Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Ever Have Problems Validating Performances of Wired and Wi-Fi Networks, and Want Ever Have Problems Validating Performances of Wired and Wi-Fi Networks, and Want Bai Qing, Technical Director, SystemEngineer360 Pte Ltd Oct 25 2016 4:00 am UTC 60 mins
    Want to learn more about point-to-point performance testing of traffic streams across the network infrastructure by assessing its throughput, loss, latency, and jitter characteristics? Join our expert in this live webinar, who will introduce you to the OneTouch AT Analyzer's Wired & Wireless Performance Tests capabilities - a sure way to validate performances of wired and Wi-Fi networks.
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Oct 25 2016 3:00 pm UTC 75 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • Securing Hyperconverged Infrastructure Securing Hyperconverged Infrastructure Rohit Goyal, Nutanix Security PMM Oct 25 2016 4:00 pm UTC 60 mins
    Security in the modern datacenter requires an evolved mindset and approach. In this technical webinar, Nutanix will provide deep insight into the latest security advancements engineered into the Nutanix enterprise cloud platform, and explain how these advancements can be leveraged to build the most secure environments for your applications and data. Join this webinar to learn security best practices and ask questions relevant to your organization.

    Nutanix offers defense in depth by embracing a security-first approach to platform design and development. The Nutanix enterprise cloud platform combines powerful features, including two-factor authentication and data at rest encryption, with a Security Development Lifecycle that is integrated into product development to help customers meet the most stringent security requirements. The Nutanix solution is certified across a broad set of evaluation programs to ensure compliance with the strictest standards.
  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco Oct 25 2016 4:30 pm UTC 60 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Oct 25 2016 5:00 pm UTC 75 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Product Marketing Manager Oct 25 2016 5:00 pm UTC 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Oct 25 2016 5:30 pm UTC 60 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Oct 25 2016 6:00 pm UTC 60 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • Case Study: IT Operations Automation - Turkcell gains faster incident resolution Case Study: IT Operations Automation - Turkcell gains faster incident resolution Mustafa Gokce Oct 26 2016 11:00 am UTC 45 mins
    Join this webinar to hear how Turkcell, the GSM-based mobile communications organization based in Turkey, has improved network efficiency with faster incident resolution and saved 250 man hours per week.

    HPE Operations Orchestration ensures faster fixes and more efficient use of resource. Integrating with your IT environment with minimal impact on current procedures and tools while fully utilizing your existing IT investments.

    So you can:

    •Reduce operational costs by automating manual, repetitive and error-prone tasks so IT staff can refocus on strategic initiatives.

    •Improve service quality by reducing escalations and mean time to repair (MTTR) by automating event and incident triage, diagnosis and resolution.
  • Tech Talk: Protecting Your Business From a Destructive Cyberattack Tech Talk: Protecting Your Business From a Destructive Cyberattack Alex Almeida Oct 26 2016 3:00 pm UTC 45 mins
    Threats to the business are evolving quickly. Learn EMC's solution to protect your business from a destructive cyber attack
  • Netflix: The Journey to Efficiently Securing Your Video Stream Netflix: The Journey to Efficiently Securing Your Video Stream Jonathan Stern, Applications Engineer at Intel & Scott Long, Sr. Software Engineer at Netflix Oct 26 2016 4:00 pm UTC 60 mins
    Netflix engineers were faced with a challenge: how do you protect the privacy of your customers while serving over a third of all internet traffic in the US? Intel and Netflix engineers discuss the scale of the challenge and how it was solved using Intel® software ingredients and the latest Intel® Xeon® processors. This session includes details of the analysis performed, the software ingredients used, and the record setting results of this collaboration.
  • Use Cases for Software-Defined Storage Use Cases for Software-Defined Storage Rick Walsworth, Vice President of Marketing, Formation Data Systems Oct 26 2016 4:00 pm UTC 60 mins
    Join us for this presentation which includes an in depth look at a number of case studies regarding customers that have successfully deployed the FormationOne software-defined storage platform. This interactive presentation will include a number of specific use cases with performance and ROI results to demonstrate the value and benefits of moving away from hardware based arrays and towards software based architectures.
  • How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric Oct 26 2016 4:30 pm UTC 60 mins
    Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

    In this webinar, you will learn critical aspects to securing data in a variety of ways:

    1) Three approaches to securing data-at-rest
    2) How software-defined policies can ease security management
    3) The role that key management plays in securing data-at-rest
    4) How real-time alerting can take your security posture to the next level
  • Accelerating Big Data Success with the Center of Excellence (COE) Model Accelerating Big Data Success with the Center of Excellence (COE) Model Justin Coffey, Senior Staff Dev Lead, Criteo and Ben Smith, Product Marketing Manager, HPE Oct 26 2016 5:00 pm UTC 45 mins
    Could you benefit from a Big Data COE? Whether you formally call it a CoE or not, your big-data analytics initiatives should be led by a team that promotes collaboration with and between users and technologists throughout your organization. Join this webinar to hear from Justin Coffey, a senior staff development lead at the performance marketing company Criteo, to hear how they used a Center of Excellence model to drive business- and customer-value results with big data analytics.
  • Flash Storage: Virtualization Unleashed Flash Storage: Virtualization Unleashed Joel McKelvey, PMM Infrastructure Solutions - Pure Storage Oct 26 2016 5:00 pm UTC 45 mins
    With today's massive influx of data, storage demands are increasingly on the rise. From flash, disk, solid state drives, persistent memory, software-defined and more, how do you decide which storage technology is right for your organization? Join this webinar to learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.

    In the Webinar we will cover:

    -What is possible with flash?
    -What flash solutions are available today?
    -How do the costs compare?
    -Pure Storage architecture overview
    -Demonstration of storage provisioning tasks
  • Software Defined Storage: Bringing Remote and Branch Offices Together Software Defined Storage: Bringing Remote and Branch Offices Together Dr Stefan Radtke, CTO Dell EMC Isilon Oct 27 2016 10:00 am UTC 45 mins
    Organizations are experiencing unprecedented data growth - while data is geographically distributed, organizations are under pressure to provide global visibility and cost effective management for all unstructured data, regardless of the location. Enterprises with branch and regional offices are further challenged with dispersed islands of storage that are costly and inefficient, while being difficult to reliably maintain and protect.

    Learn how you can expand your data lake by consolidating data from remote office locations to your core data center, through simple Software Defined Storage – enhancing protection, and introducing business Analytics.
  • The Evolution of VMware’s Private Cloud Network Using NSX The Evolution of VMware’s Private Cloud Network Using NSX John Tompkins, OneCloud Network Architect, VMware Oct 27 2016 3:00 pm UTC 45 mins
    VMware’s Private Cloud network relies heavily on the Software Defined Networking features provided by NSX today: however; it all started with a very traditional network topology. In this session we will discuss the evolution of VMware’s Private Cloud Network and how it evolved into one of the world’s biggest NSX for vSphere deployments. We will discuss design considerations and challenges, how we were able to achieve a scalable, multi-tenant security model and the technical and operational benefits that VMware’s Private Cloud team has garnered from adopting NSX.
    •Design considerations for large-scale, multi-tenant NSX environments
    •Overcoming technical and operational challenges with VMware’s Private Cloud and NSX
    •Benefits of transforming your traditional network to a software-defined one
  • 5 Steps to Simplify Security in the Modern Data Center 5 Steps to Simplify Security in the Modern Data Center Brian Morris, Worldwide Solutions Architect, vArmour Oct 27 2016 4:30 pm UTC 60 mins
    Legacy security architectures and traditional security platforms are ineffective at securing modern data centers. Modern data centers need a security solution that is software-based, distributed, and simple: making security better, faster, and cheaper. vArmour is the leader in software-based segmentation and micro-segmentation that protects critical applications and workloads in the data centers and cloud.

    Join this webinar to learn more about the simple steps to securing the modern data center with vArmour.

    Step 1: Understand the behaviors of applications and workloads (with deep visibility) for more informed decisions
    Step 2: Streamline segmentation policy creation and management
    Step 3: Flatten and secure your infrastructure without a network redesign
    Step 4: Utilize proper control placement for better security and more efficient resource utilization
    Step 5: Scale out independent controls with automation
  • Object Storage for Media & Entertainment + Content Delivery Object Storage for Media & Entertainment + Content Delivery Adrian Herrera, VP of Marketing & Ryan Meek, Product Manager Oct 27 2016 4:30 pm UTC 60 mins
    For sites that focus on content distribution, value is often measured by how quickly and easily digital assets are delivered to the audience. Caringo VP of Marketing Adrian Herrera and PM Ryan Meek share how object storage can be used to store and deliver massive amounts of unstructured data including video and images.
  • Technology to Rock Every Workload: The All-Flash Data Center is Now a Reality Technology to Rock Every Workload: The All-Flash Data Center is Now a Reality Rob Commins, VP of Marketing, Tegile Systems Oct 27 2016 5:00 pm UTC 45 mins
    There is no question - flash arrays have made a dramatic impact to high performance enterprise applications. But what about all the rest of the data? There are use cases that require cold data be stored for long term compliance and simple “keep everything forever” company cultures. There are also heavy bandwidth applications that need much more capacity than what's needed to accelerate a database redo log.

    Come hear about how flash array technologies are advancing to finally deliver on the promise of an All-Flash data center. Tegile 's Rob Commins will discuss these advancements and identify key points for IT leaders to consider as they develop their digital transformation strategy.
  • How secure content management helps align information governance and security How secure content management helps align information governance and security Rich Lauwers, Information Governance, HPE Oct 27 2016 5:00 pm UTC 45 mins
    This interactive session will look at how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. How can the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts and experiences.
  • How to Ensure Your Backups Are Not Held Ransom by Ransomware How to Ensure Your Backups Are Not Held Ransom by Ransomware Jason Leiva Solutions Architect, Veeam & Stephane Estevez Product Marketing, Quantum Oct 27 2016 5:00 pm UTC 60 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, 2016 is the year of ransomware!

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.