Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
Dave Bartoletti, Vice President and Principal Analyst, Forrester ResearchRecorded: Apr 24 201947 mins
Accelerate your innovation journey using containers.
Firms have become more comfortable with containers in the last 3 years and container usage is expected to continue to grow. With growth comes more sophisticated requirements. Containers support configuration management and continuous integration/continuous delivery (CI/CD) processes by offering improved flexibility, performance, and security. Open source software has been key in unlocking container and container platform innovation. Firms have learned to use and contribute to open source to reap the rewards of communities.
In this webinar, Forrester research analyst Dave Bartoletti will share new insights from a March 2018 study into how organizations are using containers, container platforms, and open source to quicken adoption of more enterprise apps. He'll cover:
How container usage has improved in recent years.
What the future of containers and container platforms looks like.
Navigating the performance and security challenges of containers and container platforms.
How containers can improve customer experience and lower costs.
How open source can accelerate innovation in your organization.
Brian McHenry and Graham AldersonRecorded: Apr 24 201935 mins
Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.
Join us for this webinar to learn:
- How bots infect, propagate, and attack applications
- What types of application attacks are commonly performed by bots
- How you can defend against bad bots without disrupting the good ones
Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.
Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.
Register for the webinar to discover:
• What successful fintech startups have in common
• The differences between being a solopreneur vs. being a co-founder
• Tips for finding and growing your dream team
• How to go from killer idea to disruptive startup
• Evan Schuman, Moderator, VB
• Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
• Pierre Wolff, SVP Business Development, InCountry
• Ken Kruszka, CEO, SnapCheck
• Kathleen Utecht, Managing Partner, Core Innovation Capital
Sanjay Agrawal, Co-Founder & VP of Engineering & Sean Zinsmeister, Head of Product Marketing, ThoughtSpotRecorded: Apr 24 201962 mins
For years, analytics vendors have helped enterprises understand what’s happening in their business, yet often failed at answering the more valuable question of why it’s happening.
Everyone expects to have data to understand what’s happening it their business. When it comes to understanding why that’s happening, it’s a completely different story. People don’t even know what questions to ask to begin answering that question, slowing down decisions and stifling business growth.
With AI-driven analytics, that’s all about to change. SpotIQ, the AI engine from ThoughtSpot, asks thousands of questions and automatically shares relevant, customized insights buried in your data. Business users can get to the heart of why changes are happening to make decisions with confidence.
Rani Osnat, Aqua Security and Mark Bouchard, CyberEdgeRecorded: Apr 24 201953 mins
A joint presentation by Aqua Security and CyberEdge
Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.
Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.
We will discuss :
•Key findings from the 2019 Cyberthreat Defense Report
•The unique security challenges (and benefits) of containers
•What leading enterprises are doing to automate their container security
•What you should look for in a container security solution
Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product MarketingRecorded: Apr 24 201944 mins
Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.
In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:
Key enhancements from the latest Cloud, Current and Long Term Service releases
- How to make your journey to the cloud seamless
- Administrative flexibility and security enhancements
- Industry-first user experience innovations around graphics, video and more
- Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire SystemsRecorded: Apr 24 201930 mins
Aspire Systems Original Series - Banking in the Age of Siri
Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.
Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!
Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:
1.Identify and predict current and future customer segments
2.Construct collaborative models for insightful AI processes
3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation
Tune in on April 24th, 2019 at 10:00 am CST to uncover all the tricks of the trade! Register Now!
Join us at our next Connect With Control-M technical webinar on “Managing Application Accounts with the Automation API”.
This webinar will be part of a new series on Control-M Automation API with a focus on:
•Working with Run As Accounts
•Managing Connection Profiles
Our next Connect with Control-M live webinar will be on Wednesday, April 24th, where Felipe Casali will explain and demonstrate the above. We’ll conclude with a live Q&A session.
David Stewart - Co-Founder, CriticalBlue and Stephen Gorton -Technical Architect, Racing PostRecorded: Apr 24 201946 mins
If you are deploying APIs, even private ones, you are leaving your revenue stream open to exploitation. APIs are a window into your business and if there is a way to make a gain from abusing that API, someone will do it. Worse, thousands of people or thousands of bots may do it.
The art of keeping scripts and bots from abusing your APIs requires you to validate that the incoming traffic is coming from an authentic client. Merely authenticating users may not be appropriate or may not be enough. When the remote client is a mobile app and you know that mobile devices should not be trusted, achieving the authentication goal is easier said than done.
This session will explain how Racing Post launched a feature-rich API and a new native mobile app and managed to protect their valuable data from API scrapers and their brand reputation from cloned apps. We will cover their experiences with bots, their approach to the problem and how they solved it.
Whether you are a mobile or API developer, an enterprise system architect, or even a product owner with strong mobile revenue, you'll want to hear this story.
Nearly all organizations know the opportunities and benefits of effective knowledge management, yet many still struggle to achieve long-term ROI. Knowledge management initiatives can be difficult, and your organization may be facing numerous challenges when it comes to people, processes, technology, and the overall culture in your organization. To help you, EasyVista teamed up with ITSM industry leader and analyst, Stephen Mann, in a 45-minute webinar to show you how to effectively create the best possible knowledge management environment for self-service success.
Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.
KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analystRecorded: Apr 24 201947 mins
What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.
A study conducted by global research and advisory firm Aite Group examined the protective capabilities of 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.
In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
-Common app vulnerabilities and the sensitive information they can reveal
-Top development mistakes that lead to data exposure
-Strategies for implementing app protection into the software development lifecycle
Larry Carvalho, Research Director, PaaS, IDC. Tyler Britten, Technical Marketing Manager, OpenShift, Red Hat.Recorded: Apr 23 201940 mins
As businesses in all types of industries are being disrupted by startups, organizations are being challenged to digitally transform themselves. Technology is playing a central role in this transformation, and the demand for applications is increasing to meet transformation goals. Application platforms, which are undergoing a transformation of their own, are playing a central role in accelerating application development.
Join this webinar to learn about:
-The evolution of application platforms.
-How containers are becoming the destination of choice for workloads.
-How companies are transforming a broad set of existing and new applications.
-Evolving a culture of greater agility.
Larry Carvalho, research director, PaaS, IDC
Larry Carvalho is research director of IDC's worldwide Platform-as-a-Service (PaaS) research practice. He focuses on the Cloud Applications Platform (CAP)-as-a-Service aspect of PaaS and directs research into the component competitive markets of PaaS, including business process management (BPM) PaaS, database PaaS, cloud testing, and integration PaaS. Larry has extensive experience in systems integration and the enterprise software business.
Tyler Britten, technical marketing manager, OpenShift, Red Hat
Tyler Britten is a technical marketing manager for Red Hat® OpenShift® and has spent the last 15 years working with container, cloud, virtualization, and infrastructure technologies. Prior to joining Red Hat, he was a technical advocate for Blue Box, an IBM Company, and principal technical marketing manager and vSpecialist at EMC. Tyler has also been a technical consultant for a small infrastructure reseller, a network engineer for a Fortune 1000 company, and a freelance IT consultant for small businesses.
Stephen Makowski-ServiceNow Consultant,Kiruthiga Shanmuga-ServiceNow Lead Developer,Kaviarasan Selvaraj-ServiceNow EvangelistRecorded: Apr 23 201953 mins
ServiceNow has released its Automated Test Framework (ATF) feature in last year’s Istanbul release. Ever since, it’s widely used by ServiceNow customers to create and run automated tests on their ServiceNow instance. In this webinar session, we will conduct an expert analysis on ATF, and find out how organizations are leveraging ATF to achieve ROI from their investment. We will also demo few use cases on ATF to help users navigate through this feature and learn the advantages of using it.
Key topics in the session include:
• Automated Testing Framework Overview
• Why use ATF?
• ATF for ServiceNow and Upgrades
• Achieve ROI through ATF and Automation
• ATF Use case Demo,
- Creating and running manual tests (timed)
- How to create and run same tests using ATF version and view the results
- Overview of Test Suites and scheduled testing/reports
- Display of Custom Scripts and Configuration
• Advantages and Disadvantages
Pavan Kaushik and Lei YangRecorded: Apr 23 201952 mins
Microsoft Azure provides the option of a fully-managed Kubernetes orchestration service - Azure Kubernetes Service (AKS) in addition to user-managed Kubernetes running on Azure instances. Avi integrates natively and deeply into both of these deployments in Azure to help autoscale your applications to meet growing demands.
Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlueRecorded: Apr 23 201955 mins
Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.
As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.
This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
Laurie Voss, Chief Data OfficerRecorded: Apr 23 201923 mins
Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan LockwoodRecorded: Apr 23 201961 mins
Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...
- Learn tips to maximize your experience
- Uncover the questions our clients ask us the most
- Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
- Get a preview of two of Acorio's Presentations at K19
Asitha Nanayakkara Associate Technical Lead & Nirothipan Megalingham Software Engineer, WSO2Recorded: Apr 23 201956 mins
The heterogeneous nature of today’s systems makes integration a vital part of the software development cycle. While moving away from monolithic architecture provides many advantages, it’s also important to drive focus towards some common characteristics that need to be considered when integrating between heterogeneous systems and services. One of the primary concerns would be the types of tools offered for developers to integrate between systems and services and how these tools help to manage, debug and troubleshoot various integration use cases.
This webinar will cover the following topics:
* An introduction to tooling capabilities offered by WSO2 Enterprise Integrator
* How these tools could be used to develop artifacts
* Debugging using the visual debugger
* How to manage the lifecycle of artifacts across multiple environments
* How to do continuous integration and delivery (CICD) with enterprise service bus (ESB) artifacts
* Administration - ESB analytics in a nutshell
Chuck Petrie & Peter HaagensonRecorded: Apr 23 201937 mins
Learn how you can increase productivity up to 67% by extending the capabilities of your custom dashboards in vRealize Operations with Blue Medora's True Visibility Suite. Reclaim control and visibility in your whole stack by unlocking your dimensional data.
Jade McQueen, Senior Managing Director, Media & EntertainmentRecorded: Apr 23 201922 mins
Travaillez, stockez et collaborez en toute sécurité sur vos différents actifs multimédias
Des images de campagne marketing aux fichiers vidéo, les ressources numériques sont au cœur des flux de travail de toutes les entreprises. En l'absence d'un système centralisé de gestion des actifs numériques, il devient difficile de rechercher le bon actif lorsque vous en avez besoin. La gestion de contenu peut rapidement devenir un défi lorsque les ressources sont modifiées et sauvegardées dans différents systèmes. En outre, un manque de mesures de sécurité adaptées crée des risques de perte de documents confidentiels ou non publiés. Box fournit un guichet unique pour tous vos actifs numériques, quel que soit leur format et vous permet de collaborer en temps réel avec des commentaires et un marquage automatisé des métadonnées afin que tout le monde puisse facilement trouver la dernière version. De plus, Box vous permet d'automatiser intelligemment les workflows jusqu'à l'approbation, en évitant les erreurs dues à des tâches manuelles. De la création à la publication, vous pouvez gérer tous vos actifs numériques de manière sécurisée et efficace.
Panel Discussion including David Habusha (VP Product at WhiteSource)Recorded: Apr 21 201954 mins
Forrester recently released its “Forrester Wave Software Composition Analysis SCA for Q2 2019,” highlighting the leaders in this fast-growing category.
According to their report, nowadays, one in eight open source component downloads contained a known security vulnerability and security pros now have less time to identify and remediate them. In order to keep up, a Software Composition Analysis (SCA) solution is necessary.
Watch this panel webinar as three of the companies highlighted in the Wave report discuss why SCA is so important and how it can help you keep your open source components secure.
Sean Kennedy, Senior Director, Industry Solutions and Architecture, Salesforce, Matt Serna, Industry Marketing, MuleSoftRecorded: Apr 19 201945 mins
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, the entire healthcare continuum must think beyond just driving interoperability across clinical data stores and consider how to extend interoperability across all partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Learn how NYU Langone Health implemented a new integrated approach to provide their call service agents with a one-stop comprehensive patient view, leveraging MuleSoft’s Anypoint Platform to surface real-time data from EHRs and other internal systems into Salesforce Health Cloud.
In this webinar, you will learn:
- How healthcare organizations can drive integration to transform their IT delivery model.
- How modern APIs can enable connectivity across clinical and non-clinical systems.
- How Salesforce and MuleSoft are tackling EHR interoperability challenges.
Patrick McFadin, VP of Developer Relations, DataStaxRecorded: Apr 18 201961 mins
Picking the right data model is the most critical step to ensuring you get the most out of your Apache Cassandra implementation. For years, Patrick McFadin, DataStax’s own VP of Developer Relations, has been a go-to resource for enterprises wanting to learn how to do this right. In this expert session, Patrick will walk you through how to apply schema design based on your use case and the associated query patterns—but that’s not all. He’ll also share his five-step framework for implementing an awesome Cassandra data model.
Gerry Miller, Founder and CEO, Cloudticity and Todd Bernhard, Product Marketing Manager, CloudCheckrRecorded: Apr 18 201956 mins
Achieving cloud compliance in a given industry requires a thorough, risk-based approach. And it's possible with the right strategy. It is important to be aware—and cautious—of the way data protection laws vary between states, countries, and government bodies.
In healthcare, HITRUST and HIPAA cloud compliance is highly desirable as most payers will only work with HITRUST certified vendors today. Analysts predict the majority of providers will follow suit within two years. Earning certifications like HIPAA Compliance on Amazon Web Service (AWS) can give your organization a competitive edge.
Learn how to earn AWS compliance certifications easily with the security strategies and best practices covered in this webinar. CloudCheckr Product Marketing Manager Todd Bernhard, and Cloudticity Founder and CEO Gerry Miller, discuss ways to leverage technology, automation, and cloud economics to achieve compliance while reducing costs and ongoing maintenance requirements.
Using Dynamics 365 with Power BI? Frustrated by slow query response times? Struggling to report against transactional data?
If so, don’t miss our next webinar: “Turbo Charge your Power BI Dashboards with Atlas”.
During this webinar, our solutions specialist will show you how Atlas for Dynamics:
•Provides live, record level reporting against D365 data with access to 45+ additional transactional data entities – opening up a whole new world for Power BI
•Massively speeds up D365 query response time with incremental caching – see how queries that took hours now refresh in seconds … delivering snappy Power BI visualizations that keep your business users happy
•Combine multiple data sources to create Power BI dashboards that span D365 and on-premise legacy data
•Improve your financial and operational reporting with real-time reporting in Excel with drill-down into journals, balances and sub-ledgers
… and more!
Vincent Lieffroy, Senior Lead EngineerApr 25 201912:30 pmUTC60 mins
Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:
- Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
- Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
- Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
- Des cycles de développement d'applications accélérés avec Box Elements
Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, MicrosoftApr 25 20193:00 pmUTC60 mins
Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
Jim Davis, Fluke NetworksApr 25 20193:00 pmUTC75 mins
This webinar address field testing and troubleshooting PON Networks per IEC 61280-4. Topics include inspection and cleaning (APC vs. UPC), PON Basics, understanding loss budgets, setting a reference, troubleshooting using an OTDR and Power Meter, and how to document results. Attendees will earn one BICSI CEC.
Fern Halper, VP and Senior Director, TDWI Advanced Analytics; David Menninger, SVP and Research Director, Ventana ResearchApr 25 20193:00 pmUTC75 mins
When you’re using data to drive competitive edge, you want to get analytics into the hands of as many teams as possible. That’s what embedded analytics does so well: It brings the results of an analysis to your decision-makers and to the applications, workflows, and portals that run your business.
In fact, a 2019 TDWI study reports that two thirds of respondents cited embedding analytics as a top strategy. And Ventana Research finds that 72% of research participants say it’s important to embed analytics in other applications or systems.
Join industry experts David Menninger from Ventana Research and Fern Halper from TDWI as they discuss:
- Why embedded analytics are such a proven strategy for analytics success
- Whether your organisation should build or buy
- New business models for leveraging embedded analytics
Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEAApr 25 20193:00 pmUTC60 mins
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Moderator: Daniel Blander, Virtual Clarity
Joseph Feiman, Chief Strategy Officer, WhiteHat Security
Paul Farrington, CTO, Veracode EMEA
Robert Nicklin, Product Owner, Blue Prism | Bart Peluso, SVP of Product Marketing, Blue PrismApr 25 20193:00 pmUTC75 mins
Join us on April 25th for a preview of find out what is coming with Blue Prism’s v6.5.
The latest version of our software will include:
• Full Japanese and simplified Chinese language capabilities - Through a simple drop-down box a customer can select their preferred language on the Blue Prism UI.
• Data gateways - A new mechanism that allows customers much more control of their data, with the option to send data as duplicates of what is stored in the BP database or to send the information only to the external end point, significantly reducing the amount of database space used for data storage.
• IPv6 support - Through this feature Blue Prism customers can be confident our connected-RPA platform is ready to evolve with customer environments as they plan, test and take actions to start their transition to using IPv6.
• Latest updates from the Blue Prism Digital Exchange
• Robert Nicklin, Product Owner, Blue Prism
• Bart Peluso, SVP of Product Marketing, Blue Prism
• Richard Pauly, Head of Digital Exchange, Blue Prism
If you have a burning product question to ask, make sure to pre-register and join us on April 25th for this live webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
Traditional API Testing offers well-known benefits like speed, robustness, and ease of automation as compared to testing via the UI. While testing an API as exhaustively as possible is often the most effective way to know if each component is behaving the way it should, this is still dependent on the extent of test coverage provided.
Shackled by slow incomplete manual test designs, API Testing is missing key metrics to help optimize test plans. Testers have difficulty prioritizing what needs to be tested, while developers are unable to shorten test runs and fail fast for more immediate feedback. So how do we compliment API Testing with the power of Model-based Testing (MBT) for maximum testing coverage and efficiency by optimizing our test design?
Join MBT expert Ben Johnson Ward as he dives into a fully integrated end-to-end API testing framework/pipeline to rapidly test a live webservice. Using a powerful MBT test generation solution, he will show how to generate executable REST-assured API tests with enriched reporting, as well as manage requirements changes in the application and their impact on testing.
- Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
- Creating REST-assured API tests utilizing ARD and executing with Java
- How to quickly generate tests for any scenario or coverage goal
- How to react efficiently to changing requirements to keep our automated testing in-sprint
- How to generate enriched test result reports
The presentation will be followed by a Q&A session
George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4Apr 25 20194:00 pmUTC43 mins
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Colette Balaam, CEO, Hive / Karl Hampson, Director of AI, Solstice / Steve Prewitt, Chief Analytics Officer, HealthfirstApr 25 20194:00 pmUTC45 mins
Join Colette Balaam, CEO at Hive, Karl Hampson, Director of AI at Solstice, and Steve Prewitt, Chief Analytics Officer at Healthfirst, as they explore how enterprises should leverage advanced analytics and data platforms to improve health outcomes for their patients and members.
Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoftApr 25 20195:00 pmUTC35 mins
Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.
This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention
In this webinar, you will learn how to:
- Streamline product lifecycle management processes with your eCommerce systems.
- Leverage Master Data Management to gain visibility across inventory and customer data.
- Deliver personalized customer experiences based on past behaviors and purchases.
This free 1-hour webinar from Gigaom Research brings together leading minds in CRM for the financial services industry, featuring Gigaom head of research and CIO Tim Crawford joined by NextJ thought leaders in a roundtable discussion on how to transform customer engagement in financial services.
In today’s hyper-competitive business climate, companies are looking at differentiated services to build stronger relationships with their clients. Specifically, in the financial services industry, the competition for both commercial and retail products is fierce.
This webinar delves into the opportunities that come from domain expertise that industry-specific solutions deliver. In addition, we look at the ways that companies can develop differentiated services to build stronger relationships with their clients. We cover approaches specific to the financial services industry, including AI and machine learning, to better understand customers in ways that makes it hard for others to compete.
This 1-hour webinar will give attendees insights to:
•What are the challenges that financial services organization face today?
•What does ‘holistic view of the customer’ mean? (ecosystem)
•How does customer engagement and loyalty play a role?
•Does domain expertise in the financial services industry benefit CRM?
•CRM is not new. What is the value from an industry-specific CRM solution?
•How are regulatory/ compliance and KYC issues addressed?
•Is integration with other systems/ data sources a key issue?
•How does Machine Learning and AI fit in?
David Cohn Middleware Solutions Sales Specialist, Red HatApr 25 20195:00 pmUTC59 mins
Powerful tools are needed to design scalable, distributed systems that can take advantage of the agility and organizational efficiencies promised by microservices. Tools like Istio, and service mesh in general, solve some difficult problems like observability, security, and resilience, and are highly encouraged for cloud-native application deployments.
Join this webinar for:
An overview on the current cloud-native landscape from a technology perspective including technologies like Kubernetes, Istio, Kafka, and Apache Camel.
A discussion on how to "glue" your heterogenous environments, tools, and approaches together in a cohesive cloud-ready strategy.
Red Hat's approach to agile integration, including some government case studies.
Reference architecture for an open hybrid cloud, supporting both current and cloud-native strategies.
David Ingham - Director, Software Engineering, Red Hat. Jakub Scholz, Principal Software Engineer, Red Hat.Apr 25 20196:00 pmUTC59 mins
Run Apache Kafka on Kubernetes with Red Hat AMQ streams
With the introduction of the Red Hat® AMQ streams component, you can now use the massive scalability of Apache Kafka on the most advanced container management technology, Kubernetes, using Red Hat OpenShift®.
The Red Hat AMQ streams component, the newest member of the AMQ messaging platform suite, is a massively scalable, distributed, and high-performance data streaming capability based on the Apache Kafka and Strimzi open source projects. The AMQ streams component provides an event-streaming backbone that allows microservices and other application components to reliably exchange data with extremely high throughput. AMQ streams has a particular focus on using Kafka on Red Hat OpenShift, the open source container application platform based on the Kubernetes container orchestrator.
Join this webinar to learn:
-Why Kafka is so frequently used in microservices, Internet of Things (IoT), and event processing.
-Why Apache Kafka on Red Hat OpenShift is a great match.
-How Red Hat OpenShift delivers clustering, high availability, and observability to Kafka.
-How the AMQ streams component serves as an automated Kafka administrator, automating the deployment, management, upgrades, and configuration of a Kafka ecosystem installation.
Dan Garfield, Chief Technology Evangelist, Codefresh.ioApr 25 20197:00 pmUTC45 mins
We’re all looking at ways to prevent vulnerabilities from escaping into our production environments. Why not require scans of your Docker images before they’re even uploaded to your production Docker registry? SHIFT LEFT!
When your engineers get information about security vulnerabilities earlier, they're more efficient with fixes!
Join Codefresh, as we demonstrate setting up vulnerability and compliance thresholds in a CI pipeline. We will show you how to give your teams access to your Docker images’ security reports & trace back to your report from your production Kubernetes cluster using Codefresh.
Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, GigamonApr 29 20198:00 amUTC53 mins
Enable IT Collaboration with a Common Distributed Data Services Layer.
The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.
To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.
ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.
Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
Lewis Ardern, Senior Security Consultant, SynopsysApr 29 20192:00 pmUTC90 mins
Jeff Hughes and Keith PuzeyApr 29 20195:00 pmUTC60 mins
CA Test Data Manager has just released version 4.8 with exciting new features including Portal Masking which includes an independent masking engine and Docker-Based masking. These new features, along with others, will help your testing teams speed up the process of finding and delivering test data when it's needed. Join Jeff Hughes and Keith Puzey for a complete discussion and demonstration of the latest features in TDM 4.8
Mark Elwood, Director Marketing Apr 30 20198:00 amUTC27 mins
Find out how we helped a tier 1 bank improve their mobile communications as part of their digital transformation programme.
Research indicates mobile employees are more likely to feel anxious, isolated and have higher levels of technology related frustration than office-based staff. So, finding ways of connecting people, so they can be as productive, engaged and satisfied is key.
What you will take away:
• How digital transformation projects are creating more productive, mobile employees
• How Re:Call is helping businesses take a new approach to mobile communications
• What you can do to create connected, collaborative and productive employees.
Sinead Kelly, Product Manager at Pivotal and Alex Guedes, Platform Architect at PivotalApr 30 20198:30 amUTC60 mins
As the adoption of Kubernetes expands rapidly, organisations must get up to speed with a powerful and flexible but complex container orchestration system. Understanding how the configuration of Kubernetes clusters and the configuration of your workloads interact is important when setting up your platform for success.
This webinar will cover what you need to consider to get your different types of workloads up and running.
Join us to learn:
•What you need to think about before you configure your clusters and how Pivotal Container Service (PKS) can help
•How to configure your clusters for different types of workloads
•How to deploy those workloads so that they survive Kubernetes lifecycle events
•How to keep your workloads up and running so they can survive upgrades
Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTOApr 30 20193:00 pmUTC60 mins
1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
5. to enforce identity and access through online AND offline authentication
With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.
Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
Chanika Geeganage Associate Technical Lead & Lahiru Madushanka Software Engineer, WSO2Apr 30 20194:00 pmUTC52 mins
Modern day organizations need to connect to various systems in order to perform their day to day operational tasks. As they integrate with more systems and develop large applications, it gets harder to keep track of what is going on within the system. An exposed API can take too much time to respond, the request rate for a service can increase unexpectedly or an endpoint may fail, disrupting day-to-day operations and creating unsatisfactory user experience. It’s necessary to analyze historical data about a system in order to understand the system behavior and plan the relevant modifications.
Observability is the answer to all these problems. WSO2 Enterprise Integrator provides a comprehensive set of observability features useful for monitoring current operations, collecting and analyzing historical data and triggering alerts if something unusual happens.
We will discuss the following topics in this webinar:
* Introducing the WSO2 Enterprise Integrator analytics profile
* Analyzing statistics for APIs, endpoints, sequences, and services
* Message tracing for debugging purposes
* Business process and human task analysis
* Monitoring the broker profile
* Monitoring message exchanges and application behavior via logs
Laurie Voss, Chief Data OfficerApr 30 20195:00 pmUTC30 mins