Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Synchronisieren Sie Ihre Daten mit Syncsort!
    Synchronisieren Sie Ihre Daten mit Syncsort!
    Charles Struijve Recorded: Dec 7 2018 30 mins
    Aktuelle Daten sind die beste Grundlage für die richtigen Entscheidungen. Change Data Capture oder CDC bezeichnet die Praxis, Veränderungen in einem wichtigen Transaktionssystem in andere Systeme zu übertragen. Dadurch bleiben die Daten im gesamten Unternehmen stets aktuell und konsistent. CDC sorgt dafür, dass Ihre Reporting- und Analytics-Anwendungen immer auf dem neuesten und genauesten Stand sind.

    Es gibt eine Vielzahl von CDC-Ansätzen und jeder Ansatz hat Vor- und Nachteile. Einige belasten die Datenquelle auf übermäßige Art und Weise. Sie sorgen dafür, dass Abfragen oder Applikationen langsam werden oder sogar abstürzen. Einige beeinträchtigen die Netzwerkbandbreite oder verursachen große Verzögerungen zwischen Änderung und Replikation.

    Außerdem hat jeder Geschäftsprozess unterschiedliche Anforderungen. Für einige Geschäftsanforderungen ist eine Verzögerung von mehr als einer Sekunde bei der Datenreplikation einfach zu lang. Für andere wiederum ist eine Replikation innerhalb von 24 Stunden hervorragend.

    Mit DMX-CDC bieten wir Ihnen die Lösung, um Ihre Daten punktgenau auf dem neuesten Stand zu halten – mit der Frische-Garantie von Syncsort!
  • Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Eric Slack, Sr. Analyst, Evaluator Group Recorded: Dec 6 2018 37 mins
    Digital transformation is happening! It’s driving companies to adopt new ways to capture and analyze data (the new oil), to discover new insights and optimize the way they run their businesses.

    IT is evolving to meet these new requirements, becoming more agile to keep up with dynamic markets - and the competition. The Cloud is a key, but on-prem infrastructures are, and will be, a part of most enterprise’s future.

    Join Eric Slack, Sr Analyst with the Evaluator Group and see how CI, HCI and Composable can address this need for agile, comprehensive infrastructures that reduce time for design, configuration, deployment and operations.
  • An Event-Driven Approach to Systems Management at Scale
    An Event-Driven Approach to Systems Management at Scale
    Mike Place, SaltStack director of engineering / Kendall Lovett, SaltStack head of product marketing Recorded: Dec 6 2018 31 mins
    Real-world systems are inherently complex. This is continually more apparent in the digital ecosystems that run modern business. The challenge to control, optimize, and secure these digital systems is becoming more and more daunting for IT operations teams. We must recognize and embrace emerging patterns to help efficiently manage infrastructure at scale.

    On this 30-minute webinar, Mike Place, SaltStack director of engineering and maintainer of the Salt open source project, will provide an introduction to an event-driven approach for systems management, blending traditional monitoring and configuration management techniques to build resilient and autonomous systems. The goal -- to learn how to abstract infrastructure command and control through event-driven IT automation workflows sophisticated enough to wrangle the complexity of the modern data center.
  • Hustle for the Win: Analytics for Political Campaign Success
    Hustle for the Win: Analytics for Political Campaign Success
    Joe Gallagher, Director of Data Science at Hustle and Erica Pearson, CSM at Periscope Data Recorded: Dec 6 2018 48 mins
    Many organizations use data to improve, however many sectors (including the political campaign space) have a much harder time capturing and analyzing data. Hustle is a texting tool that empowers organizations to have personal, human-to-human conversations at scale. Hustle has not only been able to leverage data to improve product experience, but has gone a step further to provide unique analytics opportunities for their customers.

    Join our webinar on Thursday, December 6 at 11 a.m. PT to hear Joe Gallagher, Director of Data Science at Hustle, discuss how Hustle is using analytics to empower organizations to engage their users and achieve desired actions.

    In this webinar, Joe will discuss:
    - What data challenges Hustle faces
    - How Hustle helps their customers track campaign performance against goals
    - How embedding analytics added value for Hustle’s customers
    - How Hustle uses data to improve product performance and customer outcomes
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois, Solutions Architect, Jamf Recorded: Dec 6 2018 24 mins
    With imaging taking a back seat to the new era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable zero-touch deployment by automating enrollment and configuration from a central location — eliminating the need to ever physically touch the device.

    In our webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organization.

    We’ll cover:
    •An overview of Apple’s deployment programs
    •The benefits of zero-touch deployment
    •How to accomplish zero-touch deployment for macOS and iOS
  • Empowering the Intent-Based Data Center
    Empowering the Intent-Based Data Center
    Lee Doyle Recorded: Dec 6 2018 48 mins
    Enterprise IT teams are planning, designing and building Intent-Based Data Centers to address the challenges driven by business transformations which include massive digital transformation, cloud adoption, mobility proliferation, advanced applications, pervasive IoT, and end-user demands. Intent-Based Data Center Automation is key to designing, building, deploying and operating the Intent-Based Data Center.

    Join our guest, Lee Doyle, Principal Analyst with Doyle Research, in this live webinar on Thursday, December 6th at 10:00 a.m. PT / 1:00 p.m. ET to gain an understanding of how Intent-Based Data Center Automation is addressing the needs of the Intent-Based Data Center through increased application reliability, simplified deployments, and reduced costs.

    In this webinar, you’ll learn:

    - How evolving technology is driving the ability to enable your data center to stay ahead of business transformations
    - How to increase the application and workload reliability and performance
    - Methods to detect and resolve underlying network challenges
    - Quick and simple ways to help meet compliance requirements
  • Next-Generation Hyperconvergence and Security
    Next-Generation Hyperconvergence and Security
    Mike McGhee - Technical Marketing Engineer at Nutanix | Shaun Donaldson - Director of Strategic Alliances at Bitdefender Recorded: Dec 6 2018 58 mins
    Since Nutanix pioneered hyperconverged infrastructure (HCI) in 2011, HCI has become an optimal way to run enterprise cloud. Meanwhile, the cyber threat landscape has worsened, demanding new approaches to protecting from advanced attacks.

    Join this webinar to see how Nutanix and Bitdefender work together to provide you the following:

    -An easy way to build a cutting-edge enterprise cloud for your environment
    -A bullet-proof combination of a hardened cloud and next-generation security for its files and workloads
    -An integrated solution to help you save time on infrastructure and security management and compliance
  • Enabling Productivity with Dell Data Security
    Enabling Productivity with Dell Data Security
    J R Balaji “JRB” – Sr. Global Product Marketing Manager – Dell Data Security Solutions Recorded: Dec 6 2018 38 mins
    Enabling Productivity with Dell Data Security calls attention to the security challenges that come with workforce transformation and how end user behavior increases security risk.
    It also discusses how Dell can help address concerns around securing and controlling data while keeping the workforce productive.
  • Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Jim Sangster, Sr.Director Product Mktg, Supermicro; Brian Watson, DCG Product Mktg, Intel Recorded: Dec 6 2018 40 mins
    Unparalleled performance and enterprise-class capabilities are now available in the industry’s broadest portfolio of entry level UP servers and multi-node blades from Supermicro. Learn how you can now “do more” than ever before in this class of system, at the same entry prices.
    Together with latest Intel® Xeon® E-2100 Processor and Supermicro UP systems, the broad portfolio offers the right server optimized for your environment.
  • The New Face of Discovery for the Data Center and IT Landscape
    The New Face of Discovery for the Data Center and IT Landscape
    Mark Gaydos, CMO @ Nlyte Recorded: Dec 6 2018 36 mins
    Join us for a review of the newest solution with agentless scanning of the assets across your entire data center and IT network. Discover how you can improve and simplify accuracy of asset tracking, increase security by understanding what is changing in your environment and who is making the changes, as well as optimize server utilization and tech refreshes.

    •Improve accuracy & simplify upkeep of your DCIM data
    •Eliminate all unrecorded changes made to any asset
    •Consolidate discovery with single source of truth
    •Validate that decommissioned assets are so
    •Ensure security team has complete information needed
    •Optimize planning & executing a tech refresh
    •Bolster efficiencies from merger/acquisition/consolidations
    •Keystone for SOX, HIPPA, and PCI compliance

    As Chief Marketing Officer, Mark Gaydos leads worldwide marketing and sales development. He oversees teams dedicated to helping organizations understand the value of automating and optimizing how they manage their computing infrastructure.
    Gaydos has more than twenty years of enterprise software marketing experience helping technology companies establish leadership and rapidly grow revenue. He previously served as the SVP of marketing at Engine Yard and has held a variety of executive marketing roles at enterprise companies such as Oracle, SAP and Comergent.
  • Essential Testing for MPO Systems
    Essential Testing for MPO Systems
    Guillaume Lavalee, EXFO Recorded: Dec 6 2018 56 mins
    Working with cabling systems that feature multifiber push-on connectors (MPOs) is a new and potentially challenging endeavor for many technicians. That’s why understanding the importance of MPO connector cleanliness, polarity and continuity, as well as how to test each of these characteristics is crucial to ensuring optimal performance. This webinar will review the basic checks you need to make before turning up MPO-based fiber-optic cabling systems and explore each of the three tests in detail, including the potential risks of omitting any of them
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois, Solutions Architect, Jamf Recorded: Dec 6 2018 24 mins
    With imaging taking a back seat to the new era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable zero-touch deployment by automating enrollment and configuration from a central location — eliminating the need to ever physically touch the device.

    n our webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organization.
    We’ll cover:

    •An overview of Apple’s deployment programs
    •The benefits of zero-touch deployment
    •How to accomplish zero-touch deployment for macOS and iOS
  • Search and Destroy Hard to Detect Security Risks
    Search and Destroy Hard to Detect Security Risks
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Dec 6 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • CDCS (Certified Data Centre Specialist) Course Sneak Peek
    CDCS (Certified Data Centre Specialist) Course Sneak Peek
    Marco van Gink Recorded: Dec 6 2018 33 mins
    The CDCS training and certification will add great value to your career in the competitive, yet exciting, data centre industry.
    CDCS is an advanced course which focuses on the knowledge and criteria to review and make improvements on existing data centre facilities, and to decide on the correct implementation of new data centre facilities. It expands on the knowledge in the CDCP course in full details including some key engineering calculations (fire suppression, batteries for UPS, power, cooling, etc).
    It will bring participants to the level of a great sparring partner with suppliers, to review equipment selection and design for correctness, effectiveness and e¬fficiency, thus preventing over/under investment. Vice-versa, it equips vendors’ selling data centre services/solutions/equipment with the same level of knowledge as their customers and enable them to answer questions and propose solutions effectively.
    Join us for this webinar and find out more!
  • Take the Leap to SNIA’s Storage Management Initiative Specification 1.8
    Take the Leap to SNIA’s Storage Management Initiative Specification 1.8
    Mike Walker, former Chair SNIA SMI TWG and former IBM Engineer, Don Deel, SNIA SMI Board Chair, SMI TWG Chair, NetApp Recorded: Dec 5 2018 36 mins
    If you’re a storage equipment vendor, management software vendor or end-user of the ISO approved SNIA Storage Management Initiative Specification (SMI-S), you won’t want to miss this presentation. Enterprise storage industry expert Mike Walker will provide an overview of new indications, methods, properties and profiles of SMI-S 1.7 and the newly introduced version, SMI-S 1.8. If you haven’t yet made the jump to SMI-S 1.7, Walker will explain why it’s important to go directly to SMI-S 1.8.
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools
    Patrick Riley, Principal Product Manager, Gigamon Recorded: Dec 5 2018 60 mins
    While inline security tools actively prevent threats in your network, deploying and optimizing these tools presents several challenges to both network and security engineers. They present a potential point of failure, they can degrade network and application performance, and they are difficult to scale and upgrade. These challenges can be overcome with the inline bypass functionality of a next-generation network packet broker.

    Join Patrick Riley, Principle Product Manager for this technical session to learn how inline bypass can:

    • Overcome physical deployment obstacles
    • Maximize network availability
    • Reduce impact to network performance
    • Increase scale of inspection
    • Deploy inline prevention tools within dual-path networks

    Watch “Overcome the Challenges of Inline Tools to Achieve Your Security Goals” now to gain the benefits of inline security tools while eliminating their challenges.
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Seyi Verma, Director of Product Marketing, Druva Recorded: Dec 5 2018 63 mins
    With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.

    Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
    - Centralise and simplify management of corporate data environments
    - Reduce costs and demands on local resources, and achieve 60% lower TCO
    - Modernise data protection for virtual workloads
    - Meet critical application data recovery speeds, and business continuity SLAs
    - Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security

    We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
  • A Walk in The Clouds: The Modern Customer Experience
    A Walk in The Clouds: The Modern Customer Experience
    Jacqueline Touma, Sandy Mathis, Amy Protexter, Razia Richter Recorded: Dec 4 2018 60 mins
    The customer expects fast, personal and engaging experiences, integrated and aligned across touch points in real time.

    The Cloud brings along a paradigm shift in the way customers interact with the businesses and what businesses must be prepared for. Understand what the Modern Customer Experience is and how content and customer analytics are keys to success.

    Organizations need to have the right tools to capture feedback and provide needed content at each point in the life cycle.

    Learn more from our Panel of experts as they share their experiences, best practices, and lessons from leading Companies.
  • Improving Security with Metadata
    Improving Security with Metadata
    Preetham Gopalaswamy, Senior Director, Product Management, Gigamon Recorded: Dec 4 2018 62 mins
    Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to know who is talking to whom and get visibility into malware and bad actors that may be hiding on the network.

    Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive.

    The bottom line is visibility into your application traffic is elemental to security – if you can’t see it, you can’t secure it. What’s needed is deep insight into your applications. Attend this ISC2 webinar to learn how NetOps and SecOps can:
    •Identify which applications are contributing to network traffic.
    •Use application metadata to gain more context of potential threat events and to more easily enforce corporate compliance.
    •Lower tool cost and improve tool efficiency by filtering out low-risk, high-bandwidth traffic.
    •Send suspicious traffic to a tool on-demand when an anomaly is detected.

    If you need to monitor, identify, and filter application traffic so you can more easily identify anomalies and lateral propagation of threats, you’ll want to attend this webinar!
  • Istio - Enabling a Defense in Depth Network Security Posture
    Istio - Enabling a Defense in Depth Network Security Posture
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Dec 4 2018 61 mins
    Are you looking into Istio? Many companies are investigating Istio to reduce the challenges of managing microservices as it delivers a uniform way to connect, monitor, and secure environments - especially used in concert with Kubernetes.

    Did you know that Istio is a part of the Tigera Secure solutions, that we play an active role in developing Istio, and we co-chair the Istio security special interest group? We'd like to share our expertise to help you understand how Istio fits into a comprehensive network security model.

    Attend our webinar on Tuesday, December 4 to learn about implementing a defense in depth posture that enables zero-trust network security across L3-L7 and allows Application, DevOps, Platform Engineering, Network, and Security and Compliance teams to seamlessly work together.

    Join Christopher Liljenstolpe, CTO, solutions at Tigera as he discusses strategies and technical details on:

    + Integrating Istio Policy into Kubernetes NetworkPolicy resulting in a single unified policy called application layer policy (ALP)
    + Implementing defense in depth by enforcing policies at multiple points within the infrastructure
    + Authenticating the identity of each request based on multiple criteria
    + Operationalizing ALP across heterogeneous environments
  • Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Bernie Hannon, Sr. Director, Citrix; Pankesh Mehta, Sr. Product Mgr, Lenovo Recorded: Dec 4 2018 61 mins
    For years, we’ve talked about the virtues of virtual desktop infrastructure (VDI). However, at the end of the day customers who invested time, resources and significant budget, often found that the benefits of VDI came with some hefty challenges. Complexity and time-to-value are difficult enough, but striking the balance between security and anytime/anywhere/any device access with has increasingly caused headaches for IT (not to mention the users!). Traditionally, securing apps and data meant keeping everything running in the data center, requiring IT to invest in expert resources to deploy and manage everything. In this session, you will see how these challenges have been addressed and how the barriers to adopting hybrid cloud digital workspaces are a reality with Citrix Cloud services deployed on Lenovo ThinkAgile HX. You’ll learn what VDI hasn’t been able to do, is now being delivered by Citrix and Lenovo. If you’ve already deployed VDI, we’ll show you how to relieve yourself of the burden of managing and maintaining a complex VDI environment, enabling you to put resources to better use. If you haven’t deployed VDI yet, we’ll show you just how simple it is to create secure, easy-to-use, and manage intelligent workspaces you and your users have been looking for. It’s called The Future of Work, and it’s here today.
  • Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Jim Jeffers, Sr. Director, Principal Engineer, Intel; Bart Willems, Director, Sr. HPC Engineer/Architect, Atipa Recorded: Dec 4 2018 26 mins
    Scientific simulations and modeling continue to produce larger and larger data sets. For our brain to understand and digest these vast amounts of data, visualization becomes an indispensable tool for post-simulation processing. Data produced by simulations is therefore often copied to high-end workstations and servers with special-purpose GPUs. As simulations continue to grow, moving and copying data becomes increasingly inefficient, time consuming, and wasteful of resources. The Atipa Polaris Select HPCV Cluster Family built on Intel Xeon Scalable Processors and Intel Omni-Path Fabric technology is the industry's first unified platform for scientific simulation and visualization. Using Intel Xeon optimized rendering engines, Atipa Polaris Select HPCV clusters offer in-situ visualization of big data on the same HPC system used to generate the data, eliminating the need for wasteful data transfers and special purpose hardware.
  • Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    Blockchain and eDiscovery (Part Two): Investigations from Bitcoin to Blockchain
    John Wilson, ACE, AME, CBE Recorded: Dec 4 2018 51 mins
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as part of data discovery and legal discovery processes.

    This expert presentation led by one of eDiscovery's foremost digital forensics experts, John Wilson, will highlight both cryptocurrencies and blockchains and provide attendees with fundamental information that will help them understand how to examine and investigate these technologies and the electronically stored information that results from their usage.

    Key Presentation Topics Include:

    + Quick Review: Cryptocurrencies and Blockchain
    + Crime, Cryptocurrencies, and Blockchain
    + Investigating Cryptocurrencies and Blockchain
    + The Physical Scene
    + The Digital Scene
    + Forensic Evidence
    + Following Transaction Trails
    + Investigation Intelligence

    Presenting Expert: John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.
  • Expecting the future with 4SIGHT
    Expecting the future with 4SIGHT
    Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice President Recorded: Dec 4 2018 53 mins
    Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.

    451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.

    Join us and see how you can raise your planning game!
  • Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    David Woolger & Luke Jeffries Dec 11 2018 11:00 am UTC 60 mins
    So after building the business case for Data Centre Modernisation you've discovered moving away from traditional, inefficient IT can help you reduce costs & reinvest in the services that matter. But will adopting cloud help you improve your security?

    Join our webinar hosted by Director of Technology David Woolger & Principal Cloud Support Engineer Luke Jeffries as we guide you through how moving from away from Legacy IT impacts your cyber security

    You'll learn
    - What the biggest threats are to your organisation
    - What to consider when modernising your Data Centre
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • MEGWARE HPC Clusters – an Energy Efficient Intel® Select Solution for Simulation
    MEGWARE HPC Clusters – an Energy Efficient Intel® Select Solution for Simulation
    Axel Auweter, CTO, MEGWARE Dec 11 2018 4:00 pm UTC 60 mins
    This webinar introduces MEGWARE’s certified Intel® Select Solution for Simulation and Modeling, an optimized platform specifically tailored to deliver stellar performance in all kinds of HPC applications. Backed by the power of cutting-edge Intel® Xeon® Scalable processors and supplemental Intel® technologies, MEGWARE offers a carefully pre-configured solution for those workloads including computational fluid dynamics (CFD) and computer-aided engineering (CAE). With more than 28 years of experience in building High-Performance Computing Clusters, MEGWARE has proven to be one of the leading vendors in Europe. Also, MEGWARE puts a strong focus on R&D with various software and hardware products developed in-house. One prominent example is the hot-water direct liquid cooling solution ColdCon® supporting high coolant inlet temperatures of up to 55°C. Hence, the Intel Select Solution for Simulation and Modeling is not only available with standard air-cooling but alternatively TCO-optimized with MEGWARE's extremely efficient ColdCon® technology.
  • Field testing MPO/MTP connectors to support 100Gig and beyond
    Field testing MPO/MTP connectors to support 100Gig and beyond
    Jim Davis, Fluke Networks Dec 11 2018 4:00 pm UTC 75 mins
    This webinar, presented by Jim Davis of Fluke Networks, will start with a basic review of the need for cleaning fiber and the differences between singlemode and multimode fibers. It will then cover the inspection and cleaning of fibers, the loss length and reflectance requirements, measuring loss, Tier 1 testing of MPO/MPT Connectors, Tier 2 testing for troubleshooting, and reading a test report.
  • Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Jambi Ganbar, Sr. Technical Solutions Manager NFV Ready Program, VMware and Petar Torre, Intel Lead Telco Architect Dec 11 2018 4:00 pm UTC 60 mins
    Intel and VMware will explore the impact of NFV Infrastructure on VNF Data Plane performance. We will explain the correct hardware design and then discuss the optimal use of VMware vCloud NFV to achieve high throughput and low latencies. This will be excellent opportunity to learn about Data Plane HW configurations with Intel® Xeon® Scalable Processors and Intel® Ethernet Adapters 710 Series, as well as VMware’s latest vCloud NFV OpenStack Edition 3.0 and NSX.
  • Open Standard for Data Center Availability (OSDA)
    Open Standard for Data Center Availability (OSDA)
    Lex Coors, Chief Data Center Technology & Engineering Officer, Interxion Dec 11 2018 4:00 pm UTC 60 mins
    The Green Grid is an industry organization focused on providing metrics, tools, and initiatives that enable the ICT industry to improve operations, increase efficiency, and deliver more sustainable products and services.

    Targeted at Data Center Designers and Owners/Operators, The Green Grid’s new Open Standard for Data Center Availability (OSDA) tool promises to modernize data center availability classification and rating, similar to how PUE modernized data center power usage. Free for anyone to use, the tool will enable data center professionals to evaluate sustainable energy source availability.

    Attendees will:
    •Learn a new approach to increase resource efficiency and sustainability by integrating renewable energy sources into their overall availability considerations
    •Understand how data centers of the future – either large data centers or edge data centers – can leverage new energy options
    •Gain insight into how to use the OSDA tool for their own operations
    •Learn about the role of The Green Grid in fostering industry collaboration and innovation
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Dec 11 2018 5:00 pm UTC 60 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid

    Speakers:

    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • Key Considerations for Stretching Your Storage Budget
    Key Considerations for Stretching Your Storage Budget
    Donna Pizarro, Product Manager, Storage; Jordan Bischof, Product Manager, Network; Bill Raftery, SVP Global Storage Solutions Dec 11 2018 5:00 pm UTC 60 mins
    Storage Admins are continually challenged by the revolution in today's storage technology; the expansive growth of storage needs and the balance of getting the best performance and extended life of the storage product to stretch an existing budget.

    Want to learn more? Join us for an informative discussion where we’ll discuss:
    •Available N-1 options for hybrid systems
    •Options you should consider when purchasing a pre-owned N-1 hybrid
    system
    •The pros and cons of purchasing a N-1 storage solution
    •How to save by extending the life of the asset
    •Why performance assessments and health checks are necessary, what is
    involved and what objectives should be expected
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Dec 11 2018 6:00 pm UTC 75 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Dec 11 2018 6:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Dec 11 2018 6:00 pm UTC 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • What’s New in Network Operations Management
    What’s New in Network Operations Management
    Jon Kies, Product Marketing Manager and Nisarg Shah, Product Management Director, Micro Focus Dec 11 2018 6:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest release of Micro Focus Network Operations Management.

    Network Operations Management (NOM)—the leading management tool for enterprise networks—is built on the core capabilities of Network Node Manager I and Network Automation. It integrates fault, performance, configuration, and compliance of physical, virtual, wireless, and software-defined network infrastructures.

    Learn about NOM’s latest enhancements for diagnostic analytics, the scheduled out-of-service feature, integration with Micro Focus Operations Bridge, and more.

    You will also get a sneak preview of the new NOMX User Interface—our next-generation customizable and persona-based experience that unifies network data from monitoring, automation, compliance, and orchestration into actionable insights.
  • Emerging Memory Poised to Explode
    Emerging Memory Poised to Explode
    Moderator: Alex McDonald, SNIA SSSI Co-Chair; Presenters: Tom Coughlin, Coughlin Associates & Jim Handy, Objective Analysis Dec 11 2018 7:00 pm UTC 75 mins
    Join SSSI members and respected analysts Tom Coughlin and Jim Handy for a look into their new Emerging Memory and Storage Technologies Report. Tom and Jim will examine emerging memory technologies and their interaction with standard memories, how a new memory layer improves computer performance, and the technical advantages and economies of scale that contribute to the enthusiasm for emerging memories. They will provide an outlook on market projections and enabling and driving applications. The webcast is the perfect preparation for the 2019 SNIA Persistent Memory Summit January 24, 2019.
  • Optimizing BI Workloads with Pepperdata
    Optimizing BI Workloads with Pepperdata
    Pepperdata Dec 11 2018 8:00 pm UTC 45 mins
    BI workloads are an increasingly important part of your big data system and typically consist of large queries that analyze huge amounts of data. Because of this, BI users frequently complain about the responsiveness of their applications.

    Learn how Pepperdata enables you to tune your big data system and applications to meet SLAs for critical BI workloads.
  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Dec 11 2018 9:00 pm UTC 60 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye iSIGHT Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • The Ghost in the Machine: Who Will Win the AI Race?
    The Ghost in the Machine: Who Will Win the AI Race?
    Simon Bryden, Consulting Systems Engineer, Fortinet Dec 12 2018 10:00 am UTC 45 mins
    In this webinar we will discuss some of the key security events and trends over the last year, drawing on threat intelligence facts and statistics as researched and reported by the FortiGuard Labs.

    As as both cyber criminals and cyber defenders look to new technological advances, we will then consider some emerging threats and defense strategies and discuss how both sides are likely to benefit, and to what extent?
  • Dell EMC Data Domain/DPS Webinar
    Dell EMC Data Domain/DPS Webinar
    Graeme Sutherland–Senior pre sales architect, Sal DeMasi–DPS Specialist Teknicor Dec 12 2018 2:30 pm UTC 60 mins
    Graeme Sutherland will be presenting an overview of the product and DPS as a whole and Sal DeMasi will be presenting a demonstration of key attributes of the appliance.

    There will be time at the end of the webinar for questions and also the opportunity to have a 1-1 Demonstration if you feel this will be of benefit to you.

    We hope you enjoy the webinar and if you have any questions please feel free to ask.
  • Unlock Your Data Capital with Dell EMC and Defendx
    Unlock Your Data Capital with Dell EMC and Defendx
    Nick Brackney, Dell EMC: Mike Davis, DefendX Dec 12 2018 5:00 pm UTC 60 mins
    Strengthen and differentiate your business by unlocking the value of your most valuable resource: data capital. Join the webinar and learn how Dell EMC and DefendX Software are making it easier for organizations to manage their unstructured data and make it easier to extract value from data.
  • Benefits of NVMe™ SSDs in Client Implementations
    Benefits of NVMe™ SSDs in Client Implementations
    Cameron Brett, Toshiba and Jonmichael Hands, Intel Dec 12 2018 5:00 pm UTC 60 mins
    NVM Express® over PCI Express® SSDs is the mainstream solution in the client space because it is low cost and has a smaller form factor than HDDs, while touting high performance and low power usage. Evolving to meet the needs of consumers, NVMe™ implementations touch various markets like gaming, content creation, workstations, mobile, media creation and more. Join Jonmichael Hands of Intel and Cameron Brett of Toshiba for this NVM Express, Inc. hosted webcast to learn more about real-world examples and how NVMe specifications continue to evolve to support client needs.

    In this webcast, attendees will learn more about the benefits of selecting NVMe enabled products like Intel SSDs and Toshiba SSDs. The webcast explores the client benefits that have surfaced with the different iterations of the NVMe specifications from NVMe 1.2 to NVMe 1.3 to the upcoming NVMe 1.4. Attendees will receive an in-depth overview of critical NVMe features including easier management of power/thermals, NVMe’s enablement in small form factors like M.2 and BGA, boot partitions and host controlled thermal management and namespace write protection.

    About the Presenters

    Cameron Brett is Director of Marketing, SSD and Storage Solutions, Toshiba Memory America, Inc. and a member of the NVMe Marketing Workgroup.

    Jonmichael Hands is a Product Marketing Manager at Intel and the NVMe Marketing Workgroup Co-Chair.
  • How to Easily Migrate Data Without Downtime
    How to Easily Migrate Data Without Downtime
    Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore Software Dec 12 2018 6:00 pm UTC 60 mins
    Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?

    Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?

    Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.

    If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
    • How to integrate software-defined storage into your environment
    • How to migrate data between totally different types of storage
    • How to change towards hyperconverged during regular business operations
  • Real Life Secrets and Best Practices of Processing Real-Time Data
    Real Life Secrets and Best Practices of Processing Real-Time Data
    Darren Chinen, Senior Director Data & AI, Malwarebytes and Priya Balakrishnan, Sr. Director of Product Marketing, Redis Labs Dec 12 2018 6:00 pm UTC 56 mins
    Malwarebytes, the industry-leading anti-malware, and internet security software company, also leads in innovative threat intelligence. One such tool is the interactive remediation map, a worldwide security vulnerability.

    Join us to learn how Malwarebytes uses Redis Enterprise at the heart of their data streams to centralize and visualize data in real-time, providing global information on threats detected, how a virus is conceived and the eventual spread through the world. In this talk, Darren Chinen, Sr. Director, Data and AI at Malwarebytes, will illustrate their use of Redis Enterprise. In this webinar, you will learn to:

    - Drive analytics for heat maps and their threat intelligence tool
    - Capture global malware records and real-time streams and drive stateful transformation
    - Efficiently cache large amounts of data for interactive exploration of malware
  • Big-Guy Security for the Little Guy
    Big-Guy Security for the Little Guy
    Claudio Scarabello Director Product, APAC FireEye Inc Dec 13 2018 3:00 am UTC 60 mins
    Threats Actors Target Vendors to Large Organisations

    We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
    Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Dec 13 2018 10:00 am UTC 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • Trends in 2019: Using AI and IoT to Make the World a Better Place
    Trends in 2019: Using AI and IoT to Make the World a Better Place
    Wael Elrifai, VP for Solution Engineering, Hitachi Vantara Dec 13 2018 4:00 pm UTC 60 mins
    Wael Elrifai, co-author of the book, “The Future of IoT”, shares his experience of recent changes in IoT technology, new terminology, and the complex challenges of scaling from sensor technologies to whole smart cities. Wael also explains how his passion for sustainable development and innovation come together to achieve good.
  • 4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    4 Steps to Drive Customer Lifetime Value & Gain Real-Time Behavior Intelligence
    Yaacov Ben-Yaacov, CEO, Catch Media Dec 13 2018 4:00 pm UTC 60 mins
    In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.

    Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.

    On this webcast you’ll learn:
    • Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
    • 4 steps needed to engage consumers, drive lifetime value and increase revenue
    • Why Catch Media chose Vertica for scale, performance, and flexibility
    • How businesses that embed Vertica can deliver higher value to customers