Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Own Your Keys to the Cloud
    Own Your Keys to the Cloud Rich Mogull, CEO, Securosis; Ken Beer, GM AWS; Jon Fan, Dir of Enterprise Products, Box Recorded: Mar 24 2017 59 mins
    As organizations, like yours, move their data to the cloud file sharing and collaboration solutions, there may be a limit to what type of data can be moved there without controlling your own encryption keys. With recently announced Box KeySafe (formerly Box EKM), you can now take advantage of content collaboration in the cloud while maintaining independent control over the encryption keys that protect their content. How?

    Box has partnered with Amazon Web Services to provide on-demand management of keys through AWS KMS (Key Management Services). This is a perfect option for organizations that require a simple solution configurable in 30 minutes to address advanced security needs.

    Join Rich Mogull, Industry Analyst and CEO of Securosis with Ken Beer, General Manager of Amazon Web Services and Jon Fan, Dir of Enterprise Products at Box to learn how to:

    - Identify whether you need customer-managed encryption
    - Evaluate options and identify requirements
    - Real-world case studies from different industries and company sizes
    - How organizations justify the investment
    - How to deploy fast without compromising usability and governance at scale
  • The Total Economic Impact of Box
    The Total Economic Impact of Box Michelle S. Bishop, Principal Consultant of Total Economic Impact™ Practice, Forrester; Jeremy Wood, Sr Director of PM, Box Recorded: Mar 24 2017 62 mins
    Looking to better understand your return on investment from using Box – and how you can use the same ROI­analysis techniques to make smarter IT decisions within your own organization?

    Today's workforce demands the ability to work securely from anywhere, at any time, on any device. These highly mobile­centric employees need robust tools to collaborate among diverse teams, yet sophisticated cybersecurity threats have placed new demands on IT – and on the applications they're choosing to deploy. Although cloud solutions have revolutionized the way we get work done, many businesses are still struggling to understand the true cost benefit of deploying these invaluable solutions.

    Box has commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, creating a detailed financial analysis of the cost, benefit, flexibility and risk factors associated with deploying Box.

    Watch this webinar to learn why the Forrester TEI study can be the key to your organization's digital evolution:
    - Become more familiar with Box and its functionality
    - Hear a detailed ROI analysis of Box deployment, as outlined in the -
    Forrester TEI study for Box
    - Discover the methodology Forrester uses to develop the study
    - Gain insight into how you can apply the Forrester methodology to your own company
  • How to Store and Manage 10 Billion Files
    How to Store and Manage 10 Billion Files David Bailey, Qumulo Director of Systems Engineering Recorded: Mar 24 2017 7 mins
    What’s in a number? Well, when that number is 10 billion, I’d say it can mean quite a lot.

    For some, 10 billion represents:
    - The number of photos posted on Facebook (by 2008)
    - The number of song downloads from Apple iTunes (by 2010)
    - The number of Tweets issued by Twitter (by 2010)
    - The number of times Shazam was used to tag songs (by 2013)
    - The number of monthly emails being sent by MailChimp (by 2014)
    - The number of monthly music video views on VEVO (by 2015)
    - The number of quarterly streaming hours of content on Netflix (by 2015)

    For Qumulo, we like to demonstrate how and why our customers create and manage 10+ billion files (in 1.2 million directories) in a single scale-out file system.

    Join David Bailey, Qumulo’s Director of Systems Engineering, for this demo, and see why customers call Qumulo Core scale-out storage “the smartest storage product ever built.”
  • The Simple, Smart Way to Move to the Cloud with Box
    The Simple, Smart Way to Move to the Cloud with Box Aaron Kramer, Head of Consulting, Box; Greg Cannan, Divisional Informational Officer, Toyota USA​ Recorded: Mar 24 2017 51 mins
    Considering the move to cloud but facing challenges getting there?

    Companies of all sizes and in all industries have recognized the productivity gains and cost benefits of moving to the cloud, but many often end up inadvertently using migration methods that are inefficient and insecure. After all, moving massive amounts of sensitive data to the cloud isn't a simple undertaking!

    At Box, we believe businesses across the globe should be able to make a smooth and seamless transition to the cloud so they can start reaping its benefits faster. That's why we're excited to announce a new service called Box Shuttle: the simple, smart way to migrate large amounts of content to Box.

    Watch now to learn about how our content migration services can help you move to Box.

    - Justify the investment – and return on investment – of content management in the cloud
    - Learn how Box can help you do the heavy lifting with customizable migration service offerings
    - Hear how Toyota moved hundreds of millions of files to Box and got up and running in a week

    It's your move. Register now for the webinar to learn how Box can help you accelerate your shift to the cloud.
  • Highlights of HPE Data Protector: Current and outlook to next release version
    Highlights of HPE Data Protector: Current and outlook to next release version Uli Wallscheid, Technical Consultant, HPE Information Management, specialist for HPE Data Protector Recorded: Mar 24 2017 62 mins
    Is your infrastructure evolving so fast that your existing backup environment can’t cope? Join presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, to learn what HPE has to offer with Data Protector, including features and benefits you never knew were available.

    You’ll also get a sneak preview of the next release version and will learn how it addresses the challenges of complexity, cost, and recoverability of today’s information-driven enterprises, with features such as:
    • Added platforms and integrations
    • New Virtualization features
    • Security updates
    • Storage integrations
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience
    How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 37 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud
    Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Proving the Business Value of Network Transformation
    Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore
    Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors
    Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Recorded: Mar 23 2017 53 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • 5 things you didn’t know you could do with a security policy management solution
    5 things you didn’t know you could do with a security policy management solution Edy Almer, VP Product Management at AlgoSec Recorded: Mar 23 2017 37 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    In this technical webinar Edy will focus on:

    •Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    •Mapping security vulnerabilities to their applications to assess and prioritize risk
    •Enable SOC engineers to tie cyber-attacks to business processes
    •Migrating Firewall policies between firewall brands
    •Performing a fully automated, zero-touch security policy change
  • #Vault7 Happened. There’s No Going Back. Now What?
    #Vault7 Happened. There’s No Going Back. Now What? Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm Recorded: Mar 22 2017 60 mins
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    FEATURED EXPERTS
    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    YOUR MODERATOR
    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • Quantifying DevOps Outcomes - Increasing Speed
    Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Recorded: Mar 22 2017 31 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • WikiLeaks Vault 7:  Facts, Fiction & Implications
    WikiLeaks Vault 7: Facts, Fiction & Implications Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP) Recorded: Mar 22 2017 61 mins
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Moderator:
    Vince Tocce a.k.a. Vince in the Bay

    Speakers:
    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout
    Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Shashi Kiran, Chief Marketing Officer at Quali. Recorded: Mar 22 2017 58 mins
    What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
    Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
    Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
  • Detect and Block Apache Struts Bug Across Your Enterprise
    Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • Object Storage for Digital Evidence & Security
    Object Storage for Digital Evidence & Security Ryan Meek, Product Manager Recorded: Mar 22 2017 46 mins
    Caringo Product Manager Ryan Meek explains how object storage can be used for storing digital evidence and the benefits of using it as a secure, compliant repository for use in law enforcement, government, and health IT use cases.
  • OPNFV Overview: Navigating Its Many Projects
    OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • 3 Proven Workflows for A Successful Windows 10 Migration
    3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • What WikiLeaks Vault 7 Means for You and Your Organization
    What WikiLeaks Vault 7 Means for You and Your Organization Chenxi Wang, Jason Haddix, and Gaurav Banga Recorded: Mar 17 2017 61 mins
    WikiLeaks published thousands of CIA-related documents in March detailing the agency's cyber-espionage programs. WikiLeaks is calling the archive "Vault 7". Discover the facts behind the leaks and how they may affect you. Some of the industry's top cybersecurity experts will discuss what the Vault 7 leaks mean for organizations and industries, from a security and privacy perspective.

    Speakers:
    Chenxi Wang, Founder, the Jane Bond Project
    Jason Haddix, Head of Security at Bugcrowd
    Gaurav Banga, Founder & CEO of a stealth mode cybersecurity startup
  • Real Life Use Cases for Object Storage, Media & Entertainment
    Real Life Use Cases for Object Storage, Media & Entertainment Adrian Herrera, VP of Marketing & Tony Barbagallo, VP of Product Recorded: Mar 16 2017 45 mins
    Caringo VP of Marketing Adrian Herrera & VP of Product Tony Barbagallo and explore how object storage is being used in the Media & Entertainment sector. They will present real-life use cases including how NEP The Netherlands is using the Caringo Swarm Cloud and Object Storage Platform for Content Delivery.
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator
    Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Recorded: Mar 16 2017 29 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Reduce Risks to Data Center Availability by Fixing Facilities Management Issues
    Reduce Risks to Data Center Availability by Fixing Facilities Management Issues Mark Kempson, Technical Consultant, Uptime Institute Recorded: Mar 16 2017 55 mins
    Join Mark Kempson, Technical Consultant in Operational Excellence and discuss the importance of a maintenance management system to anticipate upcoming changes instead of reacting to them. Learn key principles to refine your data center operations and procedures to maintain a world class critical facility.

    What questions should you be asking about maintaining and managing your data center?

    •Are you making informed decisions on future updates, changes and maintenance?
    •Have you done a comprehensive high-level risk analysis?
    •Are you documenting and analyzing incidents?
    •Is your staff properly trained to effectively manage your assets?

    Topics include:
    •Path to data center operations excellence
    •Measuring operational effectiveness
    •Addressing common staff related deficiencies in training, organization and escalation process
  • All Things Containers: Innovation, Adoption and Security
    All Things Containers: Innovation, Adoption and Security Peter Christy, Research Director of 451 Research; Marc Woolward, CTO at vARMOUR Recorded: Mar 15 2017 61 mins
    Enterprise IT is transforming rapidly and the evolution to container-structured applications is an important element of this transformation. From the container’s humble origins as a method to virtualize UNIX operating systems to provide process separation with high levels of efficiency, it has become the preferred method for building and deploying modern software into cloud environments.

    Containers are foundational to propelling agility in the enterprise - they are dynamic in nature, support increasing computing densities, have data residency and data provenance for governance and present challenges and opportunities for security in this new world with DevSecOps.

    Please join Peter Christy, Research Director of 451 Research and Marc Woolward, CTO at vArmour as they discuss all things containers along with a look at vArmour’s container strategy, solution and latest patent on container security.
  • Faster, Wider and Stronger Cyber Security with SIEM
    Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Mar 29 2017 9:00 am UTC 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Getting Started with Hyperconverged
    Getting Started with Hyperconverged Sushant Rao, Senior Director of Product Marketing Mar 29 2017 2:00 pm UTC 60 mins
    If you are starting to explore what Hyperconverged adoption could bring your business, then this is the webinar for you. Packed with hints and tips helping you to ascertain if it’s right for you, pitfalls to avoid and a typical, real-life hyperconverged install
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation
    All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Mar 29 2017 4:00 pm UTC 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • Big Data Maturity Trends: How Do You Measure Up?
    Big Data Maturity Trends: How Do You Measure Up? Josh Klahr, VP Product, AtScale; Brandon Bunker, Sr Director Analytics, Vivint; Vijay Raja, Cloudera; Dan Kogan, Tableau Mar 29 2017 5:00 pm UTC 60 mins
    Are you doing the right things with Big Data? How do your peers, and competitors, use it? Are you ahead of or behind the curve? Is on-premises or Cloud the best direction? Which workloads drive the fastest impact and biggest ROI?

    Join this webinar to learn details of the largest Big Data Maturity Survey, including why and what 2500+ Big Data and BI Enterprise Leaders choose for Big Data priorities in 2017.

    You’ll also hear from Brandon Bunker, Director of Customer Analytics and Intelligence at Vivint, IoT and Smart Home leader. With 1M+ customers generating >20K events per second. As pioneers in their space, Vivint had to get ahead of big data versus letting it get ahead of them. Brandon will share challenges, choices and lessons learned along his journey to deliver the ultimate customer experience and compete in today’s hyper-speed world.

    Join this interactive session to hear about the journey leading enterprises are making with Big Data. You will learn:

    Why leading enterprises are betting big on Big Data
    Which workloads can drive maximum value out of Big Data
    How to leverage Big Data for better customer experience + competitive advantage

    Speakers:

    Josh Klahr, VP of Product, AtScale

    Josh is responsible for driving AtScale’s product roadmap and strategy to deliver what customers need to succeed, and has worked with data and analytics since 2000.

    Brandon Bunker, Sr. Director Analytics and Intelligence, Vivint

    Brandon Bunker is Sr. Director of Consumer Analytics and Intelligence at Vivint. Vivint is the leading home automation company in America. His team is responsible for creating real time digital products based on IOT data and machine learning.

    Vijay Raja, Solution Marketing Manager, Cloudera

    Vijay Raja is a Solutions marketing manager at Cloudera, where he is responsible for rolling out new and innovative big data solutions focused on key industry verticals.
  • Redefining the Link: New Year, New Benefits
    Redefining the Link: New Year, New Benefits Mike Connaughton, Market Segment Manager, Data Center Mar 30 2017 2:30 pm UTC 30 mins
    “Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.

    * The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
  • Building a truly hybrid cloud with Google Cloud
    Building a truly hybrid cloud with Google Cloud James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management Mar 30 2017 5:00 pm UTC 60 mins
    Join James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management, as they explain how to address the challenges of operating hybrid environments that span Google and on-premises services, showing how active data replication that guarantees consistency can work at scale. Register now to learn how to provide local speed of access to data across all environments, allowing hybrid solutions to leverage the power of Google Cloud.
  • Making the Case for Lithium-Ion Batteries in the Data Center
    Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • How To Actually Leverage The New World of Low-Cost Commodity Storage
    How To Actually Leverage The New World of Low-Cost Commodity Storage Peter McCallum & Gavin McLaughlin Apr 4 2017 2:30 pm UTC 30 mins
    Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
  • LAN Standards, News & Trends: 2017 Update
    LAN Standards, News & Trends: 2017 Update Cindy Montstream, Legrand Apr 4 2017 3:00 pm UTC 90 mins
    Get the latest information about Cabling Standards from FOTC Standards Chair Cindy Montstream.

    Attendees will earn one BICSI CEC for attending.
  • Protecting your all-flash FlashStack Converged Infrastructure platform
    Protecting your all-flash FlashStack Converged Infrastructure platform Mayur Dewaikar, Product Management: Solutions & Integrations, Pure Storage Sunil Polepalli, Head of Cisco Alliance, Commvault Apr 4 2017 6:00 pm UTC 60 mins
    Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.

    According to IDC, Commvault Data protection software delivers:

    1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance

    2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts

    3. 15–30% reduction in data management point solutions

    4. 55% reduction in annual unplanned downtime

    Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:

    1 How FlashStack compares to other converged infrastructure platforms.

    2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
  • Webinar:  Software-Defined Infrastructure & Data Center Health Monitoring
    Webinar: Software-Defined Infrastructure & Data Center Health Monitoring George Clement, Sr. Application Engineer, Intel Corporation and Jonathan Gould, Software Sales Manager, Schneider Electric Apr 4 2017 6:00 pm UTC 60 mins
    Rapid change complicates every facet of data center management. Data center managers need ways to monitor, manage, and maintain the health and efficiency of their facility in real-time. They want complete visibility into power, performance, thermals, utilization, location, latency, durability, and security through a single pane of glass. Server-centric compute models are too cumbersome for today’s highly variable workloads. Enter Intel and Schneider Electric’s integrated DCIM solution.

    In this webinar, you’ll see how Intel and Schneider Electric have worked together to offer an automated, software-defined resource model and support the data center managers with the IT agility and control they need.

    We’ll showcase how Intel® and Schneider Electric can optimize your data center:

    •Asset Tracking
    •Identify potential failure throughout your power, cooling, and virtual architectures
    •Monitor Power, Cooling and Physical Security in your critical spaces
    •Aggregate KPIs on Power, Cooling, Space, and Network
    •Bridge from facilities and IT
    •Integrate into ITSM (ServiceNow and Remedy)
    •Merge the physical layer with the virtual layer
    •Monitor Power, Cooling and Physical Security in your critical spaces
  • Boost cost savings, productivity, and innovation with server upgrade (ENG)
    Boost cost savings, productivity, and innovation with server upgrade (ENG) Robin Kuepers, Server Line of Business & CoC Director, Dell EMC Europe, Middle East & Africa Apr 5 2017 9:00 am UTC 60 mins
    Analyst research reveals significant gains from server upgrade. A recent IDC study shows that by neglecting to upgrade server infrastructure regularly, IT organizations can lose up to 39% of peak performance, add up to 40% in application management costs, and incur up to 148% in server administration costs. Join to boost cost savings, productivity, and innovation.
  • Connectivity: The Key to IIoT Data Communications
    Connectivity: The Key to IIoT Data Communications Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc. Apr 5 2017 5:00 pm UTC 60 mins
    Connectivity: The Key to IoT Data Communications
    Unlocking Interoperability via the Industrial Internet Connectivity Framework

    From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

    The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.

    John this webinar to learn:
    -What is the importance of an Industrial internet connectivity framework and how it can be used by systems developers to select the best-fit technology for new and existing applications.

    -Why enhanced connectivity accelerates the development of new IIoT applications across industries.

    -How the IICF provides an architecture to enable data sharing and interoperability between previously closed components and subsystems.
  • Rockin’ and Rollin’ with SMB3
    Rockin’ and Rollin’ with SMB3 Ned Pyle, SMB Program Manager, Microsoft, John Kim, SNIA-ESF Chair, Mellanox, Alex McDonald, SNIA-ESF Vice Chair, NetApp Apr 5 2017 5:00 pm UTC 75 mins
    Server Message Block (SMB) is the core file-transfer protocol of Windows, MacOS and Samba, and has become widely deployed. It’s ubiquitous - a 30-year-old family of network code.

    However, the latest iteration of SMB3 is almost unrecognizable when compared to versions only a few years old. Extensive reengineering has led to advanced capabilities that include multichannel, transparent failover, scale out, and encryption. SMB Direct makes use of RDMA networking, creates block transport system and provides reliable transport to zetabytes of unstructured data, worldwide.

    SMB3 forms the basis of hyper-converged and scale-out systems for virtualization and SQL Server. It is available for a variety of hardware devices, from printers, network-attached storage appliances, to Storage Area Networks (SANs). It is often the most prevalent protocol on a network, with high-performance data transfers as well as efficient end-user access over wide-area connections.

    In this SNIA-ESF Webcast, Microsoft’s Ned Pyle, program manager of the SMB protocol, will discuss the current state of SMB, including:

    •Brief background on SMB
    •An overview of the SMB 3.x family, first released with Windows 8, Windows Server 2012, MacOS 10.10, Samba 4.1, and Linux CIFS 3.12
    •What changed in SMB 3.1.1
    •Understanding SMB security, scenarios, and workloads
    •The deprecation and removal of the legacy SMB1 protocol
    •How SMB3 supports hyperconverged and scale-out storage
  • Quantifying DevOps Outcomes - Efficient Service Stability
    Quantifying DevOps Outcomes - Efficient Service Stability George Miranda, Technical Strategy Apr 5 2017 5:00 pm UTC 30 mins
    This webinar is part four of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to decrease change failure rates.

    High-performing organizations that have undergone digital transformation have very low rates of failure when introducing changes. Key to this resiliency is that these organizations focus on improving how quickly they recover from failures rather than trying to prevent failures from happening. By emphasizing recovery over prevention, they achieve a substantially higher rate of service resiliency. Industry metrics prove that this capability is part of an overall approach to outperforming your competitors.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore how to achieve resiliency by optimizing for failure recovery
    - Learn which industry metrics demonstrate that resiliency
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Triple Threat:  Protecting Data Throughout its Lifecycle
    Triple Threat: Protecting Data Throughout its Lifecycle Don Vilen, Joel Rubinson Apr 5 2017 5:00 pm UTC 45 mins
    Marketers have never seen a challenge like this: unprecedented amounts of data, transferred at unprecedented rates, with data breaches doubling in just the past year. Many solutions have protected data in its various states, but no solution has secured data at rest, in use, and in motion – until now.

    In Triple Threat: Protecting Data Throughout its Lifecycle, IIS Chief Data Scientist Don Vilen and Strategic Advisor Joel Rubinson show you how to utilize the most advanced algorithms, format-preserving encryption to protect PII, and tokenization.

    About the presenters:
    Don Vilen - Formerly a Data Scientist at AOL and Chief Data Scientist at Buysight, IIS Chief Data Scientist Don Vilen brings over 30 years of software development and data analytics experience to this webinar. He has worked on some of the most groundbreaking database and web advertising products the industry has seen.

    Joel Rubinson - Joel is an adjunct professor of marketing at New York University. A published author and marketing analytics consultant, Rubinson has allowed IIS to streamline the conversation between its customers’ marketing and IT departments.
  • Simplify Persistent Storage for Red Hat OpenShift with NetApp
    Simplify Persistent Storage for Red Hat OpenShift with NetApp Andrew Sullivan, Technical Marketing Engineer at NetApp and Chris Morgan, Product Management Director at Red Hat Apr 5 2017 5:00 pm UTC 60 mins
    Red Hat® OpenShift Container Platform is a complete container application platform that provides all aspects of the application development process in one consistent solution that can span across multiple infrastructure footprints. OpenShift integrates all the architecture, processes, platforms, and services needed to help development and operations teams traverse traditional siloed structures and produce applications that help businesses to succeed.

    Using OpenShift with Project Trident, NetApp’s open-source dynamic storage provisioner, extends this experience to simplify and automate persistent storage volumes. Trident's integration with OpenShift allows infrastructure teams to define storage capabilities while simultaneously enabling application teams to consume storage based on their needs - when they need it, where they need it, and how they need it.

    Learn how OpenShift and NetApp Project Trident can empower the development and deployment of applications in an environment which meets customers’ needs with simplicity and ease.
  • HPE Data Protector Virtual Machine Protection
    HPE Data Protector Virtual Machine Protection Uli Wallscheid, Technical Consultant, HPE Information Management, specialist for HPE Data Protector Apr 6 2017 8:00 am UTC 60 mins
    Is your IT infrastructure evolving so fast that your existing backup environment can’t cope? Meeting constantly growing business demands with marginally growing budgets is a herculean task that most IT organizations are challenged with. To help close this gap, you need the ability to analyze and visualize the characteristics of your data, the capabilities of your infrastructure, and to continuously optimize how these assets are used while maintaining business continuity and resiliency. Achieving this is only possible when the backup software solution you put in place is reliable, predictable, and smart. With HPE Data Protector your service level expectations in virtualized environments can be met—successfully and cost-effectively!

    Join us for this session to learn how to protect your data in virtualized environments with major hypervisor integrations, tiered recovery options, process automation, and analytics and visualization for virtual environments. Our presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, will guide you through the supported approaches and explain the most common backup and recovery features for VMware and Hyper-V virtual environments.
  • How to Use the Fibre Channel Speedmap
    How to Use the Fibre Channel Speedmap Dave Alexander, Tony Bourke Apr 6 2017 6:00 pm UTC 75 mins
    Fibre Channel is the most well known dedicated storage networking protocol in use in data centers today, and is considered the gold standard for storage in terms of availability, reliability, and scalability. However, it does require some specific design and planning requirements. For that, storage administrators use the Fibre Channel Speedmap in order to plan.

    In this webcast, you will learn how to use the Fibre Channel Speedmap, what the numbers mean, and why its useful:

    - Why do storage administrators use the Speedmap?
    - What’s the difference between throughput, bandwidth, baud rates, and speed?
    - Why does this matter for Fibre Channel and not, say, Ethernet?

    This live webcast will be useful for anyone who wants to separate the wheat from the chaff when it comes to “speeds and feeds,” and make sense of the numbers.
  • Powering the New “Thin Branch Office” with SD-WAN (AMER)
    Powering the New “Thin Branch Office” with SD-WAN (AMER) Damon Ennis, Sr VP Products and Derek Granath, VP Product Marketing Apr 6 2017 6:00 pm UTC 60 mins
    SD-WANs have become a major market disrupter as they enable IT to use low-cost, high-speed broadband to connect their users to applications wherever they reside. Silver Peak’s SD-WAN solution is the most complete, total performance SD-WAN that not only lowers connectivity costs, it improves network and application performance. Now this powerful solution is taking on another challenge – completely simplifying the WAN architecture.

    Join this webinar to learn:
    • How to utilize an SD-WAN to consolidate and simplify the branch
    • What a “Thin Branch” is and how it benefits the entire enterprise
    • New ways to gracefully migrate to SD-WAN at your own pace
    • New features in Silver Peak’s Unity EdgeConnect that take SD-WANs to the next level with increased security, granular internet breakout and automation
  • Addressing Emerging PrivateLTE Opportunities w/ a Flexible Virtualized Solution
    Addressing Emerging PrivateLTE Opportunities w/ a Flexible Virtualized Solution Jennifer P. Clark - VP, Network Research, 451 Research; Douglas Ranalli - Founder & Chief Strategy Officer, NetNumber Apr 11 2017 3:00 pm UTC 60 mins
    Private LTE networks are becoming the critical infrastructure for a variety of vertical markets. This webinar will explore the requirements of these markets and the unique capabilities of the NetNumber TITAN centralized signaling and routing control platform to deliver the core signaling and database applications on a single virtual machine that can scale down to run on the often-limited resources available in a Private LTE network instance.

    NetNumber supports a wide range of deployment environments including COTS hardware running on Intel architecture. NetNumber also provides the capability to centrally provision the distributed LTE core instances without the need for any additional management applications, which would otherwise take up additional compute resources.
  • Best Practices for achieving Basic/Tier 1 Fiber Certification
    Best Practices for achieving Basic/Tier 1 Fiber Certification Tyler VanderPloeg, Viavi Apr 11 2017 3:00 pm UTC 90 mins
    Fiber standards and infrastructure for enterprise and data center networks have rapidly evolved over the last several years. From ribbon fiber to encircled flux for multimode, and the requirements for fiber connection quality, everything in the enterprise and data center has changed. Standards and best practices used in the field are struggling to keep up with these changes. Are your fiber test practices keeping up?
  • WANdisco Fusion 2.10 for NFS
    WANdisco Fusion 2.10 for NFS Paul Scott-Murphy, WANdisco VP Product Management Big Data/Cloud Apr 11 2017 5:00 pm UTC 60 mins
    WANdisco Fusion® 2.10 adds support for seamless data replication at petabyte scale from Network File Systems (NFS) for NetApp devices to any mix of on-premises and cloud environments. NetApp devices are now able to continue processing normal operations while WANdisco Fusion® allows data to replicate in phases with guaranteed consistency and no disruption to target environments, including those of cloud storage providers. This new capability supports hybrid cloud use cases for on-demand burst-out processing for data analytics and offsite disaster recovery with no downtime and no data loss.
  • Announcing Addy - Your Machine Learning Partner for Real-Time Data Detection
    Announcing Addy - Your Machine Learning Partner for Real-Time Data Detection Paul Sanford, Sr. Director of Product Management, Isaac Roybal, Director of Product Marketing, ExtraHop Networks Apr 11 2017 6:00 pm UTC 60 mins
    From IBM Watson to Amazon Alexa, machine learning, cognitive technology and bots are quickly bridging the gap between people and computers.

    Last month we introduced you to Addy: the first machine learning service in the cloud for wire data. It works nonstop, so you don't have to.

    This month, join us for a live webinar to see how Addy takes advantage of Wire Data's real-time insight to surface the most important information and reduce alert fatigue. Always on and always learning, Addy keeps watch for anomalous behavior and highlights only the problems that require your attention.

    Register for the webinar to get acquainted with Addy and meet the next phase of cloud-based services.

    Webinar agenda:

    1) Overview of the Addy service and how it fits with ExtraHop's existing products
    2) Demo of Addy's features and capabilities
    3) Audience Q&A