Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.
Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.
Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.
"Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."
- KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE
"Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
- PWC Global State of Info Security Survey, 2015
Artificial Intelligence, Machine Learning, Deep Learning are the buzz words across the globe today. Businesses as well as people are trying to make out if it is hype or not. While there is a hope there is also gloom somewhere, as far as AI is concerned. Lots of work needs to be done to ensure effective and valid deployment of AI solutions. Today’s AI concern is Frameworks and toolsets to manage the entire lifecycle in an integrated way to ensure dependable results is the beckoning need for AI going forward. In this discussion, we will be focussing on some of the important challenges faced with respect to the resources, frameworks, tools and techniques and also the direction AI is trending towards.
When it comes to closing your financial month end, finance is usually looking at a tedious and time-intensive process requiring skipped lunches and late nights. Our recent survey of 780+ financial professionals from around the world showed that 33% are taking 5 days to close their books for a single period with another 41% taking more than 5 days.
In this webinar, we will introduce five areas of the period end close process that you can easily expedite using Excel. By saving time and effort throughout your close, you can gain extra time for value-added tasks like audit preparations, data analysis, or simply getting to leave the office at a reasonable time. Gain insight into how you can accelerate 5 critical areas:
2.Closing, Adjusting, Correcting, and Recurring Journal Entries
3.Balance Sheet Reconciliations
5.Preparing and Publishing Financial Statements
All financial professionals who are looking to shave time off their period-end close should attend this webinar.
Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.
It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.
In this webinar, you’ll learn:
•Why a layered security approach doesn’t work.
•Why a strategic approach to evaluating security technologies is the way to go.
•How the security architecture of our next-gen firewalls prevents successful cyber breaches.
To catalyse digital transformation, business and IT leaders are embracing the Internet of Things (IoT). The IoT is empowering businesses and consumers to connect to the Cloud, applications, and services. Most importantly - to handle the deluge of data they collect, consume, and analyse. In this context, the role of Cloud security and actionable intelligence is highly significant.
Take a virtual seat on this cross-industry panel discussion covering the Internet of Things as one of driving forces behind Digital Transformation. The panellists will exchange their experiences and how their organizations approach cloud security and have changed their security strategy to actionable intelligence.
* Romain Fouchereau, IOT Analyst IDC
* Markus Handte, Director of Systems Engineering EMEA ForeScout Technologies
* Kelvin Rorive, Manager IT Security operations & Threat at Rabobank
* Stuart Davis, Director of Global Services & Intelligence
* Andrew Shepherd, Palo Alto Networks
Nasdaq is transforming — focusing on technology-driven innovation centered around their strengths in market-powering data and analytics. Supporting this move, Nasdaq is cloud-enabling all core applications using AWS for agility and using AppDynamics to speed up, visualize, and validate the migration process.
An AppDynamics-powered migration has allowed Nasdaq to support its strategic pillars of user engagement, velocity, and agile infrastructure, empowering them to draw clear, understandable correlations between customer experience and application performance.
Hear experts from Nasdaq, AWS, and AppDynamics for in this on demand webinar. You’ll learn:
- How to justify moving to AWS and re-platforming applications
- How AppDynamics provides full visibility into hybrid cloud performance
- How a common dashboard across ops, dev, and infrastructure teams can accelerate DevOps adoption
Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.
The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
"There's more than one way to skin a cat," as the saying goes...
You bet there's also more than one way to create invoices and custom billing in the cloud.
Our own Customer Success Manager, Casey Sukhavong, will teach you all about our extensive automation mechanism for generating reports and invoices based on tags related to cost centers, as well as internal or external user groups.
He'll demonstrate how to structure automation monthly, weekly, or even daily. And with more than 100 best practices specifically dedicated to optimizing cloud infrastructure and billing, you can easily set up spending alerts or warning notifications to keep costs under control and accounted for.
As Enterprises transition to online data-driven transactional business models, the need to support more customers and users at scale, typically means massive investments for Oracle database licenses and the supporting data infrastructure. But most enterprise infrastructure is not optimized to maximize the performance of CPUs in their database servers resulting in wasted resources and poor utilization of these expensive Oracle licenses. Are the bottlenecks in their current infrastructure well understood? With a plethora of solid state storage options available, do infrastructure architects know how to effectively evaluate and select the best storage platform to reduce Oracle TCO?
The key to optimizing your Oracle infrastructure spend is the focus of this webinar where Vexata solution architects will address some of the common misconceptions related to scaling Oracle ecosystems using case studies and best practices to deliver massive performance improvements and realize significant cost savings.
You will learn about:
•When and how to tune various infrastructure options available to an Oracle DBA
•How to maximize database performance including how to optimize CPU cores based on deploying solid-state storage systems.
•Best practices for Oracle evaluation and benchmarking tools including SLOB2, IO Calibration, and Orion
Your IT department has its hands full keeping your day-to-day operations in check while working on new projects. They don’t have the time or often the expertise to integrate a new acquisition into your current IT environment. Ask yourself – could your company’s IT department completely integrate a new acquisition in less than 30 days?
In this quick 30-minute webinar, you’ll learn Accudata’s proven formula for success – and understand how IT can enable your M&A business goals. We will cover:
• Why IT departments struggle with business acquisitions
• How to prioritize IT integration tasks
• Accudata’s five-step proven process to make M&A less complicated
• Review a customer example that includes integrating 35 new sites and 600+ users into an existing organization in less than 30 days
Businesses must participate in the API economy; creating an ecosystem and partnerships are essential in order to capture business of the future. Creating this agility requires changing people, processes, and technology in order to capture these often fleeting business moments. The challenge is to balance both the current environments and architectures, while creating the next generation of application architectures. These often painful changes can be approached in many ways, which we will outline along with the technology and methodology to ensure success.
Join this webcast to learn:
- The latest thinking around microservices and miniservices
- How to measure and manage the application lifecycle (with a drill down into monitoring and visibility)
- Enterprise challenges when balancing existing systems and new capabilities
If you’re migrating to a microservice architecture, it’s extremely important to make sure you don’t open up new security vulnerabilities as a result. At the same time, you have to make sure the access control approach you take doesn’t become a bottleneck for your developers or for the scalability of your system.
Join this webinar to learn:
- The state of the industry when it comes to API access control for microservices
- The DHARMA model for defining API security in a microservice architecture
- A specific DHARMA implementation using the new CA Microgateway
Government agencies across the globe are turning to the cloud to deliver better services to constituents and reduce costs. The US Department of Veterans’ Affairs (VA), responsible for providing healthcare and services to over 20 million US citizens, provides a compelling example of how government agencies can increase IT agility.
To power their move to the cloud, the VA is leveraging APIs to rapidly and securely connect legacy on-premise and cloud systems. According to Dr. Shaman Singh, Clinical Lead for Connected Care at the VA, their API-powered “Digital Veteran Platform” provides a means for the VA to “become more future-proof,” and to enable the department to “shift away from dated and expiring technologies that require an exorbitant investment.”
Join us for a conversation with Dr. Shaman Singh and Nial Darbey, Principal Solutions Architect at MuleSoft, to learn how the VA is leveraging APIs and microservices to modernize their legacy systems and power their cloud transformation journey.
Watch this webinar to learn:
- How the VA is using APIs to quickly and securely connect legacy on-premise systems and SaaS providers like Salesforce
- How government agencies can leverage the API economy to more effectively deliver on their mission
- Tips and tricks for how government agencies can implement microservices architectures to increase IT agility
The ability to rapidly connect applications and deliver data-driven insights at scale and at the right time is the key to digital success. The increase in the number and variety of endpoints, expectations around faster delivery of integration solutions and the need to support rapid Innovation are forcing customers to extend and modernize their integration platform.
Areas of Focus to Create a Successful SACM Practice
For Citizens Bank, major difficulties were encountered not just in implementing software itself, but in creating a sustainable and successful Service Asset and Configuration Management (SACM) practice. Come and learn 3 key areas to focus on to create and sustain a successful SACM process in order to:
- Provide robust reporting for audit and regulations
- Promote and maintain confidence in the quality of CMS data
- Provide ITSM users with the information they need, when they need it
Join us for the next upcoming SIG Talk on Tuesday, May 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1089263&group=.
Data is the lifeblood of business. It’s so important that data copies now consume 60% of total storage capacity for the average enterprise – even more than production data1. So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? Join us and learn how to simplify these routine tasks using the industry’s most popular database: Microsoft SQL Server. We will demo and discuss popular use cases, such as data protection, business continuity, dev/test, and more.
451 Research named Customer Intelligence Platforms (CIPs) as the #1 Customer Experience & Commerce trend for 2018. Changing customer demands, digital transformation and an abundance of data has propelled the need for an intelligent Customer 360, driven by AI and aimed at business-users. These new requirements have set the stage for Customer Intelligence Platforms that do more than consolidate a single view of the customer; they include data governance, machine learning-based synthesis and identity matching, and dynamic UIs including graph, visualization and customer journey analytics.
In this webinar, hear from Sheryl Kingstone, Research Director at 451 Research and David Corrigan, CEO at AllSight as they explore how CIPs bring together data, analytics and action to address key customer experience (CX) use cases including:
•Customer-centric marketing and micro-segmentation
•Interaction personalization and customer journey optimization
•Self-service data access and customer data lakes
•CRM and MDM modernization
•Risk and compliance including GDPR
The infinite computing power of cloud is creating new business models and driving operational efficiencies in every sector. But how can you extend cloud capabilities to the edge? Join this webinar for real-world examples of how AWS customers are exploiting both IoT data and the power of the cloud. We'll also discuss how you can deploy analytics and machine learning at the edge through AWS building blocks such as AWS Greengrass and Amazon Sagemaker.
Customer use cases to be explored include:
Nokia optimises communications to oil platforms by processing data nearer to the source
Stanley Black&Decker performs predictive maintenance by identifying faulty parts before they fail
Pentair overcomes intermittent connectivity issues to automate its water filtration plants
Who Should Attend: Business Directors, Business Leaders, Project Managers, IT Managers, Business Consultants, Heads of Innovation, Data Scientists and Product Marketeers.
Software drives the technology that enables communication, information, and automation in virtually every part of our personal and professional lives. Software also enables hardware technology companies to adapt their offerings to meet the evolving needs of the digital market.
Being able to offer flexible payment models, manage entitlements, control use, as well as track and aggregate product-usage data are just some of the top software licensing challenges affecting hardware technology companies today.
Gemalto took a closer look at how companies are or have integrated a software monetization strategy into their business processes. Using data we gathered from surveying 300 business decision makers in hardware technology companies, across five major global markets to highlight global trends and regional differences. In this webinar we share our findings.
Are you currently using or considering SAP® Analysis for Microsoft Office as a reporting solution? Although positioned as an ad hoc and multi-dimensional analysis tool that makes it easy to filter and manipulate data in Excel, the offering creates some challenges for Finance. In this webinar, we will focus on four key areas to keep in mind when using or considering SAP® Analysis for Microsoft Office.
In this webcast, you will learn:
How to tap into the many benefits of native Excel, not provided by Analysis for Office;
Create reports directly from SAP in real-time;
Reduce the reliance on IT to create and maintain reports;
Empower users to both consume, but also model and enrich reports.
The use of microservice architectures has exploded over the past couple years, but does that mean they are right for every business? When it comes to building a business case for containers and microservices, how do you determine whether or not this model is the right fit for your organization?
Join this live expert panel moderated by Haidee McMahon, SDDC Technical Solutions Marketing Manager at Intel, for a deeper look and discussion around deriving value from microservices. Whether in a complex data center app or a web or mobile app hosted on cloud infrastructure, what is the underlying architecture behind the scenes? What are the pros and cons from a UX/UI perspective, if any, and how do you make a case for microservices in your enterprise?
Chris Priest, Senior Consultant & Technical Lead, Amido
Duncan Doyle, JBoss Technology Evangelist, Red Hat
Roel Hodzelmans, Senior Solution Architect, Red Hat
Serving the two masters of stability and agility is a balancing act for today’s IT leaders—and the reason traditional IT structures are struggling to remain competitive. To keep pace with the changing needs of the digital enterprise, leaders should learn best practices for creating new teams—such as DevOps or an SRE function—to support the growing demands on IT.
View the on demand webinar originally hosted on DevOps.com and gain insights into:
- Why IT organizational change is essential to meeting new business demands
- How a bimodal strategy delivers the best of both worlds: stability and agility
- Tips for choosing the right DevOps tools for your organization
Great microservices applications are backed by strong APIs. But APIs are complex, and management solutions are expensive.
Here’s what you really need to know about routing microservices traffic, including:
-What is an API gateway?
-Where does your API management tool live in your stack?
-What new security concerns are being introduced by APIs and microservices?
-What problems can an API gateway solve on your journey from monolith to microservices?
Join this webcast with Charles Pretzer, Technical Architect, and Floyd Smith, Director of Content Marketing at NGINX as they answer these questions and more for migrating to a microservices architecture.
Building containerized cloud-native applications require learning and implementing new patterns which are essential for distributed applications. Circuit breakers, canary releases, blue-green deployment, dark launches, tracing and more which have been being implemented across many applications using the popular Netflix OSS libraries and various Spring Cloud annotations throughout your business logic. If using other frameworks or languages, you'll have to contaminate your business logic with even more boiler-plate and glue code.
In this webinar, we will introduce Istio service mesh and how it changes the way you build cloud-native applications and reduces the programming overhead of building distributed architectures.
Software development teams using the diverse tools and languages of the cloud native world face formidable hurdles safely releasing software fast. Artifactory acts as the single source of truth across languages, package types, build tools, and deployment targets. In this webinar, we’ll look at how using JFrog Artifactory with Canonical's Distribution of Kubernetes brings new levels of productivity and efficiency to your development pipelines.
Cloud Foundry from the Linux Foundation is a collection of complementary open source technologies focused on application developers and operators, as well as many projects to support and extend them.
In this webinar on April 24th, Chip Childers will provide an overview of Cloud Foundry technologies (Application Runtime, Container Runtime and BOSH) discussing use cases and core project updates. He will discuss the technical benefits of the platform, focus areas for 2018, and major highlights from the Cloud Foundry Summit, April 18-20 in Boston, MA.
In the storage community, flash is definitely the new normal; so much so that box-to-box or array-to-array comparisons aren’t all that differentiated these days. So what separates the average from the outstanding, when it comes to flash storage arrays? HPE believes that it is storage that 1.) leverages predictive analytics, 2.) is cloud-ready and is able to understand your application, regardless of where it resides, and 3.) is timeless, with characteristics that protect your IT investment. In this webinar, Jorge Maestre, HPE Storage evangelist and influencer, drills down into these new age storage requirements. Take predictive analytics for example. Think about the possibilities in your datacentre, when storage can take advantage of intelligence coming from 10’s of thousands of arrays, to make your experience better – from a support perspective, from a usability perspective, and from an all-around ownership perspective. You’ll come away with a new appreciation on how predictive analytics is a game changer for storage.
Presenter Bio: Jorge Maestre, Senior Technologist & Strategist for Worldwide Storage at Hewlett Packard Enterprise, also known as “The World’s Strongest Technologist” because of his rare combination of powerlifting and long-standing technical experience. He started his career on the customer side as a Data Center Architect, then moved into a sales role. Jorge left the block storage world to take on the role of evangelist for a small startup focused on a File and Database solution, and then for a second startup focused on Container/Application Virtualization technology. After a successful acquisition, Jorge returned to the world of block storage with HPE. As a subject-matter expert & strategist Jorge has forged a unique perspective of the storage industry by developing a deep understanding of the market, and the individual vendors, through thorough examination of their financial position, technological offerings, & strategic directions.
When it comes to your critical business questions, are you a spectator or an implementer? Today’s most effective companies blend approachable, business-relevant tools for data exploration with sophisticated technology under the hood to deliver an optimal user experience. Delivering visually appealing insights augmented with machine learning technology helps users better understand the what, why, and what now when it comes to their most pressing business questions.
On this webinar, join as Mike and Dan discuss how empowering users with analytics in context can deliver tangible results. The webinar will explore recent research findings and real-world examples related to:
- Top business challenges driving the urgency for better analytics
- Market-wide shifts in user technology preferences
- Best-in-Class approaches for magnifying analytical insight (e.g. machine learning, AI)
- Quantifiable business impact of today’s leading analytics
The payments landscape is changing. Ever-increasing payment options and growing global customer bases leads to a whole lot of complexity and a whole host of potential issues, like payments fraud which is reaching record highs.
And payments are all the more complex in the Subscription Economy where businesses have to manage ongoing recurring payments versus one-time purchases.
In this changing payments landscape how can you manage fraud explosion, limit attrition, satisfy customers’ varied payment demands, and protect your company?
Join Jim Cho, Executive Director of Business Development at JPMorgan Chase & Co, and Kristin Hagen, Global Head of ISVs and Technology Partnerships at Zuora, to learn how to master the changing landscape of payments in the Subscription Economy.
Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.
The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.
Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.
In this webinar, you will discover:
•The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
•How to successfully mitigate medical device security risks
•Strategies you can implement today to secure medical devices
Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.
In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:
•Understand the several options available today to secure the public cloud
•Build a strategy to manage and reduce your public cloud risks
•Deploy security with a frictionless approach in a multi-cloud environment
Our guest host this week will be CloudCheckr's Chief Product Officer, Jeff Valentine. Attendees will get a direct line to an innovative leader, with the opportunity to ask him questions throughout the webinar.
Jeff will be sharing his tips and recommendations for securing your SaaS vendors and your public cloud.
Viewers will learn how to utilize elements of the EU's GDPR (General Data Protection Regulation) and public policy compliance and contracts, as well as our specific product features that support security in your infrastructure.
This webinar is FREE to everyone, and will go live on Tuesday, April 24 at 2pm Eastern Time.
A recent Threat Stack survey finds that over 50% of companies admit to cutting back on security measures to meet a business deadline or objective. As long as companies are willing to sacrifice security at the altar of speed, the long-held dream of marrying DevOps and security simply won’t come true.
Join this webinar to hear Pete Cheslock, Threat Stack head of Ops, and Franklin Mosley, PagerDuty Senior Application Security Engineer discuss the current status, gaps, and obstacles of DevSecOps. Here are just a few of the survey findings:
• 68% of companies say that their CEO demands DevOps and security teams not do anything that slows the business down
• 57% percent of companies say their operations team pushes back on security best practices
• 44% of developers are not trained to code securely
In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the high availability Ultrastar® Serv24-HA NVMe all-flash storage server.
Combining high performance NVMe™ SSDs and two redundant blade servers based on Intel®’s Purley architecture into one tried and tested unit, the Serv24-HA enables customers to come to market quickly with a multitude of dependable software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
Join Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Behavioural Analytics with Magnifier’ on April 25th at 10.30 a.m. (BST)
During this event Bertrand Le Bail, Cybersecurity Systems Engineer for Palo Alto Networks Magnifier, Logging Service and Application Framework will introduce the concept of behavioural analytics and show how to rapidly identify and defeat targeted attacks with cloud-delivered analytics and machine learning.
Attend this webinar to find out:
- How to win back control of your security events using unique machine learning functionality
- Discover how Magnifier from Palo Alto Networks can help you expose the stealthiest attacker during advanced cyberattacks
With increasing digital disruption and demand for rapidly evolving business software, independent software vendors (ISVs) and software providers are looking for an open platform as a service (PaaS) that offers high-value innovation capabilities as well as a broad choice of programming, database, and multi-cloud deployment alternatives.
Join our Webinar and learn how you can tap into multi-cloud deployment scenarios. Find out how you can benefit from the features of SAP Cloud Platform, our PaaS; Cloud Foundry services; and the “Build” engagement model of the SAP PartnerEdge program* to rapidly innovate and build multi-cloud apps.
• Topic: Disruption with Purpose: Building Multi-Cloud Apps with SAP Cloud Platform
• Audience: ISVs, software providers, and existing SAP partners
• Date: Wednesday, April 25, 2018
• Time: 10:00 a.m. EST
- Opportunities to create software and business models based on multi-cloud apps
- How to take advantage of SAP Cloud Platform and Cloud Foundry services
- The advantages of the “Build” engagement model of SAP PartnerEdge
• Riley Rainey, Senior Director, Global SAP Cloud Platform Center of Excellence
• Christian Baader, VP Strategy & Marcom, SAP Global Channels & Platform GTM Ecosystem
Join us and explore the creation of new business models based on multi-cloud deployment models that help drive end-to-end digital transformation for your customers.
* Learn more about the “Build” engagement model and SAP Cloud Platform at the Application Development Partner Center.
As we enter a new age of automation — where every company needs to be able to deliver better software, faster — our goal is to provide the tools you need to iterate faster, ship sooner and deliver more customer value.
We recently announced brand new products, Puppet Tasks™ and Puppet Discovery™, to give you greater control and end-to-end visibility over your software delivery.
Listen in as Eric Sorenson, Director of Product Management, and Mike Smith, Sales Engineer cover an in-depth look at what’s new:
• Puppet Discovery is a new offering that lets you see everything you have in real time across your on-premises, cloud and container infrastructure, and know what you need to automate next.
• Puppet Tasks, a new family of offerings that encompass both Puppet Bolt™and Puppet Enterprise Task Management, makes it simple to automate ad-hoc tasks, deploy one-off changes, and execute sequenced actions in an imperative way.
• With Puppet Pipelines, we’re uniting the entire software delivery lifecycle, to bring you a platform built for the enterprise, that integrates with a wide variety of tools and helps you avoid vendor lock-in.
The new latency histogram makes it quick and easy to discover and characterize latency behaviors in your application. The new sub-trace preview immediately shows you what's slow for a particular category. These powerful new features work for any service, span or tag values which provides you unparalleled flexibility. Join us for this webinar as Dennis Chu, Director of Product Marketing at LightStep, showcases these new capabilities.
Digital disruption has come to insurance. And it’s being driven by digitally-empowered customers. Insurers need to adopt business and operating models that are more customer-focused, more collaborative, and more responsive in order to compete with the insurtech digital upstarts.
Join this webinar to hear Oliwia Berdak of Forrester Research and insurance transformation expert Sean Hull, who has worked with the likes of Allianz and Accenture, share practical advice on how to deliver a compelling digital customer experience, including:
-Selecting where best to start your digital transformation journey
-How to continually adapt and change in response to customer demands
-Learning from, rather than being threatened by, the digital native competitor
Who should attend: Digital Technology Leaders, Application Development Leaders, IT, Business and Process Professionals from across Insurance sectors
Last December, we announced a Kubernetes Cloud Native Platform in partnership with Rancher Labs. Built on Canonical’s Distribution of Kubernetes and Rancher 2.0, the Cloud Native Platform will simplify enterprise usage of Kubernetes with seamless user management, access control, and cluster administration. Join our webinar to get a tour of the platform!
There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.
Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.
In this webinar, you’ll learn:
•Why so many attacks succeed and how to stop them
•Effective techniques to protect against malware, exploits and ransomware
•Next steps for successful endpoint protection
IT leaders agree that performance monitoring is absolutely critical to their success, yet the design and execution of a monitoring strategy can often be an afterthought. During this webinar, LogicMonitor and AWS will present the key components of a world-class performance monitoring strategy, along with a framework to improve monitoring effectiveness.
We'll cover best practices for:
Achieving visibility into the performance, availability, and cost of your cloud environment, and visualizing this alongside the rest of your hybrid IT infrastructure
Alerting on monitored data, and routing alerts to ensure that the right people are notified of issues
Leveraging dashboards and performance insights in order to reduce time spent troubleshooting
Interested in learning how you can manage the performance of your microservices and characterize latency? Join us as Dennis Chu, Director of Product Marketing at LightStep, shows how you can use sophisticated histograms and distributed tracing views to quickly and easily pinpoint the root cause of performance issues.
As business models shift, so too do the ways success is measured. A new set of operating metrics is needed in the Subscription Economy.
Unlike traditional financial metrics, these metrics are forward-looking metrics that give insight into your customer’s success. There are many theories about these metrics and those theories have evolved over the past 5 years. Zuora now presents you with a chance to learn from the experiences of finance and operations experts who have steered a subscription business through multiple stages of growth and maturity.
Watch the webinar and learn:
° How best-in-class companies are measuring their customers' Subscription Experience across the entire lifecycle, from marketing influence to sales effectiveness to customer adoption and success
° How you should think about these metrics differently as your business goes through different stages of growth and its lifecycle
° How to empower your teams, solidify your company’s relationships with your customers, and be the prime catalyst for major growth in your business
The adoption of DevOps fundamentals has changed the game of software delivery. And DevOps has come a long way from being a methodology that was considered, “for startups only” to what it is today—a culture and people first approach to engineering that enables teams to deploy faster, eliminate silos, and iteratively improve no matter your size. Do it right, and your team stands to release much faster, predictively, and safely, while mitigating unplanned work and making it easier to get ahead of customer experience.
Join us as we discuss the future of DevOps with leaders from Pivotal, New Relic, and PagerDuty. We’ll look back at where DevOps has been, what it’s brought to the table, and where it’s going.
• What are the biggest challenges organizations face when cultivating DevOps adoption?
• What key fundamentals of DevOps are here to stay?
• Can DevOps best practices and fundamentals be adopted beyond the engineering team?
• Is it time for the enterprise to finally embrace DevOps?
• What’s the next big thing for DevOps?
Tori Wield, Developer Advocate, New Relic
Tony Hansmann, Field CTO, Pivotal
Matt Stratton, DevOps Evangelist, PagerDuty
Vera Chen, Technical Marketing Manager, PagerDuty
Review the main challenges that the multi-brand retail sector faces today such as the changed purchasing habits of omnichannel shoppers, greater assortment complexity, and the growing competition, both online from e-commerce pure-plays and offline from brands that have shifted from being primarily wholesale companies to powerful retail giants.
Learn how Openbravo can help multi-brand retailers compete better in this more challenging environment, by improving the quality of sales forecasts, for example, or making it quicker and easier to introduce new products, or improving customer service with mobile POS.
When requesting budget for new tooling a service leader's biggest ‘enemy’ is last year’s result. Why would you need extra budget when you’ve had a track record of year-over-year margin contribution without that budget? In this webinar Coen Jeukens, Director of Global Customer Transformation at ServiceMax from GE Digital will explain how you can articulate value above and beyond business as usual. Discover how to use metrics that matter to the decision makers in the board and deliver instant success.
A common approach for addressing a security initiative is to make assumptions about the underlying problem that needs to be solved. Too often, those assumptions are incorrect. In those cases, security practitioners end up wasting resources with little to show for it.
Join Fernando Montenegro, Senior Analyst at 451 Research, as he presents an alternative framework for evaluating the fundamental issues that may hinder an initiative’s progress in a specific scenario. This framework allows practitioners to consider whether the issue is driven by incentives, information, investment, or irrationality which will help determine the appropriate path for addressing them in the context of security. With this knowledge, the security practitioner can tackle the problems with confidence and make real progress in their environment.