Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Spark Application Performance Management with Pepperdata Application Spotlight
    Spark Application Performance Management with Pepperdata Application Spotlight Vinod Nair Live 60 mins
    Pepperdata Application Spotlight analyzes all Hadoop and Spark jobs running on the cluster and provides developers with technical insights on how each job performed. Intended for software engineers, developers, and technical leads who develop Spark applications, this webinar demonstrates how Application Spotlight helps developers quickly improve application performance, reduce resource usage, and understand application failures. Participate in this webinar and learn how developers can:

    –Identify the lines of code and the stages that cause performance issues related to CPU, memory, garbage collection, network, and disk I/O

    –Easily disambiguate resources used during parallel stages

    –Understand why run-time variations occur for the same application

    –Determine whether performance issues are due to the application or other workloads on the cluster

    –Receive actionable recommendations for tuning jobs

    –Validate tuning changes made to applications with a before and after comparison

    –View the highlights worst performing phases of jobs

    –Improve MapReduce and Spark developer productivity

    –Improve cluster efficiency based on clear recommendations on how to modify workloads and configurations


    Vinod Nair leads product management at Pepperdata. He brings more than 20 years of experience in engineering and product management to the job, with a special interest in distributed systems and Hadoop. He has worked in software for telecommunications, financial management for small business, and big data. Vinod’s approach to product management is deeply influenced by his success in applying Lean Startup principles and rapid iteration to product design and development.
  • Architecting Your Data and Systems to Address Data Subjects' Rights
    Architecting Your Data and Systems to Address Data Subjects' Rights Primitive Logic CEO Jill Reber, President Kevin Moos & Chief Architect Eric Greenfeder Recorded: Feb 21 2018 60 mins
    Regardless of your geographical location, if you handle EU residents’ personal data, you also need to provide mechanisms that allow an individual to exercise the rights that are afforded by the GDPR. The ability to search, discover and review and delete data is a critical component of GDPR compliance.
    But if that data is stored in multiple systems, and potentially shared with multiple partners, the tasks become dramatically more complex – requiring the technological ability to find and address all affected data promptly.
    All of these rights require a new level of enterprise-wide data mapping, data governance, data architecture and system management. Join Primitive Logic’s technology solution experts in a conversation about how to address Subject Access Requests from the technology perspective.

    Day 2 of 3 day series:
    Day 2 - Focus on Privacy side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 3 – Focus on Security side of GDPR from a technology perspective

    Speakers:
    Jill Reber, Primitive Logic CEO
    Kevin Moos, Primitive Logic President
    Eric Greenfeder, Primitive Logic Chief Architect
  • Under the Hood: Introduction to Vertica In-database Machine Learning
    Under the Hood: Introduction to Vertica In-database Machine Learning Waqas Dhillon and Josh Poduska, Vertica Recorded: Feb 21 2018 54 mins
    Vertica’s in-database machine learning supports the entire predictive analytics process with massively parallel processing and a familiar SQL interface. Vertica has the only native, in-database, distributed machine learning library on the market today; complete with easy-to-use features for blazing fast ingestion, complex data preparation, the fastest distributed model building available, thorough model evaluation, detailed model management, simple model deployment, and advanced integration with popular machine learning and visualization tools.

    During this demo you’ll get a firsthand look at Vertica machine learning using a public IoT dataset from the Irish Smart Meter project. The demonstration will cover data exploration and visualization, data preparation, model building, model scoring, model evaluation, and model management. Learn how data scientists and analysts can leverage Vertica to embrace the power of Big Data and accelerate business outcomes with no limits and no compromises.
  • Verizon Threat Research Advisory Center - Cryptocurrency Attacks
    Verizon Threat Research Advisory Center - Cryptocurrency Attacks John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Feb 21 2018 89 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Hardware Selection Criteria for Object Storage
    Hardware Selection Criteria for Object Storage John Bell, Senior Consultant & Tony Barbagallo, VP of Product Recorded: Feb 20 2018 40 mins
    Thinking about implementing object storage in your infrastructure and not sure what hardware you need? With information and tips curated from hundreds of installations, VP of Product Tony Barbagallo and Sr. Consultant John Bell will explain the criteria you should consider as you make your selections and will be available to answer your questions.
  • Behind Every Ticket is a Patient
    Behind Every Ticket is a Patient Rick Bradley - APCON, Ryan Davis - ExtraHop Recorded: Feb 20 2018 35 mins
    Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
  • Not Just Another GDPR Webinar: Critical Information You Need to Know About GDPR
    Not Just Another GDPR Webinar: Critical Information You Need to Know About GDPR Primitive Logic CEO Jill Reber & President Kevin Moos and Latham & Watkins Partner Michael Rubin Recorded: Feb 20 2018 59 mins
    Join this conversation between Primitive Logic’s technology solutions experts and Latham & Watkins’ Privacy and Data Protection legal expert to understand GDPR key points and technical solutions to help your GDPR readiness.

    - What steps do you have to take to address the expanded definition of Personal Data?

    - Consent Management Considerations

    - What do the Privacy Rights given to data subjects mean for your digital data governance solutions?

    Day 1 of 3 day series:
    Day 1 – Overview of key concepts with legal and technical discussion of suggested actions

    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective
    ~ Day 3 – Focus on Security side of GDPR from a technology perspective

    Speakers:
    Jill P. Reber, Primitive Logic CEO
    Kevin Moos, Primitive Logic President
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
  • Transformation from Legacy to Software Defined Networking
    Transformation from Legacy to Software Defined Networking Henrik Johansson, VP SDN & Data Center, PacketFront Software Recorded: Feb 20 2018 48 mins
    "Every service provider today has investment heavily in physical networking equipment. All their customers are all connected over the legacy network in one way or another. In order to maximize the ROI, there must be a simple and quick way to orchestrate new services using new network functions virtualizations (NFV) technology on top of the old network.

    This live demonstration will showcase how this can be done, using the service orchestration, automation and activation capabilities of PacketFront Software’s BECS platform integrated towards an open source platform consisting of OPNFV, OpenDaylight and OpenStack."
  • Remind me WHAT This GDPR Thing is all About Again?
    Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 20 2018 49 mins
    Are you Prepared, Blissfully Unaware or in Full Panic Mode?

    It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

    This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
  • Commvault V11 Relatórios
    Commvault V11 Relatórios Rubens Ferreira Recorded: Feb 19 2018 17 mins
    Nesta demonstração explicamos um pouco sobre as opções de relatórios da solução Commvault e de como criar relatórios customizados
  • The Road to Simplicity: Converging Primary and Secondary Storage
    The Road to Simplicity: Converging Primary and Secondary Storage Jacob Cherian, VP of Product Strategy, Reduxio, Mike Grandinetti, CMO, Reduxio, Keith Worthington, IT Manager, LineMaster, Recorded: Feb 15 2018 45 mins
    In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.

    IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.

    Join this session to learn about:

    - The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
    - The current challenges of copy data management and how to address them
    - A dive into a TCO study depicting the savings achieved through this architectural change
    - Why snapshots are obsolete and you to achieve near-instant data recovery
    - A look into additional use cases of copy data for DevOps team

    The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.

    Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
  • Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center
    Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center David Powell, GM of Service Provider Business, LogicMonitor Recorded: Feb 15 2018 37 mins
    Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:

    - The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
    - Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
    - Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
    - Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.

    How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
  • The 2 fastest ways to move forward on data center consolidation
    The 2 fastest ways to move forward on data center consolidation Marc Keating: Director of technology and alliance strategy; Darren Miller: Manager of engineering test and performance Recorded: Feb 15 2018 60 mins
    You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
  • Preparing Your Data Center for a Digital Makeover
    Preparing Your Data Center for a Digital Makeover Cindy Borovick, Business Intelligence Director, F5 and Lori Mac Vittie, Principal Technical Evangelist, F5 Recorded: Feb 15 2018 38 mins
    Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
  • Creating Modern Business Foundations upon Hybrid IT Infrastructures
    Creating Modern Business Foundations upon Hybrid IT Infrastructures Todd Traver, Vice President, IT Optimization and Strategy, Uptime Institute Recorded: Feb 15 2018 50 mins
    Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Recorded: Feb 15 2018 38 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC
    Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC Scott Sinclair, Sr. Analyst, Enterprise Strategy Group, Inc. Varun Chhabra, Sr. Director - Product Marketing, Dell EMC Recorded: Feb 15 2018 63 mins
    In the era of digital business, IT managers are increasingly responsible for delivering results that drive the success of their business. To achieve this, it is imperative that IT organizations implement a modern storage infrastructure that enables them to increase agility and thereby gain a competitive advantage. In this webcast, experts from Enterprise Strategy Group and Dell EMC will describe the key attributes and benefits of a modern storage infrastructure.
  • Analyze ORC and Parquet data in the right place for the right price with Vertica
    Analyze ORC and Parquet data in the right place for the right price with Vertica Mark Lyons and Steve Sarsfield, Vertica Recorded: Feb 15 2018 39 mins
    In a modern enterprise architecture, gaining access to data that’s stored in multiple locations is crucial to delivering analytics. It shouldn’t really matter if the data is stored in your database or some other location in ORC or Parquet formats. Performing analysis on it without having to first copy it can be a very powerful capability.

    Join Vertica experts Mark Lyons and Steve Sarsfield as they talk about how the external tables feature of Vertica can save you time and effort in many day-to-day analytics tasks. Whether you’re joining internal databases to external data tables for additional insight, training machine learning models, or simply tiering less critical data analysis off to a less expensive storage location, external tables can speed you through this task.

    In this webinar, you’ll also learn how external tables are a fantastic way to keep costs low yet maintain easy access to data of almost any age and any importance.
  • Automating Storage Provisioning using VMware vRealize Orchestrator
    Automating Storage Provisioning using VMware vRealize Orchestrator Eric Siebert - Product Manager, Chris Snell - Technical Solutions Engineer Recorded: Feb 15 2018 50 mins
    Virtualizing data center infrastructure has reduced server sprawl, and improved provisioning, scalability and TCO. However, it’s come with increased complexity in managing across the infrastructure stack. To address this, IT orgs are turning to automation. VMware vRealize Orchestrator and VMware vRealize Automation let you: easily provision virtual and physical servers, software, networking and storage; develop composite workflows to speed complex infrastructure provisioning; and create customized environments for dev/test. This webinar covers technical details of these products and includes a demonstration of how to start a VMware Private Cloud by automating Storage Provisioning tasks using the new vRealize Orchestrator plugin for HPE 3PAR Storeserv and vRealize Automation.
  • Embrace the Datacenter of the Future with Network Virtualization
    Embrace the Datacenter of the Future with Network Virtualization Mark Hollman, Sr. Mgr Product Marketing at Verizon Recorded: Feb 15 2018 27 mins
    The terms SDN (Software-Defined Network) and NFV (Network Function Virtualization) are on many agendas right now, but what does network virtualization really mean in practical terms for the data center environment?

    In this session we will discuss your move to the cloud, including how to:

    •Speed time to market: Embracing new technologies to quickly deploy new services or turn on new sites.
    •Become more agile: Leveraging application enablement to facilitate agile business processes and help customers connect to multiple clouds/CSPs.
    •Manage costs: Consolidating your rack to free up space and control costs.
    •Enhance the customer experience: Improving application performance and limiting downtime from outages.
  • Tsunami! The Forthcoming Wave of Liquid Cooling in the Data Centre
    Tsunami! The Forthcoming Wave of Liquid Cooling in the Data Centre John Booth, CEO, Carbon3 IT Recorded: Feb 15 2018 35 mins
    This webinar will cover the challenges of scaling up of liquid cooling technologies in the data centre space.

    About the presenter:
    The subject of sustainable and green data centres is very close to my heart. For many years I have been increasingly concerned with the ever increasing requirement for power that the information age requires and we built our business on explaining to organisations that they were wasting energy and overcooling server rooms as well as consulting on green IT issues from device to disposal.

    The EURECA project will deliver a tool that public sector IT managers can use to benchmark their current actions and see what the current standards and latest concepts are and how to implement easy solutions to make a real difference. I have been lucky enough to see some state-of-the-art public sector data centres such as the University of St Andrews that have adopted the EU Code of Conduct for Data Centres and been awarded a GOLD CEEDA and how the management used the project to promote wider sustainability concepts to the rest of the university and beyond. At the other end of the scale there remains much work to be done in data centres/server rooms across the public sector to capitalise on the fast moving and sometimes daunting array of technologies and methodologies on offer.
  • IT Transformation: Beyond the Traditional Data Centre
    IT Transformation: Beyond the Traditional Data Centre Simon Ratcliffe, Consulting & Advisory, Ensono Recorded: Feb 15 2018 49 mins
    IT Transformation projects are usually driven by the need to reduce complexity, improve agility, simplify systems, contain costs, manage ever growing data and provide more efficient operational management. Arguably, for seasoned IT professionals there is nothing new about the drivers for transformational change; it’s the velocity and scale of transformation today that’s the big challenge.

    Today, to effectively accelerate business innovation, successful IT leaders are building infrastructure that focuses on automation and flexibility, supporting agile application development and helping deliver world-class customer experience. Of course, IT teams are still under pressure to deliver legacy, mission-critical applications but they also need to support a seemingly constant flow of emerging business opportunities. They’re also tasked to lower costs, reduce Capex, while helping to drive revenue growth. That’s a lot of drivers and this complex juggling act often requires modernising infrastructure. An almost inevitable result of this is that the mix of platforms they adopt will include public cloud.

    So, does that signal the end of the corporate data centre as we know it? Well, as is so often the answer – yes and no. ‘Yes’ because there is no doubt that the complexity and cost of building and managing on-premise infrastructures is becoming increasingly unsustainable for many businesses. And ‘no’ because business continuity and stability of legacy applications are still, quite rightly, primary drivers today. But the corporate data centre may well now be a service provider’s data centre...
  • Interconnect for Success: Winning Strategies of Data Center Providers
    Interconnect for Success: Winning Strategies of Data Center Providers Jim Davis, Contributing Analyst, Structure Research Recorded: Feb 14 2018 29 mins
    Enterprises are grappling with security and performance challenges that have come along with their growing use of cloud services. Datacenter providers are in a position to facilitate on-demand connectivity with software-defined platforms. This presentation will give insight into how datacenter providers are building and marketing interconnection services. We’ll also cover cloud service providers efforts to build global networks, and assess their impact on datacenter providers.

    About the presenter:
    Jim Davis is a contributing analyst for Structure Research, an independent research and consulting firm with a special focus on the hosting and cloud segments within the Internet infrastructure market. Jim’s areas of expertise include cloud-based networking, security, and edge compute services. Jim has spoken at numerous industry events such as International Telecoms Week, Capacity North America, CDN World Summit, and Streaming Media West.
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 57 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • Stateful containers for DevOps and Beyond
    Stateful containers for DevOps and Beyond Michael Mattsson - Container Technical Marketing Engineer & Stacey Gilmore Product Marketing Feb 22 2018 4:00 pm UTC 60 mins
    2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Feb 22 2018 5:00 pm UTC 75 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My!
    The ServiceNow Kingston Update: Machine Learning, AI, UX, Oh My! Marci Parker, Garrison Ball, Meghan Lockwood Feb 22 2018 6:00 pm UTC 60 mins
    With the ServiceNow’s new Kingston release, fans will not only get new functionality for a richer user experience but enjoy important strides in perhaps the most anticipated areas area of the day: machine learning and automation.Every release brings us more expansion across the ServiceNow Platform, and Kingston is no exception, adding new features and functionality including advances in the ServiceNow Platform, CSM, HR Service Delivery, ITOM, ITBM, Performance Analytics, Security Operations, GRC, and, of course, IT Service Management (including Software Asset Management). Taken in context, these new capabilities make a strong case that ServiceNow is setting itself up to act as the technology backbone for modern organizations (so keep an eye out for future platform plays!).
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Feb 22 2018 7:00 pm UTC 45 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • Customer Support through Natural Language Processing and Machine Learning
    Customer Support through Natural Language Processing and Machine Learning Robin Marcenac, Sr. Managing Consultant, IBM, Ross Ackerman, Dir. Digital Support Strategy, NetApp, Alex McDonald, SNIA CSI Feb 22 2018 7:00 pm UTC 75 mins
    Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.

    NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.

    Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:

    •The challenges of utilizing large quantities of valuable yet unstructured data
    •How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
    •How Watson understands customer language and provides understandable responses

    Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Feb 22 2018 10:00 pm UTC 60 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Speakers:
    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • GDPR’s Dirty Little Secret and How Object Storage Enables Compliance
    GDPR’s Dirty Little Secret and How Object Storage Enables Compliance Glen Olsen, Product Manager, and Alex Oldfield, Solutions Architect Feb 27 2018 10:30 am UTC 60 mins
    The dirty little secret? The General Data Protection Regulation (GDPR) does not just affect companies in the EU, it affects companies around the world that collect or process data concerning EU residents. Caringo Product Manager Glen Olsen and Solutions Architect Alex Oldfield explain the challenges organisations face and how Caringo Swarm Object Storage provides a cost-effective solution to help meet the requirements as well as how Data Protection Officers can use Swarm to monitor and enable GDPR compliance.
  • Managing Application Connectivity in the World of Network Security
    Managing Application Connectivity in the World of Network Security Asher Benbenisty, Director Product Marketing Feb 27 2018 3:00 pm UTC 45 mins
    The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.

    During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will discuss how taking an application-centric approach to security policy management will improve both your security and operational efficiency.

    In the webinar, you will learn how to:

    •Gain insight into your company’s security policy management maturity level
    •Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows
    •Identify security risks across your enterprise network and prioritize them based on business criticality
    •Securely migrate business application connectivity and security devices to a new data center
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • ESG Tests vArmour for Securing Multi-Cloud Workloads
    ESG Tests vArmour for Securing Multi-Cloud Workloads Tony Palmer, Sr. Lab Analyst at ESG; Faraz Aladin, Sr. Director of Marketing at vArmour Feb 27 2018 6:00 pm UTC 60 mins
    The Analysts at Enterprise Strategy Group just wrapped up testing of the vArmour DSS Distributed Security System across physical, virtual, cloud, and container platforms and the results are in.

    Join ESG Senior Lab Analyst, Tony Palmer, along with vArmour Senior Director of Marketing, Faraz Aladin, for a detailed review of the vArmour solution and to see how it performs in the areas of:

    --Application identification, inspection, and protection across a combination of infrastructure platforms

    --Scalability to match compute resources and throughput requirements

    --Automatic security provisioning for new assets

    --Deception capability, ease of use, and efficiency
  • Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
    Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Daniel Towner, System Architect for Wireless Access, Intel Corporation Feb 28 2018 4:00 pm UTC 45 mins
    5G brings many new capabilities over 4G including higher bandwidths, lower latencies, and more efficient use of radio spectrum. However, these improvements require a large increase in computing power in the base station. Fortunately the Xeon Scalable Processor series (Skylake-SP) recently introduced by Intel has a new high-performance instruction set called Intel® Advanced Vector Extensions 512 (Intel® AVX-512) which is capable of delivering the compute needed to support the exciting new world of 5G.

    In his talk Daniel will give an overview of the new capabilities of the Intel AVX-512 instruction set and show why they are so beneficial to supporting 5G efficiently. The most obvious difference is that Intel AVX-512 has double the compute performance of previous generations of instruction sets. Perhaps surprisingly though it is the addition of brand new instructions that can make the biggest improvements. The new instructions mean that software algorithms can become more efficient, thereby enabling even more effective use of the improvements in computing performance and leading to very high performance 5G NR software implementations.
  • Shift Happens! The power of Performance Testing
    Shift Happens! The power of Performance Testing Jeff Bradley, Pre-Sales Advisor, CA Technologies Feb 28 2018 4:00 pm UTC 60 mins
    Performance testing is more relevant than ever. It’s even more prominent in the software development life cycle than in the past. What’s changed is that development and testing teams now can test component level performance earlier than ever with tools such as Service Virtualization.

    It’s now easier to identify and fix performance-related issues as they are being worked much earlier than before, when performance testing was done during a formal performance testing cycle in the stage environment after multiple code builds have hidden those issues deeper across several application layers.

    This session will cover the basics of how to shift performance testing left so that development and testing teams can test component level performance using CA Service Virtualization and CA BlazeMeter.
  • APT37: The Overlooked North Korean Threat
    APT37: The Overlooked North Korean Threat Ben Read, Senior Manager Cyber Espionage, FireEye Feb 28 2018 4:00 pm UTC 60 mins
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. On Thursday, February 28, join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • How To Avoid Downtime While Using 100% Commodity Hardware
    How To Avoid Downtime While Using 100% Commodity Hardware Sander Puerto, Sr. Technical Account Manager DataCore Software Feb 28 2018 5:30 pm UTC 45 mins
    Businesses lose productivity, revenue and resources during unplanned outages. To prevent unexpected downtime, many organizations are searching for solutions that can provide business continuity without breaking their budgets.

    What if you were able to achieve both goals while utilizing your existing commodity hardware? How would this benefit your customers and improve productivity?

    Join this webinar and we will show you:
    - How to keep 2 active copies of your data, even if your disks are from different vendors
    - An economical way to deploy existing x86 servers for business continuity
    - Ways to keep your hosts and applications running, even if you lose one of your SANs
    - How to cluster your preexisting Hypervisors using local disks for high availability
  • Zero to Productive: A Better Employee Onboarding Experience
    Zero to Productive: A Better Employee Onboarding Experience Jen Kaplan, Solutions Architect, Jamf & Matthew Phillips, Professional Services Engineer, Jamf Feb 28 2018 6:30 pm UTC 60 mins
    Effective employee onboarding programs increase performance by up to 11 percent, according to BambooHR. What makes an effective onboarding program? Reducing the time it takes for new employees to get the tools they need to do their best work.

    In our webinar, Zero to Productive: A Better Employee Onboarding Experience, we show how you to create a smooth and reliable technology onboarding experience that makes it easy, informative, and dare we say, fun for employees to get up and running immediately.

    In this webinar, we’ll cover:

    * Why onboarding matters
    * Advanced zero-touch device deployment tools
    * How to leverage progress feedback apps
    * End user interaction opportunities
  • Balancing Risk, Compliance, and Performance in Data Analytics
    Balancing Risk, Compliance, and Performance in Data Analytics Scott Jeschonek, Director of Cloud Products (Avere) and Leonord Law, Product Manager (Google Cloud) Feb 28 2018 7:00 pm UTC 60 mins
    In this webinar, Avere Systems and Google Cloud explore the ways in which alternative asset managers are leveraging technology to drive improved profitability data without large capital investments in infrastructure.

    Today’s hedge fund managers are consistently analyzing greater volumes of data, with more speed, from a plethora of sources, with the end ambition of generating more alpha. Balancing the growing risks associated with proprietary data, compliance and regulatory restrictions, while supplying top-level performance is a dilemma facing IT managers everywhere.

    In this webinar we will discuss:

    – The trends driving increased demand for analytics in the alternative asset management sphere
    – Considerations for leveraging the cloud for short-term backtesting workloads
    – Practical tips for overcoming potential obstacles of latency, data movement, and lock-in
  • How to secure the Windows OS in 2018
    How to secure the Windows OS in 2018 Sami Laiho Mar 1 2018 6:00 pm UTC 60 mins
    At the end of 2017 there were more than a million new malware samples found for Windows per day. The old ways of protecting computers are not powerful enough anymore. Join to learn how one of the leading security experts in the world, Sami Laiho, explains how to protect your endpoints proactively. You’ll learn tips & tricks on how to implement hard disk encryption, Whitelisting and Principle of Least Privilege.


    Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for more than 15 years. Sami’s session was evaluated as the best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016 and 2017. At Ignite 2017 Sami was evaluated as the Best External Speaker! Sami is also an author at PluralSight and the newly appointed conference chair at the TechMentor conference.
  • GDPR & Privileged Access Management … Are You Ready?
    GDPR & Privileged Access Management … Are You Ready? Cullen Lemley, Cybersecurity Consultant at CA Technologies Mar 1 2018 6:00 pm UTC 60 mins
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • Architecting Security for the Future: NetOps and SecOps
    Architecting Security for the Future: NetOps and SecOps Dan Conde of ESG and Graham Melville of Gigamon Mar 1 2018 7:00 pm UTC 60 mins
    Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of their competitors.

    In this session you will learn:
    The issues and challenges facing your industry colleagues.
    How to simplify your security architecture without throwing out security tools or flattening the network.
    How to improve network performance and reduce outages while maintaining security.
    How to spend less yet get more from your network security tools.

    If you or your organization wants to be, or are, a security leader in your industry, you won’t want to miss this webinar.
  • NetApp for SAP – A powerful Partnership for Your Digital Transformation Journey
    NetApp for SAP – A powerful Partnership for Your Digital Transformation Journey Mike McNamara, Sr. Manager, Product Marketing, NetApp Roland Wartenberg, Sr. Director, Global Alliances, NetApp Mar 6 2018 4:00 pm UTC 60 mins
    “Data is the new Oil”, said SAP’s CEO Bill McDermott at SAPPHIRE 2017. As the market leader in enterprise application software, SAP is at the center of today’s business and technology revolution. NetApp, being an SAP Global Technology Partner for more than 15 years, is the data authority in the hybrid cloud.

    NetApp and SAP work together to deliver uninterrupted real-time data access, multitenancy, and accelerated project ramp-up to propel our customers’ business forward. A Data Fabric powered by NetApp technology optimizes the value of SAP data and helps companies worldwide access enterprise applications and data where they fit best—across on-premises, hosted, and public-cloud environments.

    But the world is changing. Digital transformation with internet of things, machine learning and artificial intelligence will change the way business are run, today and tomorrow.

    Do you want to learn how NetApp helps customers transform their SAP environments to take advantage of hybrid cloud capabilities? Do you want to learn how NetApp’s solutions and products can help you to accelerate projects, to automate processes and save time on your journey to the cloud? Do you want to learn how NetApp can help you to create a comprehensive end-to-end data management strategy?

    In this webcast we answer not only these questions, we also will show how customers have taken advantage of today’s NetApp SAP Software Solutions to make their businesses ready for tomorrow’s challenges in the world of digital transformation.