The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.
In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.
An intro to AlienVault USM
How to identify prospects quickly with a simple set of questions
How to sell the benefits of USM for easier and faster threat detection
Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:
Common security challenges for the mid-market
Considerations when selecting security vendor partners and ensuring a profitable practice
Operational, financial, and process considerations that are key to a successful MSSP
Essential skills critical to build successful MSSPs
Solutions, business resources, tools, and programs available to enable the success of an MSSP
In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.
In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.
Attend this Webchat and you will also learn:
The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.
Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.
In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:
The five vital technology tools you need to run an effective security practice
A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
Current threats and how they are evolving
Comprehensive threat protection for the cloud
Unified security for detecting threats and responding to incidents
Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.
In this session you'll learn about key findings from this survey including:
The predominant driver for organizations to consider managed security services
The most critical capabilities organizations look for in MSSPs
The most requested security services offered by MSSPs
Key benefits respondents have achieved by partnering with an MSSP
Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
Join us for this next session of “Under the Hood of Vertica” as we take a deep dive into Vertica’s integration with Apache Spark, an in-memory data processing engine.
Our technical experts will discuss Vertica’s latest support for Apache Spark version 2.1, review common use cases for each, and demonstrate how to leverage Vertica and Spark together to enable continuous, real-time processing and transformation of data streams.
The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.
Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.
This webinar will address:
Solutions, support & decisions
40G or 25G lanes?
Preterminated vs field-terminated cables
Duplex or Parallel transmissions
Singlemode, multimode or wideband multimode fiber?
Attendees with earn one BICSI Continuing Education Credit for attending.
Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.
We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.
First, colocation supply is measured from both a space and power perspective.
Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.
This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.
The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.
Among topics discussed will be:
- Present and future impact of Software Defined technologies on IT (challenges and opportunities)
- How Software-Defined is enabling the digital transformation
- Best practices and recommendation on adopting software-defined technologies with the future in mind.
This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
The journey towards a cloud native environment comes with its benefits but at the same time it has a lot of challenges. The main of which is how to put together different vendors who are not used to work with each other in one environment and make that work as a complete ecosystem. This session explores the questions and challenges that this journey brings and focus on the role of software and automation in it to make it as fast and as smooth as possible.
About the presenter:
Omar is the SDN solution owner for Cloud and Data Centers at Nokia. Omar has a broad experience in SDN and NFV technologies having worked on cutting edge projects for some of the biggest companies in the word. With a BSc in Computer Engineering and an MSc in Business Management he combines both very strong technical background with an excellent business awareness. Omar has two publications and two patents related to orchestrating telecom networks and modelling of network protocols.
9 months until the GDPR deadline - are you completely up-to-speed?
Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.
We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.
GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.
It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.
Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
Software defined and X as a Service are terms often used by organizations pushing “the next big thing”. Just like Cloud and DevOps before them, these are real movements and real principles that businesses and IT teams are embracing to deliver the services their own customer base have grown to expect. However, what does reality look like from what was proposed?
In this talk we look at what Software defined and “as a Service” mean to our customers, both independently and together as a consumption model for IT. We examine the benefits that could be realized as well as the challenges and shifts in behavior and policy that will be required to be successful.
How are you delivering “Software Defined Services” and what does it mean for your business, developers and in turn impact your customers? Join us as we summarize the journeys our customers are going on and what it means to them.
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.
The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.
5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
•How will 5G impact industry?
•What are the market challenges and opportunities?
•What are the key drivers for growth?
•How big will the market be for 5G by 2022?
We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.
Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.
This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
As more and more systems become hyper-converged, it can be hard to know where to start looking when something goes wrong. In this troubleshooting deep-dive our VMware Support engineers discussed a common approach for vSAN, potential missteps and pitfalls, and provide tips on how to approach various errors and outages you may see while using vSAN. Questions on capacity, performance, and what to do if you encounter issues are were asked during the live Q&A.
As storage technologies continue to evolve in 2017, so do the challenges faced in integrating conventional storage along with new age scalable object storage. Caringo Product Manager Glen Olsen will show how contemporary storage solutions are enhancing traditional storage and protocols so they benefit from modern cost-efficient scalability and data protection.
HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View
As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.
And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.
During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.
“When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.
With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.
About the Presenter:
Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?
See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
Although vSAN provides a means for customers to have block-based storage, many customers still have a requirement for native file services. Join this session to learn about NetApp’s complimentary software solution, which provides file services for a vSAN deployment.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.
This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.
David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:
- Natural language processing: finding keywords in relevant context within unstructured text
- Statistical NLP: sentiment analysis via supervised machine learning
- Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
- Graph analysis: finding actions outside the usual or expected network of people
- Heuristic rules: finding suspect actions based on past schemes or external datasets
- Topic modeling: highlighting use of keywords outside an expected context
- Anomaly detection: Fully unsupervised ranking of unusual behavior
Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?
- Should your software emulate a data scientist?
- Learn about the power of data visualizations.
- Learn about creating value from disperse data sets.
Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
Have you conquered big data? Ventana Research reports 4 out of 5 organizations agreed analytics on big data is essential to future company success, however, in that same study, they found companies that succeeded in capturing all that data in one place didn’t always succeed in getting value out it. How can you ensure if you go ‘big data’ that you get the immediate return on your latest investment?
Join this engaging session with David Menninger of Ventana Research as he shares:
- Why analytics is your best bet to extract maximum value from big data (on-prem or cloud)
- How new big data technology can complement existing platforms (no rip n replace)
- How to capitalize on current analytics tools and skills (analysts and users, not just data scientists)
- What you can do now, and next, to drive value from your big data (with real-life customer stories)
About the presenters:
David Menninger, Director, Ventana Research
David is responsible for the overall research direction of data, information and analytics technologies at Ventana Research covering major areas including Analytics, Big Data, Business Intelligence and Information Management along with the additional specific research categories including Information Applications, IT Performance Management, Location Intelligence, Operational Intelligence and IoT, and Data Science.
Josh Klahr, VP of Product, AtScale
Josh is responsible for driving AtScale’s product roadmap and strategy to deliver what customers need to succeed, and has worked with data and analytics since 2000. He started his career as product manager for the first “Datamart in a Box” at Broadbase, and ran product management for one of the largest Data and Analytics operations in the world at Yahoo!. Before AtScale Josh was VP of Product Management at Pivotal, where he was responsible for Greenplum, Pivotal HD, and HAWQ. Josh received his undergraduate degree in Ferrous Metallurgy at Brown University and his MBA from Stanford.
Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.
In this webcast, VMware subject matter experts will explore the key components available in the new vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future. We’ll discuss:
· What’s new in vSphere 6.5 and what’s coming up
· Best practices for upgrading to vSphere 6.5
· How vSphere 6.5 is your gateway to modernizing your infrastructure so you can take advantage of VMware’s suite of products for the SDDC, including vSAN.
Join us to learn how MaxLinear relies on WANdisco to improve productivity with Subversion Multisite delivering results such as:
- A 24/7 continuous integration environment with zero Subversion downtime
- Improved administrative efficiencies with Access Control
- Elimination of the effects of network failures and the dependency on legacy backup procedures
- Overcoming the challenges with Subversion mirrors
About the Presenters:
Russ Hill, Account & Renewals Manager Americas at WANdisco. Russ Hill works with our existing SCM install base as an account manager and renewals specialist. He works closely with the WANdisco Professional Services team on all SCM service opportunities in North America and is currently responsible for all new SCM opportunities within the Americas.
Owen Ofiesh Software Configuration Manager at MaxLinear. Owen Ofiesh is the Software Configuration Manager for MaxLinear, a global chip design firm. With over 15 years experience in configuration management, he has a strong background in many of the most common SCM tools and platforms. Owen has worked with WANdisco Subversion MultiSite for over six years and has a great understanding of how it compares and contrasts with other SCM tools.
The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.
When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!
This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:
•What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
•What are the main architectural differences between NVMe and SCSI deployments
•Impact on Queue Depth
•How to cross-connect legacy and future flash arrays with FC-NVMe
Please join us on August 29th for this advanced, deep dive on FC-NVMe.
We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.
Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!
In this technical, hands-on webinar we will cover the following topics:
-Overview of vRealize Automation setup and configuration
-Identifying and catering to your end users
-Blueprint design (Machine Lifecycle Whiteboard session)
-Overview of vRealize Automation extensibility
-Tying it all together
Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.
You should attend this webinar if you want to:
- Minimize the total cost of ownership (TCO) for your next WiFi project
- Learn how wireless technology is advancing
- Be prepared for the next generation of wireless will be here in just a few years
One of the dreams of development is to build a software package once - and deploy it anywhere. With current open source projects, this dream is even closer than ever. Join Nell Shamrell-Harrington, Senior Software Development Engineer at Chef as she discusses how to create software packages that run (almost) anywhere with Habitat. You'll see how the same application can be run on bare metal, on a virtual machine, or in a container - with everything needed to automate that application already built into the package itself. Also learn how to build and deploy these packages with the intelligence to self-organize into topologies, without needing a central orchestrator. See how the dream of platform-agnostic and self-organizing packages is fulfilled today, and how it will evolve in the future.
The next Ethernet era is here, is bringing with it numerous innovations like Power over Ethernet (PoE), ever-greater speeds, and advancements in BASE-T and signaling technologies. The Ethernet Alliance’s The State of Ethernet webinar will provide insight into both current Ethernet developments and its future, and will be followed by a Q&A session. Among the topics to be covered are:
•The state of IEEE 802.3™ projects, including 50/100/200/400 Gigabit Ethernet (GbE)
•Impacts of Serializer/Deserializer (SerDes) technology
•Test and measurement’s growing role within the Ethernet ecosystem
•The Ethernet Alliance PoE Certification program
•100 Gigabit per second (Gb/s) signaling
•New optical specifications and form factors
•Emerging trends and what lies ahead for Ethernet