Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Tech Tuesday: Evaluating Object Storage Solutions
    Tech Tuesday: Evaluating Object Storage Solutions John Bell, Senior Consultant & Ben Canter, VP Global Sales Recorded: Aug 21 2018 48 mins
    You've heard about the many benefits of object storage, but do you know which one is the right solution for your use case and organization? Object storage experts John Bell, Sr. Consultant, and Ben Canter, VP Global Sales, will discuss the criteria that should be used when evaluating object storage solutions for various use cases and share the knowledge gleaned from the 100s of successful installations Caringo has managed over the past dozen years. This interactive presentation will be followed by a live Q&A so you can ask questions that address your specific areas of interest.
  • The Age of Consumption: HCTS 2018 Q&A
    The Age of Consumption: HCTS 2018 Q&A 451 Research Vice Presidents Kelly Morgan, Melanie Posey and Al Sadowski Recorded: Aug 21 2018 30 mins
    451 Research’s 14th annual Hosting & Cloud Transformation Summit (HCTS) in Las Vegas from September 24-26 is coming up fast! HCTS welcomes executives in the hosting, cloud, datacenter and managed services sectors to hear timely, actionable insight into the competitive dynamics of innovation from 451 Research analyst talent and guest speakers including AWS, Microsoft, Huawei, ING, DH Capital and more. In this webinar, we will be discussing what to expect from this year’s Summit, some highlights from previous years and asking about upcoming sessions with three 451 Research Vice Presidents who will be taking the main stage at HCTS: Kelly Morgan, Melanie Posey and Al Sadowski. Join this Q&A webinar to learn about:
    - What is the Age of Consumption and what should we expect to see from it?
    - Why should organizations have a strong business-IT alignment when moving forward with a Digital Transformation strategy?
    - What, if any, key shifts are happening in the multi-tenant datacenter space as a result of the age of consumption?
    - Why are hyperscalers both a friend AND foe to other service providers?
  • The Software Asset Management Landscape Has Changed: What You Need to Know
    The Software Asset Management Landscape Has Changed: What You Need to Know Carleen Carter, Wally Waltner, Meghan Lockwood Recorded: Aug 21 2018 60 mins
    On Tuesday, August 21st, at 1:00 PM ET, 10:00 AM PT, join Carleen Carter, Acorio's Director of Technical Consultants and Solutions, as she presents The Software Asset Management Landscape is Changing: Here's What You Need to Know.

    - Software Asset Management Best Practices & Strategy
    - Changes with Virtual Machines and Cloud Licenses
    - Lower cost and risk with ServiceNow's Software Asset Management
  • The SNIA Persistent Memory Security Threat Model
    The SNIA Persistent Memory Security Threat Model Doug Voigt, Co-Chair, SNIA NVM Programming TWG and Distinguished Technologist, HPE Recorded: Aug 21 2018 56 mins
    What new security requirements apply to Persistent Memory (PM)? While many existing security practices such as access control, encryption, multi-tenancy and key management apply to persistent memory, new security threats may result from the differences between PM and storage technologies. The SNIA PM security threat model provides a starting place for exposing system behavior, protocol and implementation security gaps that are specific to PM. This in turn motivates industry groups such as TCG and JEDEC to standardize methods of completing the PM security solution space.
  • 6 Ways to Simplify the Management of Your Multi-Cloud Environment
    6 Ways to Simplify the Management of Your Multi-Cloud Environment David Linthicum, Cloud Computing Thought Leader, Linthicum Research and Michael Procopio, Product Marketing, Micro Focus Recorded: Aug 21 2018 31 mins
    With 92% of enterprises now using multiple cloud vendors, the complexity of managing a heterogeneous multi-cloud infrastructure continues to increase dramatically.

    But managing a multi-cloud environment doesn’t have to be a complicated affair.

    Emerging IT Operations processes and tools can solve your complexity problems—and eliminate them going forward—but only if you make the right choices.

    Join us on this webcast as we discuss six recommendations that will help you simplify the management of your multi-cloud environment.
  • Introduction to SNIA Swordfish™ ─ Scalable Storage Management
    Introduction to SNIA Swordfish™ ─ Scalable Storage Management Alex McDonald, Vice-Chair SNIA Europe and NetApp Recorded: Aug 21 2018 36 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting.

    Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
  • VM Consolidation with Vexata NVMe Storage Systems
    VM Consolidation with Vexata NVMe Storage Systems Rick Walsworth Recorded: Aug 17 2018 5 mins
    Vexata provides NVMe-based storage solutions that maximize VMware virtualized workloads providing massive consolidation, high performance for enterprise workloads such as Oracle, SQL Server, and SAS Analytics. This demo provides an exclusive view into consolidating mission critical Oracle workloads on VMs supporting a range of mixed OLTP, Analytics and Data Warehouse workloads delivering ultra-low latency over increasing workloads. If you are considering moving enterprise applications into VMware virtualized environments, Vexata delivers the performance and scale to do so with confidence.
  • Build Your Cyber Budget for 2019: Part 1
    Build Your Cyber Budget for 2019: Part 1 Jerry Caponera, VP of Cyber Risk Strategy Recorded: Aug 16 2018 35 mins
    Choosing cyber vendors and balancing budgets can be a challenge. We want to help cut through the clutter and show how we build a cybersecurity budget and identify spending needs an organization needs to immediately address. This is a two-part webinar series where you will learn how to approach the cybersecurity budgeting process (as well as see common mistakes to avoid) and how to build your own cyber budget. We will offer a budget plan worksheet to guide you along the way and share best practices and takeaways.
  • Secure your customer’s Office 365 environment with leading security solutions
    Secure your customer’s Office 365 environment with leading security solutions Chris Taylor -Director, Product Marketing; Jon McCarrick-Technology Evangelist; Maggie Szczygielski -Channel Account Manager Recorded: Aug 16 2018 40 mins
    Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their service provider with their most important, sensitive, and confidential data.

    Hear how bundling an Office 365 solution with Trend Micro and Acronis provides a complete and comprehensive solution for your customers while building year over year recurring revenue for your business. Join our webinar and let’s discuss how partnering with Trend Micro and Acronis will transform your business with easy to deploy, manage, and sell security solutions.

    In this webinar the following will be covered:


    •Best practices for securing your customers Office 356 environment
    •Learn how Trend Micro’s Cloud App Security enhances Office 365 security to detect advanced threats including unknown malware, ransomware, and malicious URLs.
    •Learn how Acronis provides Backup solutions needed for Office 365 email eliminating operational overhead, streamlining backup sales, and meeting data protection regulatory requirements.
  • Nimble Storage Achieves 99.9999% Availability, 287% ROI with Vertica Analytics
    Nimble Storage Achieves 99.9999% Availability, 287% ROI with Vertica Analytics Medha Bhadkamkar, Senior Manager of Data Science and Services for InfoSight, Hewlett Packard Enterprise Recorded: Aug 16 2018 49 mins
    Join the latest webcast in our Data Disruptors Series to hear how Nimble Storage leverages flash storage and predictive analytics to deliver advanced customer insights and 99.9999% availability. The company’s InfoSight customer platform eliminates headaches and wasted time by transforming how storage is managed and supported, analyzing millions of sensors every second to prevent problems.

    On this webcast you’ll hear from Medha Bhadkamkar, Senior Manager of Data Science and Services for InfoSight, on how Nimble Storage leverages Vertica to:
    • Improve customer experience and business efficiency
    • Make storage autonomous through the use of advanced analytics
    • Predict and solve 86% of issues automatically
    • Achieve 287% ROI and annual benefit of $13.6 million
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Recorded: Aug 16 2018 40 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Recorded: Aug 16 2018 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure
    VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure Mark Geel Recorded: Aug 16 2018 38 mins
    The new VxBlock 1000 breaks the physical boundaries of traditional converged infrastructure to give businesses unprecedented simplicity and flexibility to meet all their application data services needs. Learn how this next-generation engineered system provides unmatched choices of market-leading storage, data protection, and compute for all workloads to maximize system performance and utilization.
  • Solving the Gordian Knot of DevOps in the Hybrid Cloud
    Solving the Gordian Knot of DevOps in the Hybrid Cloud Darren Pulsipher Recorded: Aug 16 2018 49 mins
    As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
  • Digitalization in the Factory, How to Protect The Network for IIoT
    Digitalization in the Factory, How to Protect The Network for IIoT Rich Karpinski, 451 Research & David Knapp, Chatsworth Recorded: Aug 16 2018 52 mins
    This presentation presents recent survey data from 451 Research [VOTE product] on trends in Digitization of the Factory from the perspective of Operational Technologists. Top use cases for the Industrial Internet of Things (IIoT) and the current project focus of IT/OT teams will be discussed. Followed by a discussion of how to protect your technology investment in non-traditional environments, including extending the network onto the factory floor, the wireless overlay, and the addition of compute and storage resources on the site (edge computing).
  • Enable SAP Predictive Maintenance/Analytics with IoT Data
    Enable SAP Predictive Maintenance/Analytics with IoT Data Roland Wartenberg, Senior Director, Global Alliances, NetApp and Juergen Hamm, SAP Solution Architect, NetApp Recorded: Aug 16 2018 46 mins
    Out of a variety of projects, NetApp has developed a five-staged model to solve the challenge of data management in the Internet of Things domain. In this session you will learn how SAP helps customer get ready for the digital journey using SAP Business Objects for Analytics and SAP HANA. We will show, based on a real-world scenario, how IoT data are processed for predictive analytics and how a hybrid model with SAP Leonardo can be deployed.

    Key Takeaways:
    - Understand how SAP, Hadoop, and NetApp work well together
    - Learn how predictive analytics could be applied to IoT data
    - See the integration of NetApp into several SAP IoT related products
  • Das Geheimnis erfolgreicher Unternehmen
    Das Geheimnis erfolgreicher Unternehmen Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Recorded: Aug 16 2018 46 mins
    Nur wer seine Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Don't Ignore Endpoint Data Protection in your Data Management Plans
    Don't Ignore Endpoint Data Protection in your Data Management Plans Kalyani Kallakuri and Gregg Ogden from Commvault Recorded: Aug 16 2018 25 mins
    Today, most organizations already have a practical understanding of how to manage their data center. However, they often overlook or decide not to focus on data that resides on endpoints, and walk out the door on a nightly basis.

    This session will discuss the business drivers and technical challenges associated with protecting, managing and controlling data that lives on their edge devices – endpoints. 

    We will help you the answer the question : Isn’t using a cloud file-sharing service good enough?
  • Modernising the Data Centre
    Modernising the Data Centre Nathan McGregor, VP & Managing Director ANZ, Hitachi Vantara; Chris Drieberg, Director, Pre-sales, ANZ, Hitachi Vantara Recorded: Aug 16 2018 4 mins
    Chris and Nathan take you through the steps and benefits of modernising your data centre and infrastructure, whether you’re making significant use of multiple clouds now, or will do in the future.
  • Salesforce Monitoring Best Practices
    Salesforce Monitoring Best Practices Angelique Medina, Sr. Product Marketing Manager, ThousandEyes Recorded: Aug 15 2018 40 mins
    Salesforce is a SaaS leader, powering Customer Service, Marketing and Sales for enterprises all over the globe. Yet too many organizations run into user experience issues due to external dependencies such as ISPs, DNS and secure web gateways impacting availability and performance. Without visibility into those dependencies, you’re operating blind and exposed to a large business continuity risk.

    Join us for our third webinar in our SaaS series where we’ll share:

    -How Salesforce service delivery works and monitoring best practices to de-risk adoption and ensure optimal performance
    -Real-world use cases where Network Intelligence uncovered the root cause of performance issues
    -Hands-on demonstrations of using ThousandEyes for Salesforce visibility
  • Should More Protection Really Equal More False Positives?
    Should More Protection Really Equal More False Positives? Nir Gaist, Founder & CTO, Nyotron Recorded: Aug 15 2018 30 mins
    Security professionals accept the paradigm of “more protection equals more false positives (FPs)” as a fact of life. The tighter they make the “screws” of the security policies in their DLP, Web or Email Gateways, UEBA, application control/whitelisting and AV tools, the higher the likelihood something benign is misclassified as malicious. That’s why it is not uncommon to see false positive rates exceed 5% using the most aggressive settings.

    What if we were thinking about this wrong? Can we break this correlation between more security and more FPs?

    During this webinar we will briefly review the definition of false positives, false negatives, true positives and true negatives, as well as the history of “more protection = more FPs” paradigm. Then we will turn the paradigm on its head and discuss how more protection can actually mean fewer FPs.


    About the Speaker
    Nir Gaist, Founder and CTO of Nyotron, is a recognized information security expert and ethical hacker. He started programming at age 6 and began his studies at the Israeli Technion University at age 10. Nir has worked with some of the largest Israeli organizations, such as the Israeli Police, the Israeli parliament and Microsoft’s Israeli headquarters. He also wrote cybersecurity curriculum for the Israel Ministry of Education. Nir holds patents for the creation of a programming language called Behavior Pattern Mapping (BPM) that enables monitoring of the integrity of the operating system behavior to deliver threat-agnostic protection.
  • The Future of Work in the 21st Century: Multigenerational Teams
    The Future of Work in the 21st Century: Multigenerational Teams Monique Morrow, President & Co-Founder, The Humanized Internet Recorded: Aug 15 2018 51 mins
    The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.

    Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.

    Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
  • IT Steps Up: Strategic Enabler of Transformation
    IT Steps Up: Strategic Enabler of Transformation Melanie Posey & Dan Thompson, 451 Research and Charisse Richards, Iron Mountain Recorded: Aug 15 2018 60 mins
    State of Transformation: Hybrid IT Progress Report from the perspectives of the IT executive and the IT practitioner. Organizations are accelerating their digital transformation efforts to keep pace with changing customer expectations. In the digital era, business innovation is highly IT-dependent, thus creating an expanded role for IT organizations in today’s enterprises. Forward-looking IT leaders are embracing the challenge, which entails not only the traditional IT task of “keeping the lights on” but also development and maintenance high-performance hybrid IT environments that provide the scale, speed and operational efficiency required to harness the potential of data and data-centric technologies to drive business value and competitive differentiation.

    In this session, Melanie Posey and Dan Thompson of 451 Research and Charisse Richards of Iron Mountain will discuss:
    • Hybrid IT: an update on uptake
    • Key attributes of “strategic” IT organizations and the role of IT as a as a strategic enabler of digital transformation
    • Hybrid IT and the role of third-party service providers in harnessing the big data beast
    • IT/line-of-business alignment in the digital era
  • Speed to Value: How To Justify Your Big Data Investments
    Speed to Value: How To Justify Your Big Data Investments Amit Duvedi, VP of Business Value Engineering, Qubole Recorded: Aug 15 2018 55 mins
    Every investment in big data, whether people or technology, should be measured by how quickly it generates value for the business. While big data uses cases may vary, the need to prioritize investments, control costs and measure impact is universal.

    Like most CTOs, CIOs, VPs or Directors overseeing big data projects, you’re likely somewhere in between putting out fires and demonstrating how your big data projects are driving growth. If your focus, for example, is improving your users’ experience you need to be able to demonstrate a clear ROI in the form of higher customer retention or lifetime value.

    However, in addition to driving growth, you’re also responsible for managing costs. Here’s the rub-- if you’re successful in driving growth, your big data costs will only go up. That’s the consequence of successful big data use cases. How then, when you have success, do you limit and manage rising cloud costs?

    In this webinar, you’ll learn:

    - How to measure business value from big data use cases
    - Typical bottlenecks that delay time to value and ways to address them
    ​- Strategies for managing rising cloud and people costs
    - How best-in-class companies are generating value from big data use cases while also managing their costs
  • 2018 Data Center Survey Results
    2018 Data Center Survey Results Rhonda Ascierto, Vice President, Uptime Institute Research and Matt Stansberry, Vice President, Uptime Institute Aug 22 2018 3:00 pm UTC 60 mins
    The 8th Annual Uptime Institute Data Center Survey provides an overview of the major trends shaping IT infrastructure and strategy. Are you on top of what's happening in the industry? Find out what 900 data center operators and IT practitioners worldwide had to say.
  • Accudata's White-Hat Files | August 2018 Edition
    Accudata's White-Hat Files | August 2018 Edition Anton Abaya, CISA, PCI QSA, Senior Consultant Aug 22 2018 4:00 pm UTC 15 mins
    Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

    In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.
  • RoCE vs. iWARP
    RoCE vs. iWARP Tim Lustig, Mellanox; Fred Zhang, Intel; John Kim, Mellanox Aug 22 2018 5:00 pm UTC 75 mins
    Network-intensive applications, like networked storage or clustered computing, require a network infrastructure with high bandwidth and low latency. Remote Direct Memory Access (RDMA) supports zero-copy data transfers by enabling movement of data directly to or from application memory. This results in high bandwidth, low latency networking with little involvement from the CPU.

    In the next SNIA ESF “Great Storage Debates” series webcasts, we’ll be examining two commonly known RDMA protocols that run over Ethernet; RDMA over Converged Ethernet (RoCE) and IETF-standard iWARP. Both are Ethernet-based RDMA technologies that reduce the amount of CPU overhead in transferring data among servers and storage systems.

    The goal of this presentation is to provide a solid foundation on both RDMA technologies in a vendor-neutral setting that discusses the capabilities and use cases for each so that attendees can become more informed and make educated decisions.

    Join to hear the following questions addressed:

    •Both RoCE and iWARP support RDMA over Ethernet, but what are the differences?
    •Use cases for RoCE and iWARP and what differentiates them?
    •UDP/IP and TCP/IP: which uses which and what are the advantages and disadvantages?
    •What are the software and hardware requirements for each?
    •What are the performance/latency differences of each?

    Join our SNIA experts as they answer all these questions and more on this next Great Storage Debate
  • Converged Tape Appliance for Veeam
    Converged Tape Appliance for Veeam Ronn Martin, Solutions Architect at Veeam & Eric Bassier, Senior Director, Product Marketing at Quantum Aug 22 2018 5:00 pm UTC 60 mins
    Tape is as relevant as ever, but it may not be for the reasons that you think. In fact, as part of delivering hyper-availability, one best practice is to use tape as an “offline” storage copy to protect against ransomware and malware, which is a key part of a comprehensive data protection strategy.

    In this webinar, join experts from Veeam and Quantum to learn about tape’s role in tomorrow’s infrastructures, best practices for tape in a Veeam environment, and to introduce Quantum’s new converged tape appliance for Veeam – which makes it easier to create tape to protect against ransomware.
  • WebEx Performance Monitoring
    WebEx Performance Monitoring Archana Kesavan, Sr. Product Marketing Director Aug 22 2018 5:00 pm UTC 45 mins
    Many organizations have adopted Webex as the primary platform for communication and collaboration across both, internal and external teams. However, enterprises constantly run into VoIP performance issues with Webex and lack sufficient visibility to troubleshoot and ensure optimal user experience.

    Join us for a webinar where we’ll cover:
    -How Webex access works and monitoring best practices
    -Customer stories and real-world use cases on how to monitor Webex voice quality
    -Hands-on demo of using ThousandEyes for Webex visibility and delivering enhanced user experience
  • Three Ways Operators Can Fix Slowdowns and Improve Big Data Cluster Performance
    Three Ways Operators Can Fix Slowdowns and Improve Big Data Cluster Performance Kirk Lewis Aug 22 2018 6:00 pm UTC 60 mins
    Despite tremendous progress, there are critically important areas, including multi-tenancy, performance optimization, and workflow monitoring where the DevOps team still need management help.

    In this webinar, presenter and Pepperdata Field Engineer, Kirk Lewis discusses why big data clusters slow down, how to fix them, and how to keep them running at an optimal level. In this online webinar followed by a live Q and A, Field Engineer Kirk Lewis discusses:

    • How Pepperdata Cluster Analyzer helps operators overcome Hadoop and Spark performance limitations by monitoring all facets of cluster performance in real time, including CPU, RAM, disk I/O, and network usage by user, job, and task.

    • How Pepperdata Capacity Optimizer increases capacity utilization by 30-50% without adding new hardware

    • How Pepperdata adaptively and automatically tunes the cluster based on real-time resource utilization with performance improvement results that cannot be achieved through manual tuning.
  • Zero Downtime, Zero Touch Stretch Clusters from Software-Defined Storage
    Zero Downtime, Zero Touch Stretch Clusters from Software-Defined Storage Augie Gonzalez, Director of Product Marketing, DataCore Software Aug 22 2018 6:00 pm UTC 60 mins
    Business continuity, especially across data centers in nearby locations often depends on complicated scripts, manual intervention and numerous checklists. Those error-prone processes are exponentially more difficult when the data storage equipment differs between sites.

    Such difficulties force many organizations to settle for partial disaster recovery measures, conceding data loss and hours of downtime during occasional facility outages.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services capable of continuously mirroring data in
    real-time between unlike storage devices.
    • Non-disruptive failover between stretched cluster requiring zero touch.
    • Rapid restoration of normal conditions when the facilities come back up.

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • From Hurricanes to Hackers: The Expanding Horizons for Disaster Recovery
    From Hurricanes to Hackers: The Expanding Horizons for Disaster Recovery David Hines, TierPoint - Vice President of Architecture and Engineering Aug 22 2018 6:00 pm UTC 60 mins
    Business disruptions are not just inconvenient but can significantly damage a company’s reputation and bottom line. Many businesses are turning to Disaster Recovery-as-a-Service (DRaaS) solutions as they have effectively solved for downtime and data loss due to weather, system failures and human error. Moreover, DRaaS solutions are effective against cyber threats. Indeed, it’s not just the weather we should be worried about when it comes to disasters.

    One of the fastest growing types of attacks in recent years is ransomware. When infected, files and data are locked down and held hostage until a ransom is paid to the anonymous attacker. Due to the nature of DRaaS solutions, your organization is protected against ransomware thanks to available, continuous copies (or snapshots) of your data as well as processes to help fail back to regular operations.

    In this session, David Hines, Vice President of Architecture and Engineering at TierPoint will review the latest in ransomware tactics, and how to best prevent malware from entering the network in the first place. Sometimes, however, this is unavoidable and having a plan to mitigate the damage is a necessity.

    Register Today!
  • 模仿電郵威脅 – 層出不窮的面具
    模仿電郵威脅 – 層出不窮的面具 洪文輝, Manfred Hung, FireEye 技術顧問 Aug 23 2018 2:00 am UTC 60 mins
    您始終無法相信電子郵件的發件人真正發送了它。 模仿威脅正變得越來越流行,用戶也難以發現。

    在此網路研討會中,Nicholas Hsiao 北亞技術顧問將會討論“模仿電郵威脅 – 層出不窮的面具”,深入探討模仿攻擊背後的細節:
    • 涉及什麼心理認證
    • 攻擊者如何捕捉接受者的想像力和情感
    • 模仿攻擊是如何演變的
    • 模仿的未來是什麼
    • 威脅情報和電郵安全的速度如何影響網絡風險
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Aug 23 2018 1:00 pm UTC 60 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • DCX Series [Ep. 2]: How to Capitalize on Digital Customer Experience
    DCX Series [Ep. 2]: How to Capitalize on Digital Customer Experience Robin Gareiss, President & Founder, Nemertes Research Aug 23 2018 3:00 pm UTC 60 mins
    Nemertes recently completed an extensive research project evaluating how companies are transforming their customer experience. In the second episode of our Digital Customer Experience webinar series, you'll learn:
    • How are companies organizing to transform CX?
    • Who runs the projects, and who is on the teams?
    • What is a typical budget for digital CX?
    • What technologies are crucial for success?
    • How do companies measure success?
    • Which vendors receive the highest scores from their customers?

    We look forward to sharing this information with you!
  • Make ML and AI Adoption Easy with Dell EMC Ready Solutions
    Make ML and AI Adoption Easy with Dell EMC Ready Solutions Armando Acosta Aug 23 2018 4:00 pm UTC 60 mins
    Machine and Deep Learning could not be hotter concepts today, driving powerful innovations across industries. But like so many hot concepts surrounding digital transformation, they seem to be done well by a select few organizations who have cracked the code of designing and deploying these platforms to support their critical transformation agendas. While many of the tools in this ecosystem are open-source, deploying them and running them well is certainly not. During this session we will show how organizations can enable their development and data science team with rapid deployments of the most popular tools for ML and AI based on proven best practices and the highly engineered Ready Solutions from Dell EMC.
  • Introduction to Qubole: A Data Platform Built To Scale
    Introduction to Qubole: A Data Platform Built To Scale Mohit Bhatnagar, SVP of Product at Qubole Aug 23 2018 4:00 pm UTC 60 mins
    Many companies today struggle to balance their users’ demands for data with the cost of scaling their data operations. As the volume, variety, and velocity of data grows, data teams are getting overwhelmed and traditional infrastructure is being pushed to the brink.

    In this webinar, Qubole SVP of Product Mohit Bhatnagar will share how Qubole’s cloud-native platform helps companies scale their data operations, activate petabytes of data, and reach administrator-to-user ratios as high as 1:200 (compared to ratios of 1:20 with other platforms).

    He’ll also share how Qubole customers like Lyft, Under Armour and Turner use our cloud-native platform and multiple open source engines to run their big data workloads more efficiently and cost-effectively, as well as how the cloud helps them rapidly scale operations while simultaneously reduce their overall big data costs.

    In this webinar you’ll learn:

    - How to handle a broad set of needs and data sources
    - The importance of a cloud-native architecture for scaling big data operations
    - How and when to leverage multiple engines like Apache Spark, Presto and Airflow
    - The importance of a multi-layered approach to security
  • Fibre Channel Interoperability
    Fibre Channel Interoperability Barry Maskas, HPE; Tim Sheehan, University of New Hampshire Interoperability Lab; David Rodgers, Teledyne LeCroy Aug 23 2018 5:00 pm UTC 75 mins
    Interoperability is a primary basis for the predictable behavior of a Fibre Channel (FC) SAN. FC interoperability implies standards conformance by definition. Interoperability also implies exchanges between a range of products, or similar products from one or more different suppliers, or even between past and future revisions of the same products. Interoperability may be developed as a special measure between two products, while excluding the rest, and still be standards conformant. When a supplier is forced to adapt its system to a system that is not based on standards, it is not interoperability but rather, only compatibility.

    Every FC hardware and software supplier publishes an interoperability matrix and per product conformance based on having validated conformance, compatibility, and interoperability. There are many dimensions to interoperability, from the physical layer, optics, and cables; to port type and protocol; to server, storage, and switch fabric operating systems versions; standards and feature implementation compatibility; and to use case topologies based on the connectivity protocol (F-port, N-Port, NP-port, E-port, TE-port, D-port).

    In this session we will delve into the many dimensions of FC interoperability, discussing:

    •Standards and conformance
    •Validation of conformance and interoperability
    •FC-NVMe conformance and interoperability
    •Interoperability matrices
    •Multi-generational interoperability
    •Use case examples of interoperability
  • Blending Art & Science: Using Data to Forecast and Manage Your Sales Pipeline
    Blending Art & Science: Using Data to Forecast and Manage Your Sales Pipeline Sam Shuster, Senior Analyst and Ben Loeffler-Little, Head of Sales at Periscope Data Aug 23 2018 5:00 pm UTC 45 mins
    Sales is a scientific art; it takes someone who can translate their experience as a sales manager into an artful set of best practices. The science part requires the application of advanced data models to standard CRM data to understand their pipeline at greater depth. Blending the quantitative expertise of the data team with the experience, intuition and knowledge of the sales leadership ensures companies are able to use that pipeline analysis to correctly predict revenue. More importantly, that process helps sales managers manage and invest in their team and have data-driven conversations that will lead to exceeding revenue goals.

    Join Sam Schuster, analytics team lead at Periscope Data, and Ben Loeffler-Little, head of sales at Periscope Data, as they discuss how analytics and sales have partnered to forecast new business revenue and manage pipeline. Together, they have built a tool that models new business revenue and identifies key pipeline trends to ensure sales leadership will hit their goals.

    In this webinar, they will discuss:
    - Why visualizing sales pipeline matters
    - How to bridge the gap between technical tools and non-technical users
    - How to model Salesforce data
    - Business impact from using these visualization

    All attendees will also get access to the Salesforce SQL data models.
  • Accelerating SAS Analytics with Vexata NVMe Storage
    Accelerating SAS Analytics with Vexata NVMe Storage Dana Rafiee, Managing Director at Destiny and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Aug 23 2018 5:00 pm UTC 60 mins
    94% of the Fortune Global 100 use SAS analytics. Through innovative software and services, SAS empowers and inspires customers around the world to transform data into intelligence. IDC predicts by 2019, 40% of Data Transformation initiatives will use AI services; by 2021, 75% of commercial enterprise apps will use AI, over 90% of consumers will interact with customer support bots, and over 50% of new industrial robots will leverage AI.

    Data-driven applications and Machine Learning (ML) workloads, using SAS analytics are increasing in volume and complexity as organizations look to reduce training and operational timelines for artificial intelligence (AI) use cases. To enable predictive and cognitive analytics, you need to accelerate training and operations by delivering ultra-low latency with massive ingest bandwidths when faced with heavy mixed random and sequential read/write workloads.

    Vexata is teaming up with Destiny Corporation, a Business and Technology firm who is a SAS gold partner and reseller. This webinar is targeted towards SAS Line of Business and IT owners who are challenged with
    - new use cases like IoT, machine and deep learning across FSI, Insurance, Healthcare and Lifesciences verticals
    - handling growing data-sets and deriving actionable intelligence from these data-sets as well as
    -optimizing their existing long running jobs and IT infrastructure without a rip and replace policy.

    Learn how to identify your SAS analytics IO bottlenecks and leverage Vexata VX-100 with its transformative VX-OS purpose built to overcome these challenges.
  • Thingbot Apocalypse - How to prepare for IoT device attacks
    Thingbot Apocalypse - How to prepare for IoT device attacks Sara Boddy- Director, F5 Labs Aug 23 2018 5:30 pm UTC 60 mins
    Our modern world depends on healthy, functioning, IoT devices; however, many of them are unsecure. Cyber attackers have compromised IoT devices for over a decade, turning them into Thingbots―botnets made from IoT devices.

    The hunt for IoT attacks has made a pivotal turn in the last two and a half years. F5 Labs has been tracking these attacks and the subsequent building of Thingbots from boutique attacks, into more sophisticated and powerful cyber weapons. Thingbots are now being sold as multi-vector bots-for-hire that allow cyber attackers to launch any attack of their choice―often used for automated web application attacks and credential stuffing.

    With the threat of IoT attacks increasing, as billions of new devices are deployed each year, the ability to detect threats, and clean and upgrade infected systems is still not a part of most IoT development processes.

    In this webinar we’ll explore:
    • How attacks have evolved from the methods they use to the attacks they launch from the resulting Thingbots
    • The threat actor networks and IPs behind these attacks, their geographical targets, and how that has changed over time
    • What you should do to protect your company
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Aug 23 2018 6:00 pm UTC 60 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Eliminate Blind Spots with Nutanix & Zenoss
    Eliminate Blind Spots with Nutanix & Zenoss Anirban Chatterjee - Zenoss, Alex LaMont - Zenoss, Krishnan Badrinarayanan - Nutanix Aug 23 2018 6:00 pm UTC 60 mins
    The integration between Nutanix and Zenoss enables enterprises to ensure the highest levels of performance and availability for applications and services that power their businesses. Zenoss and Nutanix subject matter experts will discuss and showcase how Nutanix uses Zenoss to monitor their HCI and other critical environments at Nutanix data centers. Zenoss enables IT organizations to eliminate blind spots across hybrid IT environments, predict impacts to critical services, resolve issues faster, and operate at any scale the business requires.

    The session will include a demonstration of the Zenoss and Nutanix environments working together via the Nutanix ZenPack. Both teams will answer questions about Zenoss, the Nutanix ZenPack integration and future roadmap.
  • Certified Data Centre Facilities Operations Manager (CDFOM) Training Sneak Peek
    Certified Data Centre Facilities Operations Manager (CDFOM) Training Sneak Peek Otto de Roo Aug 24 2018 8:00 am UTC 30 mins
    Managing a data centre is the most CRUCIAL undertaking because your actions and decisions determine the quality of the data centre services that you provide to your users. Yet managing a data centre successfully is not a skill you can learn in school.
    CDFOM is the globally recognised training and certification for data centre operations personnel. You will learn how to keep your data centre operations SIMPLE, MANAGEABLE, EFFECTIVE & EFFICIENT. In this webinar, our Sr Consultant/Trainer, will give you a preview of the course.
  • Red Hat OpenShift Container Platform Reference Architecture using Intel® Select
    Red Hat OpenShift Container Platform Reference Architecture using Intel® Select Dave Cain, Sr. Architect, Red Hat; Seema Mehta, Ent Solutions Mgr, Intel; Lukasz Sztachanski, Cloud Engineer, Intel Aug 28 2018 3:00 pm UTC 60 mins
    Deploying Intel® Xeon® Platinum or Gold processors with an Intel® Select Solution delivers verified solution performance ready to meet high quality thresholds for data protection and resiliency, while allowing more time and resources for innovative enhancements specific to workloads and use cases.

    The current solution using Red Hat’s OpenShift Container Platform and Container-Native Storage co-locates storage and applications, and provides resilient, scale out enterprise-caliber storage to workloads on OpenShift, enabling rapid and highly-available stateful and stateless applications on baremetal x86 systems.
  • Under the Hood: Advantages of using Python with a massively parallel database
    Under the Hood: Advantages of using Python with a massively parallel database Badr Ouali, Vertica Data Scientist and Steve Sarsfield, Director of Product Marketing, Micro Focus Aug 28 2018 3:00 pm UTC 60 mins
    Python is a powerful programming language that is a good choice for many types of analytics. It is rapidly becoming the language of choice for scientists and researchers of many types. Now by combining a massively parallel (MPP) database like Vertica with Python, you can overcome many scale and analytics challenges that sometimes challenge Python users. Python users can achieve a simplified path to do as follows:
    • Analyze more data at greater speeds
    • Breeze through data preparation with the database’s SQL capabilities
    • Quickly make the most of advanced database analytics like time-series and geospatial
    • Benefit from in-database machine learning for predictive analytics
    • Leverage data as it sits in-place on the cloud or Hadoop without having to move it

    Join this webinar to understand how to expand and enhance your Python analytics with Vertica. Vertica’s built in integration with Python allows for more data and deeper analytics. As a very efficient database for massive amounts of data, Vertica’s optimizations and advanced analytics can help you achieve new heights as a Python programmer.
  • A Guide to Modern Business Continuity
    A Guide to Modern Business Continuity Bryan Halda, Solutions Architect Aug 28 2018 4:00 pm UTC 30 mins
    Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?

    Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
  • Accelerate The Time To Value Of Apache Spark Applications With Qubole
    Accelerate The Time To Value Of Apache Spark Applications With Qubole Ashwin Chandra Putta, Sr. Product Manager at Qubole Aug 28 2018 5:00 pm UTC 60 mins
    Apache Spark is powerful open source engine used for processing complex, memory-intensive workloads to create data pipelines or to build and train machine learning models. Running Spark on a cloud data activation platform enables rapid processing of petabyte size datasets.

    Qubole runs the biggest Spark clusters in the cloud and supports a broad variety of use cases from ETL and machine learning to analytics. Qubole supports a performance-enhanced and cloud-optimized version of the open source framework Apache Spark. Qubole brings all of the cost and performance optimization features of Qubole’s cloud native data platform to Spark workloads.

    Qubole improves the performance of Spark workloads with enhancements such as fast storage, distributed caching, advanced indexing, metadata caching, job isolation on multi-tenant clusters. Qubole has open sourced SparkLens, a Spark profiler that provides insights into Spark application that help users optimize their Spark workloads.

    In this webinar, you’ll learn:

    - Why Spark is essential for big data, machine learning, and artificial intelligence
    - How a cloud-native platform allows you to scale Spark across your organization, enable all data users, and successfully deploy AI and ML at scale
    - How Spark runs on Qubole in a live demo
    - Real-world examples of companies using Spark on Qubole