Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • How to Develop a Container Migration Strategy for your Organization
    How to Develop a Container Migration Strategy for your Organization Eric Sauer, Red Hat Consultant, Architect, PaaS & DevOps Recorded: May 24 2017 49 mins
    In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).

    In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:

    -Evaluate and understand the value and impact of PaaS in your organization
    -Devise a migration vetting process
    -Create a migration plan to optimize business value
    -Use lessons learned from other organizations
  • What Makes a Storage Solution TRULY  Software-Defined?
    What Makes a Storage Solution TRULY Software-Defined? Scott Sinclair, Senior Storage Analyst, ESG's Enterprise Strategy Group & Ashok Rajagopalan, Head of Product at Datera Recorded: May 24 2017 59 mins
    It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.

    Register for a chance to win an Apple Watch 2.

    As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.

    In this session, we will discuss:

    - What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
    - What benefits your organization should expect from SDS technology
    - What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.

    Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
  • Connected Healthcare: How to Prepare for Future Bandwidth Demand
    Connected Healthcare: How to Prepare for Future Bandwidth Demand Susan Larson, Marketing Communications Manager Recorded: May 24 2017 27 mins
    The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:

    - How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
    - Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
    - Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
  • Bigger, better, faster subscription commerce growth
    Bigger, better, faster subscription commerce growth Emma Clark, Senior Product Manager, Recurly Recorded: May 24 2017 60 mins
    Better, stronger, faster subscription commerce growth

    The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.

    That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.

    Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.

    In this webinar, you'll:

    * Identify the most effective subscription plans and promotions
    * Compare your trial program performance against industry benchmarks
    * Use best practices to create a frictionless subscription experience
    * Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    * Emma Clark, Sr Product Manager, Recurly

    Sponsored by Recurly
  • Delivering the value of IoT in the retail industry
    Delivering the value of IoT in the retail industry Paul Edrich, CTO of IMS Evolve & Tom Hurlbut, Strategist Executive at Dell Recorded: May 24 2017 62 mins
    IoT is being embraced by an increasingly diverse set of sectors and one which is reaping the benefits is the retail sector, specifically supermarkets and how they are using data in cold-chain (refrigeration) solutions. For this webinar, join Paul Edrich, CTO of IMS Evolve, who is helping major supermarket chains to manage billions of data points in real time to inform operational processes, reduce energy consumption and increase product quality.

    This webinar will include the following topics:

    - Refrigeration and IoT: problems, new industry trends and benefits
    - What IMS Evolve does to solve the problem
    - The technologies enabling their solution today
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 24 2017 57 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • Journal Entry: Curing Common SAP Financial Pains with Excel
    Journal Entry: Curing Common SAP Financial Pains with Excel Melissa Neil - SAP Product Manager, Simon Parkes - SAP Solution Consultant Recorded: May 24 2017 59 mins
    Are you or your finance users struggling with time constraints in entering manual FI/CO type entries into SAP? Are you limited by your current financial custom uploading tool? Don’t worry, there is a cure.

    Entering financial or journal entries into SAP efficiently is essential to managing all aspects of your business, yet manually keying all those entries (one line at a time) into inflexible SAP T-code entry screens can be time consuming and painful. The IT Department can build your staff a home-grown custom loader for loading journal entry information into SAP; however, these batch loaders tend to be limited and inflexible, don’t handle errors well, and require ongoing IT support and maintenance. It is merely a band aid to a larger issue.

    GLSU is an Excel add-in for uploading financial data into SAP. It streamlines financial data entry and reporting without the dependency on IT making it the ultimate cure. Additional GLSU features include:
    1. Park and Post all from Excel
    2. Sophisticated error handling and business logic
    3. Excel templates created and modified in seconds with no programming or scripting.

    Attend this webinar to learn:
    • What current SAP financial uploading tools are often used today
    • The limitations for SAP users in their current FI/CO entry process
    • How GLSU, a financial spreadsheet uploader for SAP, can help reduce the manual waste and increase efficiency.
  • Generating Insights from IoT Data Using Amazon Machine Learning
    Generating Insights from IoT Data Using Amazon Machine Learning Neeraj Kumar, Solutions Architect, AWS Recorded: May 24 2017 34 mins
    If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

    AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

    Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

    In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

    Learning objectives:

    - Understand why you may use Amazon Machine Learning with IoT and how to set it up.
    - Understand how to use IoT Rules Engine
  • Bizagi  - The Digital Business Platform Demonstration
    Bizagi - The Digital Business Platform Demonstration Laurie Sinnett, Senior Consultant, Bizagi Recorded: May 24 2017 61 mins
    Watch a demonstration of an end to end loan application built with Bizagi. The demonstration will show you how you can deliver a customer experience across multiple channels both from the perspective of the customers and the employees. Also, walk you through the process model for this application, designed in the Bizagi Modeler.

    Bizagi is a digital business platform that wraps around existing legacy systems to transform organizations into agile, engaging and connected digital businesses. The platform comprises of Bizagi Modeler to design the process models, Bizagi Studio to turn process models into running applications and Bizagi Engine to run the applications enterprise-wide.

    Headquartered in the UK with customers across the world, Bizagi is a global leader in digital business platforms. With a global user community of over 650,000 process pioneers, Bizagi has helped over 500 enterprises in 50 countries to survive and thrive in the digital age.

    For more information, please visit www.bizagi.com
  • Application & Middleware Services in a Container Environment
    Application & Middleware Services in a Container Environment James Falkner, Technical Marketing Manager, Red Hat Recorded: May 23 2017 64 mins
    Developers must often build and deploy applications that rely on isolated products. Instead of focusing on development, they find themselves worrying about the deployment and management of underlying services, as well as the configuration of historically error-prone areas like clustering, resource constraint tuning, and software updates.

    Red Hat addresses this challenge by making its middleware portfolio available as containerized services, transforming them from isolated products to integrated application services running in a managed container environment.

    Join this webcast to learn how to quickly and easily build a wide range of application types using Red Hat® JBoss® Middleware as containerized services on Red Hat OpenShift Container Platform.
  • Inside The New Generation of Phishing Attacks
    Inside The New Generation of Phishing Attacks Michael Landewe, Researcher, Avanan Cofounder Recorded: May 23 2017 37 mins
    What we know and have trained users about phishing attacks has changed. Old methods no longer apply.

    IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.

    None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.

    Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.

    In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
  • Credential Theft:  A Perspective From the FBI & Unit 42 Threat Intel Team
    Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks Recorded: May 23 2017 62 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
  • Tech Demo - Flexible hybrid cloud application security
    Tech Demo - Flexible hybrid cloud application security Ajay Uggirala – Director of Product Marketing Recorded: May 23 2017 34 mins
    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.
  • Conversational Technologies- The Catalyst For Customer Service Experience
    Conversational Technologies- The Catalyst For Customer Service Experience Sheryl Kingstone, 451 Research; Jordi Torras, Inbenta; & Phil Jennings, Ticketmaster Recorded: May 23 2017 56 mins
    The shift of customer service from a cost center to an engagement center will spur investments in more intelligent automation and conversational approaches to service and commerce. With 76% of customers preferring digital channels to communicate with businesses, and roughly 40% choosing to chat with a business through SMS, social media or Facebook messenger, conversational technologies have forever changed the customer service experience. Learn first-hand, from industry peers, how smart chatbots are improving how businesses converse with customers, and nurture relationships across the customer journey.

    Join the 451 Group, Ticketmaster and Inbenta for this session to discover how:

    •Digital engagement will shift commerce and service from interactions to conversations [The 451 Group predicts that 80% of all customer interactions will eventually be contained in a self-service channel].

    •Customers want self-service options on their own terms, in their preferred channels, including SMS, web or mobile chat. [The 451 Group data shows 55% of survey respondents prefer self-serve tools to avoid calling a customer service agent]

    •How businesses like Ticketmaster leverage enterprise-class chatbots; key factors to include and what to to avoid when launching a chatbot pilot [55% of companies employ self-service solutions; and 26% say they plan to build a chatbot as part of their self-service strategy]
  • Cloud First: A New Competitive Advantage for Modern Enterprises
    Cloud First: A New Competitive Advantage for Modern Enterprises Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 23 2017 19 mins
    The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.

    During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:

    - Going all-in with the cloud as a major competitive advantage

    - Understanding the differences between on-prem vs. operating in the cloud

    - Choosing the right cloud management tools to gain complete visibility
  • Not All Search is Created Equal: Exploring NLP, Relational Search, and More
    Not All Search is Created Equal: Exploring NLP, Relational Search, and More Joe Abbott, Technical Product Marketing, ThoughtSpot; Shailesh Chauhan, Senior Product Manager, ThoughtSpot Recorded: May 23 2017 60 mins
    Imagine if analyzing your company data was as easy as searching on Google? This vision has launched search into the analytics mainstream and inspired a wide range of approaches to enterprise search. But not all search is created equal.

    Building The World’s First Relational Search Engine required a fundamentally different approach to search - one that ensures both lightning fast performance and 100% accurate results all within an easy to use search-driven interface. Join this webinar to learn more about:

    - Emerging trends across various flavors of enterprise search
    - How machine learning simplifies and guides you to 100% accurate answers
    - Best practices for using search to analyze your data in seconds
    - Live demo of ThoughtSpot’s Search-Driven Analytics solution
  • Oracle Baselines and Benchmarks for the Business
    Oracle Baselines and Benchmarks for the Business Jonas Mason, Senior Consultant & Joe Grant, Principal Architect; House of Brick Technologies Recorded: May 23 2017 43 mins
    Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.

    Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.

    Discover the importance of benchmarks in establishing baselines that:

    1) Facilitate performance troubleshooting
    2) Enable efficient use of existing hardware
    3) Inform the hardware and software requisition narrative

    Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
  • Are you ready for the GDPR? One year out.
    Are you ready for the GDPR? One year out. Christoph Luykx, Director, Government Relations EMEA, CA Recorded: May 23 2017 61 mins
    The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
  • TechTalk: CloudCheckr New Features (April - May)
    TechTalk: CloudCheckr New Features (April - May) Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 19 2017 19 mins
    During this live webinar, learn the latest enhancements to the CloudCheckr Cloud Management Platform. Todd Bernhard, Product Marketing Manager for CloudCheckr, will highlight the newest noteworthy features, and show you how you can stay updated going forward.

    The CloudCheckr service is updated frequently… every week in fact, so it’s a challenge to stay informed on all of the new features. Attend this webinar and learn the important updates including:

    - Leverage price drops and new pricing policies for AWS Reserved Instances
    - Access over 450 Best Practice Checks
    - Save time and effort with “Fix Now” capabilities
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: May 19 2017 48 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
    Inscrivez-vous aujourd’hui pour découvrir :
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
  • Provisioning New Storage Volumes with Datera
    Provisioning New Storage Volumes with Datera Bill Borsari, Director of Systems Engineering at Datera Recorded: May 18 2017 4 mins
    This video shows how to provision storage volumes with a Datera System. The processes uses the Datera UI.
  • Provisioning New Storage Volumes with Datera
    Provisioning New Storage Volumes with Datera Bill Borsari, Director of Systems Engineering at Datera Recorded: May 18 2017 4 mins
    This video shows how to provision storage volumes with a Datera System. The processes uses the Datera UI.
  • Datera Kubernetes Public Cloud Demo
    Datera Kubernetes Public Cloud Demo Ashok Rajagopalan, Head of Product at Datera Recorded: May 18 2017 8 mins
    In this demo, we will show how easy it is to deploy a Datera cluster and a Kuberenetes cluster in the Google Cloud Platform. Datera is deployed in Google Compute Engine and Kubernetes is installed in Google Container Engine. We will install and configure Datera's Kubernetes persistent storage driver, and then using Kubernetes, deploy and manage a CockroachDB cluster (running in Docker containers). The Datera cluster will serve persistent storage to the CockroachDB and seamlessly provision and scale storage as CockroachDB scales.