The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.
This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.
High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?
This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.
Join us to:
- Explore why continuous delivery is about more than just having build pipelines
- Learn which industry metrics demonstrate that you’re shipping faster successfully
- Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.
Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.
During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.
With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.
This webcast will include a live demo and Q&A session.
Caringo Product Manager Ryan Meek explains how object storage can be used for storing digital evidence and the benefits of using it as a secure, compliant repository for use in law enforcement, government, and health IT use cases.
NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
* An overview of the OPNFV project
* An introduction to create-integrate-test categories
* Upstream and OPNFV projects that belong to the above categories
Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:
*The facts on enterprise adoption of Windows 10
*Planning considerations for your Windows 10 migration project
*Three distinct approaches to performing device replacements—and the pros and cons associated with each
About the speaker:
Aimee Simpson, Product Marketing Manager – Code42
Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
SQL Server is the core enterprise database platform for many of today’s mission critical workloads. Without a doubt, performance is always one of the key issues that virtually every DBA and database professional worries about. Flash storage can be an effective way to improve SQL Server’s performance and it is changing the way businesses are configuring their modern storage infrastructures. For business critical applications like SQL Server, flash storage can effectively eliminate the I/O bottlenecks that introduce latency into your mission critical applications. Flash storage can also improve your data resiliency and simplify your data management requirements at a cost that is comparable to traditional spinning media.
In this webcast, attendees will get a deep dive into the world of flash storage and SQL Server. They will learn:
- To compare the different types of flash storage that can be used
- About some of the best practices for using flash storage with SQL Server
Caringo VP of Marketing Adrian Herrera & VP of Product Tony Barbagallo and explore how object storage is being used in the Media & Entertainment sector. They will present real-life use cases including how NEP The Netherlands is using the Caringo Swarm Cloud and Object Storage Platform for Content Delivery.
Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.
Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
Q&A will follow at the end of the session.
Join Mark Kempson, Technical Consultant in Operational Excellence and discuss the importance of a maintenance management system to anticipate upcoming changes instead of reacting to them. Learn key principles to refine your data center operations and procedures to maintain a world class critical facility.
What questions should you be asking about maintaining and managing your data center?
•Are you making informed decisions on future updates, changes and maintenance?
•Have you done a comprehensive high-level risk analysis?
•Are you documenting and analyzing incidents?
•Is your staff properly trained to effectively manage your assets?
•Path to data center operations excellence
•Measuring operational effectiveness
•Addressing common staff related deficiencies in training, organization and escalation process
Enterprise IT is transforming rapidly and the evolution to container-structured applications is an important element of this transformation. From the container’s humble origins as a method to virtualize UNIX operating systems to provide process separation with high levels of efficiency, it has become the preferred method for building and deploying modern software into cloud environments.
Containers are foundational to propelling agility in the enterprise - they are dynamic in nature, support increasing computing densities, have data residency and data provenance for governance and present challenges and opportunities for security in this new world with DevSecOps.
Please join Peter Christy, Research Director of 451 Research and Marc Woolward, CTO at vArmour as they discuss all things containers along with a look at vArmour’s container strategy, solution and latest patent on container security.
How do you manage data and deliver insights when data volumes are exploding? Does this modern data challenge require more than a ‘traditional’ approach?
With 30 million+ members globally and hundreds of terabytes of data, Ebates' BI Team moved to a non-traditional approach as a matter of necessity. They defined what a non-traditional approach looks like and kept their Tableau business users happy.
In this webinar, EBates BI leader, Mark Stange-Tregear, will share why and how his team successfully transitioned from traditional BI on a traditional data-warehouse, to "all in" self-service BI on Hadoop.
Join us for this live presentation to learn:
1) Why: Why he chose to run BI on Hadoop at Ebates.
2) How: How Ebates made the transition; the plan, challenges and end-goals.
3) What: What he actually did, what he achieved, and lessons learned
Converged Infrastructure (CI), Hyperconverged Infrastructure (HCI) along with Cluster or Cloud In Box (CIB) are popular trend topics that have gained both industry and customer adoption. As part of data infrastructures, CI, CIB and HCI enable simplified deployment of resources (servers, storage, I/O networking, hardware, software) across different environments. However, what do these approaches mean for a hyperconverged storage environment? What are the key concerns and considerations related specifically to storage? Most importantly, how do you know that you’re asking the right questions in order to get to the right answers?
Find out in this live SNIA-ESF webcast where expert Greg Schulz, founder and analyst of Server StorageIO, will move beyond the hype to discuss:
· What are the storage considerations for CI, CIB and HCI
· Fast applications and fast servers need fast server storage I/O
· Networking and server storage I/O considerations
· How to avoid aggravation-causing aggregation (bottlenecks)
· Aggregated vs. disaggregated vs. hybrid converged
· Planning, comparing, benchmarking and decision-making
· Data protection, management and east-west I/O traffic
· Application and server I/O north-south traffic
It's been two years since we released Chef Client 12, and in that time the world has changed. Chef Client 13 will be released in April 2017, featuring more resources, a more streamlined way of writing custom resources, and many other improvements to making automating your infrastructure as efficient as possible.
In this webinar, Thom May, Community Engineering Lead at Chef, will give a guided tour of what's coming in Chef 13, how you can ensure that your Chef cookbooks are ready for the upgrade, and how you can write the best possible cookbooks.
Join us to learn:
- What's new in Chef Client 13
- How to prepare for the Chef Client 13 upgrade
- The state of the art in writing Chef cookbooks
Attend this webinar to learn how HPE’s application retirement solution can help reduce the overall recurring cost of managing legacy PeopleSoft instances by up to 40%.
The costs of licensing, operational, and skilled resources in maintaining legacy PeopleSoft environments can reach hundreds of thousands of dollars each year. In addition to these costs, organizations expose themselves to various security and privacy risks associated with the improper management of employee data stored in these inactive systems.
With HPE’s application retirement and archiving solution, you can retire multiple PeopleSoft instances while retaining seamless access to the historical data for compliance and reporting. Built on HPE’s market leading Structured Data Manager platform that relocates inactive data from expensive tier 1 production systems and legacy databases while preserving data integrity and access, you can be confident that the solution is scalable, flexible and secure.
Join us to hear more about how HPE Structured Data Manager for PeopleSoft Enterprise can help you simplify the retirement of legacy PeopleSoft instances and reduce the cost, complexity and risks associated with managing legacy applications and data.
Google Cloud Platform, Avere Systems, and Cycle Computing experts will share best practices for advancing solutions to big challenges faced by enterprises with growing compute and storage needs. In this “best practices” webinar, you’ll hear how these companies are working to improve results that drive businesses forward through scalability, performance, and ease of management.
In this webinar, you will learn:
- How enterprises are using Google Cloud Platform to gain big compute and storage capacity on-demand
- Best practices for efficient use of cloud compute and storage resources
- Overcoming the need for file systems within a hybrid cloud environment
- Understand how to eliminate latency between cloud and data center architectures
- Learn how to best manage simulation, analytics, and big data workloads in dynamic environments
- Look at market dynamics drawing companies to new storage models over the next several years
In just 60-minutes, you’ll be presented with a foundation to build infrastructure to support ongoing demand growth and have ample opportunity to ask direct questions to presenters.
In the age of applications where design, simulation, visualization and interpretation can all be performed digitally on high-powered servers and networks, eliminating the big data storage bottleneck has become imperative for high performance computing users.
What’s needed is a new, innovative storage architecture to support advanced applications while providing best-of-breed performance in all dimensions of concurrency – including IOPS, throughput, latency, and capacity – while offering breakthrough levels of density. A flash storage solution with an elastic scale-out system can deliver all-flash performance to petabyte-scale data sets, ideal for big data analytics.
Join this webcast for a technical deep-dive into why storage is becoming increasingly important in the age of applications, big data, and HPC.
Digital Transformation, alongside European and country specific initiatives, liberalisation and competitive pressures, is transforming utilities, factories and critical infrastructure and their Operational Technology.
With emphasis on Cyber Physical Systems, design-Customer-Supply chain collaboration, mobility and the cloud as the core enablers of his transformation, OT security must evolve to meet today’s cyber security challenges.
This session will provide a high level view of these changes, the security challenges they present, and the security solutions which must be put in place to ensure a secured industrial transformation.
Dell EMC ScaleIO software-defined storage delivers increased business value, lower TCO, and simpler storage lifecycle management. While these business benefits are well understood, how these benefits are achieved may seem like a mystery. Attend this webinar for an overview of ScaleIO’s architecture and product features and learn how ScaleIO provide enterprise-class block storage in a software-based architecture – that won’t leave your head spinning!
Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.
AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.
Viewers will learn how easy is to:
- Discover all assets across your AWS, Azure and on-premises environments
- Scan for vulnerabilities across cloud-based and physical assets
- Detect emerging threats with real-time, integrated threat intelligence
- Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
- Respond quickly to incidents & conduct thorough investigations
About the Presenter:
Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
How do you drive the most value from your data? There is growing attention on the need to process and analyze data in motion. As your business looks to generate additional value from multiple data sources, simply processing historical data is likely not going to be enough, and nor is relying solely on real-time streaming solutions. In this webinar learn how continuous data integration can drive value for your business and gain insights into how leading global organizations have implemented this approach and the impact on their business.
Join 451 Research Analyst, Matt Aslett, and HVR’s CTO, Mark Van de Wiel for this discussion with a short Q&A at the end.
In late 2016, the Ethernet Alliance and the NBASE-T Alliance held the first-ever joint plugfest for 2.5GBASE-T and 5GBASE-T Ethernet products. The industrywide effort brought together 15 diverse stakeholders from across the Ethernet ecosystem, including manufacturers of Ethernet switches, NICs, wireless LAN access ports, physical layers components, cabling, protocol test, and electrical test equipment. This joint webinar will provide an in-depth overview of the testing and subsequent results.
Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.
Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.
In this technical webinar Edy will focus on:
•Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
•Mapping security vulnerabilities to their applications to assess and prioritize risk
•Enable SOC engineers to tie cyber-attacks to business processes
•Migrating Firewall policies between firewall brands
•Performing a fully automated, zero-touch security policy change
In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?
If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).
During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:
- It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
- It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
- It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
- It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?
In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.
Watch this 30-minute webinar to learn:
*The benefits and challenges associated with Tableau’s mixed device environment
*How Tableau performs data migrations for users who are switching platforms
*Recommendations and considerations for offering Macs to your users
Matt Peterson,Technical Support Specialist,Tableau
Aimee Simpson, Product Marketing Manager, Code42
Tad Johnson, Solutions Architect, Jamf
Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.
In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.
This session will look at issues affecting enterprise use of datacenter networking services, including:
-Changing cloud consumption patterns by enterprises, employees, partners and customers
-The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
-Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
-How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
Is your infrastructure evolving so fast that your existing backup environment can’t cope? Join presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, to learn what HPE has to offer with Data Protector, including features and benefits you never knew were available.
You’ll also get a sneak preview of the next release version and will learn how it addresses the challenges of complexity, cost, and recoverability of today’s information-driven enterprises, with features such as:
• Added platforms and integrations
• New Virtualization features
• Security updates
• Storage integrations
Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.
Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.
During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
Are you doing the right things with Big Data? How do your peers, and competitors, use it? Are you ahead of or behind the curve? Is on-premises or Cloud the best direction? Which workloads drive the fastest impact and biggest ROI?
Join this interactive webinar to learn details of the largest Big Data Maturity Survey, including why and what 2500+ Big Data and BI Enterprise Leaders choose for Big Data priorities in 2017.
You’ll also hear from Brandon Bunker, Director of Customer Analytics and Intelligence at Vivint, IoT and Smart Home leader. With 1M+ customers generating >20K events per second. As pioneers in their space, Vivint had to get ahead of big data versus letting it get ahead of them. Brandon will share challenges, choices and lessons learned along his journey to deliver the ultimate customer experience and compete in today’s hyper-speed world.
Join this interactive session to hear about the journey leading enterprises are making with Big Data. You will learn:
Why leading enterprises are betting big on Big Data
Which workloads can drive maximum value out of Big Data
How to leverage Big Data for better customer experience + competitive advantage
Josh Klahr, VP of Product, AtScale
Josh is responsible for driving AtScale’s product roadmap and strategy to deliver what customers need to succeed, and has worked with data and analytics since 2000. Before AtScale Josh was VP of Product Management at Pivotal, where he was responsible for Greenplum, Pivotal HD, and HAWQ.
Brandon Bunker, Sr. Director Analytics and Intelligence, Vivint
Brandon Bunker is Sr. Director of Consumer Analytics and Intelligence at Vivint. Vivint is the leading home automation company in America. His team is responsible for creating real time digital products based on IOT data and machine learning. His team recently launched a Smart Home Assistant that assists customers in controlling their thermostat.
“Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.
* The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
Join James Malone, Google Cloud Dataproc Product Manager and Paul Scott-Murphy, WANdisco VP of Product Management, as they explain how to address the challenges of operating hybrid environments that span Google and on-premises services, showing how active data replication that guarantees consistency can work at scale. Register now to learn how to provide local speed of access to data across all environments, allowing hybrid solutions to leverage the power of Google Cloud.
Join Peter McCallum and Gavin McLaughlin as they reconvene for part two in their discussion series on the state of the modern storage industry. For this segment, Gavin and Pete will discuss the convoluted reality of white-box or commodity storage hardware, and how it couples with software to provide real storage services for businesses. Ultimately, this overview should arm you with the concepts to look for as you shop across build-it-yourself, packaged open-source, decoupled heterogeneous, and proprietary storage paradigms. We’ll look at cost factors, gotchas, and key considerations as we review the incumbent and new players in our industry.
Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.
According to IDC, Commvault Data protection software delivers:
1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance
2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts
3. 15–30% reduction in data management point solutions
4. 55% reduction in annual unplanned downtime
Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:
1 How FlashStack compares to other converged infrastructure platforms.
2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
Analyst research reveals significant gains from server upgrade. A recent IDC study shows that by neglecting to upgrade server infrastructure regularly, IT organizations can lose up to 39% of peak performance, add up to 40% in application management costs, and incur up to 148% in server administration costs. Join to boost cost savings, productivity, and innovation.
This webinar is part four of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to decrease change failure rates.
High-performing organizations that have undergone digital transformation have very low rates of failure when introducing changes. Key to this resiliency is that these organizations focus on improving how quickly they recover from failures rather than trying to prevent failures from happening. By emphasizing recovery over prevention, they achieve a substantially higher rate of service resiliency. Industry metrics prove that this capability is part of an overall approach to outperforming your competitors.
This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.
Join us to:
- Explore how to achieve resiliency by optimizing for failure recovery
- Learn which industry metrics demonstrate that resiliency
- Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
Marketers have never seen a challenge like this: unprecedented amounts of data, transferred at unprecedented rates, with data breaches doubling in just the past year. Many solutions have protected data in its various states, but no solution has secured data at rest, in use, and in motion – until now.
In Triple Threat: Protecting Data Throughout its Lifecycle, IIS Chief Data Scientist Don Vilen and Strategic Advisor Joel Rubinson show you how to utilize the most advanced algorithms, format-preserving encryption to protect PII, and tokenization.
About the presenters:
Don Vilen - Formerly a Data Scientist at AOL and Chief Data Scientist at Buysight, IIS Chief Data Scientist Don Vilen brings over 30 years of software development and data analytics experience to this webinar. He has worked on some of the most groundbreaking database and web advertising products the industry has seen.
Joel Rubinson - Joel is an adjunct professor of marketing at New York University. A published author and marketing analytics consultant, Rubinson has allowed IIS to streamline the conversation between its customers’ marketing and IT departments.
Server Message Block (SMB) is the core file-transfer protocol of Windows, MacOS and Samba, and has become widely deployed. It’s ubiquitous - a 30-year-old family of network code.
However, the latest iteration of SMB3 is almost unrecognizable when compared to versions only a few years old. Extensive reengineering has led to advanced capabilities that include multichannel, transparent failover, scale out, and encryption. SMB Direct makes use of RDMA networking, creates block transport system and provides reliable transport to zetabytes of unstructured data, worldwide.
SMB3 forms the basis of hyper-converged and scale-out systems for virtualization and SQL Server. It is available for a variety of hardware devices, from printers, network-attached storage appliances, to Storage Area Networks (SANs). It is often the most prevalent protocol on a network, with high-performance data transfers as well as efficient end-user access over wide-area connections.
In this SNIA-ESF Webcast, Microsoft’s Ned Pyle, program manager of the SMB protocol, will discuss the current state of SMB, including:
•Brief background on SMB
•An overview of the SMB 3.x family, first released with Windows 8, Windows Server 2012, MacOS 10.10, Samba 4.1, and Linux CIFS 3.12
•What changed in SMB 3.1.1
•Understanding SMB security, scenarios, and workloads
•The deprecation and removal of the legacy SMB1 protocol
•How SMB3 supports hyperconverged and scale-out storage
Red Hat® OpenShift Container Platform is a complete container application platform that provides all aspects of the application development process in one consistent solution that can span across multiple infrastructure footprints. OpenShift integrates all the architecture, processes, platforms, and services needed to help development and operations teams traverse traditional siloed structures and produce applications that help businesses to succeed.
Using OpenShift with Project Trident, NetApp’s open-source dynamic storage provisioner, extends this experience to simplify and automate persistent storage volumes. Trident's integration with OpenShift allows infrastructure teams to define storage capabilities while simultaneously enabling application teams to consume storage based on their needs - when they need it, where they need it, and how they need it.
Learn how OpenShift and NetApp Project Trident can empower the development and deployment of applications in an environment which meets customers’ needs with simplicity and ease.
Is your IT infrastructure evolving so fast that your existing backup environment can’t cope? Meeting constantly growing business demands with marginally growing budgets is a herculean task that most IT organizations are challenged with. To help close this gap, you need the ability to analyze and visualize the characteristics of your data, the capabilities of your infrastructure, and to continuously optimize how these assets are used while maintaining business continuity and resiliency. Achieving this is only possible when the backup software solution you put in place is reliable, predictable, and smart. With HPE Data Protector your service level expectations in virtualized environments can be met—successfully and cost-effectively!
Join us for this session to learn how to protect your data in virtualized environments with major hypervisor integrations, tiered recovery options, process automation, and analytics and visualization for virtual environments. Our presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, will guide you through the supported approaches and explain the most common backup and recovery features for VMware and Hyper-V virtual environments.
Fibre Channel is the most well known dedicated storage networking protocol in use in data centers today, and is considered the gold standard for storage in terms of availability, reliability, and scalability. However, it does require some specific design and planning requirements. For that, storage administrators use the Fibre Channel Speedmap in order to plan.
In this webcast, you will learn how to use the Fibre Channel Speedmap, what the numbers mean, and why its useful:
- Why do storage administrators use the Speedmap?
- What’s the difference between throughput, bandwidth, baud rates, and speed?
- Why does this matter for Fibre Channel and not, say, Ethernet?
This live webcast will be useful for anyone who wants to separate the wheat from the chaff when it comes to “speeds and feeds,” and make sense of the numbers.
SD-WANs have become a major market disrupter as they enable IT to use low-cost, high-speed broadband to connect their users to applications wherever they reside. Silver Peak’s SD-WAN solution is the most complete, total performance SD-WAN that not only lowers connectivity costs, it improves network and application performance. Now this powerful solution is taking on another challenge – completely simplifying the WAN architecture.
Join this webinar to learn:
• How to utilize an SD-WAN to consolidate and simplify the branch
• What a “Thin Branch” is and how it benefits the entire enterprise
• New ways to gracefully migrate to SD-WAN at your own pace
• New features in Silver Peak’s Unity EdgeConnect that take SD-WANs to the next level with increased security, granular internet breakout and automation
Private LTE networks are becoming the critical infrastructure for a variety of vertical markets. This webinar will explore the requirements of these markets and the unique capabilities of the NetNumber TITAN centralized signaling and routing control platform to deliver the core signaling and database applications on a single virtual machine that can scale down to run on the often-limited resources available in a Private LTE network instance.
NetNumber supports a wide range of deployment environments including COTS hardware running on Intel architecture. NetNumber also provides the capability to centrally provision the distributed LTE core instances without the need for any additional management applications, which would otherwise take up additional compute resources.
Fiber standards and infrastructure for enterprise and data center networks have rapidly evolved over the last several years. From ribbon fiber to encircled flux for multimode, and the requirements for fiber connection quality, everything in the enterprise and data center has changed. Standards and best practices used in the field are struggling to keep up with these changes. Are your fiber test practices keeping up?