Hi [[ session.user.profile.firstName ]]

Data Center Management

  • An interview with Britt Champeau
    An interview with Britt Champeau IT Chronicles Media Recorded: Aug 18 2017 8 mins
    ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com
    Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Ankur Karer, Director of Payment Security Presales, CA Technologies Recorded: Aug 18 2017 61 mins
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Recorded: Aug 17 2017 34 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
  • Threat Intelligence: The MSP’s Secret Weapon
    Threat Intelligence: The MSP’s Secret Weapon Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 34 mins
    One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

    In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

    Attend this Webchat and you will also learn:

    The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
    The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
    Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
    and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
  • A Step-By-Step Guide to Building a Profitable Security Practice
    A Step-By-Step Guide to Building a Profitable Security Practice Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 33 mins
    As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.

    Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.

    In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:

    The five vital technology tools you need to run an effective security practice
    A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
    A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 17 2017 35 mins
    Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.


    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:

    Current threats and how they are evolving
    Comprehensive threat protection for the cloud
    Unified security for detecting threats and responding to incidents
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre
    Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre Garrett Gross Director, Field Enablement Recorded: Aug 17 2017 55 mins
    Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.

    In this session you'll learn about key findings from this survey including:

    The predominant driver for organizations to consider managed security services
    The most critical capabilities organizations look for in MSSPs
    The most requested security services offered by MSSPs
    Key benefits respondents have achieved by partnering with an MSSP

    Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
  • An interview with Chris Pope
    An interview with Chris Pope Kepner-Tregoe Recorded: Aug 17 2017 11 mins
    10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
  • SDN/NFV Interoperability – Challenges & Opportunities
    SDN/NFV Interoperability – Challenges & Opportunities Dimetis - Bruce Katzel, VP of Sales for North America; Glenn Booth, VP of Marketing Recorded: Aug 17 2017 50 mins
    SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
  • Under the Hood of Vertica: Machine Learning and Streaming Data Analytics
    Under the Hood of Vertica: Machine Learning and Streaming Data Analytics Vincent Xu, Engineering Manager, HPE Vertica Recorded: Aug 17 2017 40 mins
    Join us for this next session of “Under the Hood of Vertica” as we take a deep dive into Vertica’s integration with Apache Spark, an in-memory data processing engine.

    Our technical experts will discuss Vertica’s latest support for Apache Spark version 2.1, review common use cases for each, and demonstrate how to leverage Vertica and Spark together to enable continuous, real-time processing and transformation of data streams.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Recorded: Aug 17 2017 58 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • The Future of the Data Center Colocation Market: Trends & Growth Drivers
    The Future of the Data Center Colocation Market: Trends & Growth Drivers Jabez Tan, Research Director, Data Centers, Structure Research Recorded: Aug 17 2017 36 mins
    Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.

    We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.

    First, colocation supply is measured from both a space and power perspective.
    Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
    Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.

    This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.
  • [Panel] Software-Defined in the Digital Transformation Era
    [Panel] Software-Defined in the Digital Transformation Era Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks Recorded: Aug 17 2017 60 mins
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • The Software Defined Journey to Multivendor Cloud
    The Software Defined Journey to Multivendor Cloud Omar Alassil, Global Solution Owner SDN NFV & Data Centre, NOKIA Recorded: Aug 17 2017 48 mins
    The journey towards a cloud native environment comes with its benefits but at the same time it has a lot of challenges. The main of which is how to put together different vendors who are not used to work with each other in one environment and make that work as a complete ecosystem. This session explores the questions and challenges that this journey brings and focus on the role of software and automation in it to make it as fast and as smooth as possible.

    About the presenter:

    Omar is the SDN solution owner for Cloud and Data Centers at Nokia. Omar has a broad experience in SDN and NFV technologies having worked on cutting edge projects for some of the biggest companies in the word. With a BSc in Computer Engineering and an MSc in Business Management he combines both very strong technical background with an excellent business awareness. Omar has two publications and two patents related to orchestrating telecom networks and modelling of network protocols.
  • Software Defined… as a service
    Software Defined… as a service Glyn Bowden, Chief Technologist & Deepak Ramchandani Vensi, Software Defined & Cloud, lead Solution Consultant, HPE Recorded: Aug 17 2017 49 mins
    Software defined and X as a Service are terms often used by organizations pushing “the next big thing”. Just like Cloud and DevOps before them, these are real movements and real principles that businesses and IT teams are embracing to deliver the services their own customer base have grown to expect. However, what does reality look like from what was proposed?

    In this talk we look at what Software defined and “as a Service” mean to our customers, both independently and together as a consumption model for IT. We examine the benefits that could be realized as well as the challenges and shifts in behavior and policy that will be required to be successful.
    How are you delivering “Software Defined Services” and what does it mean for your business, developers and in turn impact your customers? Join us as we summarize the journeys our customers are going on and what it means to them.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • 5G in Asia Pacific, Forecast to 2022
    5G in Asia Pacific, Forecast to 2022 Quah Mei Lee, Industry Principal - Telecoms & Payments Strategy, Digital Transformation Practice, Frost Sullivan Recorded: Aug 17 2017 17 mins
    5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.

    The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.

    5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
    If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
    •How will 5G impact industry?
    •What are the market challenges and opportunities?
    •What are the key drivers for growth?
    •How big will the market be for 5G by 2022?
  • Not Your Grandmothers Network: What SDN Really Means
    Not Your Grandmothers Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Recorded: Aug 16 2017 46 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • Solving the last encryption problem. Never exposing keys in memory!
    Solving the last encryption problem. Never exposing keys in memory! Steve Pate – HyTrust Chief Architect Aug 22 2017 3:00 pm UTC 60 mins
    It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.

    With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Aug 22 2017 4:00 pm UTC 75 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • Ransomware attacks continue... do you have a backup plan?
    Ransomware attacks continue... do you have a backup plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Aug 22 2017 5:30 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Aug 22 2017 6:00 pm UTC 90 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Bring Order to Chaotic Storage Management with Software-defined Storage
    Bring Order to Chaotic Storage Management with Software-defined Storage Sushant Rao Senior Director WW Product Marketing DataCore Software & Bill Hansen Sr. Product Manager & Product Planner Lenovo Aug 22 2017 6:00 pm UTC 60 mins
    Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?

    In a word, CHAOS!

    That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.

    Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
    • Abstracts away the underlying complexity of storage infrastructure
    • Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Aug 23 2017 1:00 pm UTC 60 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Aug 23 2017 3:00 pm UTC 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Extending vSAN with File Services
    Extending vSAN with File Services Peter Skovrup, Director, Product Management, NetApp Aug 23 2017 3:00 pm UTC 45 mins
    Although vSAN provides a means for customers to have block-based storage, many customers still have a requirement for native file services. Join this session to learn about NetApp’s complimentary software solution, which provides file services for a vSAN deployment.
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Scott Summer, Solutions Engineer Aug 23 2017 4:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Data scientists: Can't live with them, can't live without them.
    Data scientists: Can't live with them, can't live without them. Wyatt Benno, CEO, DataHero Aug 24 2017 3:00 pm UTC 45 mins
    There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
    As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?

    - Should your software emulate a data scientist?
    - Learn about the power of data visualizations.
    - Learn about creating value from disperse data sets.
  • vSphere 6.5 Upgrade: Key New Components
    vSphere 6.5 Upgrade: Key New Components Adam Eckerle,Emad Younis, and Martin Yip, VMware Cloud Platform Aug 24 2017 4:00 pm UTC 60 mins
    VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.

    In this webcast, VMware subject matter experts will explore the key components available in the new vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future. We’ll discuss:

    · What’s new in vSphere 6.5 and what’s coming up
    · Best practices for upgrading to vSphere 6.5
    · How vSphere 6.5 is your gateway to modernizing your infrastructure so you can take advantage of VMware’s suite of products for the SDDC, including vSAN.
  • Modeling and Pricing Cloud Migration Scenarios
    Modeling and Pricing Cloud Migration Scenarios Chris Grossmeier, Senior Director of Product, CloudPhysics Aug 24 2017 5:00 pm UTC 45 mins
    Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
  • Strategies for CISSP® Exam
    Strategies for CISSP® Exam Sam Meisenberg, Head of CISSP Training at CyberVista Aug 24 2017 5:00 pm UTC 60 mins
    Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
  • Keeping Subversion In Sync Across Global Data Centers: Case Study with MaxLinear
    Keeping Subversion In Sync Across Global Data Centers: Case Study with MaxLinear Russ Hil, Account & Renewals Manager Americas at WANdisco, Owen Ofiesh, Software Configuration Manager at MaxLinear Aug 24 2017 6:00 pm UTC 60 mins
    Join us to learn how MaxLinear relies on WANdisco to improve productivity with Subversion Multisite delivering results such as:

    - A 24/7 continuous integration environment with zero Subversion downtime
    - Improved administrative efficiencies with Access Control
    - Elimination of the effects of network failures and the dependency on legacy backup procedures
    - Overcoming the challenges with Subversion mirrors

    About the Presenters:

    Russ Hill, Account & Renewals Manager Americas at WANdisco. Russ Hill works with our existing SCM install base as an account manager and renewals specialist. He works closely with the WANdisco Professional Services team on all SCM service opportunities in North America and is currently responsible for all new SCM opportunities within the Americas.

    Owen Ofiesh Software Configuration Manager at MaxLinear. Owen Ofiesh is the Software Configuration Manager for MaxLinear, a global chip design firm. With over 15 years experience in configuration management, he has a strong background in many of the most common SCM tools and platforms. Owen has worked with WANdisco Subversion MultiSite for over six years and has a great understanding of how it compares and contrasts with other SCM tools.
  • Acceleration with the Universal Data Plane - FD.io
    Acceleration with the Universal Data Plane - FD.io Ed Warnicke, FD.io Technical Steering Committee chair, Cisco & John DiGiglio, FD.io Marketing Committee, Intel Aug 29 2017 4:00 pm UTC 60 mins
    The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
  • Dive Deep into NVMe over Fibre Channel (FC-NVMe)
    Dive Deep into NVMe over Fibre Channel (FC-NVMe) Curt Beckmann, Brocade, Craig Carlson, Cavium, J Metz, Cisco Aug 29 2017 5:00 pm UTC 60 mins
    As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.

    When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!

    This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:

    •What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
    •What are the main architectural differences between NVMe and SCSI deployments
    •Impact on Queue Depth
    •How to cross-connect legacy and future flash arrays with FC-NVMe

    Please join us on August 29th for this advanced, deep dive on FC-NVMe.
  • Getting Started with IT Automation and Self Service Provisioning
    Getting Started with IT Automation and Self Service Provisioning Ryan Kelly, Staff Systems Engineer, Cloud Management BU, VMware Aug 29 2017 6:00 pm UTC 90 mins
    We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.

    Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!

    In this technical, hands-on webinar we will cover the following topics:
    -Overview of vRealize Automation setup and configuration
    -Identifying and catering to your end users
    -Blueprint design (Machine Lifecycle Whiteboard session)
    -Overview of vRealize Automation extensibility
    -Tying it all together
  • The Profound Effect Wireless will Have on Your Network Infrastructure
    The Profound Effect Wireless will Have on Your Network Infrastructure Jim Frey, Director of Marketing Aug 30 2017 3:00 pm UTC 30 mins
    Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.

    You should attend this webinar if you want to:
    - Minimize the total cost of ownership (TCO) for your next WiFi project
    - Learn how wireless technology is advancing
    - Be prepared for the next generation of wireless will be here in just a few years
  • Creating Platform Agnostic Packages with Habitat
    Creating Platform Agnostic Packages with Habitat Nell Shamrell-Harrington, Sr. Software Development Engineer at Chef Software Aug 30 2017 5:00 pm UTC 45 mins
    One of the dreams of development is to build a software package once - and deploy it anywhere. With current open source projects, this dream is even closer than ever. Join Nell Shamrell-Harrington, Senior Software Development Engineer at Chef as she discusses how to create software packages that run (almost) anywhere with Habitat. You'll see how the same application can be run on bare metal, on a virtual machine, or in a container - with everything needed to automate that application already built into the package itself. Also learn how to build and deploy these packages with the intelligence to self-organize into topologies, without needing a central orchestrator. See how the dream of platform-agnostic and self-organizing packages is fulfilled today, and how it will evolve in the future.
  • State of Ethernet
    State of Ethernet John D'Ambrosia, Chairman Ethernet Alliance Aug 30 2017 5:00 pm UTC 90 mins
    The next Ethernet era is here, is bringing with it numerous innovations like Power over Ethernet (PoE), ever-greater speeds, and advancements in BASE-T and signaling technologies. The Ethernet Alliance’s The State of Ethernet webinar will provide insight into both current Ethernet developments and its future, and will be followed by a Q&A session. Among the topics to be covered are:
    •The state of IEEE 802.3™ projects, including 50/100/200/400 Gigabit Ethernet (GbE)
    •Impacts of Serializer/Deserializer (SerDes) technology
    •Test and measurement’s growing role within the Ethernet ecosystem
    •The Ethernet Alliance PoE Certification program
    •100 Gigabit per second (Gb/s) signaling
    •New optical specifications and form factors
    •Emerging trends and what lies ahead for Ethernet
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Praveen Rajagopalan, Solutions Engineer Aug 30 2017 7:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.