Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Recorded: Oct 17 2019 47 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Introducing Desktop as a Service for Any Cloud
    Introducing Desktop as a Service for Any Cloud
    Kong Yang, Senior Product management & Ruben Spruijt, Senior Product Engineer, Nutanix Recorded: Oct 15 2019 39 mins
    Desktop as a Service (DaaS) is a powerful way to leverage the cloud for end user computing with unmatched flexibility, manageability, and performance. Nutanix Frame is a DaaS solution that runs on multiple clouds and provides simple yet very powerful access to Windows applications through a browser.
    In this webcast, learn how high-end graphics tools, resource demanding software, and classic office productivity apps run and scale easily with Nutanix Frame.

    During this webcast, you will learn:
    o How you can run any Windows software in a browser
    o How to setup and manage DaaS with a breeze
    o How Nutanix Frame integrates with cloud storage, identity, and networking like no one else can
  • Data Privacy Laws: Compliance and Consent Management Tips for Marketers
    Data Privacy Laws: Compliance and Consent Management Tips for Marketers
    Sam Ngo and Connor Bouthot Recorded: Oct 10 2019 46 mins
    New data privacy laws continue to roll out worldwide. Browsers are doubling down on user-tracking behaviors. And with GDPR-esque laws coming to the U.S. — including the CCPA — companies need to provide a standard of consumer privacy.

    What most brands don’t realize, though, is these data privacy measures offer an opportunity to build trust with their customers and garner greater customer loyalty. Consumers expect to give up data — if they get something in return.

    A CDP with identity resolution functionality can help you unify and activate customer data on their terms. Be prepared to take advantage of new data privacy laws by joining our webinar.
  • Network of the Future is Powered by AI: Dartmouth College Case Study
    Network of the Future is Powered by AI: Dartmouth College Case Study
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College Recorded: Oct 10 2019 60 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    Jose Luis Garcia, Commvault Recorded: Oct 10 2019 22 mins
    ¡Es hora de apagar su copia de seguridad heredada o legacy! Commvault mueve esos datos antiguos a la nube de forma segura.

    ¿Sigue pagando mantenimiento en los sistemas de respaldo antiguos solo porque no está seguro de qué hacer con ese conjunto de datos de respaldo y archivado que aún deben mantenerse para cumplir con los requisitos de cumplimiento o retención? ¿Qué pasaría si pudiera migrar esas copias de seguridad y archivos directamente a la nube mientras conserva los metadatos importantes, como las fechas y horas de retención originales?

    Únase a Commvault para aprender cómo mover las copias de seguridad y los archivos de los sistemas heredados o legacy, y almacenar ese conjunto de datos y cargas de trabajo directamente en el almacenamiento en la nube.

    Nuestros expertos en la materia técnica explicarán cómo la plataforma Commvault puede capturar automáticamente copias de seguridad y archivos legacy para la migración a la nube. Aprenda cómo mover copias de seguridad a la nube desde cualquiera de estos sistemas:

    Veritas NetBackup
    Veritas BackupExec
    IBM Spectrum Protect, anteriormente llamado Tivoli Storage Manager (TSM)
    Dell EMC NetWorker
    Dell EMC Avamar
    Administrador de protección de datos de Microsoft (DPM)
    Microfocus Data Protector, anteriormente HP Data Protector
    No necesita mantener ese antiguo sistema funcionando en la esquina "por si acaso". Aprenda cómo optimizar su carga de trabajo de TI, proporcionar una mejor disponibilidad de datos e incluir sus copias de seguridad legacy en la búsqueda empresarial.
  • Best Practices: How To Build Scalable Data Pipelines for Machine Learning
    Best Practices: How To Build Scalable Data Pipelines for Machine Learning
    Jorge Villamariona and Pradeep Reddy, Qubole Recorded: Oct 10 2019 41 mins
    Data engineers today serve a wider audience than just a few years ago. Companies now need to apply machine learning (ML) techniques on their data in order to remain relevant. Among the new challenges faced by data engineers is the need to build and fill Data Lakes as well as reliably delivering complete large-volume data sets so that data scientists can train more accurate models.

    Aside from dealing with larger data volumes, these pipelines need to be flexible in order to accommodate the variety of data and the high processing velocity required by the new ML applications. Qubole addresses these challenges by providing an auto-scaling cloud-native platform to build and run these data pipelines.

    In this webinar we will cover:
    - Some of the typical challenges faced by data engineers when building pipelines for machine learning.
    - Typical uses of the various Qubole engines to address these challenges.
    - Real-world customer examples
  • How AUCloud Adds High-Value Storage Services with VMware and Cloudian
    How AUCloud Adds High-Value Storage Services with VMware and Cloudian
    Peter Zafiris, Senior Infrastructure Engineer at AUCloud || Sanjay Jagad, Sr. Director of Products & Solutions at Cloudian Nov 12 2019 11:00 pm UTC 60 mins
    When recently expanding their VMware-based services, Australian cloud service provider AUCloud realized a business growth opportunity: the increasing user demand for data management services.

    Join AUCloud and Cloudian on Tuesday, November 12th at 3:00 pm PST or Wednesday, November 13th at 10:00 am ACT to learn more about the cloud-based storage market and how AUCloud is developing new services with Cloudian’s VMware-integrated storage systems.

    Topics include:

    VMWare integrated storage systems for managed service providers
    How AUCloud is capitalizing on the demand for data services
    Market trends for private cloud-based storage
    Profitability of backup-as-a-service and storage-as-a-service

    Register today to hold your spot. Bring your most vexing data storage questions to ask!
  • Simplifying vSAN Infrastructure Deployments
    Simplifying vSAN Infrastructure Deployments
    Sim Upadhyayula, Supermicro, Christine McMonigal, Intel, Jase McCarty, VMware Recorded: Oct 9 2019 58 mins
    Supermicro's Intel® Select Solutions for VMware VSAN are designed to provide the ability to provision and manage compute, network and storage resources from a single pane of management. 

    Join Supermicro, VMware & Intel in a webinar which will discuss how next generation technologies from all three companies are enabling VSAN solutions to simplify deployment and accelerate memory intensive applications.
  • ICE [Ep.5]: CX Success Stories Require Technology, Leadership, Data
    ICE [Ep.5]: CX Success Stories Require Technology, Leadership, Data
    Robin Gareiss, President and Founder, Nemertes Research Recorded: Oct 9 2019 59 mins
    Intelligent Customer Engagement Series [Ep.5]: CX Success Stories Require Technology, Leadership, Data

    A great story requires more than a compelling narrative. Marketing teams can significantly elevate their success with the right combination of leadership, technology, and data derived from well-planned customer interviews.

    Crafting that perfect story requires an expanded mindset about what comprises “marketing.”

    In this webinar, join Nemertes Research President Robin Gareiss, who recently completed detailed research with 518 companies on how they use advanced technologies and reshape their organizational structure to improve customer experience. Based on this research and her experience as a journalist, marketing content developer, and CX advisor, she will cover:

    1. Organizational overhaul: Why a Chief Customer Officer is vital, and how the CMO and CCO work together for joint success.
    2. Technology leverage: What are the key technologies and contact-center initiatives that result in measurable CX success—ultimately delivering crucial data to marketing teams that support their success stories?
    3. The perfect story: How to conduct interviews that get real-world data to support your mission.
  • Network Security DDoS Solutions for Today's Threat Landscape
    Network Security DDoS Solutions for Today's Threat Landscape
    Irene Zhan, Sr. Product Marketing Manager at Juniper Networks, Ashley Stephenson, CEO at Corero Recorded: Oct 9 2019 57 mins
    DDoS attacks are a significant part of today's threat landscape, and they continue to grow in magnitude, frequency, and sophistication. It is no longer feasible to address this growing problem with traditional out of-band scrubbing centers and manual intervention approaches. Juniper and Corero have developed a revolutionary new defense against DDoS attacks, delivering line-rate detection and mitigation in real time at very large scale by leveraging always on packet-level monitoring, automated machine analysis, and infrastructure-based enforcement across the network edge.

    Join Irene Zhang, Sr. Product Marketing Manager, Juniper Networks and Ashley Stephenson, CEO, Corero and learn how the joint Juniper Networks-Corero Network Security DDoS Solution can benefit your business.
  • Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Kurt Lender, Intel and Casey Morrison, Astera Labs Recorded: Oct 9 2019 60 mins
    As PCI Express® (PCIe®) specifications continue to double the transfer rates of previous generations, the technology can address a variety of needs for data-demanding applications. However, along with the progression of PCIe specifications, challenges like signal integrity and channel insertion loss arise as well. Retimers are mixed signal analog/digital devices that are protocol-aware and have the ability to fully recover data, extract the embedded clock and retransmit a fresh copy of the data using a clean clock. These devices are fully defined in the PCI Express base specification, including compliance testing, and are used to combat issues that PCI Express faces.

    In this PCI-SIG® hosted webinar, Kurt Lender of Intel and Casey Morrison of Astera Labs will offer solutions to conquer signal integrity and channel insertion loss challenges, explain the diagnostic capabilities of retimer technology and more.

    About the Presenters
    Kurt Lender is an Ecosystem Enabling Manager for Intel Corporation and a Marketing Workgroup Chair at PCI-SIG
    Casey Morrison is the head of Systems and Applications at Astera Labs and a PCI-SIG member
  • Network Security DDoS Solutions for Today's Threat Landscape [EMEA]
    Network Security DDoS Solutions for Today's Threat Landscape [EMEA]
    Irene Zhan, Sr. Product Marketing Manager at Juniper Networks, Ashley Stephenson, CEO at Corero Recorded: Oct 9 2019 57 mins
    DDoS attacks are a significant part of today's threat landscape, and they continue to grow in magnitude, frequency, and sophistication. It is no longer feasible to address this growing problem with traditional out of-band scrubbing centers and manual intervention approaches. Juniper and Corero have developed a revolutionary new defense against DDoS attacks, delivering line-rate detection and mitigation in real time at very large scale by leveraging always on packet-level monitoring, automated machine analysis, and infrastructure-based enforcement across the network edge.

    Join Irene Zhang, Sr. Product Marketing Manager, Juniper Networks and Ashley Stephenson, CEO, Corero and learn how the joint Juniper Networks-Corero Network Security DDoS Solution can benefit your business.
  • Understanding Storage Security and Threats
    Understanding Storage Security and Threats
    Pierre Mouallem, Lenovo; John Kim, Mellanox; J Metz, Cisco; Steve Vanderlinden, Lenovo Recorded: Oct 8 2019 51 mins
    What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:

    •Protecting the data (Keeping “the bad” out)
    •Threat landscape, Bad actors/hackers
    •Attack vectors, attack surfaces, vulnerabilities
    •Physical security issues
    •Layers of protection (encryption – last line of defense)
    •Remediation after a breach/incident
  • Learn how to massively scale your multiplayer game
    Learn how to massively scale your multiplayer game
    Madhukar Kumar, VP Technical & Product Marketing, Redis Labs, Alissa McAloon, News Editor & Associate Publisher, Gamasutra Recorded: Oct 8 2019 38 mins
    Tackling distributed computations and rapidly building accurate and readable leaderboards into multiplayer games is critical for game developers in this space, and it’s a process that can benefit from expert insight into the specific data structures (like sorted sets and hashes) and resources that are incredibly proficient at delivering vital scoring and ranking functionality.

    When it comes to massively scaling multiplayer games, there are unique sets of obstacles to address on that front, and Redis Labs - an open source, in-memory data structure store - is hosting a free webinar to help developers overcome those barriers in their own multiplayer projects.

    User experience is the heart of the game industry. Creating unique and dynamic experiences is crucial for companies to drive both customer acquisition and retention.

    Join this free webinar to learn how to use Redis’ easy to use tools in order to:

    - Accelerate analysis across a variety of data sets and data types
    - Attain consistency and durability of high-speed transactions
    - Auto-scale with multiple cloud providers
    - Keep costs down with a significantly-reduced deployment footprint
  • Unlock Innovation, Foster Operational Freedom and Evolve Predictably with VxRail
    Unlock Innovation, Foster Operational Freedom and Evolve Predictably with VxRail
    Christine Spartichino - VxRail Product Marketing, Dell EMC Recorded: Oct 8 2019 55 mins
    VxRail, the only HCI platform jointly engineered with VMware delivers simplicity, scalability and business agility through automation, orchestration and end to end lifecycle management. Join us as we review the most recent announcements on empowering IT to keep pace with business innovation. We will review how new Intel processors improve VxRail performance by up to 28%, how significant lifecycle management enhancements give the user more control and can shorten upgrade times up to 20%, and how PKS on VMware Cloud Foundation on VxRail automates Kubernetes infrastructure deployment to foster operational freedom and unlock innovation.
  • Evolving Data Protection to a Hybrid Cloud Model
    Evolving Data Protection to a Hybrid Cloud Model
    Jason Walker, Technology Evangelist, Pure Storage Recorded: Oct 8 2019 34 mins
    Modernize your current legacy protection for rapid recovery and data reuse, seamlessly between private and public clouds for your customers.

    Learn how to benefit from the economies of cloud by leveraging AWS as the destination archive tier, all while maintaining that single namespace and global deduplication pool.

    Key technical lessons:

    - Modernize your legacy protection without the pain of a forklift solution

    - Meet the emerging expectations of data availability and reusability by taking advantage of the cloud as an archive tier

    - Move away from the cold, static tape tier to the more reliable, durable cloud tier
  • How to Secure Your Enterprise Application Security & Visibility
    How to Secure Your Enterprise Application Security & Visibility
    Mike Wronski, Technical Director Product Marketing & Jason Burns, Principle Engineering, Networking Nutanix Recorded: Oct 8 2019 54 mins
    Security threats have become more sophisticated and new application and cloud deployment models add to existing complexity. As a result, more than 3/4 of organizations are victims of successful cyber attacks - don't become the next victim! Join this session to learn common use cases and best practices for implementing VM microsegmentation to secure applications. Join us to cover product features, design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
    Join this webcast to learn:
    •Where and how Flow provides needed application security
    •How to enable Flow and start adding security in minutes
    •How policy creation and management is made easier through visualization
    •How to quickly create virtual segmented networks (e.g. DMZ or Development and Production)
    •Methods to segment applications to help prevent malware spread or data breaches
  • The Shifting Balance: Expertise, Automation and the Future of Cybersecurity
    The Shifting Balance: Expertise, Automation and the Future of Cybersecurity
    Evan Wright, Staff Data Scientist, FireEye Recorded: Oct 7 2019 38 mins
    The present and future of cybersecurity operations will address the skills gap by better utilizing our existing experts and creating more intelligent automation. An evolution is underway in cybersecurity to shift some of the cognitive load from human security experts to machines. When is a machine an appropriate solution and when do you really need a human expert?

    In this presentation, FireEye outlines a spectrum of automatability that helps us identify when a machine or a human expert may be the most effective approach to solving cybersecurity challenges. Multiple factors make up this spectrum, including data volume, and the underlying threat behavior's frequency and stability.

    Join Evan Wright, Staff Data Scientist with FireEye, as he covers:
    -Examples at different points on this automation spectrum, including malware identification, alert triage in the security operations center (SOC), and incident response
    -Domain examples that will demonstrate that machine learning solutions will continue to play an important role alongside human experts
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Oct 4 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Key Differences Between On-Prem and Cloud Data Platforms
    Key Differences Between On-Prem and Cloud Data Platforms
    Purvang Parikh, Qubole Recorded: Oct 3 2019 47 mins
    Cloud service models have become the new norm for enterprise deployments in almost every category — and big data is no exception. The separation of storage and compute in the cloud afford unparalleled scale, efficiency, and economics compared to on-premise solutions.

    If you are using Cloudera, Hortonworks or MapR, you should attend this webinar to learn the key differences between on-premise and cloud solutions, considerations for selecting cloud data lakes and data warehouses, and how to build the right architecture for your organizations analytics and machine learning needs.

    In this webinar, we’ll cover:

    - Difference between hosting an on-premise data platform in the cloud versus adopting a cloud-native architecture for data processing in the cloud
    - How a cloud data lake architecture differs from cloud data warehouses
    - How to move your data to the cloud and leverage big data engines like Apache Spark, Presto, Hive and more
    - Avoiding security and cost pitfalls that can derail your migration to the cloud
    - Demo of Qubole’s cloud-native platform
  • Vertica – Past, Present, and Future
    Vertica – Past, Present, and Future
    Dr. Michael Stonebraker, MIT CSAIL; Colin Mahony and Joy King, Vertica Recorded: Oct 3 2019 59 mins
    Vertica was engineered from the very first line of code to handle the growing volume of data, and increased complexity of workloads required to power your data-driven world. As data continues to disrupt the way you do business and grow, Vertica continues to meet the technological requirements of your most demanding data-driven use cases and initiatives. Today, we power everything from predictive maintenance and customer behavior analytics, to smart agriculture, network analysis, fraud detection, and more, with advanced analytics and in-database machine learning.

    Join this webcast to discover the past, present, and future of the industry’s fastest and most scalable enterprise data warehouse on all public clouds, and on-premise data centers.

    • Dr. Michael Stonebraker, Vertica founder and 2014 Turing Award Winner, will discuss the origins of Vertica and the transformative C-Store paper, which ushered in a new era of read-optimized database technologies
    • Joy King, VP of Product Management and Product Marketing, Vertica, will discuss the countless industry-leading innovations that have brought Vertica to where it is today
    • Colin Mahony, SVP and GM, Vertica, will provide a glimpse into Vertica’s promising future – including our product roadmap and organizational priorities

    Vertica was built for the scale and complexity of your data-driven world. Find out why we’re uniquely positioned to help you manage the scale and complexity of tomorrow’s as well.
  • Critical NFVI Performance - KPIs to Validate
    Critical NFVI Performance - KPIs to Validate
    Thomas Lindquist CTO of VoerEir Recorded: Oct 3 2019 54 mins
    VoerEir focus on helping operators be successful with their NFV transformation. A cornerstone in our strategy is our list of NFVI performance-KPIs, which determine the performance of VNFs deployed on top of a specific NFVI. There are two prime use cases of these KPIs; First, for a VNF vendor to be able to commit to a performance SLA, the vendor must know the characteristics of the infrastructure on which his VNF shall be deployed. Second, if a VNF does not fulfill his performance SLAs, the operator must be able to sort out where the responsibility lays, on the VNF or the NFVI vendor. The tricky part is to find the KPIs which are essential for different types of VNFs' performance. This webinar describes VoerEir’s way of reasoning when creating the list of performance-KPIs and gives examples of detailed definitions for different kinds of KPIs. It also talks about how VoerEir is working with this in industry forums, and how our test system Touchstone can is used to perform VoerEir’s NFVI evaluation service.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Oct 18 2019 3:30 pm UTC 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • How to Improve your Disaster Recovery in Leaps and Bounds
    How to Improve your Disaster Recovery in Leaps and Bounds
    Manjul Sahay, Director of Product Management Nutanix Oct 22 2019 5:00 am UTC 37 mins
    In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    Robin Gareiss, President and Founder, Nemertes Research Oct 22 2019 3:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • Transforming Your Business with Dell Technologies Unified Workspace
    Transforming Your Business with Dell Technologies Unified Workspace
    Aaron Spencer - Product Marketing Manager, Client Manageability, Dell Technologies Oct 22 2019 4:00 pm UTC 60 mins
    Today’s IT admins are loaded with non-value add and time-consuming tasks that take away from business innovation. Dell Technologies wants to help you by delivering an intelligent unified approach to IT that enables choice and innovation. Dell Technologies Unified Workspace is the industry’s most comprehensive solution to help IT deploy, secure, manage and support virtually all devices from the cloud. This new solution from Dell Technologies gives our customers time back by bringing together a combination of Dell Technologies offerings into an integrated, intelligent platform to transform your business.

    Join us for our webinar, Transforming Your Business with Dell Technologies Unified Workspace, where we’ll be discussing the benefits of partnering with Dell Technologies, including how to:

    • DEPLOY while reducing IT time and streamlining workflow
    • SECURE endpoints with solutions that protect the entire ecosystem
    • MANAGE through intelligent automation across a heterogeneous environment
    • SUPPORT with 24/7 access to expert engineers and breakthrough tools to keep employees productive

    Presented by:
    Aaron Spencer | Product Marketing Manager, Client Manageability

    Aaron Spencer is a Product Marketing Manager for Client Manageability at Dell Technologies. Aaron has more than 17 years of experience in Technology Sales and Marketing.
    Today, Aaron evangelizes Dell’s client management offerings and leads product launch and sales enablement efforts in this area. Client management solutions differentiate Dell hardware by making it easier for customers to automate and optimize client deployments, and monitor and update PCs.
  • What Software Defined Storage Means for Storage Networking
    What Software Defined Storage Means for Storage Networking
    Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox Oct 22 2019 5:00 pm UTC 75 mins
    Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?

    Watch this SNIA webcast to learn:
    •How software-defined storage differs from integrated storage appliances
    •Whether SDS supports block, file, object, or all three types of storage access
    •Potential issues or pitfalls with deploying SDS
    •How SDS affects storage networking
    •Scale-up vs. scale-out vs. hyperconverged vs. cloud
  • CCS [Ep.5]: Application Security Meets Multicloud
    CCS [Ep.5]: Application Security Meets Multicloud
    John Burke, CIO and Principal Research Analyst, Nemertes Research Oct 23 2019 5:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Demystifying Cisco Orchestrators for Infrastructure as Code
    Demystifying Cisco Orchestrators for Infrastructure as Code
    Tony Dubiel, DevOps/Automation Lead for GES, Cisco Systems Oct 24 2019 3:00 pm UTC 60 mins
    By automating the software development lifecycle (code, test, to production) developers and operators (DevOps) are becoming more agile, reducing costs, and delivering a superb customer experience to their customers. Cisco Orchestration solutions extend the benefits of automation to the entire stack by treating each layer of the underlying infrastructure as Code (IaC). Orchestrators reduce the complexity of programmability, operational state, and visibility. In this session, we decode the differences between domain-specific workflow automation versus cross-domain orchestration. As there are many layers in the ‘stack’, achieving a goal of ‘Automate everything’ requires the right tool for the right use case. To that end, we will cover Cisco Cloud Center Suite (Workload Manager and Action Orchestrator), UCS Director, Intersight, and Network Services Orchestrator (NSO). A brief demo will showcase Open Source and Cisco Orchestration tools working hand-in-hand.
  • Start saving money with Cloudian for VMware vCloud Director
    Start saving money with Cloudian for VMware vCloud Director
    Ulrich Slothuus, Anders Agren Oct 25 2019 9:30 am UTC 30 mins
    In this 30-minute webinar, you can learn how Cloudian object storage and VMware vCloud Director enables VMware cloud providers and their tenant users to deploy, manage and consume S3-compatible storage within their services environment.

    For cloud providers, this opens the door to new service revenue streams with use cases like data protection, big data, healthcare, media archives, video surveillance, and more. For their tenant customers, it delivers a best-in-class object storage service that is fully integrated and delivered through their preferred cloud management platform.

    Benefits include:
    Proven interoperability with the S3 API
    Native integration with vCloud Director
    vCD virtual appliance deployment model
    Limitlessly scalable storage within a single namespace
    Self-service storage management for customers
  • Financial services cloud adoption and the practicalities of cloud governance
    Financial services cloud adoption and the practicalities of cloud governance
    Kevin Lash, Head of Global Financial Services Strategy & Solutions, & Sahil Bansal, Product Marketing Manager, Nutanix Oct 29 2019 5:00 am UTC 49 mins
    What cloud platforms are financial institutions adopting, and how does that compare to other industries? To answer that question, VansonBourne interviewed 2,300 IT decision makers globally to identify their challenges, usage patterns, and cloud initiatives. The survey found that Financial services organizations (91%) believe hybrid cloud is the ideal IT model.
    In this on-demand webinar we:
    •detail the benchmark findings from the report as a point of comparison for your organization
    •discuss how financial services digital disruption is accelerating hybrid cloud adoption
    •demonstrate how to automate security compliance and cost optimization as a practical example of hybrid cloud technologies in action
  • Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Kamakshi Sridhar, PhD & Ncolas St-Pierre from Sandvine Oct 29 2019 3:00 pm UTC 60 mins
    Learn how Sandvine leverages network policy automation and machine learning to enhance subscriber QoE (Quality of Experience) via dynamic bandwidth allocation across service categories, in near-real time, by analyzing operator-expressed ‘intent’.
  • Accelerate Your Innovation with Dell EMC Storage
    Accelerate Your Innovation with Dell EMC Storage
    Sean Kinney and Erin Banks, Dell EMC Oct 29 2019 5:00 pm UTC 45 mins
    The digital future is no longer optional and every organization needs to be a digital organization, powered by data, running in a multi-cloud world. At the heart is data, which many organizations now classify as their most valuable asset. As the role of data continues to expand, your business strategy must evolve in order to effectively leverage the untapped value of your data.

    At Dell EMC, we enable you to harness the power of data capital with an extensive portfolio of storage solutions. Join storage experts Sean Kinney and Erin K. Banks from the Dell EMC product marketing organization for this special webinar to learn about how Dell EMC storage solutions address some of your most pressing business use cases and applications. Discover how Dell EMC storage solutions enable you to simplify your data landscape and optimize workloads whether it is on-prem or in the cloud.
  • Transform Healthcare IT with Enterprise Cloud
    Transform Healthcare IT with Enterprise Cloud
    Tapan Mehta, Head of Healthcare & Lifesciences Solutions, Nutanix & Jim Dirkes, S, Systems Engineer, Carolina Medical Systems Oct 31 2019 5:00 am UTC 51 mins
    The healthcare industry is under pressure to transform IT operations in the face of new technologies and increased regulation. As healthcare organizations work hard to simplify operations and add new applications and services, legacy IT infrastructure is no longer able to meet their needs. Join us on this webinar to learn how Medical University of South Carolina (MUSC) is using Nutanix hyperconverged infrastructure (HCI) solutions to elevate IT to focus on the applications and services that power healthcare.

    In this session you’ll learn how to:
    •Meet the needs of the diverse and growing set of healthcare applications (e.g. Epic EHR, VDI)
    •Reduce IT costs and eliminate infrastructure complexity
    •Increase application performance, availability and security
    •Simplify IT operations and management
  • How to get your DevNet Certification for Data Center Automation
    How to get your DevNet Certification for Data Center Automation
    John McDonough, Developer Advocate, Cisco DevNet Oct 31 2019 3:00 pm UTC 38 mins
    This webinar will help you start your journey towards Cisco Certified DevNet Specialist in Data Center Automation and Programmability. The webinar takes you on a tour of developer.cisco.com with respect to Data Center Automation and Programmability. You will gain an understating of the technologies tested and the respective weighted percentages of those technologies on the certification exam. You will see how DevNet has aligned the DevNet resources to each section of the certification exam.
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 31 2019 3:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • Understanding Fibre Channel Scaling
    Understanding Fibre Channel Scaling
    Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco Nov 6 2019 6:00 pm UTC 75 mins
    One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?

    We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.

    In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:

    •What a deterministic storage network is
    •Fabric management principles
    •Negotiated credit transfers (buffer-to-buffer credits)
    •Network Engineering/Design Principles
    •Oversubscription and Fan-In Ratios
    •Topologies that help scale
    •Domains and Fabric limits
    •Consistency of performance at scale

    Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.

    Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
  • Network Automation with pyATS, Genie and Cisco DNA Center
    Network Automation with pyATS, Genie and Cisco DNA Center
    Siming Yuan, Technical Leader Engineering, Cisco Systems Nov 7 2019 4:00 pm UTC 30 mins
    Cisco DNA Center brings about a new way to manage and visualize your enterprise network. But above and beyond the UI, AI and ML, how do you integrate it into your NetDevOps cycle, and ensure your network is well-validated end-to-end? In this webinar, we’ll demonstrate how to integrate Cisco DNA Center REST APIs with pyATS | Genie, take configuration and operation snapshots, diff them programmatically, and track any changes over time.
  • How Artificial Intelligence is Powering Business & Digital Transformation
    How Artificial Intelligence is Powering Business & Digital Transformation
    Ken LeTourneau, Intel Corporation | Matt Johns, CoreSite | Jaime Schmidtke, Microsoft Azure | Arun Trivedi, Wipro Technology Nov 7 2019 6:00 pm UTC 60 mins
    Cloud plays a crucial role in enhancing the power of AI-driven applications. These technologies are allowing organizations to process structured and unstructured data like never before.

    Tune into this live panel discussion with experts in Cloud, AI, Machine Learning and Big Data as they discuss:
    - The importance of APIs and machine learning
    - Best practices for preparing your cloud infrastructure for AI
    - How big data driven from IoT will benefit from the application of AI and ML technologies

    Speakers:
    Ken LeTourneau, Solutions Architect, Intel Corporation (Moderator)
    Matt Johns, VP of Enterprise Sales, CoreSite
    Jaime Schmidtke, Cloud Networking Specialist, Microsoft Azure
    Arun Trivedi, Partner, Wipro Technology
  • Ask the Expert: Matt Johns, VP of Enterprise Sales, CoreSite
    Ask the Expert: Matt Johns, VP of Enterprise Sales, CoreSite
    Matt Johns, VP of Enterprise Sales, CoreSite Nov 7 2019 7:30 pm UTC 30 mins
    A 1-on-1, 25-minute interview with an expert discussing in-depth insights from the conference and answering questions from the live online audience. Questions are determined ahead of time and only requires experts to show up and share their knowledge.
  • We want to save YOU 70% of your infrastructure costs.
    We want to save YOU 70% of your infrastructure costs.
    Björn Kjellin Hård, Ulrich Slothuus Nov 8 2019 10:30 am UTC 30 mins
    The growth of machine and unstructured data is breaking the distributed scale-out mode that combines compute and storage in the same devices and limits your flexibility to choose the ideal resources for each. This drives up costs and makes it more difficult to accommodate growing data storage and analytics demands.

    Please join Splunk and Cloudian for an informative webinar to learn how SmartStore and HyperStore can:

    Independently scale compute and storage resources
    Reduce storage costs by up to 70%
    Simplify indexer updates (new cluster can inherit data from the original)
    Directly integrate with public cloud
    Attain built-in data protection

    Cloudian is Part of the Splunk Technology Alliance Program

    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
  • 4G and 5G virtual RAN, from LAN to WAN
    4G and 5G virtual RAN, from LAN to WAN
    Eran Bello, GM at ASOCS Inc. Nov 19 2019 4:00 pm UTC 60 mins
    In this webinar ASOCS will present the benefits of full RAN virtualization in both 4G and 5G networks. Leveraging modern open interfaces such as the ORAN Ethernet Fronthaul and open management interfaces will allow network orchestration and automation for use cases spanning from local area network (LAN) to wide area network (WAN).
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Adam Harrison, Cryptocurrency Nov 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Adam Harrison, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Cryptocurrency

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!