Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Preventing Mobile App API Abuse
    Preventing Mobile App API Abuse
    Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Recorded: Feb 20 2019 56 mins
    Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.

    As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.

    This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
  • Threat Intelligence Driven Incident Response
    Threat Intelligence Driven Incident Response
    Tim Stiller, Senior Incident Response Consultant Recorded: Feb 20 2019 27 mins
    Threat intelligence is a core component of any Incident Response engagement or SOC investigation. While threat intel comes in many forms, shapes, and sizes—when used properly—it adds critical context that enables quick and accurate investigation decisions. If you understand the different types of threat intelligence used across your organization, your team can respond quickly to threats, and prioritize a detection strategy to stop future attackers.

    In this session, Tim will share:
    1. Key types of threat intelligence
    2. How each type should be used effectively
    3. Recycling: translating investigations into detections
  • Container and Cloud Native Security:  Sharing 3 Years of Valuable Experience
    Container and Cloud Native Security: Sharing 3 Years of Valuable Experience
    Dustin Aubrey with Aqua Security Recorded: Feb 20 2019 62 mins
    Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.

    During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.

    We’ll share our views on:
    •What to invest your time in - what’s most impactful for the effort
    •What has been successful
    •What to do as you scale up
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Recorded: Feb 20 2019 47 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Recorded: Feb 20 2019 53 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    David Neugebauer, Sr. Business Development Mgr, Fujitsu Recorded: Feb 20 2019 35 mins
    Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
  • Making AI work for you
    Making AI work for you
    Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, Intel Recorded: Feb 20 2019 56 mins
    Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
  • How to Accelerate Serverless Application Development
    How to Accelerate Serverless Application Development
    Asankha Perera and Chathura Widanage, SLAppForge Recorded: Feb 20 2019 53 mins
    Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:

    - A significantly more productive IDE for Serverless computing
    - How to develop an end-to-end Serverless application in a few minutes
    - How to build, test and deploy applications without leaving the IDE
    - Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
    - Learn about upcoming features - Serverless security and monitoring
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (APAC)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (APAC)
    Chris Hiatt - Systems Engineer, N2WS Recorded: Feb 20 2019 60 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.
    Join our LIVE session to find out more about:
    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • How Coding is Driving Women's Empowerment in Gaza
    How Coding is Driving Women's Empowerment in Gaza
    Rana Alqrenawi - Product Development & Women's Inclusivity Manager, Gaza Sky Geeks Accelerator Recorded: Feb 19 2019 56 mins
    Rana Alqrenawi, coder and business developer in Gaza, works to have better young female participation in entrepreneurship and coding.

    Join Rana to learn how coding is driving women's empowerment in Gaza, and how the lessons and challenges can help you overcome your challenges.
  • How to Automate Application Stack Deployments
    How to Automate Application Stack Deployments
    Marc Petrivelli, Consulting Architect, Red Hat, and Benjamin Leung, Consultant, Red Hat Recorded: Feb 19 2019 60 mins
    Many organizations are facing a difficult challenge to automate their systems. They worry it will require ample resources to write custom code they think is required.

    Fortunately, there is another option. Organizations can use Red Hat® Ansible® Automation to write simple task descriptions that even new team members can understand the first time. Using Ansible Automation saves upfront costs and makes it easier to react to change over time.

    In this webinar, we will discuss how to:
    > Look at an app and its dependencies to construct a common framework for deployment.
    > Deploy multitier applications reliably and consistently, all from a singular common framework.
    > Configure services and push application artifacts from a common system.
  • Are Your Products Ready for the FDA’s New Digital Health Pre-Cert Program?
    Are Your Products Ready for the FDA’s New Digital Health Pre-Cert Program?
    Rick Altinger, Medical Devices Consultant ; Bradley Thompson, Epstein Becker & Green, Scott.Thiel, Navigant Recorded: Feb 19 2019 62 mins
    Is your company developing or planning to develop a software product that meets the definition of a medical device?

    On January 7, 2019, FDA published its draft working model for a new precertification program, to supplement its medical device approval process for software which functions as a medical device. The FDA recognized that the traditional regulatory methodology is not well suited for the fast-paced, iterative-design development used for digital health software products.

    Medical device expert and executive Rick Altinger will outline the new digital health software regulations and answer your questions in this live webinar, such as:
    - Is my company eligible for the program?
    - What does it mean to be pre-certified?
    - What are the risks of non-participation?
  • Leveraging Your SIEM to Implement Security Best Practices
    Leveraging Your SIEM to Implement Security Best Practices
    Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7 Recorded: Feb 19 2019 28 mins
    The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?

    InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.

    In this webcast, we will discuss:

    1. How to make security analytics more consumable
    2. The data sources you need to collect and analyze
    3. How InsightIDR leverages pre-built analytics to detect top attack vectors
  • Securing Business Continuity with Redundant DNS
    Securing Business Continuity with Redundant DNS
    Jonathan Lewis, VP of Product Marketing Recorded: Feb 19 2019 31 mins
    Your online services are business-critical, and so is your DNS. Industry analysts agree that having a redundant DNS is a best practice for business continuity; and businesses that have experienced a DNS outage have learned that as well.

    That said, 68% percent of enterprises are not using redundant DNS.

    In this webinar we’ll discuss:

    -The risks associated with single provider DNS
    -The different ways you can set up dual provider, redundant DNS
    -How NS1 Dedicated DNS makes it easier than ever to have a redundant DNS setup

    Webinar attendees will come away with a solid understanding of the benefits of a redundant DNS as a means of securing business.
  • How AI and machine learning are supercharging cybersecurity
    How AI and machine learning are supercharging cybersecurity
    VentureBeat Recorded: Feb 19 2019 60 mins
    Cyber threats continually evolve, growing more sophisticated and aggressive, regularly overwhelming and bypassing traditional security solutions. With AI-powered software trained on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions are increasingly able to detect and block abnormal behavior, even without a known signature or pattern.

    Adding AI into the mix is a major turning point for cybersecurity. It’s growing clear that artificial intelligence and machine learning is the safest, and perhaps the only, path for cybersecurity professionals to really lock down their data and protect the enterprise. These systems offer the fastest, smartest ways to identify and analyze threats in real time -- and find the quickest way to taking them down.

    To learn more about how to improve privacy and security, and how new AI-powered security can protect companies and their customers better, don’t miss this VB Live event!

    Registration is free.

    Attend this webinar and learn:

    * How AI is defeating and preventing cyberattacks
    * When AI analytics need to be deployed and for what reason
    * How to build AI-powered tools that can assure consumers their data is secure
    * Real-world AI applications and what they mean for cybersecurity

    Speakers:

    * Fernando Maymi, Cybersecurity Researcher & Consultant, Moderator
    * Jim Ducharme, VP, Identity Products, RSA.
    * Eduardo Delgado, AVP, ORM, Cybersecurity, TD
  • Tips and Tricks for Docker-Based Pipelines
    Tips and Tricks for Docker-Based Pipelines
    Dan Garfield, Chief Technology Evangelist, Codefresh.io Recorded: Feb 19 2019 48 mins
    Most people think “adopting containers” means deploying Docker images to production. In practice, adopting containers in the continuous integration process provides visible benefits even if the production environment are VMs. In this webinar, we will explore this pattern by packaging all build tools inside Docker containers. Container-based pipelines allow us to create and reuse building blocks to make pipeline creation and management MUCH easier. It’s like building with Legos instead of clay.

    This not only makes pipeline creation and maintenance much easier, it also solves a myriad of classic CI/CD problems such as:
    Putting an end to version conflicts in build machines
    Eliminating build machine management in general
    Step portability and maintenance

    In a very real sense, Docker-based pipelines reflect lessons learned from microservices in CI/CD pipelines. We will share tips and tricks for running these kinds of pipelines while using Codefresh as a CI/CD solution as it fully supports pipelines where each build step is running on its own Docker image.
  • Polaris Software Integrity Platform Partner Webinar
    Polaris Software Integrity Platform Partner Webinar
    Neal Goldman Recorded: Feb 19 2019 41 mins
    The Polaris Software Integrity Platform™ brings the power of Synopsys Software Integrity products and services together into an integrated solution that enables security and development teams to build secure, high-quality, software faster. Polaris comes as a subscription entitlement with Coverity as well as Black Duck, Seeker and Managed Services. Polaris allows customers to start with a single SIG product subscription (e.g. Coverity) and seamlessly add other products as needed, by providing a unified user experience and deployment architecture.

    In this Partner focused webinar, Neal Goldman, Product Manager of Polaris, will provide an overview of the Polaris Platform and its unique value to our Partners as an Ecosystem Platform. Neal will discuss how Polaris provides a common integration framework for the SIG portfolio, allowing our Application Development, Cloud, Vulnerability Management, and Global System Integrator partners ease of integration into their products and processes. Neal will also discuss how our Partner’s existing integrations into SIG products will continue to be supported and how they will interact with the Polaris platform.
  • Introduction to React Native and GraphQL for App Development: Part 3
    Introduction to React Native and GraphQL for App Development: Part 3
    Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Recorded: Feb 19 2019 74 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    For a smoother and faster start of the workshop, please make sure you have your env setup and a running React Native App by following the sections below.

    Environment Setup
    Setup your machine by following the instructions available at official React Native getting started link. Click on Building Projects with Native Code tab, select your Operating System and desired target platform(s), then follow the setup instructions.

    VSCode is the IDE that will be used during the course. Unless you have strong preferences on other IDEs it is suggested to have it installed before the start of the Workshop. You can download and install VSCode from here.

    Create the App
    Create an application with the command react-native init MyMovies and run it via react-native run-ios and/or react-native run-android as per the getting started guide. In case of issues consult the troubleshoot section of the guide or refer to StackOverflow with the encountered issue.

    Please note that Java 8 is the actual supported Java version for Android. If you have already upgraded to Java 9 you can either downgrade or keep both, but carefully setup the env to only use Java 8 for Android builds.

    Notes
    You may get confused between react-native init and create-react-native init . The first is the usual way you create a react native project with native dependencies and that's the approach used during the Workshop. The latter is a simplified setup which allows running iOS and Android react native without the need of Xcode or Android Studio to actually compile your app. Both are valid approaches and please note from the latter you can eject to the former. Still, the Workshop will just cover the react-native init setup.
  • How to Derive Business Value with Rules
    How to Derive Business Value with Rules
    Fred Dri, Application Platform Sales Specialist, Red Hat. Anand Akella, Senior Middleware Solutions Architect, Red Hat. Recorded: Feb 19 2019 56 mins
    A common challenge for organizations is how to derive direct, tangible business value as a result of a cohesive rules strategy.

    Please join Fred and Anand to learn about successful use cases that quickly showed benefits for cost savings, business acceleration, and overall simplification of business processes with rules solutions from Red Hat.
  • Cyber Security vs. Cyber Safety – Are Medical Devices Secure and Patients Safe?
    Cyber Security vs. Cyber Safety – Are Medical Devices Secure and Patients Safe?
    Juan Asenjo, nCipher Security and Rao Cherukuri, Device Authority Recorded: Feb 19 2019 61 mins
    Learn about the main challenges for securing connected medical devices, including how to design and deploy scalable credential management systems, end-to-end data security, at rest, in motion, using encryption, establishing enforceable security policies for regulatory compliance and creating root of trust with certified HSMs to deliver patient safety.

    The Internet of Things (IoT) holds enormous potential across a wide range of applications. From industrial sensors that manage and optimize manufacturing processes, to medical devices that monitor and deliver specialized treatment. However, to realize this potential, security and safety must become the primary focus for deployment. In this webinar, Rao Cherukuri - CTO of Device Authority, a leading provider of IoT identity and access management solutions and Juan Asenjo - Senior Manager at nCipher Security, pioneers in the development of hardware security modules (HSMs), will discuss breakthrough technology that delivers automated device provisioning, authentication, credential management, and end-to-end data privacy, with a robust root of trust.

    Sign up now to save your seat on our webinar!
  • Introduction to React Native and GraphQL for App Development: Part 2
    Introduction to React Native and GraphQL for App Development: Part 2
    Nicola Zaghani - Solution Architect | Senior Software Engineer, Phorest Salon Software Recorded: Feb 19 2019 78 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    For a smoother and faster start of the workshop, please make sure you have your env setup and a running React Native App by following the sections below.

    Environment Setup
    Setup your machine by following the instructions available at official React Native getting started link. Click on Building Projects with Native Code tab, select your Operating System and desired target platform(s), then follow the setup instructions.

    VSCode is the IDE that will be used during the course. Unless you have strong preferences on other IDEs it is suggested to have it installed before the start of the Workshop. You can download and install VSCode from here.

    Create the App
    Create an application with the command react-native init MyMovies and run it via react-native run-ios and/or react-native run-android as per the getting started guide. In case of issues consult the troubleshoot section of the guide or refer to StackOverflow with the encountered issue.

    Please note that Java 8 is the actual supported Java version for Android. If you have already upgraded to Java 9 you can either downgrade or keep both, but carefully setup the env to only use Java 8 for Android builds.

    Notes
    You may get confused between react-native init and create-react-native init . The first is the usual way you create a react native project with native dependencies and that's the approach used during the Workshop. The latter is a simplified setup which allows running iOS and Android react native without the need of Xcode or Android Studio to actually compile your app. Both are valid approaches and please note from the latter you can eject to the former. Still, the Workshop will just cover the react-native init setup.
  • Achieve Better Efficiency With Tools To Automate Scaling & Faster Deployment
    Achieve Better Efficiency With Tools To Automate Scaling & Faster Deployment
    Ruchir Shastri, President & Founder, SoftSys Hosting Recorded: Feb 19 2019 39 mins
    Most often developers are spending hours of their valuable time in deploying their application, tweaking the environment to make their apps work and monitoring them to ensure that they have enough resources to run smoothly. This reduces productivity. Developers are responsible for doing the more important task of making intelligent & user friendly apps and software solutions.

    It is about time that you leverage a platform that helps in automating the process of scaling your cloud environment with intelligent rules. This ensures that your cloud platform always has sufficient resources to operate smoothly at all times & you only pay for what you use (and not pay for limits or unused portions of flat rates). Additionally, we will also walk through the easy & zero code change deployment, secure containerised setup & self service dashboard to help you address familiar business problems like:

    Complex Management & High TCO
    Difficult Migration Flow to Cloud & Containers
    Long Time to Market & Slow Product Upgrades
    Limits in data location due to security reasons
  • Introduction to React Native and GraphQL for App Development: Part 1
    Introduction to React Native and GraphQL for App Development: Part 1
    Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Recorded: Feb 19 2019 62 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    For a smoother and faster start of the workshop, please make sure you have your env setup and a running React Native App by following the sections below.

    Environment Setup
    Setup your machine by following the instructions available at official React Native getting started link. Click on Building Projects with Native Code tab, select your Operating System and desired target platform(s), then follow the setup instructions.

    VSCode is the IDE that will be used during the course. Unless you have strong preferences on other IDEs it is suggested to have it installed before the start of the Workshop. You can download and install VSCode from here.

    Create the App
    Create an application with the command react-native init MyMovies and run it via react-native run-ios and/or react-native run-android as per the getting started guide. In case of issues consult the troubleshoot section of the guide or refer to StackOverflow with the encountered issue.

    Please note that Java 8 is the actual supported Java version for Android. If you have already upgraded to Java 9 you can either downgrade or keep both, but carefully setup the env to only use Java 8 for Android builds.

    Notes
    You may get confused between react-native init and create-react-native init . The first is the usual way you create a react native project with native dependencies and that's the approach used during the Workshop. The latter is a simplified setup which allows running iOS and Android react native without the need of Xcode or Android Studio to actually compile your app. Both are valid approaches and please note from the latter you can eject to the former. Still, the Workshop will just cover the react-native init setup.
  • Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Jason Schmitt Recorded: Feb 18 2019 12 mins
    Hear from Aporeto’s CEO, Jason Schmitt, on our products, solutions and key use cases.
  • Google Application Layer Transport Security
    Google Application Layer Transport Security
    Ariful Huq Recorded: Feb 18 2019 32 mins
    "Google is known for its brilliant engineering, its infrastructure efficiency, and its approach to robust security.

    In this webinar, learn about how to implement ATLS in your enterprise environment."
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (EMEA)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (EMEA)
    Laurent Mombel - System Engineer, N2WS Feb 21 2019 10:00 am UTC 60 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.

    Join our LIVE session to find out more about:

    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • Operating with Agility Across Your Enterprise
    Operating with Agility Across Your Enterprise
    Jeremy Brown, Senior Solutions Architect, Lynne Mullis, Senior Solutions Architect Feb 21 2019 11:00 am UTC 60 mins
    Your IT operation is in a constant state of change. Deployment models are multiplying. Application architectures are evolving. Pressures to innovate are rising. And you’re expected to manage it all with a shrinking budget.

    It is a constant challenge, but it doesn’t need to be.

    In this webinar, you’ll discover how Micro Focus solutions help you master hybrid IT with new enterprise-wide agility. More specifically, you’ll learn how you can:

    •Accelerate delivery of IT resources by bridging traditional and
    transformational IT.
    •Increase IT efficiency by automating routine tasks and processes.
    •Support innovation by employing flexible technologies that evolve
    with your needs.
  • How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    William Woodhead, Tech Lead and Co-Founder, Pilcro Feb 21 2019 11:00 am UTC 26 mins
    Switching from Express to Serverless has completely transformed the delivery of Pilcro’s APIs over the past 6 months.

    It has offered reduced cost, out-of-the-box deployment/scalability/monitoring, and lightning fast development.

    This talk outlines why we made the switch with a demonstration of setting up your first Node.js API with Serverless and AWS Lambda.
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Feb 21 2019 2:00 pm UTC 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • You Can't Make Good Business Decisions Today with Yesterday's Data
    You Can't Make Good Business Decisions Today with Yesterday's Data
    Larry Romireo at EFCO Corporation & Giacomo Lorenzin, Managing Director, Direct Solutions at BackOffice Associates Feb 21 2019 3:00 pm UTC 45 mins
    There is a growing demand for high-speed analytic database systems and platforms where data can be processed at lightning speed for business decision-making. However, is that data up-to-date? If the process to update that data is batch or overnight, the data delivery may be fast, but the information may be outdated which can result in error-prone reporting and ineffective (or disastrous) business decisions.

    For successful analytics it’s important to move data in real time from multiple systems, including legacy databases, so that combined data can be properly presented in a uniform way.

    Change Data Capture is a technology employed in the best data replication solutions to minimize the amount of time and resources necessary to update data changes from one system to another. By propagating only what’s changed since the last check on the source system, minimal data is passed between systems in order to ensure identical copies of data on both source and target.

    Change Data Capture is frequently used to select and update copies of key data for operational reasons such as maintaining activity on separate systems that interact externally with customers or vendors, or remote systems that interact with corporate databases. However, it is also useful to maintain freshly updated data in systems that are used extensively for non-transactional activity, such as for analysis, reporting and data warehousing.

    Main points:
    1.Retrieving information from any source database for your analytic system
    2.Specialized and configured support to load data into the analytic system
    3.Automatically prepare and map the data between systems, saving time and resources
    4.Best-in-class process to automatically and continuously update data
    5.Change Data Capture saves time, money and effort through efficient and cost-effective technology
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Feb 21 2019 4:00 pm UTC 60 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Future IoT Growth Opportunities in Colombia
    Future IoT Growth Opportunities in Colombia
    Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & Sullivan Feb 21 2019 4:00 pm UTC 60 mins
    IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.

    Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.


    Key Takeaways:

    · What are the key verticals in this market?
    · How will the revenue shares of the hardware, software, services, and connectivity segments change?
    · What are the top three drivers for IoT investments?
  • Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Nikolai Avteniev - Software Engineer, LinkedIn Feb 21 2019 4:00 pm UTC 56 mins
    The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.

    However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.

    In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
  • Protect While You Promote: How to Balance Social Media Engagement and Security
    Protect While You Promote: How to Balance Social Media Engagement and Security
    Evan Blair, Co-Founder, Global VP Channel, ZeroFOX & Jeremy Wood, Vice President, Product Marketing, Hootsuite Feb 21 2019 4:00 pm UTC 60 mins
    In our connected world, most people engage with brands online prior to making a purchasing decision. With social media marketing on the rise, risks to your brand and reputation are also increasing, from account hacking to impersonating profiles and more. How can you increase engagement while protecting brand integrity from digital risks?

    Key Takeaways

    • Knowledge about social media security risks related to brand
    • Tips for safe sharing on social media
    • Step-by-step guide for protecting your brand
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Feb 21 2019 5:00 pm UTC 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Enterprise Software-Defined Storage on HPE Gen10 Servers
    Enterprise Software-Defined Storage on HPE Gen10 Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Feb 21 2019 5:00 pm UTC 75 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Feb 21 2019 6:00 pm UTC 60 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Presenter:
    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Emerging Application and Data Protection for Cloud
    Emerging Application and Data Protection for Cloud
    Ulf Mattsson, Head of Innovation, TokenEx Feb 21 2019 6:00 pm UTC 60 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about Data Protection solutions for enterprise.

    Learn about the new trends in Data Masking, Tokenization and Encryption.

    Learn about new Standards for masking from ISO and NIST.

    Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
  • Developing Serverless Applications on Kubernetes with Knative
    Developing Serverless Applications on Kubernetes with Knative
    Bryan Friedman, Director of Product Marketing, Pivotal and Brian McClain, Principal Product Marketing Manager, Pivotal Feb 21 2019 6:00 pm UTC 60 mins
    Serverless computing has become a hot topic in developer communities. The use of ephemeral containers eliminates the need for always-on infrastructure. But the real payoff for serverless is greater code simplicity and developer efficiency. Sounds great! Except the open-source serverless framework space is crowded and complex. Each unique offering approaches functions differently, with varying methods for triggering, scaling, and event formatting. How is that efficient?

    One thing that most everybody can agree on is to build on top of Kubernetes. With that as the only common ground though, there is still too much fragmentation for developers to wade through when deciding on the right open source serverless solution.

    That's where Knative comes in. An open-source project from Google, Pivotal, and other industry leaders, Knative provides a set of common tooling on top of Kubernetes to help developers build serverless applications. It extends Kubernetes by combining Istio with Custom Resource Definitions to enable a higher-level of abstraction for developers. This brings support for source-to-container builds, autoscaling, routing, and event sourcing. Join this session with Brian McClain and Bryan Friedman to see a complete working demo of Knative and learn:

    ● What are the components of Knative and how do they work together
    ● What are the different ways to deploy serverless applications and functions on Knative
    ● How and when to use Knative’s build features, such as Buildpacks
    ● What is Knative’s eventing model and how are event sources used to trigger functions
    ● How Project riff compliments development on top of Knative
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Feb 21 2019 6:00 pm UTC 45 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    Sebastian Straub - Systems Engineer at N2WS; Jessica Eisenberg - Customer Success Manager at N2WS Feb 21 2019 7:00 pm UTC 60 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.

    Join our LIVE session to find out more about:

    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Feb 21 2019 7:00 pm UTC 60 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • How to Modernize Applications in the Cloud Era
    How to Modernize Applications in the Cloud Era
    Jeffrey Deverter, Cloud Strategist, Cloudreach Feb 21 2019 10:00 pm UTC 57 mins
    Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.

    Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
  • The Future of Marketing Emerging from Technology of Today: 3 things to watch
    The Future of Marketing Emerging from Technology of Today: 3 things to watch
    Yana Lapitskaya - Managing Director, Yay!Starter Marketing; James Mclaughlin - Regional Account Manager, Intro Feb 26 2019 10:00 am UTC 60 mins
    Artificial intelligence has been around for a while and is already shaping the digital marketing – even if you haven’t noticed it. Every time you work with Google Ads – you are feeding in the data that informs Google’s AI enabling them to serve you with keyword suggestions, additional ad options and much more. Imagine this happening around the clock on a global scale! No wonder Google knows everything.

    Neuroscience has uncovered the decision-making process happening in our brain that advertisers knew very little about.

    Making advertisers understand how system 1 and system 2 brain works as well as their differences is like giving a video camera to someone used to drawing primitive pictures to capture and interpret the reality… It is changing the game forever – the TV, print and digital advertising will never be the same again! We are perhaps witnessing the biggest revolution in marketing since the launch of social media advertising.

    Blockchain is the newest kid on the block, and we are yet to see it manifesting itself in marketing but even now we can say it will go far beyond the cryptocurrency world, tokenizing and decentralizing the digital economy further.

    What does it all mean for you and your company?

    Sign up to our webinar ‘The Future of Marketing Emerging from Technology of Today: 3 things to watch closely’ to learn more about Artificial Intelligence, Neuroscience and Blockchain shaping the new marketing reality.
  • Journey to Enterprise-Scale DevOps: Your Game Plan for Success
    Journey to Enterprise-Scale DevOps: Your Game Plan for Success
    Jen Thomson, Research Director, IDC and Raffi Margaliot, SVP and GM, ADM, Micro Focus Feb 26 2019 11:00 am UTC 60 mins
    Organizations of every size and industry are going through a digital transformation to adapt to new technologies and ways of doing business. A recent survey conducted by IDC across 420 large European organizations shows that a sure way to gain both business and technology benefits is to scale up existing DevOps practices. In this webinar, we’ll present the findings from the IDC survey, and present a blueprint to help organizations accelerate their journey to enterprise-scale DevOps.

    Join this webinar to learn:
    • How and why IDC classifies organizations into two distinct groups: The protagonists of DevOps, called ‘DevOps Determined’; and those struggling to scale DevOps, called ‘DevOps Distracted’
    • How to transition to a ‘DevOps Determined’ organization
    • How the Micro Focus Enterprise DevOps portfolio helps organizations to build and deliver better software faster, and enables them to become ‘DevOps Determined’ on their journey to enterprise-scale DevOps
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Feb 26 2019 4:00 pm UTC 62 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • Why IT Pros Want Digital Network Architecture
    Why IT Pros Want Digital Network Architecture
    Alejandro Rodriguez, Solutions Architect Feb 26 2019 5:00 pm UTC 15 mins
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • What’s New in Container Storage
    What’s New in Container Storage
    Keith Hudgins, Docker; Alex McDonald, NetApp Feb 26 2019 6:00 pm UTC 75 mins
    Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.

    This live webcast will cover:
    •Container storage types and Container Frameworks
    •An overview of the various storage APIs for the container landscape
    •How to identify the most important projects to follow in the container world
    •The Container Storage Interface spec and Kubernetes 1.13
    •How to get involved in the container community
  • Fast Insights with AI-driven Analytics on Google Cloud
    Fast Insights with AI-driven Analytics on Google Cloud
    Naveen Punjabi, Strategic Tech Partnership Lead, Google Cloud & Sameer Satyam, Director, Product, ThoughtSpot Feb 26 2019 6:00 pm UTC 60 mins
    In the face of unprecedented disruption more businesses are looking for new ways to leverage data and analytics in the cloud to stay relevant and competitive. ThoughtSpot on the Google Cloud Platform lets companies reap the benefits of fast search and AI-driven insights in the cloud. Doing so enables anyone, regardless of technical sophistication, to quickly extract ML-derived insights from Google Cloud ML Engine using a simple search to go from answers to predictions in a single click.

    We'll discuss:
    * Launching a winning cloud analytics strategy
    * Generating ML-derived predictions from Google Cloud ML Engine through search
    * Combining the power of ThoughtSpot’s in-memory calculation engine with Google Cloud