins
    The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
  • Practical Steps to Data Centre Migration Planning and Execution Practical Steps to Data Centre Migration Planning and Execution Simon Allen, Mike Dorfler, David Cuthbertson, Recorded: Sep 28 2016 45 mins
    This webinar is being delivered in conjunction with the UKDCIG, PTS Consulting and Square Mile Systems.
    Migrating data centres or moving to co-location is complex and subject to cost overruns, especially where existing infrastructure documentation is of questionable quality. We'll show how the use of database driven toolsets can help automate the project processes and avoid many of the typical problems that organisations with overstretched teams encounter.
  • Optimizing Data Protection for VCE VxRail Appliance Optimizing Data Protection for VCE VxRail Appliance Alex Almeida Recorded: Sep 27 2016 54 mins
    VCE VxRail Appliance with EMC data protection provides simple, fast and efficient protection of data and applications regardless of where they live, against whatever might happen, and at the right service level based on business value.
  • Effective IT Security in a Connected Mobile World Effective IT Security in a Connected Mobile World Microsoft Recorded: Sep 27 2016 34 mins
    Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.

    Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.

    Join this webcast to explore some common security scenarios such as:
    •How do you provide access when you can't always control the endpoint?
    •How do you know where all your company's files are right now?
    •If you terminate an employee, how would you know what files they had in their possession.?
    •Could you wipe a terminated employee's corporate data while leaving their personal content alone?

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • Modern Cookbook Design Modern Cookbook Design Kevin Dickerson, Loom Recorded: Sep 27 2016 54 mins
    If you’re a typical Chef user, you learned cookbook design by writing recipes and then tuning functionality with node attributes—and you probably didn’t focus too much on the underlying Ruby concepts. This approach can lead to messy designs that are more difficult to verify and maintain.

    Chef’s fundamental building blocks are resources, not recipes. In this webinar, Kevin Dickerson of Loom (a Chef Certified Partner), will demonstrate a resource-centric approach to designing and verifying cookbooks that can reduce defects, increase clarity, and provide greater isolation of logic and various configuration concerns.

    Kevin will show you how to create and use resources and resource properties instead of emulating resources with recipes. He’ll also teach you how to verify cookbooks, and how verification is simplified when a resource is only concerned with the conditions that affect its behavior.

    You’ll also be introduced to some Ruby concepts that don’t seem to get a lot of attention—after all, Chef cookbooks are written in Ruby.
  • Data Storage Breakthrough: The Beginning of the End for Traditional Storage Data Storage Breakthrough: The Beginning of the End for Traditional Storage Mark Muehl, SVP Platform Technologies, Comcast, Bogomil Balkansky, VP, Google, Florian Leibert, CEO, Mesosphere Recorded: Sep 27 2016 60 mins
    On September 27th, Datera invites you to join an exclusive event where you will hear from leading industry visionaries and experts who will offer executive-level insights into cloud technologies, processes, and solutions needed to keep pace with the speed of business.

    Key experts from Comcast, Google and Mesosphere will be discussing the storage for clouds landscape and how it is changing fast and open source solutions, like Ceph, are just not delivering on the promise.

    This is the storage breakthrough EMC, NetApp and HP don’t want you to know about. Don't make your next storage infrastructure investment on a legacy solution. Find out how an intent defined, infrastructure aware, API-first Dev/Ops, cloudy approach to storage streamlines application infrastructure operations and dramatically improves storage economics for private cloud operators.
  • Open Architecture for Branch Services in the Cloud and on Premises Open Architecture for Branch Services in the Cloud and on Premises George Hamilton, RIFT.io; Noel Charath, RIFT.io; Lakshmi Sharma, Sr. Director of Product Management Recorded: Sep 27 2016 59 mins
    Join this webcast to learn how to seamlessly deploy and orchestrate virtual network functions and services for the branch as both cloud-based and on-premises solutions. You’ll discover how easy it is to operationalize new service offerings and create a path to cost savings, rapid service monetization, and competitive differentiation.

    RIFT.io and Brocade have collaborated to integrate the Brocade Vyatta Network Operating System, deployed as a Virtual Network Function (VNF) Platform, with RIFT.ware’s network service orchestration capabilities (NFV-O). This combination creates an on-premises branch services solution (vCPE) and cloud-based service.
    The webcast will discuss best practices and feature a demo that will show:
    • How Brocade and RIFT.ware jointly deliver a robust and scalable solution for operators to deploy virtualized network services for vCPE in the cloud and customer premises.
    • How RIFT.ware and Brocade work together to deploy Vyatta Network OS as a VNF and VNF platform.
    • Details on why an open architecture approach to interfaces is critical to ensure interoperability and rapid operationalization of services.
  • 5 Ways Digital Learning Helps Build Amazing IT Organizations 5 Ways Digital Learning Helps Build Amazing IT Organizations Jeanette Jacobs, HPE Recorded: Sep 27 2016 48 mins
    Success in the idea economy requires technological agility. You have to act quickly to seize opportunity, respond to threats, turn great ideas into reality and stay ahead of the competition – and these capabilities rely on having an amazing IT organization.

    Amazing IT teams are competent, aligned to the business, highly collaborative and constantly adapting to change. These attributes just don’t happen. You need talent, you need a continuous education strategy and you need the tools to make it happen. Join this webinar to learn how implementing a continuous education strategy using the new HPE ART Enterprise Learning Edition (ELE) will help your journey to amazing.
  • Taking Control: Automation for Cloud Services Taking Control: Automation for Cloud Services Christian Paulus, Vipul Shah, Nikuni Nemani, Robert Tate Recorded: Sep 27 2016 56 mins
    If you’re still spending days to provision infrastructure services, or weeks to deploy applications, it’s time to turn automation on. Join us and learn how you can automate the delivery and management of shared services, infrastructure, and applications.

    What you will learn by attending this webcast:
    - Tips on managing the dynamic hybrid cloud and providing on-demand infrastructure services
    - How the California Department of General Services automated the delivery of virtualized compute, storage, and networking
    - Why hybrid cloud capabilities are key to building a unified environment
  • 2016 Midyear Security Roundup: The Reign of Ransomware 2016 Midyear Security Roundup: The Reign of Ransomware Myla Pilao, Director, TrendLabs Marketing Communications Recorded: Sep 27 2016 38 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • GRAEF replaces EMC VNX and Data Domain with AWS Cloud Storage GRAEF replaces EMC VNX and Data Domain with AWS Cloud Storage David Neumann Recorded: Sep 26 2016 9 mins
    David Neumann, Director of Technology from GRAEF-USA, was tired of being on the “Storage Treadmill”. GRAEF had exponential data growth and the need to refresh their EMC VNX every three years plus backup and tape. Watch this webinar to see how GRAEF replaced EMC VNX systems, backup, tape, and WAN optimization using AWS S3 and Panzura Hybrid Cloud Controllers.
  • Milwaukee Tools Moves Unstructured Data to AWS Milwaukee Tools Moves Unstructured Data to AWS Alan Musser Recorded: Sep 24 2016 52 mins
    Learn how Milwaukee Tool moved all of its unstructured data off NetApp into AWS cloud storage using Panzura, reducing costs by over $40,000 per shelf in the process and freeing up space on NetApp for additional applications. In the process, Milwaukee Tool also reduced video file open times for its global offices from hours to just seconds while ensuring file integrity.
  • Key Requirements for Next Gen Storage Key Requirements for Next Gen Storage Henry Baltazar, Eric Quinn, Rich Weber Recorded: Sep 23 2016 60 mins
    Join Guest speaker Henry Baltazar, Senior Analyst at Forrester Research, Eric Quinn, IT Director at C&S Companies, and Rich Weber, Chief Product Officer at Panzura, as they discuss the key requirements for Next Generation Global File Storage.
  • Hardware Load Balancers Don’t Cut It Any More – Why? What Should You Do? Hardware Load Balancers Don’t Cut It Any More – Why? What Should You Do? Ashish Shah, Director of Products, Avi Networks Oct 4 2016 3:00 pm UTC 60 mins
    Enterprises are increasingly focused on driving automation with the flexibility of private and public clouds and modern application architectures. Legacy application delivery controllers (ADCs) rely on proprietary appliances with custom ASICs to meet performance requirements driving up costs without addressing next generation computing needs. Significant performance improvements achieved on Intel architecture servers now enable industry leading ADC performance on standard bare-metal servers. It is time to rethink L4 – L7 services for today’s applications.

    In this webinar jointly presented by Intel and Avi Networks learn how with the right architecture, software-defined application services on standard Intel architectures deliver superior performance at the best price / performance ratio. Learn how you can finally go beyond table stakes load balancing and static hardware appliances to:

    - Use Webscale IT principles and software load balancers to achieve the best performance
    - Autoscale load balancers and applications on-demand with no manual intervention
    - Troubleshoot gnarly application issues within a minute
    - Take advantage of multi-cloud environments with central management
    - Eliminate overspending on ADCs and lower your TCO by more than 70%
  • How Zadara Storage Keeps You Agile in Uncertain Times How Zadara Storage Keeps You Agile in Uncertain Times Doug Jury, VP Solution Sales & Bob Sarubbi, VP Americas Sales at Zadara Oct 4 2016 5:00 pm UTC 60 mins
    Now more than ever, it is imperative to stay agile and ahead of the competition. In times of uncertainty, it is vital to be flexible and agile to adapt to unexpected changes in your requirements. Learn how Zadara Storage can help you implement an “immortal storage solution” with the flexibility, scalability, and agility of the cloud while enjoying economics of pay-as-you-go Storage-as-a-Service (STaaS).
  • Creating the next generation of DevOps Creating the next generation of DevOps Aaron Kalin, Caffeine Powered Server Fox, dnsimple.com Oct 4 2016 5:00 pm UTC 60 mins
    It can be difficult to hire people with the exact skills you want or need for your DevOps team. Just look at the job boards! There’s tons of competition and not nearly enough people to meet the demand. With a total size of 8 employees, DNSimple decided to take a different approach by starting an apprenticeship program to train people with little to no experience in DevOps.

    In this webinar, Aaron Kalin of DNSimple goes over the lessons learned in budgeting, hiring, and onboarding their first ever apprentice along with why and how you might want to start a similar program at your company. Aaron will conclude with an update of where their apprentice is now and answer any questions you might have.

    Join us to learn:

    - Ways to change your hiring practices to be more inclusive and increase diversity
    - How to go about starting an apprenticeship program at your company and who is currently running programs
    - The benefits of having a DevOps apprenticeship program at your company
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Gabriela Markette, Field Marketing Manager, DataCore Software Oct 4 2016 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • New Hive and Performance Features in WANdisco Fusion 2.9 (EMEA) New Hive and Performance Features in WANdisco Fusion 2.9 (EMEA) Paul Scott-Murphy, VP Product Management Oct 5 2016 12:00 pm UTC 60 mins
    WANdisco Fusion 2.9 delivers new levels of performance and scalability, with a number of enhancements that make it easier to support hybrid big data deployments with continuous and consistent access across any mix of on-premise and cloud environments.

    One of the most significant new features is the application of WANdisco’s patented active transactional replication to the Hive metastore, used to support familiar SQL-like access to Hadoop. Changes made to table definitions and other objects in the Hive metastore are replicated to Hive metastore instances deployed with other Hadoop clusters. Data added to the underlying Hadoop cluster referencing the new object definitions is replicated to other Hadoop clusters in a subsequent step, to guarantee consistent access across clusters and locations.

    WANdisco Fusion 2.9’s patented technology also:

    •Enables throughput in excess of 100,000 transactions per minute - well beyond the largest enterprise requirements
    •Ensures operations are not affected by transient network outages or “flapping WAN” links
    •Supports scenarios in hybrid cloud deployments where on-premise environments cannot accept inbound network connection requests

    Join us on October 5th as we present and demo the latest release of WANdisco Fusion.
  • The challenges of the Communication Service Providers at the age of OTT & cloud The challenges of the Communication Service Providers at the age of OTT & cloud lior barak Oct 5 2016 1:00 pm UTC 45 mins
    In this webinar we will discuss the challenges of Communication Service Providers (CSPs) in the age of Over the Top (OTT) and Cloud services and the potential solutions to address those challenges.
    We will explain in details how CSPs can address future trends such as growing demand for L3 and mixed of L2+L3 connectivity , and the loss of revenue, which forcing them to reduce OPEX and CAPEX.
  • Open Disaggregated Telco Cloud using OpenStack - Is it a Telco's Pipe dream? Open Disaggregated Telco Cloud using OpenStack - Is it a Telco's Pipe dream? Bala Pitchaikani, Telco Cloud Strategy, Mirantis; Deepak Rana, Network Systems Technology, Intel Oct 5 2016 4:00 pm UTC 60 mins
    You know the Telco technology landscape is changing, and you don't want to be left behind. So what do you do about it? In this webinar, we'll look at the realities of creating distributed Telco clouds, and what they mean to you today, and in the very near future. You will benefit from this webinar if you: (i) Hear some of these buzzwords: NFV, SDN, ETSI, OPNFV, OpenStack, MANO, Orchestrator, Distributed NFV, ODL, ONOS, CORD, VNF, NFVI, or VIM, (ii) Are puzzled by all the hype, considering the fact that production deployments by Telcos are few and far between, (iii) Wonder if (and how) a Carrier-Grade Cloud OpenStack Solution can be delivered, (iv) Want to know the best way to characterize and run workloads in a Telco Cloud, (v) Want to learn how to characterize, test and size a Telco Cloud using these new buzzwords
    [Note: This webinar goes deep into the technical underpinning of an end-to-end solution, so be ready to be drenched with lots of details in a short period of time. We will try to do follow-on single-subject sessions based on your feedback, so come prepared with your questions and suggestions.]
  • Under the Hood: Kerberos, LDAP and other security features in Vertica Under the Hood: Kerberos, LDAP and other security features in Vertica Ignacio Hwang, Sr. Product Manager, HPE Oct 5 2016 5:00 pm UTC 45 mins
    There are many potential threats to the security of your HPE Vertica data. Learn the most common threats and how to harden data access, authentication, authorization and encryption of your Vertica data. In this webcast we'll cover:

    • Authentication options an best practices
    • Granular Column/Row Masking
    • Dynamic Data Protection via HPE SecureData
  • Microsoft Ignite 2016 Review: Top Trends You Need to Know Microsoft Ignite 2016 Review: Top Trends You Need to Know Sushant Rao, Sr. Director of Product Marketing, DataCore Software; Todd Mace, Tech Evangelist, DataCore Software Oct 5 2016 6:00 pm UTC 45 mins
    Did you attend Microsoft Ignite 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
    Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from Ignite. It’s the next best thing to being there!
  • The All-Flash Storage Advantage: With Pure Storage CTO Aaron Skogsberg The All-Flash Storage Advantage: With Pure Storage CTO Aaron Skogsberg Aaron Skogsberg, CTO, Pure Storage, David Isaacs, Business Development Manager, Pure Storage Oct 6 2016 12:00 am UTC 45 mins
    Join this webinar to learn how operational simplicity, in-line data efficiency, and predictable performance through the use of flash enables your business to be more competitive in the market at the same cost as your traditional disk infrastructure.

    Topics covered include:

    - What is possible with flash?
    - What flash solutions are available today?
    - How do the costs compare?
    - Pure Storage architecture overview
    - Demonstration of storage provisioning tasks
  • Transform to the Modern Data Center with All-Flash Software-Defined Storage Transform to the Modern Data Center with All-Flash Software-Defined Storage Jason Brown Oct 6 2016 3:00 pm UTC 45 mins
    Tired of the challenges associated with running a data center using traditional infrastructure? Learn how Dell EMC ScaleIO Ready Node combines powerful Dell PowerEdge servers with the software-defined block storage capabilities of ScaleIO to deliver endless server SAN possibilities. Offering All-Flash and Hybrid configurations, the ScaleIO Ready Node is pre-validated, tested and configured to provide the best performance possible – with a single vendor for support. Now, you can meet your business objectives while greatly simplifying the process of procuring and deploying a server SAN.
  • Dos and Don’ts for Managing External Connectivity to/from Your Network Dos and Don’ts for Managing External Connectivity to/from Your Network Professor Avishai Wool - CTO and Co-Founder AlgoSec Oct 6 2016 3:00 pm UTC 60 mins
    In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant, and that they are not inadvertently creating holes in your network and exposing your organization to cyber criminals?

    Join renowned industry expert Professor Avishai Wool for this technical webinar which will cover best practices for managing external connectivity to and from your network, including:
    •Defining the right infrastructure, network segmentation, security controls and additional security protections
    •Managing changes to connectivity for third party applications or data feeds
    •Routing partner traffic through your network
    •Auditing and compliance challenges for both you and your partner
    •Technical considerations for managing the business and legal aspects of third party connectivity
  • Using big data to escape the growing public sector paper avalanche! Using big data to escape the growing public sector paper avalanche! Cheryl McKinnon is a principal analyst at Forrester Research Oct 6 2016 5:00 pm UTC 90 mins
    Our guest speaker, Forrester Analyst Cheryl McKinnon, author of the
    recent report entitled "The State Of Records Management In The Public Sector:
    Top Challenges And Priorities For 2016" will present her latest findings and recomendations.
    - Find out how public sector professionals can leverage big data initiatives to automate records capture and shift to a digital-first way of working.
    - Learn about today’s public sector landscape for records management and how it demonstrably lags behind advances in the private sector.
    - Explore ways to leverage big data initiatives to drive more successful and sustainable public sector records management programs.
    Join Hewlett Packard Enterprise and Forrester Research for an informative webinar "Using big data to escape the growing public sector paper avalanche!"
  • New Hive and Performance Features in WANdisco Fusion 2.9 New Hive and Performance Features in WANdisco Fusion 2.9 WANdisco Oct 6 2016 5:00 pm UTC 60 mins
    WANdisco Fusion 2.9 delivers new levels of performance and scalability, with a number of enhancements that make it easier to support hybrid big data deployments with continuous and consistent access across any mix of on-premise and cloud environments.

    One of the most significant new features is the application of WANdisco’s patented active transactional replication to the Hive metastore, used to support familiar SQL-like access to Hadoop. Changes made to table definitions and other objects in the Hive metastore are replicated to Hive metastore instances deployed with other Hadoop clusters. Data added to the underlying Hadoop cluster referencing the new object definitions is replicated to other Hadoop clusters in a subsequent step, to guarantee consistent access across clusters and locations.

    WANdisco Fusion 2.9’s patented technology also:

    • Enables throughput in excess of 100,000 transactions per minute - well beyond the largest enterprise requirements
    • Ensures operations are not affected by transient network outages or “flapping WAN” links
    • Supports scenarios in hybrid cloud deployments where on-premise environments cannot accept inbound network connection requests

    Join us on October 6th at 10AM Pacific, 1PM Eastern as we present and demo the latest release of WANdisco Fusion.
  • Intro to Containers, Container Storage Challenges and Docker Intro to Containers, Container Storage Challenges and Docker Chad Thibodeau, Principal Product Manager, Veritas, Keith Hudgins, Tech Alliances, Docker, Alex McDonald, Chair SNIA-CSI Oct 6 2016 5:00 pm UTC 75 mins
    Containers are the latest in what are new and innovative ways of packaging, managing and deploying distributed applications. In this webcast, we’ll introduce the concept of containers; what they are and the advantages they bring illustrated by use cases, why you might want to consider them as an app deployment model, and how they differ from VMs or bare metal deployments.

    We’ll follow up with a look at what is required from a storage perspective when using Docker, one of the leading systems that provides a lightweight, open and secure environment for the deployment of containers. Finally, we’ll round out our Docker introduction by presenting the takeaways from DockerCon, an industry event for makers and operators of distributed applications built on Docker, that took place in Seattle in June of this year.

    Join us for this discussion on:
    •Application deployment history
    •Containers vs. virtual machines vs. bare metal
    • Factors driving containers and common use cases
    • Storage ecosystem and features
    • Container storage table stakes
    •Introduction to Docker
    •Key takeaways from DockerCon 2016
  • Overcome Outdated Processes and Automate IT Risk & Compliance Overcome Outdated Processes and Automate IT Risk & Compliance Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51° Oct 6 2016 6:00 pm UTC 60 mins
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • Connecting Your Devices Through IoT Connecting Your Devices Through IoT Jeremy Foster, Senior Technical Evangelist, Microsoft Oct 7 2016 6:00 pm UTC 60 mins
    Once you've got your Internet of Things (IoT) Hub set up and you've tested it by creating a simulated device, it's time to talk to your Hub from something real. This webcast will help you do just that.

    Here, you'll take a look at the whole device landscape, learn about the starter kits available for getting you up and running quickly with Azure IoT, and see all of the available SDKs available to get your devices talking to Azure. You'll also learn how you can use open-source device SDKs for multiple platforms, including Linux, Windows, and real-time operating systems.

    Join this webcast to learn how to:
    •Write device code using the popular and open source Node.js framework
    •Register your device with IoT Hub and start sending and receiving messages
    •Manage devices using a tool called IoT Hub Explorer
  • Reduce Service Desk costs with Big Data Analytics Reduce Service Desk costs with Big Data Analytics Thore Senneset – Incident Manager in HEMIT and Markus Hammelmann – Dipl.-Ing., MBA working for T-Systems GmbH Oct 11 2016 2:00 pm UTC 45 mins
    What value does automation and big data analytics bring?

    Big Data analytics provides actionable insight and fast knowledge delivery. It allows you to see trends in incident and other service desk data for an easy jumpstart into proactive problem management. Together with faster call handling and problem resolution times, there are significant improvements in efficiency and a decrease in cost for the IT organization.

    See what others have achieved:

    The real proof of value of an automation solution is what others have achieved. Join us to hear from:

    -Thore Senneset – Incident Manager in HEMIT, Norway – on how Smart Analytics helped them reduce incident and interaction resolution times.
    -Markus Hammelmann – Dipl.-Ing., MBA working for T-Systems GmbH, Germany – will share how Smart Email helps T-Systems to automatically classify incoming tickets and help them to reduce email ticket handling time.
  • Using Enhanced Platform Awareness to deploy cloud based Business Services Using Enhanced Platform Awareness to deploy cloud based Business Services Nick St.-Pierre, Sandvine Oct 11 2016 3:00 pm UTC 45 mins
    Sandvine will be presenting how it's accelerating and facilitating Cloud based business services rollouts with carriers worldwide with the use of Openstack and Enhanced Platform Awareness capabilities to optimize platform utilizations. The webinar will cover the underlying NFV infrastructure design typically seen in production environments, and how individual VNF requirements are provisioned with Enhanced Platform Awareness. The session will cover VNF deployment and orchestration via Openstack, how to address hardware dependencies and asymmetric loading of compute nodes for DPDK usage, and the use of PCI Passthrough when scheduling compute resources.
  • What’s New in vSphere with Operations Management 6.1? What’s New in vSphere with Operations Management 6.1? Hicham Mourad, Senior Technical Marketing Manager, VMware; Himanshu, Singh Senior Product Marketing Manager, VMware Oct 11 2016 3:00 pm UTC 75 mins
    Intelligent Workload Management has arrived! VMware vSphere with Operations Management 6.1 delivers several exciting new features that will save you time, optimize your resource utilization, and provide proactive visibility into your data center operations. vSphere with Operations Management delivers a robust virtualization platform with critical capacity management and performance monitoring capabilities.

    Join this webcast to learn about new features that enable:
    •Intelligent placement and proactive rebalancing of VMs
    •Integrated OS and app monitoring.
    •Consistent operations management across the Software-Defined Data Center.
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Oct 11 2016 3:00 pm UTC 45 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • Threat Deception, Visibility, and Intelligence in Hyperconverged Datacenters Threat Deception, Visibility, and Intelligence in Hyperconverged Datacenters Rohit Goyal, Nutanix Oct 11 2016 4:30 pm UTC 60 mins
    Today’s data centers have never been more threatened, with an explosion of sophisticated, targeted attacks that lead to costly data breaches, system downtime and lost productivity. Together, GuardiCore and Nutanix enable a secure, software-defined infrastructure for virtualized environments. Virtual machines and applications running on the Nutanix enterprise cloud are protected via Nutanix's security-first design & automation and GuardiCore’s advanced security platform, featuring application-layer visibility and high-interactive threat deception.
  • Backup Impossible: Growing Data Sets vs. Shrinking Backup Windows Backup Impossible: Growing Data Sets vs. Shrinking Backup Windows Troy, Spiceworks; Jay Livens, Dell EMC; Alex Almeid, Dell EMC; Kyle Wisdom, Peninsual Credit Union Oct 11 2016 5:00 pm UTC 60 mins
    It’s no secret the amount of data in the world grows at an exponential rate. But as if larger data sets that take longer to back up wasn’t already enough of a challenge, add in 24x7 business hours, more aggressive RTOs and RPOs, and the constant threat of malware and ransomware, how are IT pros supposed to keep up?

    In this video meet-up, we’ll be discussing the future of backup and how to truly make sure your data is protected in this seemingly impossible environment. We’ll be sitting down with backup and storage experts from EMC and an IT pro from the Spiceworks Community.

    We will discuss:
    - How data de-duplication works and the difference it can make for time crunched backups
    - Managing backups of both virtual and physical machines, including to and from the cloud
    - Protecting your backups against malware and ransomware
  • How UBA and Machine Learning Can Turbocharge SIEM How UBA and Machine Learning Can Turbocharge SIEM 451 Group, Niara, Intel Security Oct 12 2016 5:00 pm UTC 60 mins
    Many enterprises have leveraged the correlation, visualization and case management of SIEM to drive the workflow of their Security Operations Center and much of the daily activity of the security team. With the introduction of big data scale, machine learning-based analytics and instantly-accessible forensic data, Network and User Behavior Analytics is a terrific complement to SIEM. Intel and Niara will explain how these new capabilities can be seamlessly introduced to SIEM and demonstrate both enhanced attack detection as well as accelerated investigations and response directly from the McAfee Enterprise Service Management (ESM) console.
  • BI-on-Hadoop Performance Benchmark: SQL Engine Wars Continue and Everybody Wins BI-on-Hadoop Performance Benchmark: SQL Engine Wars Continue and Everybody Wins Josh Klahr, VP of Product Management, AtScale, Trystan Leftwich, Sr. Engineer, AtScale Oct 12 2016 5:00 pm UTC 60 mins
    When it comes to supporting BI-on-Hadoop workloads which SQL engine works best: Impala, Hive, Presto, or Spark SQL?

    As Hadoop and the SQL-on-Hadoop engines mature, leading enterprises are throwing on more diverse workloads and getting highly performant results. Hadoop is no longer relegated to a platform for data science or batch processing - now companies are also pushing traditional Business Intelligence workloads to Hadoop as well.

    Come learn and benefit from some surprising, and not so surprising, findings in the second edition of the largest BI-on-Hadoop Benchmark Study to date.

    You’ll hear from Josh Klahr, VP of Product and Trystan Leftwich, Sr. Architect, and learn about how the AtScale BI-on-Hadoop Benchmark tests real-life workloads (big data, small data, high concurrency) across multiple SQL-on-Hadoop engines (Impala, Spark, Hive, Presto...).

    Join this this session to learn…

    - Which SQL-on-Hadoop engines work best for which BI workloads
    - Key considerations to help you select which engine(s) are right for your use cases
    - How SQL-on-Hadoop engines continue to push performance boundaries with new innovations