Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Accelerate Your Innovation Journey By Leveraging Containers
    Accelerate Your Innovation Journey By Leveraging Containers
    Dave Bartoletti, Vice President and Principal Analyst, Forrester Research Recorded: Apr 24 2019 47 mins
    Accelerate your innovation journey using containers.

    Firms have become more comfortable with containers in the last 3 years and container usage is expected to continue to grow. With growth comes more sophisticated requirements. Containers support configuration management and continuous integration/continuous delivery (CI/CD) processes by offering improved flexibility, performance, and security. Open source software has been key in unlocking container and container platform innovation. Firms have learned to use and contribute to open source to reap the rewards of communities.

    In this webinar, Forrester research analyst Dave Bartoletti will share new insights from a March 2018 study into how organizations are using containers, container platforms, and open source to quicken adoption of more enterprise apps. He'll cover:

    How container usage has improved in recent years.
    What the future of containers and container platforms looks like.
    Navigating the performance and security challenges of containers and container platforms.
    How containers can improve customer experience and lower costs.
    How open source can accelerate innovation in your organization.
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 24 2019 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Secrets of Fintech Startup Success: A Formula for Disruption
    Secrets of Fintech Startup Success: A Formula for Disruption
    Yodlee Recorded: Apr 24 2019 60 mins
    Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.

    Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.

    Register for the webinar to discover:

    • What successful fintech startups have in common
    • The differences between being a solopreneur vs. being a co-founder
    • Tips for finding and growing your dream team
    • How to go from killer idea to disruptive startup


    • Evan Schuman, Moderator, VB
    • Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
    • Pierre Wolff, SVP Business Development, InCountry
    • Ken Kruszka, CEO, SnapCheck
    • Kathleen Utecht, Managing Partner, Core Innovation Capital
  • Get to "Why" Faster with AI-Driven Analytics
    Get to "Why" Faster with AI-Driven Analytics
    Sanjay Agrawal, Co-Founder & VP of Engineering & Sean Zinsmeister, Head of Product Marketing, ThoughtSpot Recorded: Apr 24 2019 62 mins
    For years, analytics vendors have helped enterprises understand what’s happening in their business, yet often failed at answering the more valuable question of why it’s happening.

    Everyone expects to have data to understand what’s happening it their business. When it comes to understanding why that’s happening, it’s a completely different story. People don’t even know what questions to ask to begin answering that question, slowing down decisions and stifling business growth.

    With AI-driven analytics, that’s all about to change. SpotIQ, the AI engine from ThoughtSpot, asks thousands of questions and automatically shares relevant, customized insights buried in your data. Business users can get to the heart of why changes are happening to make decisions with confidence.
  • Why Container Security Has Become a Top Challenge for Enterprises
    Why Container Security Has Become a Top Challenge for Enterprises
    Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge Recorded: Apr 24 2019 53 mins
    A joint presentation by Aqua Security and CyberEdge

    Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.

    Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.

    We will discuss :
    •Key findings from the 2019 Cyberthreat Defense Report
    •The unique security challenges (and benefits) of containers
    •What leading enterprises are doing to automate their container security
    •What you should look for in a container security solution
  • What's new in Citrix Virtual Apps and Desktops
    What's new in Citrix Virtual Apps and Desktops
    Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product Marketing Recorded: Apr 24 2019 44 mins
    Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.

    In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:

    Key enhancements from the latest Cloud, Current and Long Term Service releases
    - How to make your journey to the cloud seamless
    - Administrative flexibility and security enhancements
    - Industry-first user experience innovations around graphics, video and more
    - Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Apr 24 2019 30 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on April 24th, 2019 at 10:00 am CST to uncover all the tricks of the trade! Register Now!
  • Connect With Control-M: Managing Application Accounts with the Automation API
    Connect With Control-M: Managing Application Accounts with the Automation API
    Felipe Casali Recorded: Apr 24 2019 24 mins
    Join us at our next Connect With Control-M technical webinar on “Managing Application Accounts with the Automation API”.
    This webinar will be part of a new series on Control-M Automation API with a focus on:

    •Working with Run As Accounts
    •Managing Connection Profiles

    Our next Connect with Control-M live webinar will be on Wednesday, April 24th, where Felipe Casali will explain and demonstrate the above. We’ll conclude with a live Q&A session.
  • How to Protect Cloud-Based APIs from Data Scrapers and Cloned Apps
    How to Protect Cloud-Based APIs from Data Scrapers and Cloned Apps
    David Stewart - Co-Founder, CriticalBlue and Stephen Gorton -Technical Architect, Racing Post Recorded: Apr 24 2019 46 mins
    If you are deploying APIs, even private ones, you are leaving your revenue stream open to exploitation. APIs are a window into your business and if there is a way to make a gain from abusing that API, someone will do it. Worse, thousands of people or thousands of bots may do it.

    The art of keeping scripts and bots from abusing your APIs requires you to validate that the incoming traffic is coming from an authentic client. Merely authenticating users may not be appropriate or may not be enough. When the remote client is a mobile app and you know that mobile devices should not be trusted, achieving the authentication goal is easier said than done.

    This session will explain how Racing Post launched a feature-rich API and a new native mobile app and managed to protect their valuable data from API scrapers and their brand reputation from cloned apps. We will cover their experiences with bots, their approach to the problem and how they solved it.

    Whether you are a mobile or API developer, an enterprise system architect, or even a product owner with strong mobile revenue, you'll want to hear this story.
  • 7 Tips for Getting Knowledge Management Right for Self-Service
    7 Tips for Getting Knowledge Management Right for Self-Service
    Stephen Mann Recorded: Apr 24 2019 53 mins
    Nearly all organizations know the opportunities and benefits of effective knowledge management, yet many still struggle to achieve long-term ROI. Knowledge management initiatives can be difficult, and your organization may be facing numerous challenges when it comes to people, processes, technology, and the overall culture in your organization. To help you, EasyVista teamed up with ITSM industry leader and analyst, Stephen Mann, in a 45-minute webinar to show you how to effectively create the best possible knowledge management environment for self-service success.
    Aria Naderi Recorded: Apr 24 2019 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • The Vulnerability Epidemic in Mobile Financial Apps
    The Vulnerability Epidemic in Mobile Financial Apps
    Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analyst Recorded: Apr 24 2019 47 mins
    What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.

    A study conducted by global research and advisory firm Aite Group examined the protective capabilities of 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.

    In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
    -Common app vulnerabilities and the sensitive information they can reveal
    -Top development mistakes that lead to data exposure
    -Strategies for implementing app protection into the software development lifecycle
  • Application platforms as a central component in digital transformation journey
    Application platforms as a central component in digital transformation journey
    Larry Carvalho, Research Director, PaaS, IDC. Tyler Britten, Technical Marketing Manager, OpenShift, Red Hat. Recorded: Apr 23 2019 40 mins
    As businesses in all types of industries are being disrupted by startups, organizations are being challenged to digitally transform themselves. Technology is playing a central role in this transformation, and the demand for applications is increasing to meet transformation goals. Application platforms, which are undergoing a transformation of their own, are playing a central role in accelerating application development.

    Join this webinar to learn about:

    -The evolution of application platforms.
    -How containers are becoming the destination of choice for workloads.
    -How companies are transforming a broad set of existing and new applications.
    -Evolving a culture of greater agility.


    Larry Carvalho, research director, PaaS, IDC

    Larry Carvalho is research director of IDC's worldwide Platform-as-a-Service (PaaS) research practice. He focuses on the Cloud Applications Platform (CAP)-as-a-Service aspect of PaaS and directs research into the component competitive markets of PaaS, including business process management (BPM) PaaS, database PaaS, cloud testing, and integration PaaS. Larry has extensive experience in systems integration and the enterprise software business.

    Tyler Britten, technical marketing manager, OpenShift, Red Hat

    Tyler Britten is a technical marketing manager for Red Hat® OpenShift® and has spent the last 15 years working with container, cloud, virtualization, and infrastructure technologies. Prior to joining Red Hat, he was a technical advocate for Blue Box, an IBM Company, and principal technical marketing manager and vSpecialist at EMC. Tyler has also been a technical consultant for a small infrastructure reseller, a network engineer for a Fortune 1000 company, and a freelance IT consultant for small businesses.
  • ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    Stephen Makowski-ServiceNow Consultant,Kiruthiga Shanmuga-ServiceNow Lead Developer,Kaviarasan Selvaraj-ServiceNow Evangelist Recorded: Apr 23 2019 53 mins
    ServiceNow has released its Automated Test Framework (ATF) feature in last year’s Istanbul release. Ever since, it’s widely used by ServiceNow customers to create and run automated tests on their ServiceNow instance. In this webinar session, we will conduct an expert analysis on ATF, and find out how organizations are leveraging ATF to achieve ROI from their investment. We will also demo few use cases on ATF to help users navigate through this feature and learn the advantages of using it.

    Key topics in the session include:

    • Automated Testing Framework Overview
    • Why use ATF?
    • ATF for ServiceNow and Upgrades
    • Achieve ROI through ATF and Automation
    • ATF Use case Demo,
    - Creating and running manual tests (timed)
    - How to create and run same tests using ATF version and view the results
    - Overview of Test Suites and scheduled testing/reports
    - Display of Custom Scripts and Configuration
    • Advantages and Disadvantages
  • Operationalize Kubernetes on Azure with Avi Networks
    Operationalize Kubernetes on Azure with Avi Networks
    Pavan Kaushik and Lei Yang Recorded: Apr 23 2019 52 mins
    Microsoft Azure provides the option of a fully-managed Kubernetes orchestration service - Azure Kubernetes Service (AKS) in addition to user-managed Kubernetes running on Azure instances. Avi integrates natively and deeply into both of these deployments in Azure to help autoscale your applications to meet growing demands.
  • How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Recorded: Apr 23 2019 55 mins
    Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.

    As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.

    This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
  • JavaScript: the most important language in your stack
    JavaScript: the most important language in your stack
    Laurie Voss, Chief Data Officer Recorded: Apr 23 2019 23 mins
    Every year, npm, Inc. surveys hundreds of thousands of developers around the world to assess current trends, use cases and what’s coming next in the world of JavaScript. This webinar series will go through all the learnings from the survey results.

    We know that JavaScript continues to grow year over year, but now we are seeing results that JavaScript is the most important language in your software stack. Using our survey results, we break down the current state of JavaScript and where trends are heading, so you can make more informed development decisions. We also look at how the landscape is changing, and how developers are evolving with it.
  • ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan Lockwood Recorded: Apr 23 2019 61 mins
    Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...

    - Learn tips to maximize your experience
    - Uncover the questions our clients ask us the most
    - Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
    - Get a preview of two of Acorio's Presentations at K19
  • Administrating Your Integration Scenarios with WSO2 Enterprise Integrator
    Administrating Your Integration Scenarios with WSO2 Enterprise Integrator
    Asitha Nanayakkara Associate Technical Lead & Nirothipan Megalingham Software Engineer, WSO2 Recorded: Apr 23 2019 56 mins
    The heterogeneous nature of today’s systems makes integration a vital part of the software development cycle. While moving away from monolithic architecture provides many advantages, it’s also important to drive focus towards some common characteristics that need to be considered when integrating between heterogeneous systems and services. One of the primary concerns would be the types of tools offered for developers to integrate between systems and services and how these tools help to manage, debug and troubleshoot various integration use cases.
    This webinar will cover the following topics:
    * An introduction to tooling capabilities offered by WSO2 Enterprise Integrator
    * How these tools could be used to develop artifacts
    * Debugging using the visual debugger
    * How to manage the lifecycle of artifacts across multiple environments
    * How to do continuous integration and delivery (CICD) with enterprise service bus (ESB) artifacts
    * Administration - ESB analytics in a nutshell
  • Radically reduce troubleshooting & downtime with Blue Medora
    Radically reduce troubleshooting & downtime with Blue Medora
    Chuck Petrie & Peter Haagenson Recorded: Apr 23 2019 37 mins
    Learn how you can increase productivity up to 67% by extending the capabilities of your custom dashboards in vRealize Operations with Blue Medora's True Visibility Suite. Reclaim control and visibility in your whole stack by unlocking your dimensional data.
  • La gestion des actifs numériques redéfinie
    La gestion des actifs numériques redéfinie
    Jade McQueen, Senior Managing Director, Media & Entertainment Recorded: Apr 23 2019 22 mins
    Travaillez, stockez et collaborez en toute sécurité sur vos différents actifs multimédias

    Des images de campagne marketing aux fichiers vidéo, les ressources numériques sont au cœur des flux de travail de toutes les entreprises. En l'absence d'un système centralisé de gestion des actifs numériques, il devient difficile de rechercher le bon actif lorsque vous en avez besoin. La gestion de contenu peut rapidement devenir un défi lorsque les ressources sont modifiées et sauvegardées dans différents systèmes. En outre, un manque de mesures de sécurité adaptées crée des risques de perte de documents confidentiels ou non publiés. Box fournit un guichet unique pour tous vos actifs numériques, quel que soit leur format et vous permet de collaborer en temps réel avec des commentaires et un marquage automatisé des métadonnées afin que tout le monde puisse facilement trouver la dernière version. De plus, Box vous permet d'automatiser intelligemment les workflows jusqu'à l'approbation, en évitant les erreurs dues à des tâches manuelles. De la création à la publication, vous pouvez gérer tous vos actifs numériques de manière sécurisée et efficace.
  • Panel Discussion: Forrester Wave Vendors Discuss Software Composition Analysis
    Panel Discussion: Forrester Wave Vendors Discuss Software Composition Analysis
    Panel Discussion including David Habusha (VP Product at WhiteSource) Recorded: Apr 21 2019 54 mins
    Forrester recently released its “Forrester Wave Software Composition Analysis SCA for Q2 2019,” highlighting the leaders in this fast-growing category.

    According to their report, nowadays, one in eight open source component downloads contained a known security vulnerability and security pros now have less time to identify and remediate them. In order to keep up, a Software Composition Analysis (SCA) solution is necessary.

    Watch this panel webinar as three of the companies highlighted in the Wave report discuss why SCA is so important and how it can help you keep your open source components secure.
  • Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Sean Kennedy, Senior Director, Industry Solutions and Architecture, Salesforce, Matt Serna, Industry Marketing, MuleSoft Recorded: Apr 19 2019 45 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, the entire healthcare continuum must think beyond just driving interoperability across clinical data stores and consider how to extend interoperability across all partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Learn how NYU Langone Health implemented a new integrated approach to provide their call service agents with a one-stop comprehensive patient view, leveraging MuleSoft’s Anypoint Platform to surface real-time data from EHRs and other internal systems into Salesforce Health Cloud.

    In this webinar, you will learn:
    - How healthcare organizations can drive integration to transform their IT delivery model.
    - How modern APIs can enable connectivity across clinical and non-clinical systems.
    - How Salesforce and MuleSoft are tackling EHR interoperability challenges.
  • 5 Steps to an Awesome Apache Cassandra™ Data Model
    5 Steps to an Awesome Apache Cassandra™ Data Model
    Patrick McFadin, VP of Developer Relations, DataStax Recorded: Apr 18 2019 61 mins
    Picking the right data model is the most critical step to ensuring you get the most out of your Apache Cassandra implementation. For years, Patrick McFadin, DataStax’s own VP of Developer Relations, has been a go-to resource for enterprises wanting to learn how to do this right. In this expert session, Patrick will walk you through how to apply schema design based on your use case and the associated query patterns—but that’s not all. He’ll also share his five-step framework for implementing an awesome Cassandra data model.
  • Easy Cloud Compliance Strategies for HIPAA and HITRUST Certifications
    Easy Cloud Compliance Strategies for HIPAA and HITRUST Certifications
    Gerry Miller, Founder and CEO, Cloudticity and Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: Apr 18 2019 56 mins
    Achieving cloud compliance in a given industry requires a thorough, risk-based approach. And it's possible with the right strategy. It is important to be aware—and cautious—of the way data protection laws vary between states, countries, and government bodies.

    In healthcare, HITRUST and HIPAA cloud compliance is highly desirable as most payers will only work with HITRUST certified vendors today. Analysts predict the majority of providers will follow suit within two years. Earning certifications like HIPAA Compliance on Amazon Web Service (AWS) can give your organization a competitive edge.

    Learn how to earn AWS compliance certifications easily with the security strategies and best practices covered in this webinar. CloudCheckr Product Marketing Manager Todd Bernhard, and Cloudticity Founder and CEO Gerry Miller, discuss ways to leverage technology, automation, and cloud economics to achieve compliance while reducing costs and ongoing maintenance requirements.
  • Turbo Charge your Power BI Dashboards
    Turbo Charge your Power BI Dashboards
    Andrei Stefan Apr 25 2019 10:00 am UTC 42 mins
    Using Dynamics 365 with Power BI? Frustrated by slow query response times? Struggling to report against transactional data?

    If so, don’t miss our next webinar: “Turbo Charge your Power BI Dashboards with Atlas”.
    During this webinar, our solutions specialist will show you how Atlas for Dynamics:

    •Provides live, record level reporting against D365 data with access to 45+ additional transactional data entities – opening up a whole new world for Power BI
    •Massively speeds up D365 query response time with incremental caching – see how queries that took hours now refresh in seconds … delivering snappy Power BI visualizations that keep your business users happy
    •Combine multiple data sources to create Power BI dashboards that span D365 and on-premise legacy data
    •Improve your financial and operational reporting with real-time reporting in Excel with drill-down into journals, balances and sub-ledgers
    … and more!
  • Quoi de neuf chez Box? 
    Quoi de neuf chez Box? 
    Vincent Lieffroy, Senior Lead Engineer Apr 25 2019 12:30 pm UTC 60 mins
    Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
    C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:

    - Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
    - Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
    - Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
    - Des cycles de développement d'applications accélérés avec Box Elements
  • Deliver Azure Services from Your On-Premises Data Center
    Deliver Azure Services from Your On-Premises Data Center
    Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, Microsoft Apr 25 2019 3:00 pm UTC 60 mins
    Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
  • Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Jim Davis, Fluke Networks Apr 25 2019 3:00 pm UTC 75 mins
    This webinar address field testing and troubleshooting PON Networks per IEC 61280-4. Topics include inspection and cleaning (APC vs. UPC), PON Basics, understanding loss budgets, setting a reference, troubleshooting using an OTDR and Power Meter, and how to document results. Attendees will earn one BICSI CEC.
  • Embedded Analytics: Unleashing Insights Everywhere
    Embedded Analytics: Unleashing Insights Everywhere
    Fern Halper, VP and Senior Director, TDWI Advanced Analytics; David Menninger, SVP and Research Director, Ventana Research Apr 25 2019 3:00 pm UTC 75 mins
    When you’re using data to drive competitive edge, you want to get analytics into the hands of as many teams as possible. That’s what embedded analytics does so well: It brings the results of an analysis to your decision-makers and to the applications, workflows, and portals that run your business.

    In fact, a 2019 TDWI study reports that two thirds of respondents cited embedding analytics as a top strategy. And Ventana Research finds that 72% of research participants say it’s important to embed analytics in other applications or systems.

    Join industry experts David Menninger from Ventana Research and Fern Halper from TDWI as they discuss:
    - Why embedded analytics are such a proven strategy for analytics success
    - Whether your organisation should build or buy
    - New business models for leveraging embedded analytics
  • The Journey to Microsoft Teams - Part II
    The Journey to Microsoft Teams - Part II
    Jason Schwendinger, Global Head of IT | Richard Smith, Global Microsoft Alliance Director Apr 25 2019 3:00 pm UTC 60 mins
    We've discussed the planning phase, now it is time to run through the deployment phase.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Robert Nicklin, Product Owner, Blue Prism | Bart Peluso, SVP of Product Marketing, Blue Prism Apr 25 2019 3:00 pm UTC 75 mins
    Join us on April 25th for a preview of find out what is coming with Blue Prism’s v6.5.

    The latest version of our software will include:

    • Full Japanese and simplified Chinese language capabilities - Through a simple drop-down box a customer can select their preferred language on the Blue Prism UI.
    • Data gateways - A new mechanism that allows customers much more control of their data, with the option to send data as duplicates of what is stored in the BP database or to send the information only to the external end point, significantly reducing the amount of database space used for data storage.
    • IPv6 support - Through this feature Blue Prism customers can be confident our connected-RPA platform is ready to evolve with customer environments as they plan, test and take actions to start their transition to using IPv6.
    • Latest updates from the Blue Prism Digital Exchange

    • Robert Nicklin, Product Owner, Blue Prism
    • Bart Peluso, SVP of Product Marketing, Blue Prism
    • Richard Pauly, Head of Digital Exchange, Blue Prism

    If you have a burning product question to ask, make sure to pre-register and join us on April 25th for this live webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
  • Model-based API Testing
    Model-based API Testing
    Ben Johnson Ward Apr 25 2019 3:00 pm UTC 60 mins
    Traditional API Testing offers well-known benefits like speed, robustness, and ease of automation as compared to testing via the UI. While testing an API as exhaustively as possible is often the most effective way to know if each component is behaving the way it should, this is still dependent on the extent of test coverage provided.

    Shackled by slow incomplete manual test designs, API Testing is missing key metrics to help optimize test plans. Testers have difficulty prioritizing what needs to be tested, while developers are unable to shorten test runs and fail fast for more immediate feedback. So how do we compliment API Testing with the power of Model-based Testing (MBT) for maximum testing coverage and efficiency by optimizing our test design?

    Join MBT expert Ben Johnson Ward as he dives into a fully integrated end-to-end API testing framework/pipeline to rapidly test a live webservice. Using a powerful MBT test generation solution, he will show how to generate executable REST-assured API tests with enriched reporting, as well as manage requirements changes in the application and their impact on testing.

    You'll learn:
    - Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
    - Creating REST-assured API tests utilizing ARD and executing with Java
    - How to quickly generate tests for any scenario or coverage goal
    - How to react efficiently to changing requirements to keep our automated testing in-sprint
    - How to generate enriched test result reports

    The presentation will be followed by a Q&A session
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4 Apr 25 2019 4:00 pm UTC 43 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • The Patient Experience Imperative: Simplifying The Healthcare System
    The Patient Experience Imperative: Simplifying The Healthcare System
    Colette Balaam, CEO, Hive / Karl Hampson, Director of AI, Solstice / Steve Prewitt, Chief Analytics Officer, Healthfirst Apr 25 2019 4:00 pm UTC 45 mins
    Join Colette Balaam, CEO at Hive, Karl Hampson, Director of AI at Solstice, and Steve Prewitt, Chief Analytics Officer at Healthfirst, as they explore how enterprises should leverage advanced analytics and data platforms to improve health outcomes for their patients and members.
  • Creating compelling customer experiences through MDM with Stibo Systems
    Creating compelling customer experiences through MDM with Stibo Systems
    Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoft Apr 25 2019 5:00 pm UTC 35 mins
    Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.

    This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention

    In this webinar, you will learn how to:
    - Streamline product lifecycle management processes with your eCommerce systems.
    - Leverage Master Data Management to gain visibility across inventory and customer data.
    - Deliver personalized customer experiences based on past behaviors and purchases.
  • Changing the Game: Transforming Customer Engagement in Financial Services
    Changing the Game: Transforming Customer Engagement in Financial Services
    Tim Crawford Apr 25 2019 5:00 pm UTC 54 mins
    This free 1-hour webinar from Gigaom Research brings together leading minds in CRM for the financial services industry, featuring Gigaom head of research and CIO Tim Crawford joined by NextJ thought leaders in a roundtable discussion on how to transform customer engagement in financial services.

    In today’s hyper-competitive business climate, companies are looking at differentiated services to build stronger relationships with their clients. Specifically, in the financial services industry, the competition for both commercial and retail products is fierce.

    This webinar delves into the opportunities that come from domain expertise that industry-specific solutions deliver. In addition, we look at the ways that companies can develop differentiated services to build stronger relationships with their clients. We cover approaches specific to the financial services industry, including AI and machine learning, to better understand customers in ways that makes it hard for others to compete.

    This 1-hour webinar will give attendees insights to:

    •What are the challenges that financial services organization face today?
    •What does ‘holistic view of the customer’ mean? (ecosystem)
    •How does customer engagement and loyalty play a role?
    •Does domain expertise in the financial services industry benefit CRM?
    •CRM is not new. What is the value from an industry-specific CRM solution?
    •How are regulatory/ compliance and KYC issues addressed?
    •Is integration with other systems/ data sources a key issue?
    •How does Machine Learning and AI fit in?
  • Kubernetes, Istio, Kafka, and Camel: The glue to your cloud-native strategy
    Kubernetes, Istio, Kafka, and Camel: The glue to your cloud-native strategy
    David Cohn Middleware Solutions Sales Specialist, Red Hat Apr 25 2019 5:00 pm UTC 59 mins
    Powerful tools are needed to design scalable, distributed systems that can take advantage of the agility and organizational efficiencies promised by microservices. Tools like Istio, and service mesh in general, solve some difficult problems like observability, security, and resilience, and are highly encouraged for cloud-native application deployments.

    Join this webinar for:

    An overview on the current cloud-native landscape from a technology perspective including technologies like Kubernetes, Istio, Kafka, and Apache Camel.
    A discussion on how to "glue" your heterogenous environments, tools, and approaches together in a cohesive cloud-ready strategy.
    Red Hat's approach to agile integration, including some government case studies.
    Reference architecture for an open hybrid cloud, supporting both current and cloud-native strategies.
  • Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    David Ingham - Director, Software Engineering, Red Hat. Jakub Scholz, Principal Software Engineer, Red Hat. Apr 25 2019 6:00 pm UTC 59 mins
    Run Apache Kafka on Kubernetes with Red Hat AMQ streams
    With the introduction of the Red Hat® AMQ streams component, you can now use the massive scalability of Apache Kafka on the most advanced container management technology, Kubernetes, using Red Hat OpenShift®.

    The Red Hat AMQ streams component, the newest member of the AMQ messaging platform suite, is a massively scalable, distributed, and high-performance data streaming capability based on the Apache Kafka and Strimzi open source projects. The AMQ streams component provides an event-streaming backbone that allows microservices and other application components to reliably exchange data with extremely high throughput. AMQ streams has a particular focus on using Kafka on Red Hat OpenShift, the open source container application platform based on the Kubernetes container orchestrator.

    Join this webinar to learn:

    -Why Kafka is so frequently used in microservices, Internet of Things (IoT), and event processing.
    -Why Apache Kafka on Red Hat OpenShift is a great match.
    -How Red Hat OpenShift delivers clustering, high availability, and observability to Kafka.
    -How the AMQ streams component serves as an automated Kafka administrator, automating the deployment, management, upgrades, and configuration of a Kafka ecosystem installation.
  • Introducing a Security Feedback Loop
    Introducing a Security Feedback Loop
    Dan Garfield, Chief Technology Evangelist, Codefresh.io Apr 25 2019 7:00 pm UTC 45 mins
    We’re all looking at ways to prevent vulnerabilities from escaping into our production environments. Why not require scans of your Docker images before they’re even uploaded to your production Docker registry? SHIFT LEFT!

    When your engineers get information about security vulnerabilities earlier, they're more efficient with fixes!

    Join Codefresh, as we demonstrate setting up vulnerability and compliance thresholds in a CI pipeline. We will show you how to give your teams access to your Docker images’ security reports & trace back to your report from your production Kubernetes cluster using Codefresh.
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Apr 29 2019 8:00 am UTC 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Reviewing Modern JavaScript Applications
    Reviewing Modern JavaScript Applications
    Lewis Ardern, Senior Security Consultant, Synopsys Apr 29 2019 2:00 pm UTC 90 mins
    When dealing with modern JavaScript applications, many penetration testers approach from an ‘out-side-in’ perspective, this is approach often misses security issues in plain sight. This talk will attempt to demystify common JavaScript issues which should be better understood/identified during security reviews. We will discuss reviewing applications in code-centric manner by using freely available tools to help start identifying security issues through processes such as linting and dependency auditing.
  • What's New in Test Data Manager (TDM) 4.8?
    What's New in Test Data Manager (TDM) 4.8?
    Jeff Hughes and Keith Puzey Apr 29 2019 5:00 pm UTC 60 mins
    CA Test Data Manager has just released version 4.8 with exciting new features including Portal Masking which includes an independent masking engine and Docker-Based masking. These new features, along with others, will help your testing teams speed up the process of finding and delivering test data when it's needed. Join Jeff Hughes and Keith Puzey for a complete discussion and demonstration of the latest features in TDM 4.8
  • Mobility, Productivity and Employee Engagement - How to have it all
    Mobility, Productivity and Employee Engagement - How to have it all
    Mark Elwood, Director Marketing Apr 30 2019 8:00 am UTC 27 mins
    Find out how we helped a tier 1 bank improve their mobile communications as part of their digital transformation programme.

    Research indicates mobile employees are more likely to feel anxious, isolated and have higher levels of technology related frustration than office-based staff. So, finding ways of connecting people, so they can be as productive, engaged and satisfied is key.

    What you will take away:

    • How digital transformation projects are creating more productive, mobile employees
    • How Re:Call is helping businesses take a new approach to mobile communications
    • What you can do to create connected, collaborative and productive employees.
  • How to Configure Kubernetes for Enterprise Workloads
    How to Configure Kubernetes for Enterprise Workloads
    Sinead Kelly, Product Manager at Pivotal and Alex Guedes, Platform Architect at Pivotal Apr 30 2019 8:30 am UTC 60 mins
    As the adoption of Kubernetes expands rapidly, organisations must get up to speed with a powerful and flexible but complex container orchestration system. Understanding how the configuration of Kubernetes clusters and the configuration of your workloads interact is important when setting up your platform for success.

    This webinar will cover what you need to consider to get your different types of workloads up and running.

    Join us to learn:
    •What you need to think about before you configure your clusters and how Pivotal Container Service (PKS) can help
    •How to configure your clusters for different types of workloads
    •How to deploy those workloads so that they survive Kubernetes lifecycle events
    •How to keep your workloads up and running so they can survive upgrades

    We look forward to you joining us.
  • Five Tips for Securing and Managing your IoT environment with PKI
    Five Tips for Securing and Managing your IoT environment with PKI
    Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTO Apr 30 2019 3:00 pm UTC 60 mins
    Learn how
    1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
    2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
    3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
    4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. to enforce identity and access through online AND offline authentication

    With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.

    Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
  • How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
    How to Create Observable Integration Solutions Using WSO2 Enterprise Integrator
    Chanika Geeganage Associate Technical Lead & Lahiru Madushanka Software Engineer, WSO2 Apr 30 2019 4:00 pm UTC 52 mins
    Modern day organizations need to connect to various systems in order to perform their day to day operational tasks. As they integrate with more systems and develop large applications, it gets harder to keep track of what is going on within the system. An exposed API can take too much time to respond, the request rate for a service can increase unexpectedly or an endpoint may fail, disrupting day-to-day operations and creating unsatisfactory user experience. It’s necessary to analyze historical data about a system in order to understand the system behavior and plan the relevant modifications.
    Observability is the answer to all these problems. WSO2 Enterprise Integrator provides a comprehensive set of observability features useful for monitoring current operations, collecting and analyzing historical data and triggering alerts if something unusual happens.
    We will discuss the following topics in this webinar:
    * Introducing the WSO2 Enterprise Integrator analytics profile
    * Analyzing statistics for APIs, endpoints, sequences, and services
    * Message tracing for debugging purposes
    * Business process and human task analysis
    * Monitoring the broker profile
    * Monitoring message exchanges and application behavior via logs
  • Where is JavaScript going in 2019?
    Where is JavaScript going in 2019?
    Laurie Voss, Chief Data Officer Apr 30 2019 5:00 pm UTC 30 mins
    Every year, npm, Inc. surveys hundreds of thousands of developers around the world to assess current trends, use cases and what’s coming next in the world of JavaScript.

    During this webinar, we focus on how JavaScript and npm are changing development in 2019. Beyond web development, we’re seeing massive growth in JavScript for mobile and native applications. We discuss using JavaScript with different frameworks and look into the adoption of WebAssembly for better web performance.
  • Multi-Cloud Load Balancing and Application Services
    Multi-Cloud Load Balancing and Application Services
    Steve Allie Apr 30 2019 5:00 pm UTC 41 mins
    Walk through a live demo on how applications can be delivered consistently regardless of the underlying infrastructures.