Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Recorded: May 25 2020 84 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • [Demo] Getting Ready for the "New Normal" with Connected Customer 360 for CPG
    [Demo] Getting Ready for the "New Normal" with Connected Customer 360 for CPG
    Danny Ellis, Reltio | Paul Veilleux, Reltio | Swati Sinha, Reltio Recorded: May 22 2020 25 mins
    We are seeing the impact of the global pandemic on consumer packaged goods(CPG) companies. Changing buying behavior will accelerate the Shift to Digital and Direct to Consumer transformations.

    Watch this 25-minute demo to learn:
    - How to use your customer data to create personalized customer experiences
    - How to manage multi-channel consent management and channel preferences
    - 6 easy steps to empower your teams with Connected Customer 360 profiles
  • It's time to get cirrus about the cloud
    It's time to get cirrus about the cloud
    Graeme McMillan, Sr. Security Solutions Engineer & Justin Buchanan, Senior Manager of VM Offerings Recorded: May 22 2020 49 mins
    Find yourself gazing towards the cloud with roughly the same intrepidation as the Wright brothers did when they looked to the clouds? Although somewhat daunting,the public cloud has sparked an IT migration worth billions.

    Many organizations have turned to the agility of the cloud as a means of accelerating growth and streamlining operations. However, with the somewhat endless list of services and options now available, some companies could certainly find themselves straying from a well architected solution.

    Join Rapid7 as we explore the shift and share how to ensure you're formulating a secure cloud approach.
  • S2:E4 The Value of an Interconnected Ecosystem: Cloud Optimization
    S2:E4 The Value of an Interconnected Ecosystem: Cloud Optimization
    Steve Smith, CoreSite CRO Recorded: May 22 2020 34 mins
    Live stream with CoreSite’s Chief Revenue Officer, Steve Smith every Friday at 9:00AM MST for an interactive discussion on industry trends and hot topics with CoreSite ecosystem partners.

    May 22nd, Season 2 Episode 4
    Organizations face a challenging business climate as they race even faster to better understand how the cloud can help them in their digital transformation journey.

    The rapid change of technology, architectures, security and compliance, along with network, compute and storage/DR requirements has created a big burden on business leaders and IT executives. Gaining an understanding of all of these pieces and assessing price, performance, ROI and TCO models can help companies make the best decision, but how do they get there?

    Groupware Technologies, a valued CoreSite Solution Partner, recently named to The CRN Elite 2020 is based in Silicon Valley and serves high demand brand customers across all verticals, including Facebook, NVIDIA, Salesforce.com, etc. They optimize Cloud spend and architectures for hundreds of customers. We will look at runaway cloud costs, how to control monthly cloud spend, hybrid cloud connectivity, architecture review and assessing for the optimal digital transformation.

    Special Guests:
    Hear from industry experts, John McGivern, Senior Director of Cloud Optimization Services at Groupware Technology and Daryl Harrington, Director of Cloud Solutions at Groupware Technology

    Trending Topics:
    • Cloud Optimization - gaining control of your monthly spend and performance
    • Direct Cloud Scale - Customer network dilemma vs DirectConnect & ExpressRoute
    • Optimal Digital Transformation - The value of an Architecture review and Assessment
  • Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Neal Carter Recorded: May 22 2020 49 mins
    Are your searches not yielding the help that you hoped? Are you spending more time than any one person should, simply writing search criteria? Come spend an hour with us where we will explore ways to alleviate these challenges. You'll walk away with best practices, tips, and tricks to solve many common search problems.
  • Kubernetes on Windows with WSL 2
    Kubernetes on Windows with WSL 2
    Alex Chalkias & Sohini Roy - Ubuntu Product Managers & Nuno Do Carmo - Ferring Pharmaceuticals Recorded: May 22 2020 21 mins
    Learn to unleash the power of Kubernetes on Windows easier and faster than before. Join us for a demonstration from Microsoft MVP and Docker Captain, Nuno Do Carmo as he guides us through how to configure a full Kubernetes on-rails on your Windows machine. This is made possible through two tools, MicroK8s and WSL2.

    During this session, you’ll learn how easy it is to not only access a full Linux terminal on Windows, and with the updates on the newest WSL2 (wide release in May) how you can enable MicroK8s, a lightweight, single-package application that brings a fully-featured, conformant and secure Kubernetes system directly on users machines.

    You’ll learn:

    What is the Windows Subsystem for Linux, and what’s are some of the great features that will be enabled in the newest version, WSL2, released in May by Microsoft
    What is MicroK8s
    How to install a local Kubernetes using MicroK8s with WSL2
    The advantages / what this combo can help you achieve
  • Behind the Scenes of Managed Detection & Response Service
    Behind the Scenes of Managed Detection & Response Service
    Marcus Eaton, Lead Security Solutions Engineer, Jason Prescott, Manager Threat Detection, Douglas Wainer, Threat Analyst Recorded: May 22 2020 48 mins
    You might think of a security operations center like a stereotypical movie war room: a dark room filled with complex maps, fancy monitors, and analysts on headsets. However, most SOCs aren't really a physical presence or room; more accurately, they're a formally organised team that's dedicated to a specific set of security roles and responsibilities for detecting and validating threats within your environment.
    No matter a company's size or purpose, it’s valuable to have a dedicated organisational-level team whose job is to constantly monitor security operations and incidents and respond to any issues that may arise. The various responsibilities within a cybersecurity team can be extremely complex, and a SOC can not only serve as the tactical console to empower team members in performing their day-to-day tasks, but also as a strategic center to keep the team aware of bigger, longer-term security trends.

    In this webcast, our threat detection specialists will reveal;
    · How known and unknown threats are identified in our customer environments
    · The intelligence behind threat hunting
    · How our SOC uses threat intelligence to detect, investigate and respond to incidents
    · What a typical day in the life of a SOC Analyst looks like
  • As best practises para detetar e bloquear ficheiros maliciosos
    As best practises para detetar e bloquear ficheiros maliciosos
    Pedro Castro Recorded: May 22 2020 51 mins
    O número e complexidade dos ataques têm crescido exponencialmente. As organizações gastam milhões de euros todos os anos em soluções de cibersegurança, no entanto as empresas continuam a ter brechas de segurança.

    Neste webinar, os nossos experts vão falar sobre os métodos mais eficientes de detetar e bloquear ficheiros maliciosos, demonstrando as best practises para o fazer, assim como, exemplos de ataques que temos observado no mundo real e que devem ser precavidos. Irá aprender os detalhes por detrás destas ameaças, as suas estratégias para ultrapassar as soluções de segurança existentes e para se moverem lateralmente dentro das organizações. Por último, veremos como é possível simplificar a segurança das organizações com menos tools e menos alertas.

    Junte-se a esta sessão informativa focada na prevenção de ameaças
  • Eveniment de lansare PowerStore in Romania
    Eveniment de lansare PowerStore in Romania
    Valentin Stanescu, Radu Isaia, Cristian Stan, Dell Technologies Recorded: May 22 2020 132 mins
    Vino alaturi de noi pe 22 mai, de la ora 11:00, pentru a participa la evenimentul de lansare a PowerStore in Romania.

    PowerStore este o familie de sisteme de stocare All-Flash cu o arhitectura revolutionara. Folosind cele mai bune practici in dezvoltarea platformelor hardware si software moderne (hardware de ultima generatie, sistem de operare bazat pe container-e), PowerStore este o platforma care va va schimba pentru totdeauna asteptarile cu privire la sistemele de stocare All-Flash.

    PowerStore permite gazduirea si migrarea facila a datelor (block sau file), furnizand o performanta foarte ridicata si posibilitatea de crestere atat pe verticala (Scale-Up, prin adaugarea de module de expansiune), cat si pe orizontala (Scale-Out, prin adaugarea mai multor appliance-uri PowerStore intr-o arhitectura de tip cluster). Foloseste un motor avansat de Inteligenta Artificiala pentru automatizarea proceselor, in vederea simplificarii administrarii, optimizarii resurselor si furnizarii de analize proactive ale starii sistemului si componentelor acestuia

    Fii printre primii care descoperă ultimele inovații în materie de stocare a datelor și protecție si afla toate noutatile care fac din lansarea PowerStore cea mai importanta lansare Dell EMC din ultimii 10 ani!
  • Bringing Governance and Cost Control to your Application Release Pipeline
    Bringing Governance and Cost Control to your Application Release Pipeline
    Pascal Joly, Quali; Mark Galpin, JFrog Recorded: May 21 2020 50 mins
    As your organization goes through the application transformation journey, DevOps engineers are faced with difficult questions around the need to maintain security compliance and infrastructure costs under control while implementing full automation of your release process.

    Join us and learn how JFrog and Quali combine forces to speed up the application release cycle and enforce governance and control. In particular, how Environment as a Service can help with security compliance, with a consistent blueprint throughout the value stream and cost control with built in automation and business-driven policies.
  • Assessing the Benefits and Risks of Today's Collaboration Tools
    Assessing the Benefits and Risks of Today's Collaboration Tools
    ROBERT CRUZ, Sr. Dir of Information Governance, Smarsh; BRIAN HILL, Principal, Wellington Consulting Recorded: May 21 2020 52 mins
    Collaboration tools are helping organizations save time and work together while reaching a broader audience. The potential risks associated with these dynamic channels are what firms need to be prepared for. In this webinar, we will go over the advantages to giving employees the tools they need to communicate and how to use technologies to help mitigate the risk these dynamic communication tools create.

    Watch this webinar to learn more about:
    - How productivity and customer immediacy goals are driving investment in collaboration
    - How firms are managing new functionalities offered by Slack, Microsoft Teams, and Webex Teams
    - What new communications risks are introduced by interactive tools?
  • Enabling Remote Workforce Productivity with AWS
    Enabling Remote Workforce Productivity with AWS
    Michael Bordash, Lead Cloud Architect and Connie Chen, Field Marketing Specialist at Onica, a Rackspace Company Recorded: May 21 2020 44 mins
    We live in a uniquely challenging world today where we find ourselves in an unpredictable situation with Covid-19. As a result of this, a majority of the global workforce has begun to work remotely. If your organization utilizes legacy software and applications to run the bulk of your business activities, and do not have a remote work plan in place, now is an important time to look at what options are available to support your employees to help them maintain productivity, while avoiding further workforce disruption.

    Learn how you can gain the scalability, security, and global reach of AWS’ network by leveraging Amazon WorkSpaces, a fully managed, secure virtual cloud desktop, and Amazon Appstream 2.0, an application streaming service able to easily stream desktop applications to any device running a web browser.

    What we’ll cover:
    - A deep dive comparison on Amazon WorkSpaces & Amazon Appstream 2.0
    - How to enable a remote workforce based on your position on the remote-ready spectrum
    - Enabling your proprietary or legacy applications for remote access
    - How to optimize your cloud resources during times of lower utilization
  • Migrating to the Cloud with Container Storage and VTL
    Migrating to the Cloud with Container Storage and VTL
    Todd Brooks, CEO, & Mark Delsman, VP of Engineering at FalconStor Software Recorded: May 21 2020 37 mins
    Compliance, Regulatory, Legal Discovery, and Privacy mandates have changed the storage landscape. “Do not retain” has become “retain forever,” creating a new challenge for enterprises and scalable storage capabilities. With the average hardware lifespan being five to seven years and software lifespans being three to five years, how do businesses maintain access to critical retention information assets once systems and software are past their end-of-life date while data still has 90+ years of mandated retention life left? This mandated retention tsunami is like nothing the world has seen before and its growth is compounding, as new regulations continue to expand to include new information assets.

    This is where FalconStor’s Virtual Tape Library (VTL) and new Virtual Container Storage (VCS) technologies come in. This session will explain how, by leveraging these technologies, there is a new portable, survivable and robust future-proof format to safely archive information to meet the long-term retention mandates while obviating the hardware and software issues. And, how migrating to the Cloud can deliver unlimited storage and archival capacity at very affordable price points.
  • Automate Windows tasks using Ansible automation with Red Hat Training(v2)
    Automate Windows tasks using Ansible automation with Red Hat Training(v2)
    John Walter, SA, Training & Certification, Red Hat Recorded: May 21 2020 76 mins
    Red Hat® Training has developed a new course, Microsoft Windows Automation with Red Hat Ansible (DO417), designed for Windows Server professionals without previous Ansible experience. In this course, students will use Ansible to write automation playbooks for Windows systems to perform common system administration tasks that can be reproduced at scale. Students will use Red Hat Ansible Tower, a component of Red Hat Ansible Automation Platform to securely manage and run Ansible Playbooks from a central, web-based user interface.
  • Laying the Foundation for Smart Cities
    Laying the Foundation for Smart Cities
    Marlana Bosley - Data Center Market Intelligence Lead, Corning | Ben Green - Network Sales VP, CoreSite Recorded: May 21 2020 49 mins
    Cities across the world are becoming smarter by the day. Connected devices are bringing about technological advancement that impacts our daily life. And there is still a lot of growth on the horizon. Governments are starting to utilize data to work smarter for their citizens. Companies are installing technologies to improve their user experiences.
    Among the organizations supporting these smart city initiatives are CoreSite and Corning. Innovative technologies require efficient infrastructure to run optimally. IoT devices at the edge are some of the most difficult to support, and at times are the most critical. Especially in smart cities.
    Join Corning’s Data Center Market Intelligence Lead, Marlana Bosley, and CoreSite’s Network Sales VP, Ben Green, as they discuss smart cities, networking, IoT and the edge on this live panel.
  • Move From Disruptive to Productive Digital Transformation
    Move From Disruptive to Productive Digital Transformation
    Dave Landa, Kintone CEO Recorded: May 21 2020 28 mins
    The democratizing forces of no-code software development and citizen developers are turning disruptive Digital Transformation into productive Digital Execution. In this webinar by Kintone’s CEO Dave Landa, learn how citizen developers and new mode IT teams together are revolutionizing agile software development, deployment and iteration from the ground up.
  • Enterprise AI to Drive Business Outcomes
    Enterprise AI to Drive Business Outcomes
    Matt Fornito, Principal Consultant, Trace3 and Hoseb Dermanilian, Sr. Solutions Manager, AI, NetApp Recorded: May 21 2020 55 mins
    Join TRACE3 and NetApp on a journey to discuss how Artificial Intelligence is revolutionizing industries. As industries adjust to global changes, companies are looking at AI to help provide optimizations and solve business problems.

    With an increase in the amount of data collected, deep learning and neural networks can make sense of hidden connections and better understand how to drive optimal business outcomes that are revolutionizing organizations.

    By attending this virtual event, you’ll learn:

    •About the current state of AI and it’s exponential expansion into global industries
    •How different business verticals are applying AI to their enterprises to better understand their data, customers, and business drivers
    •How NVIDIA’s GPUs combined with NetApp’s AFF systems are providing accelerated deployment and success toward supercharging your AI/DL environments
  • Deep Dive into Responsible Machine Learning with H2O Driverless AI
    Deep Dive into Responsible Machine Learning with H2O Driverless AI
    Navdeep Gill, Senior Data Scientist and Software Engineer at H2O.ai and Patrick Hall, Advisory Consultant at H2O.ai Recorded: May 21 2020 62 mins
    Utilization of artificial intelligence (AI) and machine learning models have become a common practice in many aspects of the economy. Furthermore, more sections of the economy will start to embrace automation and data-driven decision making over the coming years. While these predictive systems can be quite accurate, they have been treated as inscrutable black boxes in the past, that produce only numeric predictions with no accompanying explanations. Unfortunately, recent studies and recent events have drawn attention to mathematical and sociological flaws in prominent weak AI and ML systems, but practitioners usually don’t have the right tools to pry open machine learning black-boxes and debug them.

    This presentation goes over how one can use Driverless AI to increase transparency, accountability, and trustworthiness in machine learning models. If you are a data scientist or analyst and you want to explain a machine learning model to your customers or managers (or if you have concerns about documentation, validation, or regulatory requirements), then this presentation is for you!

    What you will learn:
    - How to build interpretable models in Driverless AI
    - How to explain models in Driverless AI
    - How to evaluate fairness of models in Driverless AI
    - How to debug models in Driverless AI

    This webinar will be a deep dive into responsible machine learning. Please watch the webinars below to get an introduction to responsible machine learning:
    - Fairness in AI and Machine Learning: https://www.h2o.ai/webinars/?commid=382828
    - Towards Responsible AI: https://www.h2o.ai/webinars/?commid=387075
    - Key Terms and Ideas in Responsible AI: https://www.h2o.ai/webinars/?commid=395829
  • Episode 2: How Virtual Care Changes Population Health Management Post COVID-19
    Episode 2: How Virtual Care Changes Population Health Management Post COVID-19
    Hosted by Marten den Haring, PhD Recorded: May 21 2020 42 mins
    Webinar Series: Re-engaging Patients and Employees Post-COVID 19

    As cognitive and regulatory barriers have been cleared by the impact of COVID-19, usage and satisfaction has increased exponentially for both patient and physician—physicians gain a more holistic understanding of home and circumstances, while patients get to make eye contact with their physician again. This has paralleled a shift in telehealth usage not just for urgent care but for chronic conditions and mental health, highlighting the potential for increased access to care while maintaining empathy.

    Join Lirio COO Marten den Haring as he talks with Ann Mond Johnson, CEO of American Telemedicine Association, about the role of virtual care in this reopening phase and the opportunity to meet people where they are.
  • Avid-Certified Storage Management, Analytics, Visualization, Archiving and DR
    Avid-Certified Storage Management, Analytics, Visualization, Archiving and DR
    Simon Fearn, Product Manager, Marquis Broadcast Recorded: May 21 2020 22 mins
    Project Parking uses advanced low-level analytics to enable significant simplification of Avid shared storage operations. These include analyzing and managing media and workspaces, archive and transfer of projects, restore and merge projects or bins.

    The Project Parking and Wasabi solution enables film production, post and broadcast companies to export projects to the cloud for short and long term archive, for backup or to make way for incoming productions on valuable ISIS or NEXIS storage space. Most importantly, it makes it easy to move complete Avid projects, together with all the bins, sequences and media files to Wasabi cloud storage.
  • Data Protection Solutions: Preventing Ransomware
    Data Protection Solutions: Preventing Ransomware
    Chris Evans, Architecting IT; Michael Cade, Veeam; Guy Bartram VMWare; Neil Stobart, Cloudian Recorded: May 21 2020 73 mins
    Ransomware has been identified by the World Economic Forum as one of the top 5 economic risks, a risk level comparable to global warming. Join this panel session to learn how new technology from Cloudian, Veeam and VMware provides a hardened solution to keep your data safe - whether that be in on-premise data centre or as a Managed Services Provider providing Ransomware Protection as a Service to Enterprise Customers.

    Chair: Chris M Evans, Architecting IT.

    Panelist 1: Neil Stobart, VP Global Systems Engineering - Cloudian
    Panelist 2: Michael Cade, Senior Global Technologist, Veaam Software
    Panelist 3: Guy Bartram, Global Product Marketing, VMware
  • Thread Model of a Remote Worker
    Thread Model of a Remote Worker
    Rick Holland, CISO and VP of Strategy Recorded: May 21 2020 56 mins
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
  • Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Joe Krull, Senior Analyst, Aite Group | Paul Dant, Senior Security Engineer, Arxan Technologies Recorded: May 21 2020 31 mins
    When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised. And relying on legacy methods – like network or perimeter protection that is incapable of detecting these kinds of attacks – can have dire consequences.

    In this webinar, Aite Senior Analyst Joseph Krull and Arxan senior security engineer Paul Dant will discuss how the growing demand by mobile apps for API access is changing the security landscape, and what you can do to protect your organization from a costly breach (hint: it starts with protecting your applications).

    You’ll learn:
    -How easily mobile apps can be reverse engineered - the first step in circumventing traditional security approaches
    -How common app vulnerabilities and development mistakes can lead to data exposure
    -What’s necessary to implement a comprehensive mobile app security strategy
  • Intelligent Data Management: Reduce Storage Costs with Igneous and Wasabi
    Intelligent Data Management: Reduce Storage Costs with Igneous and Wasabi
    Andy Ferris, Product Manager, Igneous Recorded: May 21 2020 23 mins
    Static datacenter footprints, missed SLA’s and the failure of legacy solutions are all challenges facing organizations today. With the growth of unstructured data projected to keep growing exponentially enterprises are increasingly turning to cloud storage for additional data protection capacity.

    Do you have a defined cloud strategy, do you have a view into what challenges you may face or the cost implications around moving to the cloud? What if you could accurately predict your cloud SLAs and operating costs with absolute certainty?

    IT teams looking to reduce costs and simplify their cloud strategy need look no further than the pairing of Igneous, the SaaS data management company for file intensive environments and Wasabi, the hot cloud storage company. Igneous enables the movement of unstructured data from any primary NAS system to Wasabi storage at a predictable and cost-effective price point. Wasabi provides an affordable cloud storage pricing model with no egress fees or API requests, unlike other cloud storage providers.

    This webinar will outline how Igneous’ highly parallelized system architecture and Wasabi’s high-performance, one-size-fits-all object storage services can provide the highest performing and predictable solution for replacing on-premises NAS backup with igneous and Wasabi.
  • EVPN Best Practices and Lessons From Deployment
    EVPN Best Practices and Lessons From Deployment
    Dinesh Dutt, Former Chief Scientist, Cumulus Networks & Pete Lumbis, Director, Technical Marketing, Cumulus Networks Recorded: May 21 2020 58 mins
    EVPN has become a de facto way to build data center networks, but the term refers to a big tent of technologies that continue to grow and change. Join Dinesh Dutt and Pete Lumbis for discussion on how to scale up EVPN networks using multicast replication, as well as the underlay design considerations for deploying multicast. They’ll address EVPN multihoming and how you can finally kill off MLAG without losing host redundancy, and they'll discuss the Linux and FRR work that has been done to support these technologies and how they enable next-generation EVPN deployments.

    Learning Objectives:
    - When and how to deploy EVPN multicast replication
    - Underlay design considerations when using multicast replication
    - How EVPN multihoming simplifies host deployments
    - EVPN open source contributions and the future of open EVPN networks
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 12:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • The 2020 Global Managed Services Report: Transformation reimagined
    The 2020 Global Managed Services Report: Transformation reimagined
    Dan Greengarten, Senior Vice President, Client Success; Alex Bennett, Group Senior Vice President, Go to market: Customer May 26 2020 7:00 am UTC 45 mins
    NTT Ltd.’s 2020 Global Managed Services Report, conducted by IDG Research, covers the challenges and opportunities felt by over 1,250 business and IT leaders across the world. Our research lifts the lid on the importance of smart sourcing for organizations and the service providers they partner with.
    Join our experts as they discuss how organizations are still transforming. Yet, transformation shifts and pivots dependent upon the internal or external forces being applied. And right now, the pivot is towards the end user. That is keeping people secure, engaged and productive is paramount to ensuring business outcomes are still met.
  • När Nätverken Möter Den Nya Morgondagen! 1
    När Nätverken Möter Den Nya Morgondagen! 1
    Robert Klasson Gigamon SE Nordic and Baltic andJohn Svensson Gigamon Sales Director Nordic and Baltic May 26 2020 8:00 am UTC 30 mins
    Gör mer med befintlig utrustning, verktygsoptimering kan spar upp till 50%
    Klarar befintlig utrustning 10G, 40G, 100G, Hur undviker ni att uppgradera säkerhets och analysutrustning i onödan.
    De flesta organisationer har gjort betydande investeringar i nätverket och säkerhetsverktygen som de använder för att hantera och skydda sina nätverk.

    När trafiken skiftar från LAN till WAN är det viktigt att dataflödet till dessa verktyg inte orsakar överbelastning av sökerhetslösningar och andra verktyg, orsakar områden där ni inte har full synlighet eller skapar andra problem beroende på den ökade trafikmängden.
    För att maximera effektiviteten av en organisations verktyg och säkerhetsutrustning är det viktigt att nätverkstrafik från fysisk, virtuell och moln miljöerna är optimerade innan de levereras till dessa lösningar.
    Om inte riskerar man att överbelasta dessa och att få göra manuell handpåläggning i annars automatiserade processer för att undvika problem
    ”Case study”
    Den amerikanska Myndigheten HHS (Health and Human Services) uppgraderade sitt nätverk till 10 GBps, men många av deras säkerhetsverktyg hade 1 Gbps nätverks interface.
    Med Gigamon kunde de behålla de äldre verktygen som kunde kunna arbeta med trafik från det snabbare 10Gb nätverket.
    Enligt ESG-studie tillhandahåller de en en besparing på 40–50 procent för att de kunnat dimensionera sin hårdvara och sina säkerhetsverktyg
  • Vom Status-Quo in die Cloud
    Vom Status-Quo in die Cloud
    Thomas Hauser, Systems Engineer May 26 2020 9:00 am UTC 60 mins
    Mit der Cloud verhält es sich wie mit Mainframe und Open Systems: Alles Bedarf seiner Zeit und die vollständige Umstellung ist nicht mit einem Klick getan. Erfahren Sie in diesem Webinar, wie Pure Storage Ihnen dabei helfen kann, die Brücke zwischen der privaten und der öffentlichen “Wolke” zu schlagen bzw. den Weg in die Cloud zu ebnen.
  • How do you gain cyber assurance?
    How do you gain cyber assurance?
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye May 26 2020 9:00 am UTC 45 mins
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Keep your business running in times of crisis
    Keep your business running in times of crisis
    Eileen O’Mahony - GM WMPromus & James Dening - Chief Evangelist Automation Anywhere May 26 2020 9:00 am UTC 45 mins
    This current crisis requires a fundamental shift in how you live your life and how your organisation operates. Quickly adapting to remote working and relying heavily on online collaboration tools has become the norm. For many of us, navigating through this unprecedented time is extremely stressful.

    What would make a difference?

    Join our webcast series with WMPromus and Automation Anywhere, starting by sharing the RPA insights and how some of our clients used this as the game changer to rely on IT automation tools to deliver business continuity.

    •Invoice Processing – Automatically process invoices without the need for manual matching/reconciliation
    •Application Forms – Process new forms e.g. Job Retention Scheme, SME Grants etc.
    •Co-ordinated Supply Response – Collate information from supply chain to predict usage and order key items
    •JML – Processing on-boarding, background checks, enabling workforce deployment, eliminating overpayments
    •Rostering – Accelerating roster availability, finalising roster reminders, automated billing and reconciliation
    •Automating HR Forms – Process HR, training and declaration forms, upload appraisal data
    •Sickness and absence – Collating daily nCov-19 sitrep information for managers and situations submissions

    Don’t miss out and register now!
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 9:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Eveniment de lansare PowerStore - sesiune speciala pentru parteneri
    Eveniment de lansare PowerStore - sesiune speciala pentru parteneri
    Cosmin Floroiu, Radu Isaia, Daniel Munteanu May 26 2020 12:00 pm UTC 120 mins
    Vino alaturi de noi pe 26 mai, de la ora 15:00, pentru a participa la evenimentul de lansare a PowerStore in Romania, sesiune speciala, dedicata partenerilor Dell Technologies.

    PowerStore este o familie de sisteme de stocare All-Flash cu o arhitectura revolutionara. Folosind cele mai bune practici in dezvoltarea platformelor hardware si software moderne (hardware de ultima generatie, sistem de operare bazat pe container-e), PowerStore este o platforma care va va schimba pentru totdeauna asteptarile cu privire la sistemele de stocare All-Flash.

    PowerStore permite gazduirea si migrarea facila a datelor (block sau file), furnizand o performanta foarte ridicata si posibilitatea de crestere atat pe verticala (Scale-Up, prin adaugarea de module de expansiune), cat si pe orizontala (Scale-Out, prin adaugarea mai multor appliance-uri PowerStore intr-o arhitectura de tip cluster). Foloseste un motor avansat de Inteligenta Artificiala pentru automatizarea proceselor, in vederea simplificarii administrarii, optimizarii resurselor si furnizarii de analize proactive ale starii sistemului si componentelor acestuia

    Fii printre primii care descoperă ultimele inovații în materie de stocare a datelor și protecție si afla toate noutatile care fac din lansarea PowerStore cea mai importanta lansare Dell EMC din ultimii 10 ani!
  • BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    John Bailey, Blue Prism; Arvid Aendenboom, BrightKnight & Fred Versyck, BrightKnight May 26 2020 1:00 pm UTC 60 mins
    SAP is a powerful software suite, used extensively in many corporations of all sizes across the globe. BrightKnight have come across many business processes executed in SAP. Many of them have a tremendous potential for automation with Blue Prism. During this webinar we will focus on two of them.
    Focus will be on how we went about the automation journey and on the benefits realized with these processes. Furthermore, we will also share a quick word on how we tackled this from technical standpoint.

    Both use cases focus on Customer Service in the utilities sector, specifically customer data quality. SAP relies on verified and correct customer data to work as intended; this is where automation comes in. A significant amount of manual work was spent on simple checks to verify how a client contract should be handled. Now all this preparation is done by a Blue Prism robot and the manual work focuses on handling the actual contract.
    In another use case, the aftercare of a mass migration of data is being done. It wasn’t technically feasible to couple incoming clients with existing clients and therefore RPA came into the picture. Due to the implementation of this Blue Prism robot, business could take the correct decisions in handling the rest of the cases.
  • Reflections on Secure Remote Working
    Reflections on Secure Remote Working
    Kamran Khan, Intelligent Workspaces GTM Leader and Rory Duncan, Intelligent Cybersecurity GtM Leader May 26 2020 1:00 pm UTC 60 mins
    A little more than two months on from the implementation of strict lockdown measures in the UK, Ireland and many other countries across the world, join presenters Rory Duncan, Go to Market Lead for Cybersecurity and Kamran Khan, UK&I Go to Market lead for Intelligent Workplace at NTT Ltd. as we reflect on key lessons learned from the rapid shift to home working.

    In this webinar we will share the very latest insights about what we are seeing in the market and discuss best practices around how the technologies and solutions deployed to respond rapidly to COVID-19 can be leveraged to enhance employee experience, improve security posture and ultimately contribute to longer term business recovery.
  • Data Xpresso meets Seth Cochran, Founder & CEO of Operation Fistula
    Data Xpresso meets Seth Cochran, Founder & CEO of Operation Fistula
    Helena Schwenk, Technology Evangelist,; Eva Murray, Technology Evangelist | Exasol May 26 2020 1:30 pm UTC 30 mins
    Special guest Seth Cochran takes us through how he built a nonprofit for maternal health and how his data-driven approach completely flipped the typical nonprofit funding model on its head to lead to more effective and better outcomes for women and girls.
  • The State of Open Source Security Vulnerabilities in 2020
    The State of Open Source Security Vulnerabilities in 2020
    Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager May 26 2020 2:00 pm UTC 56 mins
    WhiteSource’s Annual Report on The State of Open Source Security Vulnerabilities in 2020 found that a record-breaking number of new open source security vulnerabilities in was published in 2019.

    In our research, we focused on open source security’s weakest and strongest points in the hopes of bringing some clarity to the fast-paced and complex space of known open source security vulnerabilities.

    Join Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager at WhiteSource as they discuss:
    •How the open source community is evolving when it comes to security research and what to expect in 2020.
    •Ways software development outfits can implement secure coding from the earliest stages of the DevOps pipeline.
    •Best practices for development, DevOps, and Security teams to make sure they address the most critical issues to their software products’ security.
  • Transforming Banking & Financial Services with Intelligent Automation
    Transforming Banking & Financial Services with Intelligent Automation
    Ken Mertzel, Global Industry Leader - Financial Services at Automation Anywhere May 26 2020 2:00 pm UTC 60 mins
    Financial institutions are facing tremendous pressure to improve business performance and drive cost efficiency while encountering challenges such as increased regulatory scrutiny, high cost of compliance, back-office inefficiencies and outdated legacy systems.

    In the current economic environment, banks are adopting Robotic Process Automation (RPA) to manage increasing volumes of customer requests for loan refinancing and forbearance. Learn how your organization can scale and transform with the latest Intelligent Automation (RPA +AI); not only to reduce cost, but also boost the overall business performance as well as improve employee and customer experience.

    Join our upcoming webinar to hear industry experts share their insights on:

    • Intelligent Automation Trends in Banking and Financial Services
    • Successful Use Cases in KYC/AML Compliance, Loan Forbearance & Call Center Automation
    • Key Success Factors to Implement and Scale RPA

    Who Should Join:
    Loan Fulfillment, Compliance, Call Center Operations, Customer Experience, IT and Finance executives in Banking and Financial Services
  • The Networking Impact of Digital Transformation: A Practical Approach
    The Networking Impact of Digital Transformation: A Practical Approach
    Greg Ferro - Co-founder of Packet Pushers Podcast & Dave Greenfield - Secure Networking Evangelist, Cato Networks May 26 2020 2:00 pm UTC 58 mins
    Digital transformation is the talk of the tabloids and business pundits but what does it mean for network engineers and architects? Find out, as we dive deep into the possibilities and probabilities of changing the business running on a legacy network.

    IT pundit and analyst, Greg Ferro from Packet Pushers podcast, will speak with Dave Greenfield, Cato’s secure networking evangelist, about realities of preparing enterprise networks for the “digital business.” Ferro has a unique perspective on what IT should be considering based on 25-years of IT experience as a network architect, analyst, and podcaster.
  • Modern Data Experience for Financial Services [SPANISH]
    Modern Data Experience for Financial Services [SPANISH]
    Douglas Wallace, Leo Higuera and Ernesto Piñeros May 26 2020 2:00 pm UTC 60 mins
    Pure Storage, líder en almacenamiento Tier1, estará exponiendo como su plataforma de datos Todo-Flash trae una experiencia moderna para los usuarios y clientes del sector financiero. Nuestros especialistas estarán presentando como acelerar aplicaciones de negocios de como SAP y Bases de Datos, implementar una infraestructura con alta seguridad, protección de data y disponibilidad para Contendedores, Virtualización de Escritorios e Servidores.
  • Webinar - Hyperautomation oltre l'RPA
    Webinar - Hyperautomation oltre l'RPA
    Ezio Viola The Innovation Group, Constanino Croce Appian, Fabrizio Custro Amadori, Alexia Zeri Prysmian Group May 26 2020 2:00 pm UTC 67 mins
    ho il piacere di invitarla al Webinar “Hyperautomation – oltre l’RPA” organizzato da Appian, in collaborazione con The Innovation Group, sul tema dell’automazione dei processi aziendali.
    In particolare di parlerà di automazione end-to-end dei processi e di come le applicazioni di Robotic Process Automation (RPA) oggi si stiano espandendo verso contesti di automazione più ampi.

    Nella sessione interverrano, oltre ad un esperto di automazione di Appian, un analista di mercato di The Innovation Group ed alcune aziende italiane che hanno già fatto esperienza ini questo percorso di automazione più ampio. Verranno trattati:

    Esempi applicativi per vari ambiti dell’impresa
    Automazione dei processi nell’area amministrativa
    Benefici raggiungibili con i sistemi RPA e limiti dei robot software
    Come unificare e orchestrare la collaborazione tra umani, bot e algoritmi IA
    Il valore di una piattaforma che unisce RPA, BPM e sviluppo Low Code
  • The Ins and Outs of Fuzzing
    The Ins and Outs of Fuzzing
    Kimm Yeo, Product Marketing Manager and Rikke Kuipers, Product Manager May 26 2020 3:00 pm UTC 60 mins
    “Another day, another data breach” is not just a cliché; it’s a reality. But all data breaches are not equal. To avoid becoming the next victim, you must create software that’s more secure, higher quality, and compliant with standards.

    This webinar will introduce you to the concept of fuzzing, as well as Synopsys’ best-of-breed fuzzing solution, Defensics. Fuzzing is well established as an excellent technique for locating vulnerabilities in software. Register for this webinar to learn:

    •What fuzzing is, how it works, and when and why you should use it
    •How various fuzzing approaches differ and the pros and cons of each
    •How Defensics uses generational / specification-based fuzzing to test over 250 protocols effectively and efficiently
  • Hear about the ServiceNow Agile transformation journey
    Hear about the ServiceNow Agile transformation journey
    Debbra McGrath, Rani Pangam, Nick Tudisco May 26 2020 4:00 pm UTC 54 mins
    Like any enterprise, ServiceNow has a growing portfolio of IT projects and needed a way to improve quality of services and accelerate delivery cycles — ultimately creating value for business stakeholders. Our IT organization’s journey to adopt Agile transformed IT project management to enable smarter use of time, expertise, and resources.

    In this webinar, hear our IT practitioners discuss how our IT organization adopted Agile and SAFe® practices and solutions to transform IT project management and make smarter use of time, expertise, and resources. We’ll discuss our Agile journey, including the challenges we faced, the lessons we learned, and our future plans.

    Attend this webinar to….

    -Get insight into how our PMO and Agile delivery teams are accelerating time-to-market while increasing quality, employee satisfaction, and velocity by implementing an Agile methodology.
    -See how Agile and SAFe allowed us to improve planning accuracy, forecast work levels with more precision, and easily manage stories across sprints, backlogs, and epics.
    -Learn how Agile solutions provide a platform to pull software development lifecycle workflows together in one system and connect them to other activities already taking place in our enterprise.
  • Integrating Cloud Storage Into Post-Production and Content Creation Workflows
    Integrating Cloud Storage Into Post-Production and Content Creation Workflows
    Jim McKenna, Facilis Technology, Workflow Storage & Management May 26 2020 4:00 pm UTC 30 mins
    High-performance shared storage networks are the backbone of production and post-production facilities. The ability to share media assets effectively across multiple edit suites and artists can make all the difference when it comes to making a delivery date or meeting budget.

    Facilis is a leading international supplier of premium shared storage solutions for collaborative media production across all content creation workflows. The company, which utilizes an optimized shared file system for editorial performance, is now incorporating Wasabi hot cloud storage into its HUB Shared Storage system to offload expensive tier 1 storage to lower cost cloud storage when assets are no longer needed in the immediate editorial process. Wasabi also delivers an external content repository that can be accessed from anywhere and enable artists to continue work remotely when necessary.

    This webinar will show how Facilis HUB users can leverage Wasabi hot cloud storage to better manage overall storage costs, protect against local disasters with an off-site replicated store of data, and provide external access to media files for remote workers.
  • Adding Message Queues to Kubernetes Deployments
    Adding Message Queues to Kubernetes Deployments
    Zohar Kaufman, VP R&D Portshift May 26 2020 4:30 pm UTC 60 mins
    How to Remain Efficient and Secure

    Asynchronous messaging brokers like RabbitMQ and Kafka are commonly used for microservices applications. Although KubeMQ is the CNCF option for message broker and message queue, most enterprises still use Kafka and RabbitMQ in their Kubernetes deployments to create a messaging scheme that decouples message production by a producer from its processing by a consumer.

    But message brokers and queues imply a new security challenge for DevSecOps teams, as it eliminates the option to create any level of segmentation between microservices that use the message queues, classical Kubernetes network policies are useless when all services can communicate with the broker.

    In this webinar we’ll explore microservices deployments in Kubernetes using message brokers like Kafka, examine their deployments options. We’ll also examine the security angle of messaging queues and brokers and show how to create effective security governance for these deployments.

    Key Discussion Points:
    1.Messaging queues/brokers deployment options in Kubernetes clusters
    2.Explore the security challenges of native Kubernetes network policies
    3.Explore different options to implement efficient network security policies that addresses messages queues/brokers
  • Supply Chain Resiliency: Countermeasures & Resource Mobilization
    Supply Chain Resiliency: Countermeasures & Resource Mobilization
    Frank Konieczny, CTO, U.S. Air Force & Mark Palmer, SVP Analytics, TIBCO Software. May 26 2020 5:00 pm UTC 52 mins
    Watch TIBCO’s Virtual Supply Chain Round Table on to gain access to exclusive thought leadership concerning the current state and future of supply chain.

    Gain industry perspective from guest speakers including; Frank Konieczny, CTO, U.S. Air Force and Mark Palmer, SVP Analytics, TIBCO Software.

    Explore how you can:
    Eliminate data silos with an integrated solution
    Ensure accuracy & one version of the truth
    Analyze and gather insights from designated data sources to create timely & reliable plans/forecasts
    Understand the impacts of potential outcomes in order to adapt to market conditions
  • CDW StudioCloud: From Render Origin Story to Powering Remote Artists
    CDW StudioCloud: From Render Origin Story to Powering Remote Artists
    Joe D’Amato, Senior M&E Solution Architect, CDW; Kris Kostiuk, Global Director, Business Development – M&E, CDW May 26 2020 5:00 pm UTC 45 mins
    Render more business value.

    Designed specifically for the media & entertainment industry, StudioCloud takes the burden of technology off your hands to let you focus on creating great work. With over 100,000 render cores and seven data centers across North America, we offer a completely secure, fully managed and infinitely scalable solution for studios of any size. Plus we are TPN/MPAA-audited for production security peace of mind.

    Flexible rental terms allow StudioCloud users to quickly scale up the render, storage, and artist workstation capacity they need and stay within the term length allocated to their projects. Leverage a hybrid of rental, rent-to-own, reserved capacity and straight ownership paired with StudioCloud co-location to bring all of your software and technology infrastructure together under one managed solution without altering your production pipeline.

    Select the location you want to render, connect to our animation/VFX render purpose built data centres via dark fibre and light up render capacity with the look, feel and security of being on your premises. If access to talent and tax credits means you need to shift locations, just scale up capacity and remote artists at a new StudioCloud site. If your nodes are idle, you can sub-lease them via our StudioCloud Exchange.

    Leverage StudioCloud for greater performance and flexibility while rendering more business value for your studio.
  • Tanzu Service Mesh 0-60 in 60 minutes
    Tanzu Service Mesh 0-60 in 60 minutes
    Niran Even-Chen, Field Principal SE; Oren Penso, Lead Solution Engineer, Kubernetes May 26 2020 5:00 pm UTC 60 mins
    Tanzu Service Mesh, is it a network solution or an application platform? Maybe it’s a security solution? Actually, It's all of the above.
    In this session, we will explore the possibilities with this platform VMware is building. And as it goes with us, we will have demos!
  • Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco
    Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco
    Pawan Shankar, Director, Secure Product Marketing, Sysdig & Vicente Garcia, Technical Marketing Engineer, Sysdig May 26 2020 5:00 pm UTC 70 mins
    Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. Examples include:

    - Exploits of unpatched and new vulnerabilities
    - Insecure configurations
    - Leaked or weak credentials
    - Insider threats

    Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail. In order to keep up with threats at runtime, an open-source based approach can help you stay up to date.In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what. We will also cover how Sysdig Secure extends the Falco detection engine and eases the burden of creating and updating Falco rules. It can also generate fewer false positives by tuning Falco-based policies for your own environment.
  • Using Strategic Modeling and Connected Planning to Navigate Market Uncertainty
    Using Strategic Modeling and Connected Planning to Navigate Market Uncertainty
    Wayne Heather, Director EPM Product Marketing, Oracle | Scott Leshinski, Managing Director, Huron May 26 2020 5:00 pm UTC 60 mins
    The pandemic crisis has leaders in every industry preparing and making critical business decisions. Many organizations are taking swift actions to protect their employee base and assessing the impact on customers and vendors – all while quantifying how this uncertainty affects their balance sheet, cash flow and liquidity.

    When market disruptions arise, there are actions that organizations can take today to position their business for success no matter what news tomorrow brings. Organizations must prepare to confidently respond to three critical questions:
    • Can your organization rapidly model “what-if” scenarios across remote teams?
    • Based on the range of scenarios, can you quantify the impact on your liquidity, capital structure needs and cash burn?
    • Have you prepared contingency plans to address any financial, operational and cash flow issues for all potential scenarios?

    The key to addressing these questions is having a strategic modeling and connected planning solution that provides real-time analysis and the ability to statistically analyze an unlimited number of “what-if” scenarios for contingency planning.

    Many organizations have de-emphasized the strategic modeling process following a period of favorable economic conditions. While the “rising tide” of a 10-year bull market elevated all businesses, the rapid shift in the market trajectory has revealed the importance of proactive contingency planning and connected planning. Join Oracle, Huron and their customer panel to learn why now is the time to invest in the solutions and resources that help prepare your organization for what tomorrow may bring.

    Customer Panel:
    Lululemon: Patrick D’Addabbo, Director, Strategic Finance
    Lululemon: Sohail Ali, Financial Systems Manager
    H&R Block: Kate Ditta, Assistant Treasurer
    Macerich Co.: Allan Gee, Assistant VP Analytical Applications
    ConEd: Patrick Beacham, Manager, Corporate Financial Planning & Analysis