Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Two is company, is three too many clouds? Keeping the clichés out of multi-cloud
    Two is company, is three too many clouds? Keeping the clichés out of multi-cloud Brad King, Chief Architect and Co-Founder, Scality Recorded: Oct 19 2018 31 mins
    The term multi-cloud has caught on this year, and we’ll be discussing the reasons it could matter a great deal to your business. If you are a cloud user, a company providing services and solutions that use public cloud infrastructure, or currently defining a cloud strategy, we’ll discuss why being able to keep your cloud options open is so important. Scality is working hard to provide tools to help public and private cloud users keep control of their storage, permitting the use of the right cloud for the right job. We’ll be discussing the business implications of multi-cloud storage, the freedom that our Zenko technology allows. We’ll be joined by Nodeweaver who will share why multi-cloud is important to their business.
  • NoSQL As-A-Service in the Cloud Using Containers and Kubernetes
    NoSQL As-A-Service in the Cloud Using Containers and Kubernetes Mike Wiederhold, Sr. Engineering Manager - Cloud, Tools, & UI Recorded: Oct 18 2018 38 mins
    The unique and powerful architecture of NoSQL can provide unparalleled performance at any scale for cloud and container-based environments - even across multiple datacenters operated by different cloud vendors. In this webinar, Mike Wiederhold, Sr. Manager Engineering-Cloud, Tools & UI, will explain how you can run Couchbase NoSQL as-a-service in the cloud which includes unique Multi-Dimensional Scaling, in-memory performance, and flexible JSON document store, all of which make Couchbase ideal for modern containerized mission-critical applications.

    Mike will also show you how to deploy a Couchbase cluster in OpenShift with a Couchbase operator, and how to manage Couchbase’s high availability and resiliency in a distributed system while running on the Red Hat OpenShift Container Platform including a live demo where he will create a Couchbase cluster on Red Hat OpenShift Container Platform.
  • Enterprise-Wide Kubernetes: Episode 2 - Security
    Enterprise-Wide Kubernetes: Episode 2 - Security Patrick Maddox and Jim Bugwadia Recorded: Oct 18 2018 54 mins
    Kubernetes has become the multi-cloud OS for enterprises. In this series, we will look at what makes up an enterprise-grade Kubernetes stack, and the key tradeoffs for each component.

    In this episode, we will take a close look at end-to-end security for Kubernetes. Here are some of the key questions that we will discuss:

    1. What are the top 5 things I need to do to secure my cluster?
    2. What do I need to consider for securing applications deployed in the Kubernetes cluster?
    3. How do you recommend customers evaluate and compare the security solutions in the CNCF ecosystem?


    Presenters:

    Patrick Maddox, Senior Director, Solution Architecture at Twistlock
    Jim Bugwadia, CEO at Nirmata
  • Profiting from Reserved Instances: An RI Guide for Service Providers & Resellers
    Profiting from Reserved Instances: An RI Guide for Service Providers & Resellers Todd Bernhard, CloudCheckr Product Marketing Manager, Marit Hughes, CloudCheckr Billing Solutions Architect/SME Recorded: Oct 18 2018 33 mins
    Welcome to CloudCheckr Webinars—where we learn how to use comprehensive cloud management in the modern enterprise, as a service provider, and in the public sector.

    In this webinar, service providers and resellers looking to maximize profits, automatically generate invoices, and control where charges and discounts are applied will find that CloudCheckr cost management fits the bill.

    We’ll focus on the benefits of Reserved Instances, commonly known as RIs. The major cloud providers—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—all offer a form of discount for customers who reserve computing power in advance. These Reserved Instances can result in savings of up to 75% compared to on-demand rates. For committed cloud users, RIs can be a great deal.

    Attend this webinar to learn how to use arbitrage and CloudCheckr Reserved Instance Purchase Recommendations, as a managed service provider (MSP), to increase profitability.
  • Breaking through I/O Bottlenecks for Faster Financial Outcomes
    Breaking through I/O Bottlenecks for Faster Financial Outcomes Matt Meinel and Rick Walsworth Recorded: Oct 18 2018 51 mins
    In order to deliver immediate value back to the business, it’s critical to ensure that an organization’s financial systems are running at full strength, but in most cases, I/O bottlenecks throttle performance and delay analytic outcomes. Vexata and Levyx have collaborated on a joint solution that achieves increased performance with less infrastructure, resulting in a 300% improvement in the price/performance ratio over the industry's next best alternative solution. In this webinar, you’ll learn:
    •How to utilize the Levyx low-latency software and Vexata’s NVMe-based storage systems
    •Best practices to eliminate bottlenecks for tick-analytics, strategic back-testing, algorithmic modeling, etc.
    •Real-world results from customer trials and the recent STAC A3 test benchmarks


    Presenters:
    •Matt Meinel, Senior Vice President of Solutions Architecture, Levyx Inc.
    •Rick Walsworth, VP of Product & Solution Marketing at Vexata
  • Cloud DevSecOps With Synopsys and AWS
    Cloud DevSecOps With Synopsys and AWS Binoy Das, Partner Solution Architect, Amazon Web Services; Dave Meurer, Partner Solution Architect, Black Duck by Synopsys Recorded: Oct 18 2018 55 mins
    Automation in the cloud can help you build faster and deliver continuously, but it can also make managing security a challenge. By integrating Black Duck by Synopsys with the development tools you use in Amazon Web Services, you can scan images in your container registry, automate build scans in your CI pipeline, and stay notified of any security vulnerabilities or policy violations found in your open source code.

    Join experts from Synopsys and AWS as we explore how to build applications and containers safely in the cloud without sacrificing agility, visibility, or control. In this hands-on webinar, we’ll demonstrate how to:

    - Get started with Black Duck and AWS
    - Build better solutions through open source intelligence
    - Use open source management automation and integration with AWS
  • Financial Crimes and FINRA’s Increased Focus on High-Risk Brokers
    Financial Crimes and FINRA’s Increased Focus on High-Risk Brokers Sonali Bhavsar, Associate Partner, Watson FSS Industry Platforms & Robert Cruz, Sr Director, Information Governance Practice Recorded: Oct 18 2018 52 mins
    Over the past several years, FINRA has continued to demonstrate their focus on monitoring high-risk brokers. In 2017, FINRA approved new proposals to strengthen controls on high-risk brokers and further indicated it would be an ongoing priority in their 2018 Priorities Letter.

    FINRA and other regulators have announced the expectation of firms to adopt practices of “heightened supervision” in an attempt to isolate high-risk brokers and activities. These activities are often associated with financial crimes, which have become even more difficult to identify and intercept given today’s volume and variety of communications data.

    Watch this webinar featuring Sonali Bhavsar, Associate Partner, Watson FSS Industry Platforms at IBM, to learn:

    - What “heightened supervision” means for today’s communications compliance realities.
    - The challenges and the potential risks hidden inside of today’s non-email communication channels.
    - How Smarsh and IBM can deliver surveillance insights from supervised content.
  • Splunk Next with Jon Rooney - a Big Data Beard podcast
    Splunk Next with Jon Rooney - a Big Data Beard podcast Cory Minton and Rob Hout Recorded: Oct 18 2018 43 mins
    Join Cory and Rob as they discuss Splunk’s newest announcements with podcast alum Jon Rooney, Vice President Product Marketing for Splunk. In this episode we dig in on Splunk Next and its components. This announcement at Splunk .conf included the ability to use augmented reality, business process flows, natural language processing, Phantom, federated search, data stream processing, and quite possibly the most applauded announcement “Dark Mode". We dig in to the potential of each of these topics and their real world applications with Jon.
  • Lenovo ThinkAgile SX for Microsoft Azure Stack – What’s new ?
    Lenovo ThinkAgile SX for Microsoft Azure Stack – What’s new ? Greg Kettmann, Product Manager, Software Defined Infrastructure, Lenovo Recorded: Oct 18 2018 50 mins
    Please join us as we discuss Lenovo ThinkAgile SX for Microsoft Azure Stack product enhancements.  Since it was introduced there have been many enhancements made available by leveraging Intel technologies.  In this session we’ll discuss all product enhancements with a focus on where Intel technologies have been critical and those solutions which are Intel Select certified. 
      
  • How to Become an IAM Policy Ninja
    How to Become an IAM Policy Ninja Raisa Hashem Recorded: Oct 18 2018 56 mins
    As organisations’ cloud environments continue to scale and grow, how do you ensure that access to resources are being managed securely? How do you scope permissions to achieve least-privilege access control across your AWS environment? This webinar answers these questions, delving into the AWS Identity and Access Management (IAM) web service and looking at how it can help you securely control access to AWS resources.
  • The 5 Requirements Every SD-WAN Must Meet to be Application-Aware
    The 5 Requirements Every SD-WAN Must Meet to be Application-Aware Zeus Kerravala, Principal and Fonder of ZK Research; Ricardo Belmar, Senior Director, Product Marketing, InfoVista Recorded: Oct 18 2018 57 mins
    SD-WANs promise to enable enterprise digital transformation from migrating to the cloud, to powering digital customer experiences - but there are challenges ahead!
    - Why do enterprises risk losing up to 3% of their annual revenue to poor application performance and application downtime?
    - How do you ensure your enterprise network has enough application intelligence and awareness to meet these demands?
    Join Zeus Kerravala, principal and founder of ZK Research, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, as they define the five requirements every SD-WAN must meet to be application-aware in this webinar.

    You’ll learn why Ipanema SD-WAN, Application Intelligence for the WAN Edge, is the only solution that meets all of these requirements and how it helped the world’s largest QSR brand protect its digital revenues, while enabling the digital transformation of its restaurants.

    Register
  • The Future of Work: Why the Digital Employee Experience Matters
    The Future of Work: Why the Digital Employee Experience Matters Pat Wadors Chief Talent Officer of ServiceNow, Jason Averbook CEO and co-founder of Leapgen Recorded: Oct 18 2018 63 mins
    Discover why the employee experience is shaping up to be one of the most top-of-mind topics for HR leaders this year. We brought together industry experts Pat Wadors, Chief Talent Officer at ServiceNow, and Jason Averbook, CEO & Co-founder of Leapgen, to discuss why the digital employee experience matters so much and what the future of work looks like for forward-thinking organizations.

    Don’t miss this opportunity to ask industry thought leaders Pat and Jason your burning questions on how to:

    • Design new employee experiences

    • Identify digital moments that matter

    • Serve your employees better across the enterprise
  • Data Virtualization: Key Foundation of a Cloud-First Strategy
    Data Virtualization: Key Foundation of a Cloud-First Strategy Kevin Moos, Eric Greenfeder, Jay Livens Recorded: Oct 17 2018 58 mins
    As more organizations adopt a cloud-first strategy, the task of migrating high-volume transactional workloads presents a unique set of challenges, particularly in handling the large amounts of data involved. Join Primitive Logic and Actifio as we discuss the most pressing challenges around transactional data migrations … and the solutions that can help address them.

    You will learn:
    The unique challenges in migrating transactional data to the cloud
    How to handle data for applications with both on-prem and cloud components
    How to approach transactional data as part of a multi-cloud strategy
    How data virtualization helps resolve issues of security, governance, multi-cloud coordination, and more
  • Data Residency
    Data Residency Claude Baudoin, Chair, OMG Data Residency Working Group Recorded: Oct 17 2018 33 mins
    Data Residency consists of issues and approaches related to the location of data and metadata, and how to minimize the risk of adverse consequences due to the many laws and regulations that constrain where various types of information (financial, private, sovereign, etc.) can be stored. The OMG Data Residency Working Group published two important discussion papers in 2017: a study of Data Residency Challenges and Opportunities for Standardization, and a Data Residency Maturity Model. OMG's intent is to develop standards to describe laws and regulations on one hand, and the sensitive nature of a dataset on the other hand, allowing tools to expose the issues on might face when moving that data from one location to another. Recorded September 27 in Ottawa, Canada.
  • What You Need to Know about the AWS Well-Architected Framework
    What You Need to Know about the AWS Well-Architected Framework Todd Bernhard, CloudCheckr Marketing, Jonathan LaCour, Mission CTO, Mike Boudreau, Mission Director of Cloud Optimization Recorded: Oct 17 2018 57 mins
    Welcome to CloudCheckr Partner Webinars—where comprehensive cloud management meets a managed service provider to help you recognize the full potential of cloud infrastructure as a service.

    CloudCheckr is joining forces with Mission (formerly Reliam) to deliver the key takeaways you need to know about the AWS Well-Architected Framework. Mission is an Amazon Web Services (AWS) trusted consulting and Managed Services Provider (MSP) for public cloud platforms.

    Amazon created the AWS Well-Architected Framework to help IT professionals build a secure, scalable, and highly available cloud infrastructure. They did so with Five Pillars, including: Operational Excellence, Security, Reliability, Performance Efficiency, and Cost Optimization.

    Plus, all live webinar attendees will receive access to a free, 15-minute assessment with a Well-Architected Review expert.

    Understand the concepts that make up the AWS Well-Architected Framework and how to use CloudCheckr, alongside the framework, to achieve operational excellence. Download the attached white paper during the webinar.
  • Eliminate Over-provisioning in AWS
    Eliminate Over-provisioning in AWS Imran Moin, Chief Product Officer and Co-founder Recorded: Oct 17 2018 30 mins
    Over-provisioning in AWS can be a costly cloud computing mistake. Quite simply, DevOps teams are often purchasing too much cloud computing power. Enterprise Architects and IT professionals over-provision infrastructure, buying capacity just in case they need it, but the cloud allows you to spin up infrastructure as you go and as you need it. Another common mistake is that people are a little too slow in buying reserved instances, which is Amazon's way of lowering the hourly cost of infrastructure in exchange for a prepayment.

    Register now to learn:
    • How to downsize or terminate underutilized instances
    • How to right-sizing the nodes with a larger footprint.
    • How to make optimal RI purchases
  • Ask an Agile Expert: Let's Talk Modern Business Management
    Ask an Agile Expert: Let's Talk Modern Business Management Laureen Knudsen, Sr. Director of Advisors, Modern Business Management Recorded: Oct 17 2018 60 mins
    Here's your opportunity to Ask the Agile Expert, Laureen Knudsen.

    Join us for our webinar, "Connect Strategic Planning to Agile Team Execution", on Tuesday, October 9, 10am PT / 1pm ET, and then bring your questions here.

    During this session, Laureen will answer questions that you have on topics such as:

    •How daily visibility into the work can help steer the business
    •How teams can deliver value continuously
    •How to tie value to investments

    If you are a business leader, lacking the data you need to be informed, or a project team, constantly getting interrupted for status updates, you won’t want to miss this discussion.
  • Effective Policies for Managing and Releasing Open Source Software
    Effective Policies for Managing and Releasing Open Source Software Mark Radcliffe, Partner, DLA Piper/General Counsel OSI; Anthony Decicco, Shareholder, GTC Law Group & Affiliates Recorded: Oct 17 2018 60 mins
    Once you get a handle on what open source your organization has in house and you're through remediating any issues that came up during your code scan, then what? How do you ensure you avoid surprises the next time around and fully leverage your investment?

    Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and General Counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss effective policies for managing and releasing open source in your company:

    - What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
    - What are key success factors for effectively releasing code as open source?
    - How does this play out in transaction due diligence and integration following an acquisition?
  • Prognosis for UC Live Demo [October 2018]
    Prognosis for UC Live Demo [October 2018] Stefan Rottbeck, Senior Solutions Engineer Recorded: Oct 17 2018 41 mins
    Join one of our Senior Solutions Engineers for a live demo of Prognosis for UC
  • Tech Demo: Key Features for Web Application Firewalls
    Tech Demo: Key Features for Web Application Firewalls Shelly Hershkovitz, Product Management at Imperva; Jon Burton, Sales Engineering at Imperva Recorded: Oct 17 2018 62 mins
    Join to better understand key requirements needed in a web application firewall to protect applications and critical data in this changing world of application development and security.

    This webinar includes:

    - A detailed explanation of key features
    - Security technologies needed in DevOps and hybrid models
    - A demo showcasing the use of analytics to quickly reference attack campaigns
  • Key findings from the World Quality Report (WQR) 2018-19
    Key findings from the World Quality Report (WQR) 2018-19 Sami Suro, Tieto and Malcolm Isaacs, Micro Focus Recorded: Oct 17 2018 48 mins
    Top Priority: End-User Satisfaction

    Hear what is top of mind for QA and testing for IT leaders just like you. The latest edition of the World Quality Report 2018-19 (WQR) analyzes responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discusses the trends shaping QA and testing today, along with recommendations for addressing tomorrow’s challenges. One of the key findings of the report is that for the first time, end user satisfaction is now a top priority for QA and testing.

    Attend this webinar to learn the latest trends in:
    • Customer-centered innovation
    • Growth of Artificial Intelligence
    • Adoption of Internet of Things
    • Emergence of Blockchain
    • Heightened focus on security
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 17 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Eggplant Performance for JMeter
    Eggplant Performance for JMeter Tom Miseur Recorded: Oct 17 2018 28 mins
    Eggplant Performance for JMeter is a fully functional version of Eggplant’s load testing solution that can be used with JMeter Test Plans. Eggplant Performance adds strong test composition, environment management, dynamic control, and result analytics to JMeter’s existing scripting capability.

    In this webinar, we'll cover how Eggplant Performance for JMeter includes:
    - Flexible Test Composition
    - Cloud-based load injection
    - Real-time test and server monitoring
    - Dynamic test control
    - Advanced results analytics
  • Re-inventing APM for the Digital Era
    Re-inventing APM for the Digital Era Mike Sargent, Riverbed; Steve Mastin, Aetna; and Stephen Elliot, IDC Recorded: Oct 17 2018 30 mins
    Join Riverbed, Aetna and guest speaker IDC for a discussion and demonstration on how we are revolutionizing application performance management (APM) for the digital era with a focus on the end-user experience.

    Traditional APM solutions aren’t designed with the end-user in mind and rely on sampling a limited set of application performance data points. This legacy approach is not adequate for delivering today’s complex digital services. In today’s digital world, a unified application performance and end-user experience monitoring solution is critical to business success.

    Register now to see the power of our user experience-centric solution, hear from Aetna about their APM journey, and take the next step to ensuring end-user experience in the digital era.

    Topics
    User-centric: Ensure end-user experience and troubleshoot issues faster with an end-to-end APM solution.
    All Data: Use big data insights from all transactions to be more proactive and holistic in driving better business decisions.
    Every App: Monitor your entire enterprise application ecosystem without compromising data quality.
  • Next-Generation Finance: A Review of Global Open Banking Platforms
    Next-Generation Finance: A Review of Global Open Banking Platforms From CA Technologies, API Academy: Mehdi Medjaoui Recorded: Oct 17 2018 21 mins
    In a flat digital world: Simplicity sells, Simplicity Scales, Simplicity saves. This session is part of the API Virtual Summit 2018 on Open Banking Platforms.
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Oct 22 2018 2:00 am UTC 75 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Oct 22 2018 6:00 am UTC 60 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • Introduction to React Native and GraphQL for App Development: Part 1
    Introduction to React Native and GraphQL for App Development: Part 1 Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Oct 22 2018 3:00 pm UTC 60 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    Additionally, the GraphQL query language will be presented and used during the workshop as a strategic companion for frontend development and a perfect match for React design.

    By the end of the workshop, attendees will be capable of understanding the technologies involved and proactively progress in their learning journey.

    Who is it for?
    Developers of all levels interested in mobile application development with very little or no knowledge of React Native and GraphQL technologies.

    The workshop is provided in 3 sessions of 1h each.
    - In the first session we will focus on React and React Native principles, code organisations and useful tips and tricks.
    - In the second session an app will be produced using React Native, running on both iOS and Android.
    - In the third and final session we will focus on GraphQL and its integration with the previously built React Native App.

    Main topics:
    - Core principles of React and React Native
    - How to organise a React Native project
    - Core principles of GraphQL
    - How to query GraphQL from React Native

    Technologies involved.
    - React
    - React Native
    - TypeScript and Javascript
    - GraphQL
    - Apollo for GraphQL

    Pre-requisites.
    In order to follow the workshop with your computer a software stack should be installed. Details will be provided.
  • SSL Decryption - the pro’s, the con’s and best practices
    SSL Decryption - the pro’s, the con’s and best practices Fred Streefland, Chief Security Officer Northern and Eastern Europe and Marco Vadrucci, Systems Engineer Oct 23 2018 9:00 am UTC 45 mins
    Join Fred Streefland, Chief Security Officer and Marco Vadrucci, Systems Engineer from Palo Alto Networks for this exclusive Cybersecurity Webinar focusing on ‘The Pros and Cons of SSL Decryption.’

    During the webinar Fred and Marco will discuss how Secure Sockets Layer Decryption (SSL) (and its successor Transport Layer Security (TLS)) is designed to protect the privacy and security of sensitive communications across an internal or external network.

    During this webinar you'll learn:

    •SSL, its benefits and growth
    •Challenges of encryption
    •How Palo Alto Networks can provide visibility and control across encrypted SSL channels

    Register Now and join us on Wednesday October 10th at 10:00am. We’re looking forward to seeing you there.
  • Applying AI to Unstructured Content
    Applying AI to Unstructured Content Anthony Tate, Head of Product Marketing EMEA Box & Mike Schwartz, Senior Product Marketing Manager, Box Oct 23 2018 9:00 am UTC 47 mins
    AI and machine learning technologies are rapidly maturing and becoming more enterprise ready — but 83% of organisations don't yet know how to leverage AI/ML in their business.

    Join us to learn how the new Box Skills makes all your business-critical unstructured content easier to find, organise, manage and protect by automating mundane processes to get to your most impactful work faster.

    During this live webinar you'll learn how you can:
    - Use Box Skills to manage and tap the potential inside unstructured content like videos, photos, audio and more
    - Reap the value from your unstructured content — without recruiting a team of data scientists to build AI/ML from scratch
    - Apply ML to your content to increase employee productivity, improve customer experience, accelerate or automate business processes, and mitigate risks
  • Top 10 Security Recommendations for Public Cloud Migration
    Top 10 Security Recommendations for Public Cloud Migration Dejan Stanic - Consulting Engineer Cloud EMEA at Palo Alto Networks Oct 23 2018 10:00 am UTC 45 mins
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover public Cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public Cloud workloads and data.
  • Splunk CEO Doug Merritt Talks with the Big Data Beard at Splunk conf2018
    Splunk CEO Doug Merritt Talks with the Big Data Beard at Splunk conf2018 Cory Minton and Brett Roberts Oct 23 2018 1:00 pm UTC 17 mins
    Doug Merritt, CEO of Splunk, sat down with the Big Data Beard to talk about the exciting announcements coming from conf2018 as well as how he is leading Splunk's massive growth while retaining their incredible culture and focus on using their powers for good.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Oct 23 2018 1:00 pm UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • A Pattern-Oriented Approach to API-centric Integration
    A Pattern-Oriented Approach to API-centric Integration Keith Babo, Product Management Director - Middleware, Red Hat. Oct 23 2018 3:00 pm UTC 60 mins
    In this webcast, Keith will provide an overview of Agile Integration and it's application to building modern, cloud-native application integration architectures. The Agile Integration reference architecture and implementation patterns will be covered along with practical advice for putting Agile Integration into practice.
  • Build Intelligent Machine Learning Apps Based on SAP Cloud Platform
    Build Intelligent Machine Learning Apps Based on SAP Cloud Platform SAP Oct 23 2018 3:00 pm UTC 60 mins
    Join us October 23 to learn all about building and infusing cloud applications with intelligent, easy-to-use machine learning (ML) services.

    Find out how, as a solution provider or independent software vendor (ISV), you can enhance business processes and software applications with intelligence - unlocking knowledge from structured and unstructured data such as images, text, time series, and tabular data by consuming easy-to-use APIs.

    Our enterprise-grade, cloud-based platform for machine learning enables simple consumption and tight integration with SAP software. Bring your own models or easily deliver customized machine learning models for critical business processes and enable your customers. You can:
    • Optimize business operations using computer-based predictions
    • Create intelligent processes by extracting knowledge from different data types
    • Invent business scenarios through ML such as image-based searches or personalized shopping

    As part of this Webinar, you’ll learn how the SAP PartnerEdge ‘Build’ program enables you to bundle SAP technologies with your IP to deliver cloud-based services for machine learning, enabling customers with the next level of intelligent solutions.

    Featured speakers:
    • Nitol Dutta, Global Partner Manager, Leonardo Machine Learning
    • Scott Harrison, Sr. Director, Global ISV Program, SAP
  • Introduction to React Native and GraphQL for App Development: Part 2
    Introduction to React Native and GraphQL for App Development: Part 2 Nicola Zaghani - Solution Architect | Senior Software Engineer, Phorest Salon Software Oct 23 2018 3:00 pm UTC 60 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    Additionally, the GraphQL query language will be presented and used during the workshop as a strategic companion for frontend development and a perfect match for React design.

    By the end of the workshop, attendees will be capable of understanding the technologies involved and proactively progress in their learning journey.

    Who is it for?
    Developers of all levels interested in mobile application development with very little or no knowledge of React Native and GraphQL technologies.

    The workshop is provided in 3 sessions of 1h each.
    - In the first session we will focus on React and React Native principles, code organisations and useful tips and tricks.
    - In the second session an app will be produced using React Native, running on both iOS and Android.
    - In the third and final session we will focus on GraphQL and its integration with the previously built React Native App.

    Main topics:
    - Core principles of React and React Native
    - How to organise a React Native project
    - Core principles of GraphQL
    - How to query GraphQL from React Native

    Technologies involved.
    - React
    - React Native
    - TypeScript and Javascript
    - GraphQL
    - Apollo for GraphQL

    Pre-requisites.
    In order to follow the workshop with your computer a software stack should be installed. Details will be provided.
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Oct 23 2018 3:00 pm UTC 75 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • From BI to AI: Amplifying Intuition with Machine Intelligence
    From BI to AI: Amplifying Intuition with Machine Intelligence Joe Kaszynski, Qlik; Wayne W. Eckerson, Eckerson Group; Chris Mabardy, Qlik; and Elif Tutuk, Qlik Oct 23 2018 3:00 pm UTC 68 mins
    The next generation of BI technology will rely heavily on machine intelligence – and how that intelligence is used matters. The best solutions will support human-centered analysis, giving users at any skill level the ability to gather, visualize, and analyze data. Join this webinar to hear The Eckerson Group and Qlik explain how augmented intelligence is making analytics even more accessible to users.
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.
  • Protecting Connected Healthcare Applications from the Inside Out
    Protecting Connected Healthcare Applications from the Inside Out Paul Dant, Arxan Senior Security Engineer & Ken Jochims, Arxan Director of Product Marketing Oct 23 2018 5:00 pm UTC 30 mins
    As connected medical devices become more commonplace, so do the threats of cyberattacks targeting applications that connect to these devices. Inadequately protected apps are vulnerable to reverse engineering and tampering, which can threaten patient safety, expose sensitive data, compromise valuable IP, and result in lost revenue, regulatory and governmental penalties. Traditional perimeter, network or device security methods are not sufficient to prevent these types of attacks.

    Join Arxan to learn how to defend your web and mobile apps, improve patient safety, protect IP, and help prevent data breaches.
  • How to apply a templated approach to Release Management?
    How to apply a templated approach to Release Management? Sridhar Prabhakar, Sr. Software Engineering Consultant Oct 23 2018 5:00 pm UTC 60 mins
    In part-4 of the DevOps webinar series, we are discussing the topic ‘Release Management and Continuous Integration’. Release management is almost always the overarching concern in any organization. DevOps plays an important role in enabling a robust release process that is both quicker and mindful of quality. In this episode of the webinar series, we take a deep dive into release management and suggest ways to apply a templated approach to the release management process.

    This 40-min webinar session will cover following key takeaways:
    • Overview of Release Management, Version Management, Backward compatibility, and Branching Strategy
    • Deep dive into Continuous Integration, Continuous Testing, Continuous release processes
    • Deterministic approach to templatize Release Management policies
    • Post Release aspects such as Archival Strategy, Cleanup, Upgrade planning and scheduling, etc.
    • Use cases to demonstrate the template approach
  • Get Ready for re:Invent! Tips to Optimize Your Experience at the #1 AWS Show
    Get Ready for re:Invent! Tips to Optimize Your Experience at the #1 AWS Show CloudCheckr Marketing Team including Jarrett Plante, Deb Schleede, Kristen Mansfield, and Todd Bernhard Oct 23 2018 6:00 pm UTC 45 mins
    CloudCheckr is known for optimizing your cloud infrastructure, including cost and security, but we can also help you optimize your experience at AWS re:Invent!

    Hear from our trade show experts on how to plan your show, to learn and network (and play) and stay comfortable throughout the week-long event!
  • Using Micro-Segmentation to Secure Your Hybrid Multi-Cloud Environment
    Using Micro-Segmentation to Secure Your Hybrid Multi-Cloud Environment Faraz Aladin, Product Marketing Director, at Illumio Oct 23 2018 6:00 pm UTC 45 mins
    With the rise of hybrid multi-cloud architectures, micro-segmentation is fast becoming a foundational layer of the security architecture to help protect against unauthorized lateral movement and access to high-value assets. When implemented correctly, micro-segmentation can offer  the security needed and provide  tremendous application visibility in the process.

    In this webinar, you’ll learn:

    - Why you need micro-segmentation and how it works
    - How customers are using it to solve problems
    - 5 steps to implementing a micro-segmentation strategy for your data center and cloud

    About the presenter:

    Faraz Aladin, Product Marketing Director - As Illumio’s Product Marketing Director, Faraz Aladin is a Technical Product Marketing leader responsible for Product Marketing missions as well as technical evangelism. Having worked with customers across various segments and industry verticals, he is well versed in how customers successfully leverage technology to drive business outcomes. His subject matter expertise spans Networking & Cloud Infrastructure, Data Center Architectures, Security and Collaboration technologies. With over 25 years of industry experience, Faraz spent a major portion of his professional career at Cisco across various business units and roles before joining vArmour as Product Management and Marketing leader. He is a CCIE and holds an engineering degree from Bombay University.
  • Apple Device Management for Beginners
    Apple Device Management for Beginners Nick Thompson, Product Manager, Jamf Oct 23 2018 6:00 pm UTC 60 mins
    While some are already familiar with Apple device management, many of you are diving in for the first time and seeking guidance on ways to properly deploy, manage and secure the growing number of Mac, iPad, iPhone and Apple TV devices joining your environment. If you fall into the “I want help” camp, we are here for you.

    In our webinar, Apple Device Management for Beginners, we’ll teach you the basics and help you build, and ultimately master, your Apple management skills.
    You’ll learn:

    • What Apple services and programs are available
    • The stages of Apple lifecycle management
    • Best practices for infrastructure planning
  • Securing Enterprise-Level Cloud Deployments
    Securing Enterprise-Level Cloud Deployments Kinnaird McQuade, Senior Consultant, Synopsys Software Integrity Group Oct 23 2018 8:00 pm UTC 60 mins
    When you’re operating in a cloud environment, access expands, responsibilities change, control shifts, and the speed of provisioning resources and applications increases—significantly affecting all aspects of IT security. Security must keep up with these demands without compromising on auditability, least privilege, and secure development practices while receiving the benefits of automation. In cloud environments, security must be built in with configuration management and infrastructure as code. This talk aims to piece all of it together while providing practical guidance (and examples) that will help your organization operate safely in this age of cloud computing.

    Topics will include:
    - Building security in with infrastructure as code
    - Pipeline-friendly OS hardening
    - Vulnerability scanning considerations for building cloud applications
    - Migrating to the cloud with rapid deployments in mind
  • Box + Microsoft: Helping You Accelerate Digital Transformation
    Box + Microsoft: Helping You Accelerate Digital Transformation Eric Ren Product Marketing & Business Development, Box & Rakesh Shah Cloud Solution Architect, Azure Oct 24 2018 8:00 am UTC 35 mins
    Did you know our partnership with Microsoft continues to grow? Box now integrates with Microsoft's global-scale Azure cloud platform, bringing your people, information and applications together to transform your workflows.

    Box using Azure is the first product milestone in the expanded partnership between Box and Microsoft. Now customers can benefit from combining our Cloud Content Management platform with Microsoft's global-scale Azure cloud platform to:

    - Simplify cross-company collaborative processes between employees and external stakeholders
    - Securely manage content for the enterprise through integrations with 1,000+ best-of-breed apps, including Office 365
    - Deliver new digital experiences and streamline business processes by bringing Box capabilities to their own custom apps

    In this webinar, we’ll explore all this and more — and you’ll learn what the Box and Microsoft partnership means for you.
  • Take Control of Your Email and Files in the Cloud
    Take Control of Your Email and Files in the Cloud Rob McDonald, VP of Product Management, Virtru Oct 24 2018 11:00 am UTC 45 mins
    Do you trust cloud vendors to protect your information and privacy 100% of the time? Are you taking proper steps to limit your risks around data loss and resulting GDPR penalties and damage to your brand? And as your employees create and share data in undefined cloud environments, how do you overcome shortcomings of legacy and native controls that don’t give you clear visibility over where your data resides and who can access it?

    Enterprises of all sizes have struggled to adapt to this new normal, but fortunately there’s still hope for your data and privacy.

    Join us to learn how a data-centric approach to encryption gives you persistent protection and control over where your data travels, who has access, and for how long, so you can empower your employees and truly embrace the golden age of the cloud.

    About the presenter:

    Rob McDonald is the VP of Product Management for Virtru and has been with the company since late 2013. Prior to Virtru Rob was listed by Beckers Review as 2013 and 2014 Top 100 Healthcare CIOs to Know through his work as a CIO for several Acute Care facilities and denovo Healthcare development teams. Rob has also consulted with corporations to help them assess their current information security position and develop a plan to not only mitigate the discovered technical shortcomings but more critically to raise security awareness amongst their employees. Rob holds BS from the University of Texas at Dallas in computer science and is a perpetual student of technology, information security, and privacy practices.