Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Enabling Event-Driven Microservices
    Enabling Event-Driven Microservices Jonathan Schabowsky Recorded: Jul 27 2017 9 mins
    Microservices are an incredible tool for modern solutions, especially when paired to today's cloud choices. Come watch this episode of Solace Sayss to learn more about the choices and challenges for microservice architectures
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Recorded: Jul 27 2017 19 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 27 2017 61 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • How to Scale Agile SAFely at the Portfolio Level
    How to Scale Agile SAFely at the Portfolio Level Dean Leffingwell, Scaled Agile, Inc & Tamara Nation, CA Technologies Recorded: Jul 27 2017 60 mins
    Scaled Agile, Inc recently released SAFe® 4.5, with feedback from users and the community. In the words of Dean Leffingwell, Director and Chief Methodologist at Scaled Agile, Inc.: “we believe you’ll find 4.5 to be leaner, more Agile, and better at fostering faster innovation and learning than any of its predecessors”.

    Join Mr. Leffingwell and Tamara Nation, Agile Transformation Consultant at CA Technologies, on Thursday, July 27, 10am PT / 1pm ET, as they discuss:

    •What’s new with SAFe 4.5
    •How CA Agile Central supports SAFe 4.5 at the portfolio level
    •How successful companies combine SAFe implementation and CA Agile Central

    We encourage you to join us for the first of a three-part series on how CA Agile Central Products and Services supports scaling agile SAFely.

    SAFe is a registered mark of Scaled Agile, Inc. Reproduced with permission © 2011-2017 Scaled Agile, Inc. All rights reserved.
  • Webcast: E-Signatures: Changing Landscape for Life Insurers
    Webcast: E-Signatures: Changing Landscape for Life Insurers Colleen Risk, Senior Analyst - Celent & Andrea Masterton, Director Corporate Marketing - eSignLive Recorded: Jul 27 2017 57 mins
    The process of buying life insurance is becoming increasingly digitized - driven by customer expectations for convenience and ease. As insurers are removing paper from everyday processes, electronic signatures enabling this digital transformation by providing a secure means to offer the customer a user-friendly end-to-end digital experience.

    In response to the accelerated adoption, Celent recently published the report, “Putting a Lock On Straight-Through Processing – Life Insurance E-Signature Vendors 2017”. The research aimed to answer the questions: “how is e-signature technology transforming the life insurance customer experience”; “who are the main vendors?”; and “what are the common components of a solution?”.

    In this on-demand webcast, hosted by LOMA, you will learn what to look for in a solution, hear an update on how the vendor landscape has changed and takeaway these highlights:

    Top e-signature solution requirements
    How to evaluate and differentiate vendors
    Perceived and real obstacles to continued adoption
    Case Studies of E-Signatures in Life Insurance

    - Colleen Risk, Senior Analyst - Celent
    - Andrea Masterton, Director Corporate Marketing - eSignLive by VASCO
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Recorded: Jul 26 2017 28 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • Harness the power of crowdsourced mobile data and GPU-powered analytics
    Harness the power of crowdsourced mobile data and GPU-powered analytics Tom Luke, VP Sales, Marketing and Partnerships, and Mike Gardner, CSM at MapD Recorded: Jul 26 2017 46 mins
    Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.

    Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.

    Attend this webinar to learn how telecoms and other mobile companies can:

    Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.

    Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.

    Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.

    Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.

    MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.

    Try the demo here: https://www.tutela.com/explorer/
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Recorded: Jul 26 2017 58 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Today’s Modern Business Management
    Today’s Modern Business Management James Chan and Laureen Knudsen Recorded: Jul 26 2017 48 mins
    Being an adaptive enterprise means having the ability to rapidly respond to changing conditions. As the market changes, you adapt. As customer feedback comes in, you adapt. As your competitors shift their focus, you adapt. 
    Join James Chan and Laureen Knudsen, of CA Technologies, on Wednesday, July 26, 9am PT / 12pm ET, as they dig deeper into how Modern Business Management is essential to a thriving, adaptive enterprise. During this webinar, you’ll learn:
    •How enterprise-wide business visibility provides real-time, continuous project data 
    •How to align funding for the projects agile teams are working on 
    •How financial and performance metrics connect financial models and audits to delivery practices 
    The adaptive enterprise is leveraging real-time visibility that allows it to proactively embrace changes and transform negatives into opportunities that move the business forward. It is prepared to respond to nearly every possibility with speed and agility and to take advantage of every circumstance. Are you ready?
  • Building a commercial robot with open source
    Building a commercial robot with open source Kyle Fazzari - Roboticist at Canonical Recorded: Jul 26 2017 60 mins
    Developing a new device is hard. So is taking that device to production. However, we see numerous examples of companies devoting all of their time to development, and none to answering the important questions that are raised as one approaches production, such as:

    * What is my factory process?
    * How is the base OS updated so as to remain secure?
    * How is my own software updated?
    * How is the device recovered if an update goes wrong?

    In this webinar we'll discuss:

    * The challenges of commercialising robots
    * Using ROS in your production code
    * Build security in from the get go with snaps and Ubuntu Core
    * Continuously deliver new features and updates without the cold sweat
  • Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps
    Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps Fouad ElNaggar, CEO and Co-Founder of Sapho Recorded: Jul 26 2017 45 mins
    Enterprise systems are failing today’s employees because they are hard to use, they trap data in silos, they have a poor user experience, and they offer limited mobile support. Therefore, it is no surprise that a Forrester Research study showed that 76% of employees believe it takes too long to complete tasks in their systems and another 62% delay completing tasks that require multiple systems. In short, this means your business has delays.

    On the flip side, consumer applications keep getting better and better – these apps are simple, enable quick task completion, are accessible from anywhere, and offer a great user experience. Why can’t enterprise systems be as easy to use as consumer apps? It turns out, they can be. Modern portals are the next generation digital workplace tools that push data and key actions to employees from their systems so they can more effectively do their jobs.

    Join this webinar to learn how easy it is to:

    •Remove system bottlenecks, reduce helpdesk calls, decrease software spending, enable smart decision-making, and streamline workflows with consumer-like business apps.
    •Build smart, event-driven micro apps that sit on top of your existing systems and push actionable insights and tasks to employees on any device, intranet, or messenger.
    •Triple the productivity of your workforce with a modern portal that surfaces personalized and relevant tasks and information from all your systems.
  • Practical Guide to Cloud Management Platforms
    Practical Guide to Cloud Management Platforms Cloud Standards Customer Council Recorded: Jul 26 2017 60 mins
    Cloud Management Platforms (CMPs) are integrated products that provide for the management of public, private and hybrid cloud environments. The rise of hybrid IT architectures increases the need for process harmonization and tools interoperability to address evolving requirements through the use of a CMP.

    This webinar will cover:

    •A review of CMP capabilities
    •How to operate and manage applications and data across hybrid cloud infrastructures
    •Available CMPs on the market today
    •Evaluation criteria for selecting a CMP to meet your needs
    •Deployment considerations
  • Handling multiple releases for multiple customers
    Handling multiple releases for multiple customers Aspire Systems Recorded: Jul 26 2017 3 mins
    This video illustrates how multiple releases can be made at the same time for different customers, by adopting the feature-based release model.
  • Introduction to Being an Incident Commander
    Introduction to Being an Incident Commander Eric Sigler - Head of DevOps @ PagerDuty Recorded: Jul 25 2017 45 mins
    During a major customer-impacting incident, every minute counts. The team must work together seamlessly and quickly to a successful resolution — and that’s done best with an Incident Commander driving coordination.

    An Incident Commander is tasked with being the decision maker, delegating tasks and listening to input from subject matter experts in order to bring the incident to resolution. This is a critical role and there are essential best practices you must follow to get it right.

    Join us to learn:
    •What is an Incident Commander?
    •The role and responsibilities of an Incident Commander
    •Incident call procedures and terminology
    •Incident commander skills for success
  • From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift
    From Monolith to Containers: How Verizon Containerized Legacy Apps on OpenShift Zohaib Khan, Practice Lead, App Modernization & Migration, Red Hat; Malik Sayed, Sr. Manager, Digital Architecture, Verizon Recorded: Jul 25 2017 44 mins
    Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.

    In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Recorded: Jul 25 2017 47 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • What Even the Best Firms Miss About Customer Service
    What Even the Best Firms Miss About Customer Service Ellen Daley, Vikas Nehru, Nitin Badjatia Recorded: Jul 25 2017 63 mins
    Join Acorio CEO, Ellen Daley, 3CLogic's CTO, Vikas Nehru, and ServiceNow's Senior Director of Business Strategy, Nitin Badjatia, for this panel discussion about Customer Service in the real world & what most companies are getting wrong.

    While we know that customer service is a critical defining characteristic, executing effective Customer Service somehow falls flat in the real world. The challenge is that delighting customers means more than just responding quickly to requests and issues from them – it means ensuring the all functions are involved and present in helping customers. This is a paradigm shift of the last 2 decades of Customer Service which set to prioritize response over resolution.

    Join a panel of executives from ServiceNow, 3C Logic, and Acorio as they explore the challenges facing customers and executives alike, and explore the transformative results customers in the real world have driven using the power of the ServiceNow CSM platform.
  • The 3 Essentials of Digital Transformation & How to Deliver Them
    The 3 Essentials of Digital Transformation & How to Deliver Them Rob Koplowitz, VP and Principal Analyst at Forrester Research and Steve Tassell, Bizagi Recorded: Jul 25 2017 40 mins
    Is your digital transformation moving in the right direction? We know that there are three essential business imperatives that organizations need to act on: delivering better customer experiences, improving operational efficiency, and managing regulatory compliance.

    Wherever you are in your journey, process automation is recognized as a foundation for meeting these digital transformation goals. So join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research, as we explore the role of ‘Digital Process Automation’ in digital transformation and discuss real-life stories of how it has helped companies to:

    •Deliver digitally-led omni-channel customer experiences
    •Improve operational excellence, efficiency and agility
    •Manage data, privacy and processes to meet regulatory compliance
    •Innovate at the speed of changing customer expectations in your industry

    Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.

    About Rob Koplowitz

    Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing. Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy
  • Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform
    Accelerating Cloud Migration and SaaS Deployment with Anypoint Platform Dave Rudzinsky, SVP & CIO; Jim McDaniel, VP, Strategic Accounts; Matt Serna, Manager, Industry Marketing Manager Recorded: Jul 25 2017 48 mins
    Organizations across all industries have begun to adopt cloud and SaaS technologies as a means of increasing operational efficiencies and improving customer experience. Those who can do so quickly - and securely - stand to reap outsized rewards in the market. But how?

    Hologic, a global life-sciences company that manufactures diagnostic products, surgical equipment, and imaging systems, provides a model for how organizations can drive secure cloud technology deployments within an accelerated timeframe. In partnership with MuleSoft and Apps Associates, they were able to go live with Salesforce Sales Cloud, Service Cloud, and Marketing Cloud within a six month period, supporting their continued investment in driving best in class customer engagement.

    Learn from Hologic CIO Dave Rudzinsky how the right combination of technology, partners, and internal operating model can help your organization to quickly and securely adopt modern cloud technologies.

    Attendees will learn:

    - How Hologic leveraged MuleSoft to triple the speed of on-premise to cloud integration
    - The strategic role that delivery partners can play in supporting cloud migration initiative
    - How Hologic increased project delivery speed by increasing connectivity asset reuse throughout their organization
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Recorded: Jul 25 2017 52 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • 5 Principles I applied to build a sticky product that 800k people use weekly
    5 Principles I applied to build a sticky product that 800k people use weekly Glen Rabie, CEO, Yellowfin Recorded: Jul 25 2017 5 mins
    More than 800,000 people use our Yellowfin product every week. We’ve achieved this by making user adoption and stickiness a core part of our product development.

    We think about stickiness constantly and have a central goal to continuously improve our user adoption rates. It’s taken us years to understand the drivers of these behaviours. The lessons we’ve learned along the way can be distilled into five key components:
  • Seize the opportunity as GST launches in India
    Seize the opportunity as GST launches in India Hari Madhavan, Director of ERP Practice, Promantia Global Consulting Recorded: Jul 25 2017 45 mins
    On July 1, India ushered in the most significant tax reform in its 70-year history by rolling out the Goods and Service Tax (GST). The new fiscal measures will fundamentally change the way Indian businesses and, in particular, retailers work by impacting many functional areas, including pricing, supply chain management, IT, tax, and accounting. We at Openbravo are delighted to now announce that our software is now fully compliant with the GST requirements, and so we are ideally positioned to help retailers embrace the opportunities.
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 24 2017 37 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem
    [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 24 2017 40 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • Using Big Data & Machine Learning to Uncover Hidden Cyber Threats
    Using Big Data & Machine Learning to Uncover Hidden Cyber Threats Ofir Barzilay, VP R&D at Cyberbit Endpoint Detection & Dana Gardner, Principal Analyst, Interarbor Solutions Aug 1 2017 5:00 pm UTC 60 mins
    As we’ve learned from the recent WannaCry and Petya attacks, attackers can now bypass not only antivirus systems but more advanced, next-generation security systems and put large enterprises out of service.  Today, detecting advanced attacks requires understanding their behavioral patterns and analyzing massive amounts of data in near real time. This can be achieved by using machine learning, behavioral analysis and big data security analytics.

    Join us on this webcast and learn how Cyberbit Endpoint Detection is using next generation technologies originally developed for confidential military projects, to detect threats that outsmart conventional security solutions.

    What you will learn:

    -Why most organizations are vulnerable to advanced cyberattacks even after deploying security systems
    -How behavioral detection and machine learning can surface a cyber threat that penetrated the organization - before damage was done.
    -How you can detect zero-day attacks and accelerate response and slash SOC operation cost
    -How Cyberbit uses Vertica with near real-time data ingestion and advanced data transformation from hundreds of thousands endpoints
  • Software Quality at Speed in Agile and DevOps Environments
    Software Quality at Speed in Agile and DevOps Environments Nancy Gohring, Senior Analyst, 451 Research. Dharminder Dewan, Agile QA Manager, Infostretch Aug 1 2017 5:00 pm UTC 60 mins
    The meteoric rise of software is putting pressure on development teams to iterate faster. It’s no surprise that this trend has resulted in the adoption of new tools and more agile practices, such as DevOps, the impact of which has been to push testing left. Development and DevOps teams are now building in testing earlier in the development cycle, helping to speed delivery of new releases for maximum competitive advantage.

    This new methodology also is shaking up the relationship between testing teams and development teams. In some cases, developers might take on some QA functions, while the QA teams serve as consultants. A free web seminar on August 1st will explore these topics in-depth with expert advice from Nancy Gohring, 451 Research Senior Analyst for Application and Infrastructure Performance, and Dharminder Dewan, Agile QA Manager for Infostretch.

    Join this web seminar to learn how to:

    •Overcome common quality challenges that are faced by most developers
    •Apply “Shift Left” DevOps best practices to achieve the highest quality and fastest time to market
    •Improve group dynamics across DevOps teams to optimize the development life cycle for continuous delivery of quality software at speed.
  • The Application Lifecycle Model is Changing - Don't Get Left Behind!
    The Application Lifecycle Model is Changing - Don't Get Left Behind! Craig Sproule, CEO, Metavine Aug 1 2017 6:00 pm UTC 30 mins
    Your application's customers are facing unprecedented competition in their businesses. To win, they need you to help meet this challenge by delivering exceptional digital solutions faster than ever before. In order to achieve this digital agility, you must rethink your application lifecycle model and adjust how you are currently developing your enterprise applications. Join us for this 20-minute briefing to learn:

    • How industry dynamics are driving a change to the approach to application development
    • Why today’s application lifecycle models can no longer satisfactorily meet demand
    • Why next-generation application lifecycle models are needed and and how they work
    • How a real-world enterprise system achieved these goals

    Speaker Bio
    Craig Sproule is the founder and CEO of Metavine Previously, he had founded a successful systems integration firm that completed hundreds of enterprise-class development engagements in various industries over 17 years. From these projects, he developed Metavine Genesis that delivers an innovative approach to the application lifecycle that enables companies to achieve cloud-first digital agility. With more than 30 years experience in enterprise software sector, Craig has also held senior technology and management positions at several leading software companies.
  • Open Banking APIs: Where, what and when?
    Open Banking APIs: Where, what and when? Barry O'Donohoe, Senior Partner, RAiDiAM Consulting Aug 2 2017 1:30 pm UTC 45 mins
    The webinar will explore the topic of customer consent, its authorisation during an Open Banking API flow from an overall concept, design and implementation perspective.

    This will cover all main aspects of the security profile and enforcement on an API channel - also from a GDPR perspective.

    Also explored will be how a policy decision capability could help with fine grained authorisation in the context of an Open Banking / PSD2 API channel.
  • Speed up your software development lifecycle using Kubernetes
    Speed up your software development lifecycle using Kubernetes Marco Ceppi, Product Strategy at Canonical and Luke Marsden, Head of Developer Experience at Weaveworks Aug 2 2017 4:00 pm UTC 60 mins
    For a complete cloud native application lifecycle Kubernetes needs some tools to "close the loop". The promise of the new way of doing things, is that you'll speed up your software delivery with microservices and devops teams. But how should you really do that?

    Join this webinar to discover:

    * Why you should try the Canonical Distribution of Kubernetes container solution and how to install it.
    * How to deploy, troubleshoot and manage your application using Weave Cloud
    Prometheus monitoring.
    * What is Prometheus monitoring, how it works, how to instrument your application using it and how you can get the most out of it.
    * How to speed up your software development lifecycle - ship features faster, fix problems faster.

    The webinar includes live demo’s and Q&A.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.


    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Marrying DevOps and Virtualization for Better Deployment Automation
    Marrying DevOps and Virtualization for Better Deployment Automation Jon Benedict, technology evangelist, Red Hat; Moran Goldboim - senior technical product manager, Red Hat Aug 3 2017 4:00 pm UTC 45 mins
    Virtualization configuration management should be an easy and automated process that allows your team to continuously deliver innovation. Furthermore, you need to be able to provide speed, efficiency, and security for the DevOps and virtualization administration teams with simple architecture and management tools.

    In this webinar, you'll learn how Red Hat® Virtualization and Ansible Tower by Red Hat can help your organization to:
    > Quickly and easily provision, deprovision, take inventory, and manage your virtual infrastructure.
    > Empower your non-administrative users to confidently and securely request and manage virtual resources using provided playbooks.
    > Provide flexibility and control while speeding up development.
    > Add new capabilities to your continuous integration, improving the cycle times and agility of your application teams.
  • Big Data Analytics and Hybrid Cloud Considerations
    Big Data Analytics and Hybrid Cloud Considerations Cloud Standards Customer Council Aug 8 2017 3:00 pm UTC 60 mins
    Big data analytics (BDA) and cloud computing are a top priority for CIOs. Harnessing the value and power of big data and cloud computing can give your company a competitive advantage, spark new innovations, and increase revenue. The majority of the use cases for big data and analytics are built on hybrid cloud infrastructure. Hybrid cloud is a secure and cost-effective way to manage big data and analytics while allowing for increased scalability and computational power.

    This webinar will cover:

    •Business reasons to adopt cloud computing for big data and analytics capabilities
    •An architectural overview of a big data analytics solution in a cloud environment with a description of the capabilities offered by cloud providers
    •Proven architecture patterns that have been deployed in successful enterprise projects
    •An overview of what hybrid cloud is and why it is important in the context of big data and analytics
    •Hybrid cloud implementation considerations

    The information provided in this webinar draws from the following two deliverables from the Cloud Standards Customer Council: Cloud Customer Architecture for Big Data and Analytics Version 2.0 and Hybrid Cloud Considerations for Big Data and Analytics.
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Aug 8 2017 3:00 pm UTC 60 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Banking on OpenShift: A DevOps Journey
    Banking on OpenShift: A DevOps Journey John Rzeszotarski, Director of Continuous Delivery and Feedback at KeyBank Aug 8 2017 7:00 pm UTC 15 mins
    John Rzeszotarski, Director of Continuous Delivery and Feedback at KeyBank, shares how his organization tackled the modernization of a complex online banking system consisting of different merged banks with various legacy computer systems. Learn how KeyBank used Red Hat OpenShift and a DevOps approach to successfully update their online banking platform.
  • Get Ready for AI-Driven Analytics
    Get Ready for AI-Driven Analytics Martha Bennett, Principal Analyst, Forrester; Andrew Yeung, Sr. Director, Product Marketing, ThoughtSpot Aug 9 2017 5:00 pm UTC 60 mins
    Join ThoughtSpot and Forrester Research Principal Analyst, Martha Bennett, to learn best practices for leveraging AI as a key enabler for analytics. We’ll also discuss how to best understand and manage the potential risks involved.
  • 3 Reasons Why Flash is Changing Back-Up and Recovery
    3 Reasons Why Flash is Changing Back-Up and Recovery Jack Hogan, CTO and General Manager, Lifescript Brian Reagan, CMO, Actifio, Vaughn Stewart, VP of Technology, Pure Storage Aug 9 2017 5:00 pm UTC 60 mins
    Attend this webinar to find out why and how Lifescript, one of the world's largest women's health care websites serving 10 million customers and a half billion emails monthly have transformed their data centers with AppFlash from Actifio and Pure Storage.

    In this webinar you will learn about:

    - AppFlash, an all flash, enterprise backup appliance improving Business Resiliency & availability
    - How the solution improves internal SLA’s while reducing cost, risk, & complexity of backup & DR
  • Security Orchestration In Action: Integrate – Automate –Manage
    Security Orchestration In Action: Integrate – Automate –Manage Silvio Pappalardo & Alex Ruhl, FireEye Aug 10 2017 1:30 pm UTC 60 mins
    Simplify & Accelerate Security Operations through integration and automation

    Join us to hear how Security Orchestration from FireEye can:

    Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
    Save time and resources & Improve your overall ROI

    Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
    Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.

    Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
    Minimise error prone manual processes while maintaining response and process consistency &
    Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.

    Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
  • NTT DATA’s Intelligent QA Approach
    NTT DATA’s Intelligent QA Approach Nikhil Joshi - VP QAT Practice, Katsutoshi Imai - QAT Global R&D Lead Aug 10 2017 2:00 pm UTC 60 mins
    Join this informative webinar to see how we achieve superior test acceleration using NTT DATA's ML/AI based Intelligent QA solution. Our Software Test Acceleration Toolkit forays into Intelligent Automation space with its in-house built analysis driven testing engine, helping organizations improve their testing quality by taking better decisions.
  • Five Indicators Your Network May be Breached
    Five Indicators Your Network May be Breached Tony Thompson, General Manager, Threat Detection, SS8 Networks Aug 10 2017 5:00 pm UTC 45 mins
    Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats. The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.
  • How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery
    How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery Dale Bewley, Pixar, Leonard Arul, Walt Disney Studios, Thomas Haynes, Disney; Charles Sochin, Pixar Aug 10 2017 6:00 pm UTC 45 mins
    Providing platforms and services at Disney Studios and Pixar is both exciting and demanding. OpenShift offered a technology mix that assisted the technology teams to deliver an on demand, container platform that exposed developers to up-to-date content, pipeline automation, storage, and deployment patterns for microservices and tiered applications. During this talk we will hear from both the Disney and Pixar teams to find out how they are offering an automated experience for developers and IT services.
  • Start Benefiting from PAN-OS 8.0 Now
    Start Benefiting from PAN-OS 8.0 Now Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics Aug 15 2017 4:00 pm UTC 45 mins
    You’ve heard the hype, now see for yourself the innovations that PAN-OS 8.0 brings to your network security. Attend this 30 minute webcast, “Start Benefiting from 8.0 Now,” to get a quick overview of the new features and enhancements PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course and VM-100 - $800 value

    Reserve your spot now, so you can start to take advantage of all 8.0 has to offer.
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 15 2017 5:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Considerations in Data Center Transformation
    Considerations in Data Center Transformation Tom Parker, Solutions Product Manager, Lenovo and Robert Campbell, Senior Global Technical Alliance Manager, VMWare Aug 16 2017 3:00 pm UTC 60 mins
    VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.

    In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s Purley-based ThinkSystem line of servers and infrastructure. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Shashi Kiran, CMO, Quali, Jay Lyman,Analyst, 451 Research Aug 16 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations
  • Not Your Grandmother’s Network: What SDN Really Means
    Not Your Grandmother’s Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Aug 16 2017 9:00 pm UTC 60 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Aug 17 2017 10:00 am UTC 60 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.


    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Aug 17 2017 3:00 pm UTC 90 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?

    Attendees with earn one BICSI Continuing Education Credit for attending.
  • eCommerce Redefined: Connect to Your Customers Through API-Led Architecture
    eCommerce Redefined: Connect to Your Customers Through API-Led Architecture Allegra Margolis, Industry Marketing; Ani Pandit, Client Architect; Andrew Latham, Customer Success Director, MuleSoft Aug 17 2017 4:00 pm UTC 60 mins
    Across industries, consistent branding and engaging consumer experiences are important for commerce. With more and more brands growing their eCommerce presence, it becomes critical for businesses to build a strategy set-up for the future.

    Drawing on his experience as former Director of Enterprise Architecture at Macys.com, hear Andrew Latham discuss his predictions for eCommerce and Ani Pandit, Client Architect, walk through the technical architecture of headless eCommerce APIs through customer stories.


    - Why headless eCommerce architecture is gaining dominance
    - How to build a successful eCommerce strategy through a composable enterprise and API-led connectivity
    - Learn from customer examples how to execute an eCommerce strategy set-up for the future