Hi [[ session.user.profile.firstName ]]

Data Center Management

  • The Road to Simplicity: Converging Primary and Secondary Storage
    The Road to Simplicity: Converging Primary and Secondary Storage Jacob Cherian, VP of Product Strategy, Reduxio, Mike Grandinetti, CMO, Reduxio, Keith Worthington, IT Manager, LineMaster, Recorded: Feb 15 2018 45 mins
    In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.

    IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.

    Join this session to learn about:

    - The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
    - The current challenges of copy data management and how to address them
    - A dive into a TCO study depicting the savings achieved through this architectural change
    - Why snapshots are obsolete and you to achieve near-instant data recovery
    - A look into additional use cases of copy data for DevOps team

    The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.

    Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
  • Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center
    Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center David Powell, GM of Service Provider Business, LogicMonitor Recorded: Feb 15 2018 37 mins
    Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:

    - The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
    - Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
    - Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
    - Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.

    How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
  • Preparing Your Data Center for a Digital Makeover
    Preparing Your Data Center for a Digital Makeover Cindy Borovick, Business Intelligence Director, F5 and Lori Mac Vittie, Principal Technical Evangelist, F5 Recorded: Feb 15 2018 38 mins
    Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
  • Creating Modern Business Foundations upon Hybrid IT Infrastructures
    Creating Modern Business Foundations upon Hybrid IT Infrastructures Todd Traver, Vice President, IT Optimization and Strategy, Uptime Institute Recorded: Feb 15 2018 50 mins
    Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Recorded: Feb 15 2018 38 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC
    Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC Scott Sinclair, Sr. Analyst, Enterprise Strategy Group, Inc. Varun Chhabra, Sr. Director - Product Marketing, Dell EMC Recorded: Feb 15 2018 63 mins
    In the era of digital business, IT managers are increasingly responsible for delivering results that drive the success of their business. To achieve this, it is imperative that IT organizations implement a modern storage infrastructure that enables them to increase agility and thereby gain a competitive advantage. In this webcast, experts from Enterprise Strategy Group and Dell EMC will describe the key attributes and benefits of a modern storage infrastructure.
  • The 2 fastest ways to move forward on data center consolidation
    The 2 fastest ways to move forward on data center consolidation Marc Keating: Director of technology and alliance strategy; Darren Miller: Manager of engineering test and performance Recorded: Feb 15 2018 60 mins
    You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
  • Analyze ORC and Parquet data in the right place for the right price with Vertica
    Analyze ORC and Parquet data in the right place for the right price with Vertica Mark Lyons and Steve Sarsfield, Vertica Recorded: Feb 15 2018 39 mins
    In a modern enterprise architecture, gaining access to data that’s stored in multiple locations is crucial to delivering analytics. It shouldn’t really matter if the data is stored in your database or some other location in ORC or Parquet formats. Performing analysis on it without having to first copy it can be a very powerful capability.

    Join Vertica experts Mark Lyons and Steve Sarsfield as they talk about how the external tables feature of Vertica can save you time and effort in many day-to-day analytics tasks. Whether you’re joining internal databases to external data tables for additional insight, training machine learning models, or simply tiering less critical data analysis off to a less expensive storage location, external tables can speed you through this task.

    In this webinar, you’ll also learn how external tables are a fantastic way to keep costs low yet maintain easy access to data of almost any age and any importance.
  • Automating Storage Provisioning using VMware vRealize Orchestrator
    Automating Storage Provisioning using VMware vRealize Orchestrator Eric Siebert - Product Manager, Chris Snell - Technical Solutions Engineer Recorded: Feb 15 2018 50 mins
    Virtualizing data center infrastructure has reduced server sprawl, and improved provisioning, scalability and TCO. However, it’s come with increased complexity in managing across the infrastructure stack. To address this, IT orgs are turning to automation. VMware vRealize Orchestrator and VMware vRealize Automation let you: easily provision virtual and physical servers, software, networking and storage; develop composite workflows to speed complex infrastructure provisioning; and create customized environments for dev/test. This webinar covers technical details of these products and includes a demonstration of how to start a VMware Private Cloud by automating Storage Provisioning tasks using the new vRealize Orchestrator plugin for HPE 3PAR Storeserv and vRealize Automation.
  • Embrace the Datacenter of the Future with Network Virtualization
    Embrace the Datacenter of the Future with Network Virtualization Mark Hollman, Sr. Mgr Product Marketing at Verizon Recorded: Feb 15 2018 27 mins
    The terms SDN (Software-Defined Network) and NFV (Network Function Virtualization) are on many agendas right now, but what does network virtualization really mean in practical terms for the data center environment?

    In this session we will discuss your move to the cloud, including how to:

    •Speed time to market: Embracing new technologies to quickly deploy new services or turn on new sites.
    •Become more agile: Leveraging application enablement to facilitate agile business processes and help customers connect to multiple clouds/CSPs.
    •Manage costs: Consolidating your rack to free up space and control costs.
    •Enhance the customer experience: Improving application performance and limiting downtime from outages.
  • Tsunami! The Forthcoming Wave of Liquid Cooling in the Data Centre
    Tsunami! The Forthcoming Wave of Liquid Cooling in the Data Centre John Booth, CEO, Carbon3 IT Recorded: Feb 15 2018 35 mins
    This webinar will cover the challenges of scaling up of liquid cooling technologies in the data centre space.

    About the presenter:
    The subject of sustainable and green data centres is very close to my heart. For many years I have been increasingly concerned with the ever increasing requirement for power that the information age requires and we built our business on explaining to organisations that they were wasting energy and overcooling server rooms as well as consulting on green IT issues from device to disposal.

    The EURECA project will deliver a tool that public sector IT managers can use to benchmark their current actions and see what the current standards and latest concepts are and how to implement easy solutions to make a real difference. I have been lucky enough to see some state-of-the-art public sector data centres such as the University of St Andrews that have adopted the EU Code of Conduct for Data Centres and been awarded a GOLD CEEDA and how the management used the project to promote wider sustainability concepts to the rest of the university and beyond. At the other end of the scale there remains much work to be done in data centres/server rooms across the public sector to capitalise on the fast moving and sometimes daunting array of technologies and methodologies on offer.
  • IT Transformation: Beyond the Traditional Data Centre
    IT Transformation: Beyond the Traditional Data Centre Simon Ratcliffe, Consulting & Advisory, Ensono Recorded: Feb 15 2018 49 mins
    IT Transformation projects are usually driven by the need to reduce complexity, improve agility, simplify systems, contain costs, manage ever growing data and provide more efficient operational management. Arguably, for seasoned IT professionals there is nothing new about the drivers for transformational change; it’s the velocity and scale of transformation today that’s the big challenge.

    Today, to effectively accelerate business innovation, successful IT leaders are building infrastructure that focuses on automation and flexibility, supporting agile application development and helping deliver world-class customer experience. Of course, IT teams are still under pressure to deliver legacy, mission-critical applications but they also need to support a seemingly constant flow of emerging business opportunities. They’re also tasked to lower costs, reduce Capex, while helping to drive revenue growth. That’s a lot of drivers and this complex juggling act often requires modernising infrastructure. An almost inevitable result of this is that the mix of platforms they adopt will include public cloud.

    So, does that signal the end of the corporate data centre as we know it? Well, as is so often the answer – yes and no. ‘Yes’ because there is no doubt that the complexity and cost of building and managing on-premise infrastructures is becoming increasingly unsustainable for many businesses. And ‘no’ because business continuity and stability of legacy applications are still, quite rightly, primary drivers today. But the corporate data centre may well now be a service provider’s data centre...
  • Resilient BCDR: Unifying People, Processes and Systems
    Resilient BCDR: Unifying People, Processes and Systems Jason Buffington, Principle Analyst at ESG Recorded: Feb 14 2018 61 mins
    When the people and processes within your business work as one to achieve BCDR resiliency, you can rest easy in the knowledge that you’re prepared for any interruption that comes your way.

    In this webinar, one of the industry’s leading experts will show you how to focus your organization’s efforts on building a resilient BCDR plan. We’ll also cover ways to make sure your BCDR solution is:

    • Prepared for any possible interruption
    • Checked frequently for repeat errors
    • Tested by a rotating cast of stakeholders
    • Seen as a key part of your company’s survival

    Join us, and discover how thorough planning leads to peace of mind for everyone involved.

    About the Featured Presenter

    Jason Buffington is the principal analyst at ESG focusing on all forms of data protection, preservation and availability. He has actively deployed or consulted on data protection and storage solutions for 28 years, working at channel partners, multiple data protection software vendors and Microsoft. Jason has been a featured speaker at many server-infrastructure, business continuity and storage events around the world, and his articles have appeared in numerous IT industry journals.
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 57 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • Interconnect for Success: Winning Strategies of Data Center Providers
    Interconnect for Success: Winning Strategies of Data Center Providers Jim Davis, Contributing Analyst, Structure Research Recorded: Feb 14 2018 29 mins
    Enterprises are grappling with security and performance challenges that have come along with their growing use of cloud services. Datacenter providers are in a position to facilitate on-demand connectivity with software-defined platforms. This presentation will give insight into how datacenter providers are building and marketing interconnection services. We’ll also cover cloud service providers efforts to build global networks, and assess their impact on datacenter providers.

    About the presenter:
    Jim Davis is a contributing analyst for Structure Research, an independent research and consulting firm with a special focus on the hosting and cloud segments within the Internet infrastructure market. Jim’s areas of expertise include cloud-based networking, security, and edge compute services. Jim has spoken at numerous industry events such as International Telecoms Week, Capacity North America, CDN World Summit, and Streaming Media West.
  • 2018: Trends in Information Storage and Management
    2018: Trends in Information Storage and Management Randy Kerns, Sr. Strategist, Evaluator Group Recorded: Feb 14 2018 49 mins
    There are many developments going on in the industry for storing and managing information. This webinar will cover the major trends, explaining the development and status as well as the potential impact on data center environments. Technologies such as advanced flash and storage class memory and enabling software and systems for digital transformation will be covered. Randy will give the industry analyst view of the trends and provide background on the maturity and adoption.
  • Orchestration within Telefónica UNICA Platform: The role of Open Source MANO
    Orchestration within Telefónica UNICA Platform: The role of Open Source MANO Antonio José Elizondo Armengol, Telefónica & Javier Ramón Salguero, Telefónica Recorded: Feb 14 2018 60 mins
    Telefónica launched its UNICA program back in 2013. After several years maturing involved technologies and granting the assurance and security aspects, Telefónica started to deploy UNICA in five different countries during 2017. This is just the end of the beginning. UNICA is a live project that needs to evolve to support and guarantee future network needs, providing a way to have Zero Touch operations by automating the end to end life cycle of creating and operating network services along with a smooth evolution towards 5G. ETSI OSM, the Open Source project with the broadest industry support of more than 85 companies is setting down the basis for having a Common Information Model, agnostic to NFVI/VIM technologies, and that is helping to accelerate the availability of solutions for Zero Touch operations.
  • Revealing the Blind Spots in Your IT Infrastructure Spend
    Revealing the Blind Spots in Your IT Infrastructure Spend John Cole, Solutions Principal, AHEAD Recorded: Feb 13 2018 32 mins
    IT leaders in the driver’s seat of their organization are constantly focused on the road ahead—including forces reshaping the industry and emerging technology trends. But the road to digital transformation is riddled with blind spots—whether in the form of hidden infrastructure costs or obstructed views of multi-year, total cost of ownership (TCO).

    In a “do-more-with-less” world, IT decision-makers are tasked with not only pursuing the latest and greatest in tech initiatives, but also keeping the lights on while improving service levels. So, what if you could take those sunken costs and eliminate or repurpose them to fuel company-wide innovation? This webinar addresses just that: identifying improvements in operations to fund modernization within your organization.

    AHEAD Solutions Principal John Cole outlines a roadmap to data center optimization, including:

    -Top enterprise IT objectives for 2018—and best practices for success
    -Analyzing committed data center costs—and repurposing those funds to eliminate incremental budget approvals
    -IT infrastructure maintenance—and effectively managing multiple vendors and contracts
    -AHEAD’s “Harvest to Invest” initiative—and how we helped a large healthcare system identify significant cost savings opportunities
  • Build Security, Agility and Cost-Efficiency into your Data Center Strategy
    Build Security, Agility and Cost-Efficiency into your Data Center Strategy Galeal Zino, Founder & President, NetFoundry Recorded: Feb 13 2018 50 mins
    Join this live webinar with Galeal Zino, Founder & President of NetFoundry, on Tuesday, February 13th at 10am PT / 1pm ET as he reviews the top challenges to effective hybrid data center interworking. Learn how to make your networks as agile as the applications they need to support.

    About the presenter:
    Galeal is the President of NetFoundry. NetFoundry believes in enabling edge innovation. NetFoundry frees individuals, apps, groups and businesses from traditional network, telco and hardware constraints, enabling applications and business policies to control underlying networks, with security, compliance, reliability & performance.

    Prior to NetFoundry, Galeal’s roles included President at LocalReplay, VP of Engineering at Teleglobe and VP of Development and Engineering at ITXC. Galeal’s teams helped develop the world’s largest VoIP network, and build global collaboration products. Galeal has been awarded eight patents for the platforms powering those products, and the software still powers the services of many of the world’s top communications providers.
  • Crossing The Digital Transformation Chasm
    Crossing The Digital Transformation Chasm Shailesh Manjrekar, Sr. Director, Product & Solutions at Vexata, Frederic Van Haren, Senior Analyst at Evaluator Group Recorded: Feb 13 2018 58 mins
    Leverage Vexata Active Data Fabric Ecosystem for AI, Deep Learning, Machine Learning and Cognitive Pipelines

    Digital Transformation is cutting across industries and making a profound impact in our lives. Data is the new oil, however, businesses need a different approach to drill this oil, in a way it impacts the business processes positively and instantaneously. Existing datacenter infrastructure falls short in meeting the requirements of these new distributed and massively parallel pipelines and datatypes and need to evolve.

    Several trends are proving to democratize Digital Transformation vision and technologies are emerging as building blocks. Notably Convergence of HPC, Big Data Analytics, and Artificial intelligence markets, driven by GPU computing, open sourcing of ML / DL frameworks, Distributed architectures, faster storage media like NVMe and 3D-Xpoint and faster networking with NVMeOF are fueling these trends.

    Join this webinar and learn about the latest industry trends, vertical use cases and how Vexata with its Active Data Fabric ecosystem is uniquely positioned to help its customers cross the chasm.

    Webinar takeaways:
    1. Future of Analytics – move from descriptive to prescriptive and now to cognitive, leveraging Deep Learning, neural nets, streaming paradigms
    2. Business Value of Digital Transformation – remain competitive, survive and thrive.
    3. Remove infrastructure bottlenecks, particularly as they pertain to storage and data management when using AI, Deep Learning, Cognitive pipelines for use cases across verticals like:
    - EDA / Manufacturing
    - Media and Video Analytics
    - Genomics, Precision medicine
    - Speech Recognition
    - Industrial IoT
    - Financial and Security Analytics
    - Retail Customer Churn / Sentiment Analysis
  • 2018 Trends in Information Security
    2018 Trends in Information Security Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise Recorded: Feb 13 2018 66 mins
    In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?

    Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.
  • Ep. 7 Performance Testing Internet of Things: Q&T SIG Talk
    Ep. 7 Performance Testing Internet of Things: Q&T SIG Talk Scott Moore Recorded: Feb 13 2018 36 mins
    Performance Testing Internet of Things

    Scott Moore will take a dive into performance testing Internet of Things (IoT) applications and platforms. It includes a deeper look into two of the most popular protocols being used today: MQTT and CoAP. Learn how you can ensure your IoT platform and applications scale and reduce the risk of failure under load in highly constrained environments.

    What will be covered:

    • An overview of IoT architecture and protocols
    • A deeper look into the MQTT and CoAP protocols specifically
    • A demonstration ofhow to test the performance of IoT applications using LoadRunner 12.55

    Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
  • Ep. 8 Using Splunk to Analyze Performance Metrics: Q&T SIG Talk
    Ep. 8 Using Splunk to Analyze Performance Metrics: Q&T SIG Talk Chris Trimper Recorded: Feb 13 2018 18 mins
    Using Splunk to Analyze Performance Metrics

    Chris Trimper will show you how to leverage Splunk for storing and analyzing performance data from LoadRunner. This allows for easy trending and possible collaboration with other application metrics stored in Splunk. We will also look at building self-service dashboards showing application performance metrics.

    You will be hearing about:

    • Introduction to Splunk
    • Process of preparing LR data for Splunk consumption
    • Building dashboards and performing analytics in Splunk

    Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
  • Remind me WHAT This GDPR Thing is all About Again?
    Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Feb 20 2018 11:00 am UTC 45 mins
    Are you Prepared, Blissfully Unaware or in Full Panic Mode?

    It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

    This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
  • Transformation from Legacy to Software Defined Networking
    Transformation from Legacy to Software Defined Networking Henrik Johansson, VP SDN & Data Center, PacketFront Software Feb 20 2018 3:00 pm UTC 45 mins
    "Every service provider today has investment heavily in physical networking equipment. All their customers are all connected over the legacy network in one way or another. In order to maximize the ROI, there must be a simple and quick way to orchestrate new services using new network functions virtualizations (NFV) technology on top of the old network.

    This live demonstration will showcase how this can be done, using the service orchestration, automation and activation capabilities of PacketFront Software’s BECS platform integrated towards an open source platform consisting of OPNFV, OpenDaylight and OpenStack."
  • Behind Every Ticket is a Patient
    Behind Every Ticket is a Patient Rick Bradley - APCON, Ryan Davis - ExtraHop Feb 20 2018 6:00 pm UTC 60 mins
    Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
  • Not Just Another GDPR Webinar: Critical Information You Need to Know About GDPR
    Not Just Another GDPR Webinar: Critical Information You Need to Know About GDPR Primitive Logic CEO Jill Reber & President Kevin Moos and Latham & Watkins Partner Michael Rubin Feb 20 2018 6:00 pm UTC 60 mins
    Join this conversation between Primitive Logic’s technology solutions experts and Latham & Watkins’ Privacy and Data Protection legal expert to understand GDPR key points and technical solutions to help your GDPR readiness.

    - What steps do you have to take to address the expanded definition of Personal Data?

    - Consent Management Considerations

    - What do the Privacy Rights given to data subjects mean for your digital data governance solutions?

    Day 1 of 3 day series:
    Day 1 – Overview of key concepts with legal and technical discussion of suggested actions

    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective
    ~ Day 3 – Focus on Security side of GDPR from a technology perspective

    Speakers:
    Jill P. Reber, Primitive Logic CEO
    Kevin Moos, Primitive Logic President
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
  • Hardware Selection Criteria for Object Storage
    Hardware Selection Criteria for Object Storage John Bell, Senior Consultant & Tony Barbagallo, VP of Product Feb 20 2018 7:00 pm UTC 60 mins
    Thinking about implementing object storage in your infrastructure and not sure what hardware you need? With information and tips curated from hundreds of installations, VP of Product Tony Barbagallo and Sr. Consultant John Bell will explain the criteria you should consider as you make your selections and will be available to answer your questions.
  • Verizon Threat Research Advisory Center - Cyrptocurrency Attacks
    Verizon Threat Research Advisory Center - Cyrptocurrency Attacks John Grim and David Kennedy, Verizon Enterprise Solutions Feb 21 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Under the Hood: Introduction to Vertica In-database Machine Learning
    Under the Hood: Introduction to Vertica In-database Machine Learning Waqas Dhillon and Josh Poduska, Vertica Feb 21 2018 4:00 pm UTC 60 mins
    Vertica’s in-database machine learning supports the entire predictive analytics process with massively parallel processing and a familiar SQL interface. Vertica has the only native, in-database, distributed machine learning library on the market today; complete with easy-to-use features for blazing fast ingestion, complex data preparation, the fastest distributed model building available, thorough model evaluation, detailed model management, simple model deployment, and advanced integration with popular machine learning and visualization tools.

    During this demo you’ll get a firsthand look at Vertica machine learning using a public IoT dataset from the Irish Smart Meter project. The demonstration will cover data exploration and visualization, data preparation, model building, model scoring, model evaluation, and model management. Learn how data scientists and analysts can leverage Vertica to embrace the power of Big Data and accelerate business outcomes with no limits and no compromises.
  • Architecting Your Data and Systems to Address Data Subjects' Rights
    Architecting Your Data and Systems to Address Data Subjects' Rights Primitive Logic CEO Jill Reber, President Kevin Moos & Chief Architect Eric Greenfeder Feb 21 2018 6:00 pm UTC 60 mins
    Regardless of your geographical location, if you handle EU residents’ personal data, you also need to provide mechanisms that allow an individual to exercise the rights that are afforded by the GDPR. The ability to search, discover and review and delete data is a critical component of GDPR compliance.
    But if that data is stored in multiple systems, and potentially shared with multiple partners, the tasks become dramatically more complex – requiring the technological ability to find and address all affected data promptly.
    All of these rights require a new level of enterprise-wide data mapping, data governance, data architecture and system management. Join Primitive Logic’s technology solution experts in a conversation about how to address Subject Access Requests from the technology perspective.

    Day 2 of 3 day series:
    Day 2 - Focus on Privacy side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 3 – Focus on Security side of GDPR from a technology perspective

    Speakers:
    Jill Reber, Primitive Logic CEO
    Kevin Moos, Primitive Logic President
    Eric Greenfeder, Primitive Logic Chief Architect
  • Spark Application Performance Management with Pepperdata Application Spotlight
    Spark Application Performance Management with Pepperdata Application Spotlight Vinod Nair Feb 21 2018 7:00 pm UTC 60 mins
    Pepperdata Application Spotlight analyzes all Hadoop and Spark jobs running on the cluster and provides developers with technical insights on how each job performed. Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar demonstrates how Application Spotlight helps developers quickly improve application performance, reduce resource usage, and understand application failures. Participate in this webinar and learn how developers can:

    –Identify the lines of code and the stages that cause performance issues related to CPU, memory, garbage collection, network, and disk I/O

    –Easily disambiguate resources used during parallel stages

    –Understand why run-time variations occur for the same application

    –Determine whether performance issues are due to the application or other workloads on the cluster

    –Receive actionable recommendations for tuning jobs

    –Validate tuning changes made to applications with a before and after comparison

    –View the highlights worst performing phases of jobs

    –Improve MapReduce and Spark developer productivity

    –Improve cluster efficiency based on clear recommendations on how to modify workloads and configurations


    Vinod Nair leads product management at Pepperdata. He brings more than 20 years of experience in engineering and product management to the job, with a special interest in distributed systems and Hadoop. He has worked in software for telecommunications, financial management for small business, and big data. Vinod’s approach to product management is deeply influenced by his success in applying Lean Startup principles and rapid iteration to product design and development.
  • Stateful containers for DevOps and Beyond
    Stateful containers for DevOps and Beyond Michael Mattsson - Container Technical Marketing Engineer & Stacey Gilmore Product Marketing Feb 22 2018 4:00 pm UTC 60 mins
    2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Feb 22 2018 5:00 pm UTC 75 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My!
    The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My! Marci Parker, Garrison Ball, Meghan Lockwood Feb 22 2018 6:00 pm UTC 60 mins
    With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Feb 22 2018 7:00 pm UTC 45 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • Customer Support through Natural Language Processing and Machine Learning
    Customer Support through Natural Language Processing and Machine Learning Robin Marcenac, Sr. Managing Consultant, IBM, Ross Ackerman, Dir. Digital Support Strategy, NetApp, Alex McDonald, SNIA CSI Feb 22 2018 7:00 pm UTC 75 mins
    Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.

    NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.

    Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:

    •The challenges of utilizing large quantities of valuable yet unstructured data
    •How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
    •How Watson understands customer language and provides understandable responses

    Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Feb 22 2018 10:00 pm UTC 60 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Speakers:
    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • GDPR’s Dirty Little Secret and How Object Storage Enables Compliance
    GDPR’s Dirty Little Secret and How Object Storage Enables Compliance Glen Olsen, Product Manager, and Alex Oldfield, Solutions Architect Feb 27 2018 10:30 am UTC 60 mins
    The dirty little secret? The General Data Protection Regulation (GDPR) does not just affect companies in the EU, it affects companies around the world that collect or process data concerning EU residents. Caringo Product Manager Glen Olsen and Solutions Architect Alex Oldfield explain the challenges organisations face and how Caringo Swarm Object Storage provides a cost-effective solution to help meet the requirements as well as how Data Protection Officers can use Swarm to monitor and enable GDPR compliance.
  • Managing Application Connectivity in the World of Network Security
    Managing Application Connectivity in the World of Network Security Asher Benbenisty, Director Product Marketing Feb 27 2018 3:00 pm UTC 45 mins
    The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.

    During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will discuss how taking an application-centric approach to security policy management will improve both your security and operational efficiency.

    In the webinar, you will learn how to:

    •Gain insight into your company’s security policy management maturity level
    •Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows
    •Identify security risks across your enterprise network and prioritize them based on business criticality
    •Securely migrate business application connectivity and security devices to a new data center
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • ESG Tests vArmour for Securing Multi-Cloud Workloads
    ESG Tests vArmour for Securing Multi-Cloud Workloads Tony Palmer, Sr. Lab Analyst at ESG; Faraz Aladin, Sr. Director of Marketing at vArmour Feb 27 2018 6:00 pm UTC 60 mins
    The Analysts at Enterprise Strategy Group just wrapped up testing of the vArmour DSS Distributed Security System across physical, virtual, cloud, and container platforms and the results are in.

    Join ESG Senior Lab Analyst, Tony Palmer, along with vArmour Senior Director of Marketing, Faraz Aladin, for a detailed review of the vArmour solution and to see how it performs in the areas of:

    --Application identification, inspection, and protection across a combination of infrastructure platforms

    --Scalability to match compute resources and throughput requirements

    --Automatic security provisioning for new assets

    --Deception capability, ease of use, and efficiency
  • Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
    Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Daniel Towner, System Architect for Wireless Access, Intel Corporation Feb 28 2018 4:00 pm UTC 45 mins
    5G brings many new capabilities over 4G including higher bandwidths, lower latencies, and more efficient use of radio spectrum. However, these improvements require a large increase in computing power in the base station. Fortunately the Xeon Scalable Processor series (Skylake-SP) recently introduced by Intel has a new high-performance instruction set called Intel® Advanced Vector Extensions 512 (Intel® AVX-512) which is capable of delivering the compute needed to support the exciting new world of 5G.

    In his talk Daniel will give an overview of the new capabilities of the Intel AVX-512 instruction set and show why they are so beneficial to supporting 5G efficiently. The most obvious difference is that Intel AVX-512 has double the compute performance of previous generations of instruction sets. Perhaps surprisingly though it is the addition of brand new instructions that can make the biggest improvements. The new instructions mean that software algorithms can become more efficient, thereby enabling even more effective use of the improvements in computing performance and leading to very high performance 5G NR software implementations.
  • Shift Happens! The power of Performance Testing
    Shift Happens! The power of Performance Testing Jeff Bradley, Pre-Sales Advisor, CA Technologies Feb 28 2018 4:00 pm UTC 45 mins
    Performance testing is more relevant than ever. It’s even more prominent in the software development life cycle than in the past. What’s changed is that development and testing teams now can test component level performance earlier than ever with tools such as Service Virtualization.

    It’s now easier to identify and fix performance-related issues as they are being worked much earlier than before, when performance testing was done during a formal performance testing cycle in the stage environment after multiple code builds have hidden those issues deeper across several application layers.

    This session will cover the basics of how to shift performance testing left so that development and testing teams can test component level performance using CA Service Virtualization and CA BlazeMeter.