Hi [[ session.user.profile.firstName ]]

Data Center Management

  • HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE Storage Recorded: Mar 22 2019 60 mins
    Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
    So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
  • Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Dilip Krishna, Anuta Networks Recorded: Mar 21 2019 11 mins
    In this video, we share some of Anuta ATOM customer deployments including Tata Communications, Neustar, F5 Networks, An Energy Provider in APAC and a Financials Services Enterprise in the US.
  • 3 Keys to NoSQL Backup Success: A Demo
    3 Keys to NoSQL Backup Success: A Demo
    David Sedgwick Recorded: Mar 21 2019 29 mins
    Rubrik Datos IO offers fast NoSQL data recovery, any-to-any data mobility, and cost savings to organizations that rely on Apache Cassandra, DataStax Enterprise or MongoDB. In this webcast we’ll do a deep dive into how Rubrik Datos IO can save time by automatically discovering and identifying your databases and tables, how to quickly build a test/dev database from production data, and how Datos IO saves 70% or more on secondary storage with semantic deduplication – a capability unique to Rubrik.
  • Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of Carmel Recorded: Mar 21 2019 57 mins
    Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.

    Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.

    The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.

    Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.

    In this webcast you will discover how City of Carmel:
    • Has experienced 100% uptime for nearly 10 years
    • Extended their storage life expectancy by 80% and saved $75k
    • Replaced every storage component without doing a forklift and replace
  • The Ultimate Protection for Hyperconverged Infrastructure
    The Ultimate Protection for Hyperconverged Infrastructure
    Dick Csaplar - Senior Product Marketing Manager at Unitrends, Mike Wronski - Principal Product Marketing Manager at Nutanix Recorded: Mar 21 2019 38 mins
    One of the many advantages of hyperconverged infrastructure is that it can include native data protection and recovery features. However, to gain advanced data protection, users can attach a pre-certified data backup and recovery solution to provide enterprise-grade capabilities such as disaster-recovery-as-a-service (DRaaS), sandboxes built from the latest backups to test software, and automated ransomware detection.

    Join the webinar to learn:

    •About using advanced data protection features available in hyperconverged platforms
    •How to enhance those features with advanced backup and recovery capabilities
    •How to protect the hyperconverged infrastructure from ransomware, software incompatibility issues, and lost files.
    •How the combination of the two solutions can recover critical business applications in the cloud, even in the event of a total data center disaster - guaranteed!
  • How to Plan & Execute a Successful SAP Migration to AWS
    How to Plan & Execute a Successful SAP Migration to AWS
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Mar 21 2019 43 mins
    Join us to learn how to:

    - Plan & Execute SAP Business workloads migrations on AWS.

    - Cover the routes on each scenario: OS/DB platform, database size, downtime window and connection bandwidth.

    - Impact of each variable on the overall migration project and combine all together to shape the right migration strategy to AWS.

    This is a technical webinar aimed for Infrastructure Engineers, SAP Basis and OS/DB migration experts and technical decision makers.
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Recorded: Mar 21 2019 19 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadow Recorded: Mar 21 2019 26 mins
    With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?

    End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.

    SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:

    •What are the available options: on-premise upgrades, migrate to cloud or do nothing?
    •Best practice methodologies
    •Cloud tooling options for migration acceleration
    •Cloud migration framework for success

    Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.

    This webinar will primarily focus on cloud migration.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Recorded: Mar 21 2019 43 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Mar 21 2019 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Anuta Networks Academy: Episode-11: ATOM Closed-Loop Automation Use-cases
    Anuta Networks Academy: Episode-11: ATOM Closed-Loop Automation Use-cases
    Dilip Krishna, Anuta Networks Recorded: Mar 20 2019 8 mins
    Closed-Loop Automation ensures the system works as intended by closely monitoring network analytics and taking corrective actions. In this video, we discuss the 5 real-world applications of CLA for Telecom providers, App Delivery, Financial Services, Managed Services, and SD-WAN.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Mar 20 2019 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Micro-segmentation is achievable. What's stopping you?
    Micro-segmentation is achievable. What's stopping you?
    Joe Onisick, CTO, Xentaurs Recorded: Mar 20 2019 20 mins
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Smart Energy in the Data Center
    Smart Energy in the Data Center
    Andy Lawrence, Executive Director of Research, Uptime Institute Intelligence Recorded: Mar 20 2019 53 mins
    Smart energy is a trending concept in a field crowded with competing and complementary terms, technologies, and approaches – but has the business case yet been made? Andy Lawrence will share his views on where this technology segment is headed.
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Recorded: Mar 20 2019 24 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • How to Build a Simple and Profitable Business Through CSP Indirect
    How to Build a Simple and Profitable Business Through CSP Indirect
    Paul O'Connor, Global Lead CSP Indirect Program; Clare Richards, Partner Business Manager; Kathy Jones, SPLA Business Manager Recorded: Mar 20 2019 23 mins
    If you are a Microsoft partner that falls into one of the following categories and you are unsure what benefits the new Microsoft CSP Indirect program brings to you, we recommend joining this webinar:

    •System Integrator (SI) Partners – these partners will now be able to offer software and support to customers that they were not able to access in the past providing the partner with new sources of revenue and a differentiated value proposition.

    •Hosters/SPLAs – the CSP Indirect program allows these partners to forego their existing infrastructures, which may not be viable long-term, and work through SoftwareONE and Microsoft to help end-customers.

    •ISVs – providing help with scale and reach; working with SoftwareONE’s CSP Indirect team can help them get to market faster and at a greater scale ensuring faster returns for ISV startup stakeholders.

    Finding new business in your customer base this year may seem daunting. Building a new practice may be a costly venture that won’t return value to the business for years. However, delivering long-term customer value is paramount and critical to growing your business.

    SoftwareONE is a certified member of the CSP Indirect program and it’s an exciting time for those in the Microsoft ecosystem, benefiting partners and end customers alike.

    Find out more about the new opportunities available to you and specifics about SoftwareONE’s additional value and services delivered through our unique CSP Indirect program called ONEClub.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • How to Develop and Implement an Effective Cloud Assurance Program for Government
    How to Develop and Implement an Effective Cloud Assurance Program for Government
    Ron Bushar, Vice President & CTO - Government Solutions Recorded: Mar 19 2019 59 mins
    As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.

    Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?

    Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:

    - Identifying roles and responsibilities of government, service provider, and third-party stakeholders
    - Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
    - Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
    - Selecting a cloud service delivery and deployment model
  • Improving Dashboard Performance, Achieving Fine-Grained Analytics with Vertica
    Improving Dashboard Performance, Achieving Fine-Grained Analytics with Vertica
    Yuanzhe Bei and Jie Guo, Vertica Recorded: Mar 19 2019 53 mins
    There are two popular ways that organizations mine growing volumes of data for insight: short-term dashboard reporting and long-term analytics. Every organization would like their dashboards on recent data to be faster in addition to keeping data longer so that data analytics can derive more insightful, granular results.

    Join us for this Webcast to understand how Vertica can help you achieve both of these goals with these powerful features – Hierarchical Partitioning, Flattened Tables, and Live Aggregate Projections. Discover how Hierarchical Partitioning combines old data partitions into larger files, allowing you to retain more data without bloating the catalog or forcing partitions to be less fine-grained. The former benefits data analytics, while the latter helps with dashboard reporting, as more fine-grained partitions help with pruning data more aggressively, resulting in faster query performance and less resource usage.

    You’ll also learn how Flattened Tables provides convenient and faster data denormalization for your dashboard queries and optimizes resources more efficiently by avoiding joins. The unique column-wise refresh mechanism can defer denormalization operation after your ETL process without introducing much overhead. Finally, learn how Live Aggregate Projections materializes partially aggregated results to speed up those aggregation-type analytical queries.
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Mar 19 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    Adam Mason, Carleen Carter, Ken Michelson, Meghan Lockwood Recorded: Mar 19 2019 62 mins
    Acorio Executives will chat all about ServiceNow Madrid. Join the webinar to learn about:

    - The Top Platform Enhancements: Mobile Studio, Agent Workspace, Service Portal, Flow Designer, Automated Testing Framework, Custom App Licensing
    - Improvements & Updates in HR, CSM, Problem Management, and Software Asset Management License Workbench
    - Upgrading the right way
  • 7 Reasons Asset Compliance Blows-up
    7 Reasons Asset Compliance Blows-up
    Mark Gaydos, CMO, at Nlyte Recorded: Mar 19 2019 29 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Asset Discovery - it is about what you don't know!

    In the 30 minutes you are watching this, find out:

    - What happens when compliance goes wrong
    - What you weren't worrying about that you should
    - How 7 best practices and a little technology can reduce your chance of a panic attack

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Mar 25 2019 5:00 pm UTC 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • Using FileFly to Manage Your Data with Azure, Google, Amazon or Swarm
    Using FileFly to Manage Your Data with Azure, Google, Amazon or Swarm
    John Bell & Tony Lokko, Caringo Senior Consultants Mar 26 2019 2:00 pm UTC 60 mins
    FileFly is the solution you need for complete, automated and flexible data lifecycle management of unstructured data—from creation to preservation. Working with both NetApp and Windows filers, FileFly allows you to set policies that guide the level and target of file data movement based on your organization’s requirements. Senior Consultants John Bell and Tony Lokko explain how FileFly works and can now be used with any of the Big 3 cloud providers (Azure, Google and Amazon) as well as Caringo Swarm Object Storage. They will demonstrate use of FileFly and have a live Q&A session so you can learn from their extensive experience in architecting, deploying and managing storage solutions.
  • Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Jim Davis, Fluke Networks Mar 26 2019 3:00 pm UTC 71 mins
    This presentation will look at some of the requirements for field testing Single Mode fiber to make sure it will support the new applications you are planning to run on it. Starting with inspection and cleaning it will answer many of those little questions, “can I use that click pen from UPC multimode connectors on APC connectors?, How do I inspect APC connectors?”

    From there the presentation will move on to the calculation of a loss budget, what is the correct budget, and what wavelengths should be tested. We will look at the best practices in Tier I loss testing to assure the minimum of uncertainty in our test results. The presentation will explain how this can be done for both single connectors such as LC and SC as well as MPO connections.

    Finally, we will look at troubleshooting the fiber using an OTDR and give an introduction to the identification of common events in Single Mode OTDR traces.

    Attendees will earn 1 BICSI CEC
  • Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Zahid Ghadialy, Sr. Dir., Strategic Mktg and 3G/4G Blogger and Babak Jafarian, Dir, Strategic Business Communications Mar 26 2019 3:00 pm UTC 60 mins
    The telecoms industry is capital intensive, so every dollar and every cent spent on new infrastructure needs to be accounted for. The biggest expense for mobile operators has always been the RAN, accounting for around 60 % of CAPEX (and 65 % of OPEX). Older (2G, 3G) technologies are becoming more expensive to maintain alongside with 4G and soon 5G. The Open Compute model of the data center has the potential to help operators to move away from proprietary hardware to a virtualized network architecture. Some of TIP’s (Telecom Infrastructure Project) initiatives by Facebook) highest-profile activities are aimed specifically at the RAN, where the proprietary nature of several interfaces has stopped operators from using more than one vendor. The software-based approach for older Gs is unheard of where by virtue of the original design, it’s impossible to reconfigure legacy 2G and 3G networks to support newer communications standards such as 4G, and eventually 5G. In this webinar learn how Parallel Wireless Open RAN technology, designed on x86 across baseband processing platform, radio hardware, and radio and core software, simplifies MNOs business models to support ALL current, present, and future Gs for a better service to the end users at much lower cost. We will present recent case studies from TIP Summit from operators like Telefonica, MTN and Vodafone. www.parallelwireless.com
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
  • Customer-proven Source Code Management Migration Process to Compuware ISPW
    Customer-proven Source Code Management Migration Process to Compuware ISPW
    Francois Dansereau, Director of Migration Services Team Mar 26 2019 5:00 pm UTC 39 mins
    Have you been reluctant to change your Source Code Management (SCM) system because it’s too risky? For Compuware ISPW customers, our migration process helped them switch and they found the grass to be greener on the other side. In this webcast, you’ll hear their stories. We know migrating away from an entrenched mainframe SCM system is daunting. Our customers have massive amounts of code in their SCM systems and numerous active development projects that cannot be disrupted. They also lack both in-house expertise in SCM migration and headcount to spare for large migration projects.

    Leveraging 24+ years of experience, our team of experts in SCM migration, with their proven methodology and state of-the-art migration tools, seamlessly migrate customers to ISPW.The Compuware ISPW SCM Migration Service is a customized solution for organizations migrating from CA Endevor, CA Panvalet, CA Librarian, Micro Focus/Serena ChangeMan, IBM RTC as well as homegrown systems to ISPW SCM. This service is designed to quickly and economically take you through all the steps of your migration—from project planning, data migration and integration to testing and knowledge transfer. Our methodology and infrastructure provide a single, lighter, more robust and agile SCM environment.

    This proven SCM migration practice: Accurately finds and documents codebase characteristics including histories and inter-application dependencies, so they can be fully preserved in the new environment

    •Manages migration in targeted, rightsized stages to accelerate time-to-benefit and limit exposure to risk
    •Rigorously tests code artifacts in the customer’s new SCM environment and brings them to a near-live state in parallel to the old environment to ensure zero disruption of development work
    •Improves code structure and reduces code complexity due to reorganizing the code base during the migration
    •Involves an end-to-end methodology addressing all critical dimensions of the migration project
  • Got a Hungry Splunk? Feed it Smartly with syslog-ng
    Got a Hungry Splunk? Feed it Smartly with syslog-ng
    James Bonamico, Senior Engineer (syslog-ng product specialist) Mar 27 2019 10:00 am UTC 32 mins
    We can help eliminate your struggle to reliably collect and send your log data to Splunk.

    Register for our free webinar to learn how you can easily manage and scale log ingestion across your whole enterprise environment.

    In this webinar we will demonstrate:
    •syslog-ng Premium Edition’s high-performance Splunk HTTP Event Collector (HEC) destination
    •How to batch and send messages to multiple Splunk HEC nodes
    •How to eliminate the need for forwarders and external load balancers
  • Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Bridge to Cloud: Using Apache Kafka to Migrate to GCP
    Priya Shivakumar, Director of Product, Confluent + Ryan Lippert, Product Marketing, Google Cloud Mar 27 2019 10:00 am UTC 56 mins
    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka® service, to migrate to Google Cloud Platform. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    Register now to learn:
    -How to take the first step in migrating to GCP
    -How to reliably sync your on premises applications using a persistent bridge to cloud
    -How Confluent Cloud can make this daunting task simple, reliable and performant
  • Taming the storm clouds: managing network security across hybrid and multi-cloud
    Taming the storm clouds: managing network security across hybrid and multi-cloud
    Yonatan Klein, Director of Product Management (AlgoSec) Mar 27 2019 2:00 pm UTC 45 mins
    Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.

    Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.

    Yonatan will cover how to:
    •Easily and automatically identify security risks and misconfigurations in your cloud
    •Centrally manage security controls across accounts, regions and VPCs/VNETs
    •Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
    •Obtain a cross-network-estate risk analysis
  • Anatomy of an International Investigation
    Anatomy of an International Investigation
    Jeremy Burdge, John Wilson, and Michael Sarlo Mar 27 2019 4:00 pm UTC 90 mins
    From FCPA to FIFA and from the Panama Papers to GDPR privacy requirements, international investigations require an incredible balance of knowledge, expertise, and practical experience for those involved in collecting and assessing electronically stored information (ESI) in response to bribery, corruption, fraud, and privacy violation allegations. And with the increased risk factors associated with multinational and cross-border data transfer, an investigative misstep might be the last step for involved investigators.

    This expert presentation led by international investigations expert Jeremy Burdge of Hogan Lovells will present actionable considerations for auditors, investigators, and litigators as they navigate the planning requirements, political and people issues, privacy laws, and the technologies available to identify and shape positive investigation outcomes in international venues.

    Webcast Highlights

    + Defining Investigations: Internal and External Events
    + Preparing and Planning: Actors, Allegations, and End-Points
    + Politics and Privacy: Agreements, Borders, and Confidentiality
    + Technologies and Techniques: Investigative Goals and Goal Posts

    Presenting Experts:

    + Jeremy Burdge

    As Litigation Practice Group Lead for Legal Project Management (LPM) for the Americas at Hogan Lovells, Jeremy leads the LPM teams that support Investigations & White Collar, International Arbitration, and Employment practice groups spanning the firm's U.S., Mexico, and Brazil offices.

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.
  • Trends in Worldwide Media and Entertainment Storage
    Trends in Worldwide Media and Entertainment Storage
    Alex McDonald, SNIA SSSI Co-Chair (Moderator) and Tom Coughlin, SNIA SSSI Education Chair and President, Coughlin Associates Mar 27 2019 5:00 pm UTC 75 mins
    Join SNIA Solid State Storage Initiative Education Chair and leading analyst Tom Coughlin for a journey into the requirements and trends in worldwide data storage for entertainment content acquisition, editing, archiving, and digital preservation. This webcast will cover capacity and performance trends and media projections for direct attached storage, cloud, and near-line network storage. It will also include results from a long-running digital storage survey of media and entertainment professionals. Learn what is needed for digital cinema, broadcast, cable, and internet applications and more.
  • Intent-Based Data Center Automation Architecture
    Intent-Based Data Center Automation Architecture
    Sasha Ratkovic Mar 27 2019 5:00 pm UTC 60 mins
    Enterprises are building Intent-Based Data Centers to meet growing business transformation demands, operational efficiency expectations, and client requirements. These data centers are being empowered by Intent-Based Data Center Automation, which is built on technologies such as Intent-Based Networking, vendor-agnostic overlays, graph datastores, closed-loop validation, and advanced analytics.

    Join industry expert Sasha Ratkovic, Chief Technology Officer and Co-founder of Apstra for a live webinar on Wednesday, March 27th at 10:00 a.m. PT / 1:00 p.m. ET. Sasha will review the architecture of Intent-Based Data Center Automation and discuss the foundational technologies that make up this architecture.

    During this webinar, you will learn how Intent-Based Data Center Automation is designed and the core technologies that form this capability. At the conclusion of this webinar you will have an understanding of how each of the following technologies combine to form this architecture:

    - Intent-Based Networking
    - Single source of truth graph datastores
    - Open and vendor-agnostic overlay
    - Advanced telemetry
    - Real-time closed-loop validation
    - Self-documentation capabilities
    - Intent-Based Analytics
    - Root cause identification
    - Full lifecycle automation
  • Applications Driving 24G SAS in the Data Center
    Applications Driving 24G SAS in the Data Center
    Cameron T. Brett, President, SCSI Trade Association; Director of SSD and Storage Solutions Marketing, Toshiba Memory America, Mar 27 2019 5:00 pm UTC 45 mins
    Serial Attached SCSI (SAS) has been the storage technology of choice for business-critical applications in data centers for nearly 15 years, starting with 3.0 Gb/s SAS in 2004, then doubling in effective bandwidth with each new generation. The next generation in development is 24G SAS, with end-user products anticipated in late 2020. Optimized for both solid state drives (SSDs) and hard disk drives (HDDs), 24G SAS is backward compatible with existing tried-and-true SAS ecosystems. The end result is unmatched by other storage technology: a highly scalable and flexible technology, offering the fastest per lane performance with the most reliable device management of any drive technology available. 24G SAS will be the technology of choice for all-flash deployments, as well as tiered or cached systems supporting both HDD and SSD devices.

    Join this webinar to learn more about how 24G SAS technology can satisfy the performance, scalability and capacity required by today’s video streaming, big data, analytics and other business applications. SAS technology can be deployed across multiple storage tiers and supports SSDs with varied endurance and performance levels, as well as low-cost capacity storage.
  • Data Protection Considerations for Multi-Cloud Environments
    Data Protection Considerations for Multi-Cloud Environments
    David Hill, Product Technology Strategist, Veeam Mar 28 2019 3:00 pm UTC 60 mins
    The benefits of turning to the cloud are numerous; scalability, control, flexibility, and power to name a few. While transitioning to the cloud has many strong points, there are still the challenges of data and application protection. In this webinar, you’ll learn:
    • How to leverage multi-cloud as an addition to your traditional data center
    • What applications and services require the most protection in hybrid mode—and how to protect them
    • The importance of portability and how to avoid lock-in
    • How to get better compliance and data protection by moving data between on-prem and the cloud.
  • The Impact of GPU Solutions in Deep Learning & AI
    The Impact of GPU Solutions in Deep Learning & AI
    Sarosh Irani, Supermicro & Renee Yao, NVIDIA Mar 28 2019 4:00 pm UTC 45 mins
    Cognitive computing fuelled by Deep Learning has had a profound impact on our lives by helping to solve everyday problems through advanced technological breakthroughs. This transformative computing method is being deployed by Fortune 500 companies looking for creative ways in which to solve business problems as efficiently and accurately as possible.
     
    Join Supermicro and NVIDIA to find out more about:
     
    · Why GPUs are the de facto platform to train and develop Deep Learning models
    · NVIDIA’s latest technologies: NVSWITCH and HGX-2
    Supermicro GPU SuperServer Solutions
  • Next Generation Discovery for ServiceNow
    Next Generation Discovery for ServiceNow
    Mark Gaydos, CMO, at Nlyte Software Mar 28 2019 4:00 pm UTC 60 mins
    Shouldn’t your CMDB be Your Trusted Source of Truth? Is it really?

    In this webinar you will learn:

    - How Next Generation Discovery improves your ServiceNow CMDB data accuracy
    - How you can cost effectively automate the discovery and reconciliation across your entire compute infrastructure
    - How to increase efficiency by up to 20%
    - Find assets you weren’t aware were on your network
    - Significantly reduces the time it takes you to perform audits

    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Discovery - It is about what you don't know.
  • SAM 2.0 - The Modern Approach to Software Asset Management
    SAM 2.0 - The Modern Approach to Software Asset Management
    Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam Mar 28 2019 4:00 pm UTC 60 mins
    The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
  • Avoid Data Drift in Your Cloud Data Warehouse
    Avoid Data Drift in Your Cloud Data Warehouse
    Sean Anderson - Director of Product Marketing - StreamSets | Dash Desai - Technology Evangelist - StreamSets Mar 28 2019 5:00 pm UTC 51 mins
    Cloud Data Warehouses are on the rise. As companies aim to make analytics pervasive across their organization, cloud data warehouses and data marts became a logical solution for delivering a familiar analytics experience but without the constraints of managing large DW infrastructure. Cloud Data Warehouses help reduce management and infrastructure costs, offload maintenance and uptime responsibilities, and allow users to simply load data and run queries instead of managing databases.

    However, migrating and streaming data to these new cloud managed services remains a freshman effort with many tools offering only simple ingestion functionality and limited data destinations. StreamSets has built an advanced integration with popular cloud Sw solutions like Snowflake, one of the world’s most popular cloud data warehouses. This level of integration provides fast synchronous and asynchronous ingest, multi-table uploads, and data drift compensation. StreamSets Control Hub helps users then manage a variety of pipelines, on-premise; across public clouds and cloud services.

    In this webinar you will...

    -Take a look at common usage patterns for Cloud Data Warehousing.
    -Understand the core functionality of the Snowflake connector.
    -Get information on the installation and operation of the new tool.
  • Welcome to the Future of Your Digital Archive
    Welcome to the Future of Your Digital Archive
    Brian Campanotti, CEO cloudfirst.io former CTO Front Porch Digital + David Phillips, M&E SA, Cloudian former NBC architect Mar 28 2019 5:00 pm UTC 60 mins
    Legacy Content Management Systems (CMS) such as DIVA (DIVArchive) have become cumbersome and costly archive targets.

    Join Cloudian, CloudFirst, and Ergonomic Group on March 28th @ 10am PST to learn how to create the foundation for a future-proof archive solution.

    Speakers will be:

    - Brian Campanotti, CEO at cloudfirst-io and former CTO at Front Porch Digital, founders of DIVArchive
    - David Phillips, M&E Solutions Architect at Cloudian and former architect at NBC

    The joint solution of cloudfirst-io and Cloudian Hyperstore enables easy migration from Diva to a modern object storage platform that:

    - Addresses limitations of legacy systems by providing exabyte-scalability
    - Increases accessibility and search-ability in an economical manner
    - Overcomes the lock-in created by proprietary DIVA formatting
    - Avoids future disruptive and tedious migrations
  • Modernize Your COBOL Testing Processes with Compuware and SonarSource
    Modernize Your COBOL Testing Processes with Compuware and SonarSource
    Olivier Gaudin, CEO, SonarSource Mar 28 2019 6:00 pm UTC 58 mins
    Compuware and Sonar Source are working together to change how application quality is addressed on the mainframe. Learn how an integration between Compuware Topaz, Compuware ISPW and SonarSource gives you an accurate, unified view of unit testing code coverage and code quality metrics across all platforms. This will help you accelerate delivery, improve quality, increase maintainability and close your COBOL skills gap.

    SonarQube continuously analyzes source code for bugs, code smells and security vulnerabilities and displays the results along with other quality milestones in project dashboards for continuous code quality assessment.
    Working in conjunction with Jenkins, the SonarQube integration with Topaz for Total Test enables test pass/fail results to display within SonarQube for code quality analysis. Test metrics can be used in SonarQube Quality Gates to determine whether to proceed with a workflow or stop and fix code before continuing.

    The integration means organizations can build a mainframe CI pipeline that can be triggered automatically every time a developer promotes their code. That pipeline can automatically trigger unit tests and collect code coverage metrics that can be feed back into SonarQube to verify that the code meets the quality standards defined in the quality gate, before moving it higher into the lifecycle. It’s critical to have this type of quality gate in place so that you can manage code quality and get feedback to developers as soon as possible.

    During this webcast, you will learn how:

    •COBOL unit testing can be automated
    •COBOL code coverage shows what percentage of an application has been tested
    •Continuous Integration shortens feedback loops to speed time-to-benefit
    •Code quality can be managed consistently across platforms
  • Managing IT Risk and Compliance in the Age of Digital Transformation
    Managing IT Risk and Compliance in the Age of Digital Transformation
    Ryan Spelman, Center for Internet Security (CIS) Sr. Director, and Brandon James, Sunayu CEO Mar 28 2019 6:00 pm UTC 45 mins
    As business technology evolves, so must the security compliance policies designed to protect business from emerging threats. IT operations and security teams must work together to define, adopt, and implement compliance policies that are both programatic and sustainable.

    Join Ryan Spelman, Center for Internet Security (CIS) Sr. Director, and Brandon James, Sunayu CEO, for a SaltStack-moderated discussion on the evolution of IT compliance. Together we will explore how businesses can balance compliance and innovation in the era of digital transformation.
  • Your Future Self is Calling, Will You Pick Up? Dell EMC, NVIDIA & Mastercard
    Your Future Self is Calling, Will You Pick Up? Dell EMC, NVIDIA & Mastercard
    Nick Curcuru, Mastercard and Bob Crovella, NVIDIA Apr 1 2019 4:00 pm UTC 60 mins
    Your Future Self is Calling, Will You Pick Up?
    AI with Dell EMC, NVIDIA, & MasterCard

    What if you had a crystal ball that could always tell you the right business decision? You’d always be a step ahead of your competition with the right products, better more personalized services, and first to innovate into new spaces. Think it’s impossible? It’s not so farfetched … these insights and many more are hiding in plain sight, in your most valuable asset, your Data Capital. If harvested correctly, your data can be your ticket to better performance and new opportunities that you haven’t even dreamed of. This is where AI comes into play as an advanced technique enabling you to extract the maximum value from your data by helping you find the proverbial needle in the haystack.

    But to fully take advantage of AI and your data, you need a fundamental mind shift. You’re no longer a retail chain, an auto parts supplier, a financial services company; you’re not even a data analytics company. You need to become a technology company with a data and analytics first mentality.

    To learn more, please join us for our webinar featuring Dell EMC, NVIDIA, and MasterCard where we’ll delve into the art of the possible with AI.

    In the session we’ll cover the following:
    • Review the leading AI uses cases that can impact your business today
    • Showcase a day in the life of an AI data scientist
    • Highlight how compute and storage innovations are helping democratize and accelerate AI
    • MasterCard will share how they used data and AI to evolve from a Credit Card company into a technology company

    Presented by:
    Nick Curcuru - Vice President, Advanced Analytics and Cyber Security, Mastercard
    Bob Crovella - OEM Technical Enablement Manager, NVIDIA
  • How to Manage the Digital Content Lifecycle
    How to Manage the Digital Content Lifecycle
    Chris Rae Apr 2 2019 10:00 am UTC 60 mins
    Learn how media and broadcasting organisations are managing to connect Data and Digital Content to solve their challenges across all business units in this streaming, Cloud world.