Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Multi-cloud is the new normal and hybrid cloud is inevitable.
    Multi-cloud is the new normal and hybrid cloud is inevitable. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Jul 20 2017 45 mins
    As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
  • Supermicro Launches New X11 Family of Server and Storage Solutions
    Supermicro Launches New X11 Family of Server and Storage Solutions Ray Pang, Director of Technical Solutions; Supermicro Recorded: Jul 20 2017 39 mins
    Supermicro has released a comprehensive line of new X11 generation server and storage solutions featuring the new Intel® Xeon® Scalable processor family with the strongest support for NVMe storage and 100G/25G Ethernet in the industry.

    Supermicro’s new X11 generation solutions are engineered to unleash the full performance and rich feature sets on the new Intel® Xeon® Scalable processor family, supporting more cores and higher TDP envelopes of 205 watts and higher, increased to six memory channels with higher bandwidth, and more PCI-E 3.0 lanes with up to 100G/40G/25G/10G Ethernet, 100G EDR InfiniBand and integrated Intel® Omni-Path Architecture networking fabrics. The elevated compute performance, density, I/O capacity, and efficiency are coupled with industry’s most comprehensive support for NVMe NAND Flash to deliver up to 16 million IOPS for unprecedented application responsiveness and agility. Customers can select the Server, Storage, Blade, Network, or Workstation systems optimized for their applications, as well as the performance, memory, storage, and I/O profiles that are optimally matched to their workloads, at attractive price points.

    Register for this webinar to hear about Supermicro’s latest and broadest portfolio of new Ultra, BigTwinTM, SuperBlade®, and SuperStorage products optimized for today’s latest technology innovations. We will also be sharing critical insights on how Supermicro workload optimized server solutions deliver the highest performance, efficiency, and scalability in demanding customer environments from cloud to big data and hyper-converged solutions, and efficiently power mission-critical Enterprise workloads.
  • Securing Your Public Cloud Infrastructure
    Securing Your Public Cloud Infrastructure Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza Recorded: Jul 20 2017 54 mins
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • The State of Cloud Security
    The State of Cloud Security Eric Hibbard, Hitachi Data Systems, Mark Carlson, Co-Chair SNIA Tech Council, Toshiba Recorded: Jul 20 2017 63 mins
    Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.

    Topics covered will include:

    Summary of the standards developing organization (SDO) activities:
    - Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
    Securing the Cloud Supply Chain:
    - Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
    Emerging & Related Technologies:
    - Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
  • How to Identify and Address Congestion in All-Flash SAN with Connectrix
    How to Identify and Address Congestion in All-Flash SAN with Connectrix Alan Rajapa and Paresh Gupta Recorded: Jul 20 2017 59 mins
    Today’s storage area networks (SANs) face tremendous pressure from the phenomenal growth of digital information and the need to access it quickly and efficiently. It’s little wonder that storage administrators rank SAN congestion (Slow Drain) issues as their number-one concern. If not addressed in a timely fashion, these can have a domino effect, even degrading the performance of totally unrelated applications. Find out how the Dell EMC Connectrix MDS products have simplified the detection, troubleshooting and automatic recovery from SAN congestion.
  • The Economics of Serverless Computing
    The Economics of Serverless Computing Owen Rogers Recorded: Jul 20 2017 32 mins
    Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
  • Maximum Availability Architecture for Oracle BDA and BDCS
    Maximum Availability Architecture for Oracle BDA and BDCS Paul Scott-Murphy, Product Management, WANdisco,Jean-Pierre Dijcks, Product Manager, Oracle, Nick Collins, Analyst, Accenture Recorded: Jul 20 2017 55 mins
    Join this discussion with expert panel Paul Scott-Murphy of WANdisco, Jean-Pierre Dijcks from Oracle, and Nick Collins of Accenture, to learn how to:

    - Deploy Oracle Big Data Appliance (BDA) and Big Data Cloud Service (BDCS) in environments running any mix of HCFS compatible distributions with a path for full cluster migration with no downtime and no data loss.
    - Meet enterprise SLAs with Oracle Maximum Availability Architecture.
    - Replicate selected data among multiple big data systems and verify that they remain consistent regardless of where they are ingested or changed.
    - Replicate data at any geographic distance with signficantly low RPO and RTO.
    - Complete data transfer in approximately half the time of DistCp rgardless of the load imposed on the cluster.
    - Overcome the limitations of traditional approaches that leverage DistCp or dual-ingest methods.

    About the Presenters:

    Paul Scott-Murphy VP of Product Management at WANdisco. Paul Scott-Murphy has overall responsibility for the definition and management of WANdisco's product strategy, the delivery of product to market and its success. This includes direction of the product management team, product strategy, requirements definitions, feature management and prioritization, roadmaps, coordination of product releases with customer and partner requirements, user testing and feedback.

    Jean-Pierre Dijcks, Master Product Manager at Oracle. Highly experienced product manager with 15 years of experience in enterprise software and enterprise data. Currently responsible for all product management aspects (technology, GTM, Enablement etc.) of Oracle BDA and BDCS.

    Nick Collins, Principal Applications Systems Analyst at Accenture. Nicholas Collins is a Principal Applications Systems Analyst at MD Anderson Cancer Center, where he serves as the chair over architecture for the Department of Clinical Analytics and Informatics. He has worked with Oracle technologies for over ten years and is a Master Level CDMP.
  • Law Enforcement Data On the Move: Don’t make CJI a Crime
    Law Enforcement Data On the Move: Don’t make CJI a Crime Stan Mesceda, Encryption Expert at Gemalto Recorded: Jul 20 2017 57 mins
    Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
    Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
    “When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”

    Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
    Attendee takeaways:
    •Overview of CJIS-SP mandate
    Network vulnerabilities and how Ethernet encryption can help secure data in motion
    •Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
    •Mapping solutions to the needs of your organization

    For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091
  • Are You Ready to Respond?
    Are You Ready to Respond? Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant Recorded: Jul 20 2017 59 mins
    “In our current state of cyber security, security breaches are inevitable.” -- Kevin Mandia, CEO, FireEye

    In 2016 there were 1,093 publicized cyber security breaches. That’s a 40% increase from 2015. Given this era’s up surge in breach activity, it’s no longer about whether you’ll be breached. It’s how you’ll respond when you are breached. Organizations with a well-designed response capability are better off.

    Join Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant, for our webinar on July 20. They will cover several topics including:

    •Six primary areas of focus for an effective response plan
    •Best practices for each of those areas
    •Examples of how deficiencies in any area reduce an organization’s ability to effectively detect and respond to a cyber security incident, whether targeted or opportunistic
  • Dell EMC Webinar: Accelerate Innovation with IT transformation
    Dell EMC Webinar: Accelerate Innovation with IT transformation Sebastien Verger: CTO Dell EMC France, and Denis Montillet: Infrastructure Solutions Marketing EMEA Recorded: Jul 20 2017 37 mins
    To be competitive in today’s increasingly digital economy requires creating seamless, frictionless customer experiences and changing the way organizations serve and interact with their end users. But when and where to start?
    Join us and discover, based on an ESG survey, why IT transformation is key to unlocking opportunities by helping organizations gain better control of the costs and complexities of operating IT resources. You will understand where our organization stand on the ESG IT Transformation Maturity Index we have created and Discover the 3-phases transformation process of your IT.
  • Tame your Unstructured Data with Next Generation Scale-Out Storage
    Tame your Unstructured Data with Next Generation Scale-Out Storage Dr Stefan Radtke, EMEA CTO, Unstructured Data and Analytics Recorded: Jul 20 2017 49 mins
    How We Improved the #1 Scale-Out NAS Platform

    Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World in May. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
  • [Demo] CloudShell Cloud Sandboxing Overview
    [Demo] CloudShell Cloud Sandboxing Overview Hans Ashlock, Director of Technical Marketing, Quali Recorded: Jul 19 2017 4 mins
    Quali’s Cloud Sandbox Software allows you to create and publish sandboxes that are replicas of infrastructure and application configurations and use them for development, testing, demos, training and support. Model, orchestrate, and deploy on-prem, cloud, and hybrid environments and accelerate DevOps Automation.
  • Advanced SD-WAN: Powering the Cloud-Connected Enterprise
    Advanced SD-WAN: Powering the Cloud-Connected Enterprise Brad Casemore, IDC and Derek Granath with Rolf Muralt from Silver Peak Recorded: Jul 19 2017 57 mins
    Today’s cloud-connected enterprise demands a new WAN architecture, an SD-WAN, to meet the performance and security requirements for SaaS and IaaS. As SD-WAN technology evolves, new levels of automation, security and architectural simplification have emerged. First-packet application classification is an advanced capability that automatically steers trusted SaaS and web traffic directly to the internet and unknown or suspicious traffic to a next-generation firewall for additional security inspection.

    Further advancements harness machine learning and AI to enable adaptive, application-centric traffic handling and pervasive security. With automation, machine learning, and AI, the Self-Driving WAN can be realized.
  • Are You Ready for What’s Next in Hyper Converged Infrastructure?
    Are You Ready for What’s Next in Hyper Converged Infrastructure? Gabe Chapman: Sr. Manager, NetApp HCI GTM and Cindy Goodell: Sr. Product Marketing Manager, NetApp HCI Recorded: Jul 19 2017 39 mins
    Initial versions of HCI solutions were designed to reduce the complexity of deploying storage and compute resources. To achieve simplicity, vendors had to make trade-offs that created performance, flexibility and consolidation limitations that affected how and where HCI could be utilized in your enterprise datacenter. NetApp HCI is the first enterprise-scale hyper converged infrastructure to be designed specifically to solve for these first-generation challenges.

    Join us for this webinar to learn how NetApp HCI enables you to confidently deploy a hyper converged infrastructure in the core of you most demanding datacenters by:
    •Delivering unique Quality of Service limits that allow the granular control of every application.
    •Scaling compute and storage resources independently so you only buy what you use.
    •Integrates into the NetApp Data Fabric for enhanced data portability, visibility and protection.
  • Next-Gen Application Security at the Speed of Modern Business
    Next-Gen Application Security at the Speed of Modern Business Christopher Campbell, Director, Solutions Product Marketing, Security, VMware Recorded: Jul 19 2017 27 mins
    Applications drive modern business—and keeping them safe is a big priority for organizations across every industry. But as the digital economy continues to change the way applications are run and managed, IT teams must juggle traditional, virtual, and next-gen apps on a variety of platforms and environments. Perimeter-centric security simply can’t keep up with the diverse demands and threats. It’s time for a transformation that enables granular security that follows applications whether they’re on- or off-premises.

    In the webcast, we’ll explore:
    - How digital transformation is putting pressure on IT
    - Why abstraction is the solution
    - How abstraction delivers many benefits
  • Register Now! 3 Reasons Why Flash is Changing Back-Up and Recovery
    Register Now! 3 Reasons Why Flash is Changing Back-Up and Recovery Jack Hogan, CTO and General Manager, Lifescript Brian Reagan, CMO, Actifio, Vaughn Stewart, VP of Technology, Pure Storage Recorded: Jul 18 2017 1 min
    Attend this webinar to find out why and how Lifescript, one of the world's largest women's health care websites serving 10 million customers and a half billion emails monthly have transformed their data centers with AppFlash from Actifio and Pure Storage.

    Register here: https://www.brighttalk.com/webcast/14517/269419
  • Data Flood Warning: How to Simplify Data Lake Environments
    Data Flood Warning: How to Simplify Data Lake Environments Matt Aslett, Research Director at 451 Research, Lucio Daza, Technical Product Marketing Director at AtScale Recorded: Jul 18 2017 58 mins
    With storage costs declining over 20% in the last year, keeping your data is cheaper than throwing it away. Are you making the most effective use of your growing data lake? Depending on where you sit in your organization, the answer might be ‘no’, since every BI tool has its own requirements, and moving data to satisfy unique BI needs, takes more effort than just a file transfer.

    Join this webcast to learn why adding business logic to its architecture, Big Data environments can increase their simplicity regardless of the ingestion method.

    BI and Big Data veterans Matt Aslett, Research Director at 451 Research and Lucio Daza, Director of Technical Product Marketing at AtScale will deliver this session covering current industry trends, real use case scenarios and answering questions from the audience.

    In this webinar you will learn:

    - The ongoing challenges of data growth and how to manage it easily
    - How business logic adds value and simplicity to your Big Data environment.
    - The differences between traditional and emerging data-to-insight approaches.
  • Creatively Visualizing Spark Data
    Creatively Visualizing Spark Data Christina Holland Recorded: Jul 18 2017 26 mins
    Pepperdata tech talk by Pepperdata software engineer, Christina Holland on creatively visualizing spark data and designing new ways to see new pipelines.
  • Stop Malware in its Tracks with Security Orchestration
    Stop Malware in its Tracks with Security Orchestration Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jul 18 2017 60 mins
    Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.

    USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.

    Join us for this webcast to learn:

    -What security orchestration means, and why it has become essential for fast, efficient incident response
    -How USM Anywhere can automate incident response activities, saving valuable time
    -How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • Next-generation Edge Computing: Redefining Data Center Infrastructure
    Next-generation Edge Computing: Redefining Data Center Infrastructure Jeffrey Fidacaro, Senior Analyst, Datacenters & Critical Infrastructure Recorded: Jul 18 2017 49 mins
    The Internet of Things and other emerging edge computing trends will drive more datacenter capacity closer to users and ‘things’. However, latency, data volume and availability requirements will vary, dictating datacenter requirements and their physical placement. Increasingly distributed compute and storage will create new opportunities for colocation and service providers, as well as for datacenter technologies and services suppliers. This webinar reviews how the next generation of edge computing is redefining datacenter infrastructure.
  • Deep Dive into What's New in vSAN 6.6: Better Data Center Security & Performance
    Deep Dive into What's New in vSAN 6.6: Better Data Center Security & Performance Jase McCarty, Staff Technical Marketing Architect Recorded: Jul 18 2017 65 mins
    Come learn the technical details of the latest, innovative features in VMware vSAN 6.6 that are helping customers accelerate their path to a modern, secure infrastructure.

    In this session, learn how vSAN will help your digital transformation to a fully software-defined data center for 2017 and beyond. We’ll take a deep dive into the brand-new features of just-released vSAN 6.6 which include:

    - The first native HCI security, enhanced stretched clusters with local protection
    - Intelligent operations
    - 30% higher performance

    We’ll also share the insight gained from our recently concluded vSAN beta program where the VMware IT user community tested out features and capabilities around the themes of security, protection, and management. Plus, learn how to better secure your data center, a top IT priority, and how you can accelerate your deployment of cutting edge flash technology.
  • [Webinar] Stop Pulling Your Hair about Cyber Threats
    [Webinar] Stop Pulling Your Hair about Cyber Threats Chuck Reynolds, CTO, TSI, Deepu Rathi, CMO, CypherPath, Pascal Joly, Dir Tech Partnerships, Quali Recorded: Jul 17 2017 48 mins
    You can construct & deconstruct your app environments and integrate security testing tools while assessing vulnerabilities before releasing to production.
    Getting anxious about cyber attacks?

    You're not alone: there’s hardly a day passing by without news of a security breach. Keeping abreast of the latest cyber threats and applying mitigation strategies to application environments seems to be a losing battle.

    In this webinar, we will go over:

    A solution to rapidly construct and deconstruct your applications environments, integrate security testing tools, and harden these environments while assessing vulnerabilities before releasing to production.

    A methodology to clone a production environment to conduct rapid cyber defense assessments, create resiliency from cyber attacks, and enable developing incident responses.

    These types of environments can also be leveraged for cyber security training of your personnel.
  • Boston Globe Case Study: Move Faster with Flash-Based IT
    Boston Globe Case Study: Move Faster with Flash-Based IT Joel McKelvey, Infrastructure Solutions, Pure Storage, Wade Sendall, Vice President of IT, The Boston Globe Recorded: Jul 13 2017 31 mins
    View this on-demand webinar where the VP of IT from The Boston Globe discusses how his organization approaches IT, the challenges of delivering IT services without interruption, and how The Globe modernized its IT architecture. The discussion also includes details on the systems, including all-flash storage, that helped The Globe handle the many different variations of OS, databases, and platforms inherent to its complex infrastructure. You'll also hear real-world ways The Globe handled challenges so you may apply them to your IT and your business.
  • Implementing Splunk at Enterprise Scale
    Implementing Splunk at Enterprise Scale Somu Rajarathinam, Solutions Architect, Pure Storage, Avi Nayak, Data Analytics, DevOps and Cloud Solutions at Pure Storage Recorded: Jul 13 2017 32 mins
    Splunk is not an IT experiment anymore – it’s a mission critical application. Thousands of organizations are gaining insight from their machine data and
    transaction logs using Splunk. One of the greatest risks to any enterprise-
    level deployment of Splunk is inadequate, under-sized, or non-performant
    hardware. Organizations frequently try to repurpose existing – and often
    aging – hardware for Splunk deployments. In most cases the hardware
    only meets Splunk’s minimum specifications for IOPS and compute sizing.
    The result can be an under-performant or non-performant Splunk solution,
    leading to poor performance and unmet expectations.This session will detail how you can get get the most out of your Splunk environment using modern All Flash infrastructure, ensuring you maximize performance and efficiency.