Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • The Open Innovation Labs Experience: Redefining DevOps Culture
    The Open Innovation Labs Experience: Redefining DevOps Culture Justin Holmes, App Dev Architect, Red Hat; Øystein Bedin, PaaS Infrastructure Architect, Open Innovation Labs, Red Hat Recorded: Jul 20 2017 45 mins
    DevOps is foundational to the world’s highest-performing information technology organizations. But more than anything else, DevOps is about culture, and culture can be elusive. To help our customers experience how a DevOps culture can accelerate their innovative ideas, Red Hat launched it's Open Innovation Labs. In this session, Justin Holmes and Øystein Bedin from Open Innovation Labs will share their story building a DevOps culture for the Labs' core team.

    In this session, you'll learn about:

    - Behaviors and processes to enable collaboration between development and operations.
    - How tools like Ansible by Red Hat and Red Hat OpenShift can help facilitate communication between team members.
    - How Open Innovation Labs provide an environment for Red Hat customers to experience the unique advantages of a DevOps culture.
  • How ChatOps & Enterprise IT Application Maps Will Finally Kill Your War Room
    How ChatOps & Enterprise IT Application Maps Will Finally Kill Your War Room Petamber Pahuja (Director of Business Engineering) & Mike Lenze (Chief Automation Engineer) Recorded: Jul 20 2017 40 mins
    The quest to eliminate unwanted downtime feels like a permanent battle. We are all trying to reduce failures, diagnose issues faster, and deploy the right engineer(s) to fix the problem. This is top of mind for everyone in IT. 

    In this webinar, the team from pureIntegration share first-hand insights around IT enhancement projects that were recently deployed at our Fortune 500 clients, including:

    • ITSM strategies, processes, and tools that can integrate with your existing service management architectures.
    • The requirements to build application maps that will visually represent underlying application failure through correlated event data. 
    • A live demonstration of:
    - A visual application map (service model)
    - Graphical reporting dashboard
    - Underlying configuration management database
    - Ability to diagnose and restart services with Chatbots
     
    Register Now!
  • The Economics of Serverless Computing
    The Economics of Serverless Computing Owen Rogers Recorded: Jul 20 2017 32 mins
    Serverless is more than just hype; it has the potential to revolutionize the way we develop, build and operate applications in the cloud. Understanding the economics of serverless technology is vital to understanding its role in the world and its longer-term potential to disrupt the industry. In this webinar, we review these economics, pit the TCO of serverless against traditional virtual machines and containers, and compare pricing across the big four providers, namely AWS, Google, IBM and Microsoft.
  • Shedding a Light on the Unique Requirements of PoE Lighting
    Shedding a Light on the Unique Requirements of PoE Lighting Brian Simmons, Copper Product Manager Recorded: Jul 20 2017 29 mins
    PoE lighting is increasing in popularity due to is cost-effectiveness, energy efficiency and control capabilities, but what is the best way to deploy this technology and what is the best cabling to use? This webinar will explore the details of PoE and PoE Lighting and how Berk-Tek can help you Topics to be discussed include:

    - A high-level overview of PoE
    - How PoE lighting can benefit your organization
    - Details about a new Berk-Tek solution to help you efficiently install and run PoE Lighting
  • Build user-friendly cloud apps more productively with SAP Cloud Platform
    Build user-friendly cloud apps more productively with SAP Cloud Platform Christian Baader, Platform Partner Ecosystem, SAP Global Channels and Platform GTM / Keith Fischer, SAP Design - Build Recorded: Jul 20 2017 62 mins
    Dear Sir/Madam,

    In today’s world of digitization there is an increasing dependence on sophisticated business software to rapidly evolve and deliver an intuitive user experience – not just to keep training and support cost low but – most importantly – to keep employee motivation up.   

    If you are interested in driving down application development costs and time by up to 50% while vastly improving user adoption and relevancy, join us for this exciting webinar opportunity July 20 2017!

    Find out how, as an SAP partner in the Build engagement model, you can rapidly prototype, build, and monetize functionally rich applications for the integrated business processes of SAP’s 350,000 customers - based on SAP Cloud Platform.

    SAP Cloud Platform is a platform-as-a-service (PaaS) that enables you to:

    • Rapidly build and deploy business applications in the cloud for faster time to value.
     
    • Securely integrate with your SAP and third-party (non-SAP) cloud and on-premise systems for greater agility and productivity.
     
    • Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction.
     
    • Leverage our digital channels and flexible license options to market your packaged solution to 350,000 SAP customers.

    Join us on this webcast and learn about the partner experience and how you can benefit from the features of SAP Cloud Platform and the Build engagement within the SAP PartnerEdge program.
     
    Webcast Details:
    Date: Thursday, July 20, 2017
    Time: 10 a.m.to 11 a.m. EST (60 minutes)

    To find out more about the SAP PartnerEdge program and SAP Cloud Platform, visit our Application Development Partner Center. 
  • Getting Started with Windows on AWS
    Getting Started with Windows on AWS Julien Lepine, Principal Solutions Architect, Amazon Web Services Recorded: Jul 20 2017 46 mins
    In our first Windows webinar, find out about the benefits of migrating your Windows workloads to AWS. During the session, we will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to architect, deploy, and manage your Windows platforms on AWS.
  • Getting Started with Microsoft SQL Server on AWS
    Getting Started with Microsoft SQL Server on AWS Julien Lepine, Principal Solutions Architect, Amazon Web Services Recorded: Jul 20 2017 45 mins
    In this webinar, we will explain how running SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery.
  • [Demo] CloudShell Cloud Sandboxing Overview
    [Demo] CloudShell Cloud Sandboxing Overview Hans Ashlock, Director of Technical Marketing, Quali Recorded: Jul 19 2017 4 mins
    Quali’s Cloud Sandbox Software allows you to create and publish sandboxes that are replicas of infrastructure and application configurations and use them for development, testing, demos, training and support. Model, orchestrate, and deploy on-prem, cloud, and hybrid environments and accelerate DevOps Automation.
  • An Integrated ITAM Strategy is key to successful Digital Transformation
    An Integrated ITAM Strategy is key to successful Digital Transformation Chris Gough, Chief Digital Officer, Derive Logic and Michel Avenel, Sr. Principal Product Manager, CA Technologies Recorded: Jul 19 2017 55 mins
    The demands of managing Digital Transformation across the organization involves the alignment of IT suppliers, services and asset inventories, which requires an integrated approach to IT asset and service management. Understanding and aligning the long term value of existing IT services and assets is key to maximizing the commercial benefits of Digital Transformation, ensuring new investments are strategic and add long term business value. This session will explore why building an integrated approach is essential to the success of Digital Transformation, discussing how organizations should architect an ITAM governance, technology and process strategy aligned with ITSM for digital success.
  • Are You Ready for What’s Next in Hyper Converged Infrastructure?
    Are You Ready for What’s Next in Hyper Converged Infrastructure? Gabe Chapman: Sr. Manager, NetApp HCI GTM and Cindy Goodell: Sr. Product Marketing Manager, NetApp HCI Recorded: Jul 19 2017 39 mins
    Initial versions of HCI solutions were designed to reduce the complexity of deploying storage and compute resources. To achieve simplicity, vendors had to make trade-offs that created performance, flexibility and consolidation limitations that affected how and where HCI could be utilized in your enterprise datacenter. NetApp HCI is the first enterprise-scale hyper converged infrastructure to be designed specifically to solve for these first-generation challenges.

    Join us for this webinar to learn how NetApp HCI enables you to confidently deploy a hyper converged infrastructure in the core of you most demanding datacenters by:
    •Delivering unique Quality of Service limits that allow the granular control of every application.
    •Scaling compute and storage resources independently so you only buy what you use.
    •Integrates into the NetApp Data Fabric for enhanced data portability, visibility and protection.
  • Intelligente Endpunktsicherheit: mehr als nur Vorbeugung
    Intelligente Endpunktsicherheit: mehr als nur Vorbeugung Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye Recorded: Jul 19 2017 32 mins
    Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
    Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
    Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
    Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?

    Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.

    Die Themen:
    - Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
    - Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
    - Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
    - Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
    •Mehrere Engines für die Bedrohungserkennung und -abwehr
    •Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
    •Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
  • How to Manage Spreadsheet Risk from Within your SAP Environment
    How to Manage Spreadsheet Risk from Within your SAP Environment Richard Sampson - Managing Director Europe, Simon Parkes - SAP Solution Engineer Recorded: Jul 19 2017 51 mins
    Are you frustrated at the mainly standard, readily structured reports available in SAP? Are you still using Excel to do a lot of the ‘heavy lifting’ reporting? 
     
    Regardless of IT policy, Excel is still the go-to-tool for most users to transform their data into something meaningful. Yet, static spreadsheets inherently create issues around version control, complex cross referencing, master data references and calculation errors, all of which is an Audit Risk. The responsibility for this tends to fall between the Business and IT and can become a necessary evil.

    Attend this webinar to hear how you can overcome these issues using an Excel add-in from Excel4apps.

    What you'll learn: 
    •Achieve a genuine Single Version of the Truth - discover how you can access live SAP data in real-time from an Excel front-end - your data remains in SAP but you view it from Excel.
    •Reduce Financial Reporting and Consolidation Time by 70% - learn how Excel4apps helps you accomplish this goal by solving many SAP Process Challenges.
    •See the Management Reporting capabilities of the award-winning GL Wand in action - be inspired to transform your period-end process.

    If you’d like to find out more about how you can manage spreadsheet risk while still using Excel for reporting, then don’t miss this webinar.
  • Register Now! 3 Reasons Why Flash is Changing Back-Up and Recovery
    Register Now! 3 Reasons Why Flash is Changing Back-Up and Recovery Jack Hogan, CTO and General Manager, Lifescript Brian Reagan, CMO, Actifio, Vaughn Stewart, VP of Technology, Pure Storage Recorded: Jul 18 2017 1 min
    Attend this webinar to find out why and how Lifescript, one of the world's largest women's health care websites serving 10 million customers and a half billion emails monthly have transformed their data centers with AppFlash from Actifio and Pure Storage.

    Register here: https://www.brighttalk.com/webcast/14517/269419
  • What's new in JFrog Products!
    What's new in JFrog Products! Mansimran Singh & Shlomi Kriheli Recorded: Jul 18 2017 55 mins
    Spend an hour with JFrog to learn about the new and cool features that just released in the latest releases of our products. Learn about how you can leverage these features to accelerate your delivery pipeline. We will talk about new features in Artifactory that were released after version 5.1 such as: JFrog Access, Event-based pull replication, SHA256 support, Azure blob storage support, SAML SSO and other security improvements and some UI improvements.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Recorded: Jul 18 2017 15 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Container-Driven Continuous Delivery: Maximizing your Application Pipeline
    Container-Driven Continuous Delivery: Maximizing your Application Pipeline Red Hat Recorded: Jul 18 2017 38 mins
    In order for businesses to stay agile, developers must be able to deploy applications quickly, efficiently, and in a streamlined manner. Creating automated continuous integration and delivery (CI/CD) pipelines is a widely accepted process to accelerate the release process, and is critical to success in adopting OpenShift.

    But, what should a minimal viable pipeline have? What does a good pipeline look like? What are the right tools for building a pipeline? In this interactive session, we’ll look to answer these questions so you’ll walk away with an understanding of how to create container-driven continuous delivery that works for your organization.
  • Why Hybrid IT is a Big Opportunity for Managed Security Service Providers
    Why Hybrid IT is a Big Opportunity for Managed Security Service Providers Aaron Sherrill, Senior Analyst & Dan Thompson, Senior Analyst Recorded: Jul 18 2017 57 mins
    The enterprise is shifting away from on–premise-only IT to a Hybrid IT model that delivers services using internal resources and/or external resources and services, often from multiple providers. While this model of IT can result in cost savings, performance optimization and greater agility, it also significantly increases the complexities of cybersecurity for the enterprise. Enterprises already struggling with cybersecurity will need help to address these concerns – concerns that many enterprises are not aware of or are unable to tackle. The Hybrid IT model does, however, present unique challenges for Managed Security Service Providers (MSSPs), as these providers will be asked to secure environments that span multiple platforms, and in some cases disparate business units. MSSPs are poised to benefit from this shift if they can deliver services to address and mitigate these threats.
  • The Role of APIs to enable Healthcare interoperability
    The Role of APIs to enable Healthcare interoperability Craig Klein & David Codelli, Red Hat Recorded: Jul 18 2017 60 mins
    Massive changes in healthcare delivery, regulation, and payment make connectivity and integration more important than ever. Collaboration can be among patients and doctors, among hospital staff, and among hospitals and other healthcare organizations—including insurance companies. APIs are a great tool in facilitating this collaboration.

    Join this webinar to learn about Red Hat® integration technologies that provide healthcare business value beyond integration and API engines to support value-based and patient-centered care, healthcare Internet of Things (IoT), and other emerging healthcare goals.

    You'll learn:
    • How integrated, open source offerings can provide seamless, intelligent, and transformative interoperability.
    • How APIs can facilitate collaboration.
    • How APIs support digital services in healthcare.
    • The highlights of Red Hat JBoss® Fuse, Red Hat 3scale API Management Platform, and related technologies.
    • How this unique approach helps meet the pressing interoperability requirements in healthcare with flexible deployment options.
    • How Red Hat customers are using this technology now.
  • Explore Sapho in 3 minutes!
    Explore Sapho in 3 minutes! Sapho Recorded: Jul 17 2017 3 mins
    Watch this quick demo of how easy it is to build micro applications and deliver them to your employees on any device, messenger, or intranet.
  • How AI turns customers into big-spending brand loyalists
    How AI turns customers into big-spending brand loyalists Dr. Anand Rao, Global AI Lead for PwC Data & Analytics Recorded: Jul 14 2017 61 mins
    Customer loyalty is won with both marketing messaging and customer service that anticipates needs, answers questions, and solves issues on the fly. And a well-integrated, data-soaked AI platform can deliver that perfectly timed, exquisitely personalized customer service with the right message, right time, right place support and communication that leads to big jumps in engagement rates. Not to mention enduring loyalty.

    But while integrating AI technology into your marketing automation systems can help build profitable long-term relationships, there are security issues to tackle, privacy issues to consider, and data integration to execute flawlessly.

    Want to do it right? Join our free VB Live event to learn how master marketers join marketing insight with AI intelligence execution to significantly boost customer loyalty.

    In this webinar, you’ll:
    * Learn how deep learning can help your customers get a "human" through chat
    * Cut through the hype around chat bots and learn what really matters
    * Understand privacy issues around AI and how it may impact your org's security
    * Integrate a successful marketing campaign using chatbot interactions

    Speakers:
    * Dr. Anand Rao, Global AI Lead for PwC Data & Analytics
    * Scott Horn, CMO, 24[7]
    * Stewart Rogers, Director of marketing technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • Introduction to Metavine Genesis™ Platform
    Introduction to Metavine Genesis™ Platform Metavine Recorded: Jul 14 2017 3 mins
    Learn more about how Metavine brings digital agility to businesses with its innovative platform that rapidly and securely delivers enterprise applications to the cloud. Visit us at www.metavine.com for more information..
  • Applying 12 Factor rules to your Microservices
    Applying 12 Factor rules to your Microservices Vikas Grover, Solutions Architect & Veer Muchandi, Principal Architect Recorded: Jul 14 2017 64 mins
    Are you on your journey to move to the Cloud? Are you taking the necessary steps to make your applications cloud-ready? Do you have a methodology to provide guidance for cloud application development? Do you have right tools and technologies to support your methodology?
    Red Hat invites you to a web session on applying the 12 factor apps principles to your application development.

    12 Factor Apps is a methodology that outlines best practices guiding application developers on how to build cloud native applications.

    In this session, we will highlight the 12 factors and how each rule is applied with container technologies. During the discussion you'll learn:

    - What are the 12 Factors?
    - How to implement 12 Factors in your app without getting overwhelmed
    - How to be cloud agnostic without even writing a line of code
    - How to go beyond the 12 factors

    Who Should attend this event?
    Architects and Developers building microservices/ Application as a Service (AaaS).
    Ops engineers who deploy or manage such applications.
  • Boston Globe Case Study: Move Faster with Flash-Based IT
    Boston Globe Case Study: Move Faster with Flash-Based IT Joel McKelvey, Infrastructure Solutions, Pure Storage, Wade Sendall, Vice President of IT, The Boston Globe Recorded: Jul 13 2017 31 mins
    View this on-demand webinar where the VP of IT from The Boston Globe discusses how his organization approaches IT, the challenges of delivering IT services without interruption, and how The Globe modernized its IT architecture. The discussion also includes details on the systems, including all-flash storage, that helped The Globe handle the many different variations of OS, databases, and platforms inherent to its complex infrastructure. You'll also hear real-world ways The Globe handled challenges so you may apply them to your IT and your business.
  • Implementing Splunk at Enterprise Scale
    Implementing Splunk at Enterprise Scale Somu Rajarathinam, Solutions Architect, Pure Storage, Avi Nayak, Data Analytics, DevOps and Cloud Solutions at Pure Storage Recorded: Jul 13 2017 32 mins
    Splunk is not an IT experiment anymore – it’s a mission critical application. Thousands of organizations are gaining insight from their machine data and
    transaction logs using Splunk. One of the greatest risks to any enterprise-
    level deployment of Splunk is inadequate, under-sized, or non-performant
    hardware. Organizations frequently try to repurpose existing – and often
    aging – hardware for Splunk deployments. In most cases the hardware
    only meets Splunk’s minimum specifications for IOPS and compute sizing.
    The result can be an under-performant or non-performant Splunk solution,
    leading to poor performance and unmet expectations.This session will detail how you can get get the most out of your Splunk environment using modern All Flash infrastructure, ensuring you maximize performance and efficiency.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Jul 21 2017 6:00 pm UTC 30 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 24 2017 5:00 pm UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Jul 24 2017 6:00 pm UTC 60 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • Seize the opportunity as GST launches in India
    Seize the opportunity as GST launches in India Hari Madhavan, Director of ERP Practice, Promantia Global Consulting Jul 25 2017 9:30 am UTC 60 mins
    On July 1, India ushered in the most significant tax reform in its 70-year history by rolling out the Goods and Service Tax (GST). The new fiscal measures will fundamentally change the way Indian businesses and, in particular, retailers work by impacting many functional areas, including pricing, supply chain management, IT, tax, and accounting. We at Openbravo are delighted to now announce that our software is now fully compliant with the GST requirements, and so we are ideally positioned to help retailers embrace the opportunities.
  • Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform
    Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform Dave Rudzinsky, SVP & CIO; Jim McDaniel, VP, Strategic Accounts; Matt Serna, Manager, Industry Marketing Manager Jul 25 2017 3:00 pm UTC 60 mins
    Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?

    Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.

    Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.

    Attendees will learn:

    - How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
    - The strategic role that delivery partners can play in supporting cloud migration initiative
    - How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Jul 25 2017 3:00 pm UTC 60 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
     
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Jul 25 2017 3:00 pm UTC 60 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • The 3 Essentials of Digital Transformation & How to Deliver Them
    The 3 Essentials of Digital Transformation & How to Deliver Them Rob Koplowitz, VP and Principal Analyst at Forrester Research and Steve Tassell, Bizagi Jul 25 2017 4:00 pm UTC 45 mins
    Is your digital transformation moving in the right direction? We know that there are three essential business imperatives that organizations need to act on: delivering better customer experiences, improving operational efficiency, and managing regulatory compliance.

    Wherever you are in your journey, process automation is recognized as a foundation for meeting these digital transformation goals. So join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research, as we explore the role of ‘Digital Process Automation’ in digital transformation and discuss real-life stories of how it has helped companies to:

    •Deliver digitally-led omni-channel customer experiences
    •Improve operational excellence, efficiency and agility
    •Manage data, privacy and processes to meet regulatory compliance
    •Innovate at the speed of changing customer expectations in your industry

    Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.

    About Rob Koplowitz

    Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing. Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy
  • What Even the Best Firms Miss About Customer Service
    What Even the Best Firms Miss About Customer Service Ellen Daley, Vikas Nehru, Nitin Badjatia Jul 25 2017 5:00 pm UTC 75 mins
    Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.

    While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.

    Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Jul 25 2017 5:00 pm UTC 60 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift
    From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift Zohaib Khan, Practice Lead, App Modernization & Migration, Red Hat; Malik Sayed, Sr. Manager, Digital Architecture, Verizon Jul 25 2017 6:00 pm UTC 45 mins
    Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.

    In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
  • Introduction to Being an Incident Commander
    Introduction to Being an Incident Commander Eric Sigler - Head of DevOps @ PagerDuty Jul 25 2017 10:00 pm UTC 60 mins
    During a major customer-impacting incident, every minute counts. The team must work together seamlessly and quickly to a successful resolution — and that’s done best with an Incident Commander driving coordination.

    An Incident Commander is tasked with being the decision maker, delegating tasks and listening to input from subject matter experts in order to bring the incident to resolution. This is a critical role and there are essential best practices you must follow to get it right.

    Join us to learn:
    •What is an Incident Commander?
    •The role and responsibilities of an Incident Commander
    •Incident call procedures and terminology
    •Incident commander skills for success
  • Practical Guide to Cloud Management Platforms
    Practical Guide to Cloud Management Platforms Cloud Standards Customer Council Jul 26 2017 3:00 pm UTC 60 mins
    Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.

    This webinar will cover:

    •A review of CMP capabilities
    •How to operate and manage applications and data across hybrid cloud infrastructures
    •Available CMPs on the market today
    •Evaluation criteria for selecting a CMP to meet your needs
    •Deployment considerations
  • Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps
    Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps Fouad ElNaggar, CEO and Co-Founder of Sapho Jul 26 2017 4:00 pm UTC 60 mins
    Enterprise systems are failing today’s employees because they are hard to use, they trap data in silos, they have a poor user experience, and they offer limited mobile support. Therefore, it is no surprise that a Forrester Research study showed that 76% of employees believe it takes too long to complete tasks in their systems and another 62% delay completing tasks that require multiple systems. In short, this means your business has delays.

    On the flip side, consumer applications keep getting better and better – these apps are simple, enable quick task completion, are accessible from anywhere, and offer a great user experience. Why can’t enterprise systems be as easy to use as consumer apps? It turns out, they can be. Modern portals are the next generation digital workplace tools that push data and key actions to employees from their systems so they can more effectively do their jobs.

    Join this webinar to learn how easy it is to:

    •Remove system bottlenecks, reduce helpdesk calls, decrease software spending, enable smart decision-making, and streamline workflows with consumer-like business apps.
    •Build smart, event-driven micro apps that sit on top of your existing systems and push actionable insights and tasks to employees on any device, intranet, or messenger.
    •Triple the productivity of your workforce with a modern portal that surfaces personalized and relevant tasks and information from all your systems.
  • Today’s Modern Business Management
    Today’s Modern Business Management James Chan and Laureen Knudsen Jul 26 2017 4:00 pm UTC 60 mins
    Being an adaptive enterprise means having the ability to rapidly respond to changing conditions. As the market changes, you adapt. As customer feedback comes in, you adapt. As your competitors shift their focus, you adapt. 
     
    Join James Chan and Laureen Knudsen, of CA Technologies, on Wednesday, July 26, 9am PT / 12pm ET, as they dig deeper into how Modern Business Management is essential to a thriving, adaptive enterprise. During this webinar, you’ll learn:
     
    •How enterprise-wide business visibility provides real-time, continuous project data 
    •How to align funding for the projects agile teams are working on 
    •How financial and performance metrics connect financial models and audits to delivery practices 
     
    The adaptive enterprise is leveraging real-time visibility that allows it to proactively embrace changes and transform negatives into opportunities that move the business forward. It is prepared to respond to nearly every possibility with speed and agility and to take advantage of every circumstance. Are you ready?
  • Building a commercial robot with open source
    Building a commercial robot with open source Kyle Fazzari - Roboticist at Canonical Jul 26 2017 4:00 pm UTC 60 mins
    Developing a new device is hard. So is taking that device to production. However, we see numerous examples of companies devoting all of their time to development, and none to answering the important questions that are raised as one approaches production, such as:

    * What is my factory process?
    * How is the base OS updated so as to remain secure?
    * How is my own software updated?
    * How is the device recovered if an update goes wrong?

    In this webinar we'll discuss:

    * The challenges of commercialising robots
    * Using ROS in your production code
    * Build security in from the get go with snaps and Ubuntu Core
    * Continuously deliver new features and updates without the cold sweat
  • Harness the power of crowdsourced mobile data and GPU-powered analytics
    Harness the power of crowdsourced mobile data and GPU-powered analytics Tom Luke, VP Sales, Marketing and Partnerships, and Mike Gardner, CSM at MapD Jul 26 2017 5:00 pm UTC 60 mins
    Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.

    Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.

    Attend this webinar to learn how telecoms and other mobile companies can:

    Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.

    Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.

    Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.

    Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.

    MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Jul 26 2017 5:00 pm UTC 60 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Jul 26 2017 5:00 pm UTC 45 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Jul 27 2017 5:00 pm UTC 30 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • How to Scale Agile SAFely at the Portfolio Level
    How to Scale Agile SAFely at the Portfolio Level Dean Leffingwell, Scaled Agile, Inc & Tamara Nation, CA Technologies Jul 27 2017 5:00 pm UTC 60 mins
    Scaled Agile, Inc recently released SAFe® 4.5, with feedback from users and the community. In the words of Dean Leffingwell, Director and Chief Methodologist at Scaled Agile, Inc.: “we believe you’ll find 4.5 to be leaner, more Agile, and better at fostering faster innovation and learning than any of its predecessors”.

    Join Mr. Leffingwell and Tamara Nation, Agile Transformation Consultant at CA Technologies, on Thursday, July 27, 10am PT / 1pm ET, as they discuss:

    •What’s new with SAFe 4.5
    •How CA Agile Central supports SAFe 4.5 at the portfolio level
    •How successful companies combine SAFe implementation and CA Agile Central

    We encourage you to join us for the first of a three-part series on how CA Agile Central Products and Services supports scaling agile SAFely.



    SAFe is a registered mark of Scaled Agile, Inc. Reproduced with permission © 2011-2017 Scaled Agile, Inc. All rights reserved.
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture
    From Legacy to Microservices: Lessons Learned on the Road to Modern Architecture Matthias Krohnen, Manager IT, Miles & More GmbH, Torben Jaegar, Solution Architect, Red Hat; Pagop, Sales Specialist, Red Hat Jul 27 2017 6:00 pm UTC 45 mins
    With over 29 million participants, Miles & More is the largest frequent flyer program in Europe. Expanding this travel rewards program into other markets required a fundamental change to the company's IT infrastructure, as the previous legacy environment was hard to maintain and not scalable. Miles & More chose to move to a microservices-based architecture built on Red Hat OpenShift. With this new environment, the company can support innovation and deploy new microservices into production within 5 days with zero downtime. Learn more about how Miles & More modernized their application development environment and process.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • Software Quality at Speed in Agile and DevOps Environments
    Software Quality at Speed in Agile and DevOps Environments Nancy Gohring, Senior Analyst, 451 Research. Dharminder Dewan, Agile QA Manager, Infostretch Aug 1 2017 5:00 pm UTC 60 mins
    The meteoric rise of software is putting pressure on development teams to iterate faster. It’s no surprise that this trend has resulted in the adoption of new tools and more agile practices, such as DevOps, the impact of which has been to push testing left. Development and DevOps teams are now building in testing earlier in the development cycle, helping to speed delivery of new releases for maximum competitive advantage.

    This new methodology also is shaking up the relationship between testing teams and development teams. In some cases, developers might take on some QA functions, while the QA teams serve as consultants. A free web seminar on August 1st will explore these topics in-depth with expert advice from Nancy Gohring, 451 Research Senior Analyst for Application and Infrastructure Performance, and Dharminder Dewan, Agile QA Manager for Infostretch.

    Join this web seminar to learn how to:

    •Overcome common quality challenges that are faced by most developers
    •Apply “Shift Left” DevOps best practices to achieve the highest quality and fastest time to market
    •Improve group dynamics across DevOps teams to optimize the development life cycle for continuous delivery of quality software at speed.