Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
Maintaining accountability across an ephemeral IaaS infrastructure can be a challenge for Finance and DevOps teams. With the proper tagging strategy and implementation, organizations can manage cloud costs around their EC2 instances and resources.
Join CloudCheckr March 22nd at 2 pm Eastern, 11 am Pacific for a live webinar discussing proactive tactics and tips to execute an AWS and Azure tagging strategy as your organization scales, including:
- Tagging rule guidelines to gain visibility and control over your asset inventory
- Cost allocation reports and tools to understand cloud expenses and recognize optimization opportunities
- How CloudCheckr can help enforce tagging policies and reduce cloud costs
Security by design examines a wide range of issues, such as: control responsibilities; the automation of security baselines; the configuration of security; and the auditing of controls for AWS customer infrastructure, operating systems, services and applications. This standardized, automated, prescriptive and repeatable design can be deployed for common use cases, security standards and audit requirements across multiple industries and workloads.
The Utilities sector is under constant pressure caused by raising customer expectations, ever changing regulations and technical complexities. To thrive amid these challenges, Utilities enterprises need to transform with an aim to renew and enrich user experience for their customers, while driving profitability.
With strong industry expertise, Wipro, as a strategic partner of Oracle, is helping the Utilities enterprises to embrace the latest version of Oracle's Customer Care & Billing applications for a superior experience.
Join our webinar to know how Wipro ensures a smooth and accelerated upgrade to CC&B 2.6 lowering risk and total cost of ownership.
Big Data is an exciting concept and emerging set of technologies that hold seemingly unlimited promise to enable organisational transformation, gain new analytic insights and operational efficiencies. It is a unique architecture that enables low-cost, high-speed, parallel processing of huge data sets of structured and unstructured data. When used in an enterprise environment, however, the importance of data security becomes paramount. Organizations must protect sensitive customer, partner and internal information from an increasing array of advanced threats and risks, and must adhere to a complex set of privacy laws and compliance requirements.
These challenges often prevent organisations from maximising the value of their data. That’s why we’re running a new webinar series designed to offer telecoms a wealth of best practice advice to
•Unlock the power of big data
•Monitise data held
•Securely migrate into hybrid environment
Voltage experts Anna Russell and Reiner Kappenberger will be on hand to guide you through how Micro Focus has helped the world’s leading Telcos, using real world, big business scenarios and to help you gain an advantage.
Is your continuous delivery pipeline vulnerable? How do you bring the control and visibility required to ensure security?
As the world becomes increasingly interconnected, the opportunities for data breaches have risen proportionately. Privileges are extended to users and bots to perform a specific job and often aren’t revoked upon completion. Administration credentials are being stolen and compromised accounts and unmanaged systems are proving to be real threats to enterprises. It’s clear that user governance isn’t a luxury then, it’s an imperative.
CA Privileged User Governance (CA-PG) provides the functionality required to safeguard businesses from unauthorized access and breaches. It enables a high level of control, auditability and transparency to be introduced to your organization’s privileges.
By combining CA-PG and Automic Release Automation, you can automatically provide – and revoke – users and bots with necessary access credentials and privileges as and when needed. Doing so limits the risk of unauthorized access and potential data breaches.
This Webinar Explores:
Automic Release Automation – what it is and why it’s the industry-leading solution
The goals and challenges of continuous delivery
CA Privileged User Governance
Though much is made of the potential of Deep learning, architecting and deploying a Deep Learning platform is a daunting proposition, especially when trying to leverage the latest GPUs and I/O technologies.
By attending this webinar, you'll learn about:
• Implementation Hurdles - We'll provide an overview of avoidable hurdles associated with why Deep Learning initiatives, especially with newer accelerated (GPU) architectures.
• Comparing Common Frameworks - We'll compare and contrast popular Deep Learning architecture(s) and tools might be useful for your organization, to assist you in choosing the one that's most appropriate.
• Performance Considerations - Explore the unprecedented Deep Learning performance gains that are possible, utilizing POWER8 with NVLink, along with the NVIDIA P100 GPU.
The accelerated adoption of industry-specific cloud solutions has made discrete manufacturing one of the largest growth opportunities for solution providers and independent software vendors (ISVs). With over 37,000 customers in the discrete manufacturing sector, SAP, our industry innovation, and SAP partner programs can play a vital role in supporting software providers that are looking to access this growth market.
Join us on Thursday March 22 and learn about SAP’s strategy for discrete manufacturing industries covering automotive, industrial machinery & components, high tech, and aerospace & defense.
Participants will hear about the opportunities to build and monetize industry cloud apps with SAP Cloud Platform as extensions to SAP S/4HANA Cloud, SAP Hybris solutions, or SAP SuccessFactors solutions.
Join our Webcast and learn about:
1. SAP’s discrete manufacturing (DM) industry strategy
2. SAP Cloud Platform and extending DM industry solutions
3. Taking apps to market with exposure to over 37,000 SAP customers in DM
4.The advantages of the SAP PartnerEdge – Build engagement model
‘After the Webinar, participants may submit a use case proposal for review. Respondents with approved submissions will be invited to a free on-site workshop (held in Waldorf, Germany and Atlanta, US), to facilitate development and design coaching of their solution extension.’
Audience: Software providers, ISVs, and existing SAP partners
Date: Thursday, March 22, 2018
Time: 10:00 a.m. EST
• Kerstin Tinter, Global Head of Discrete Manufacturing Industry Ecosystem, SAP
• Heiko Flohr, VP Discrete Industries Product Management, SAP
• David Sacks, Senior Director, Platform Partner Ecosystem, SAP
Working with COBOL data files, including the creation of reports, often requires specialty tools and developer skills. It’s time to improve business continuity, application availability and to work with COBOL data files in real time, using off-the-shelf analysis and reporting tools.
Join Micro Focus on 21st February to:
Discover the real challenges many teams face in working with COBOL data files
Understand how to work with COBOL data files using familiar tools such as Excel and Crystal Reports
See how to easily integrate existing COBOL applications with RDBMS technology with minimal code change
Learn how to leverage open source database platforms, reducing application and infrastructure costs
Unlock the value of business application data using the latest modernization tools from Micro Focus. Join us on 21st February, 2018 for an exciting webinar discussion, demo and Q&A.
Mobile applications, agile development methods and continuous testing are solidly linked together as fast time to market is key to success. However many development departments struggle today in actually getting this to work due to lack of processes, lack of know-how and lack of integrated, open and automated toolchains.
In this webinar we will provide a perspective on how to achieve faster time to market without compromising quality and show a live example on how to get it to work. An end to end demo focused on automation and visibility.
Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
-The status of 802.11ax and ay
-An overview of 5G cellular and how it will effect wireless
-How infrastructure will adapt to support these new developments
How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.
- The Big Picture: Why are we all investing in HR?
- Real World Examples: What's possible in HRSD
- Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
- Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.
There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.
Each section will be divided into:
-Threat description: Attack vector and why it affects containers in particular.
-Docker security best practices: What can you do to prevent this kind of security threats.
-Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
Organizations create roadmaps to communicate strategy. Roadmaps must have the right level of granularity and connect strategy with implementation to ensure desired outcomes are achieved and value is delivered. Roadmaps provide the benefit of visualizing future business outcomes in order to make better-informed investment decisions.
Join Andy and CA’s Jim Tisch as they address:
•Why product roadmaps are more important than ever in an agile operating environment
•How roadmaps can be leveraged to develop proactive solutions that guide industry trends
•The importance of integrated product and project portfolio management
•The need for active roadmap management across the entire product portfolio
This webinar will not only challenge your assumptions on modern business management, it will provide you a tangible action plan to improve your success through better product roadmap management. Don’t miss out, sign up today.
This webinar will examine concepts for managing sensitive data in AWS. For example, using tools to encrypt client access with AWS Certificate Manager; secret management with AWS Systems Manager Parameter Store and its integration with deployment pipelines; and how to encrypt data at rest to ensure privacy.
In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.
Join us for this webinar to learn about:
• The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
• How you can leverage threat intelligence to secure your apps and data
• Where to spend your security budget to provide the strongest level of protection
Pure, as one of the leading CRIS (or research information management RIM) systems, has facilitated the emergence of exciting opportunities for research organisations to transform their support for researchers, with many research libraries taking an increasingly important role. Broadly defined, RIM is the aggregation, curation, and utilization of information about institutional research activities, and as such, intersects with many aspects of traditional library services in discovery, acquisition, dissemination, and analysis of scholarly activities.
OCLC Research has been working with members of its international OCLC Research Library Partnership, including the University of St Andrews in Scotland, on a publication to help libraries and other institutional stakeholders to understand developing RIM practices and, in particular, their relevance for service and staff development purposes.
In this presentation, we will provide an overview of the OCLC position paper and provide a case study from the University of St Andrews.
According to IDC, only IBM Power Systems servers are designed specifically to work with data-intensive workloads such as SAP HANA.
Organizations that have the most to gain using SAP HANA on IBM Power Systems are:
• Businesses with SAP HANA appliances due for a refresh
• Organizations on commodity architecture moving to SAP HANA
• Businesses with a traditional database and SAP applications on IBM Power Systems
• Businesses on IBM Power Systems that currently do not have SAP
This webinar featuring IDC Research Analyst Peter Rutten's details the findings and how using IBM Power Systems can reduce migration risks and broaden your options for a hybrid cloud infrastructure.
May 25, 2018 is just around the corner, and that means you must evaluate your organisation's content, including where it's stored and where it's processed. You're responsible for getting your organisation GDPR-ready over the next few months — whether your data is within your company's walls or outside your business.
To avoid hefty fines, make sure you select vendors who are not only compliant with the GDPR, but who also proactively help you streamline your GDPR readiness journey.
View this webinar, where Crispen Maung, the VP of Compliance at Box covered:
- The GDPR requirements your vendors must meet
Which questions to ask when evaluating cloud platforms for GDPR readiness
- How Box helps customers address critical GDPR requirements
Today, modern, Customer Support teams use thoughtful, intuitive technology to solve customer issues at light speed. In some cases, they have even transformed from a cost center to a juiced up revenue producer.
In our March Lunch and Learn our Customer Service experts will show how to do just that, with real-world examples from companies winning Customer Service right now, and a live demo.
There could be many reasons why you started down your Agile journey. There will be many more reasons why you continue with that journey today and in the future. But ultimately you have to deliver meaningful business results, and that requires you to validate your achievements and adjust as needed.
In many organizations this requires change. You might not be measuring the most important factors, which could result in a misunderstanding of the value of Agile.
Join ProjectManagement.com SME and industry expert Andy Jordan to discuss:
-The importance of tying Agile performance to business results
-Establishing the right, business focused metrics
-How customer focused metrics drive business performance
-The need to evolve and mature your metrics over time
As always in one of Andy’s webinars he will not only make you think and challenge your assumptions, he will provide a tangible plan to help you take the concepts of effective metrics and measurement into your organization to drive even greater Agile success.
Using community-based software often puts your organization at risk for security breaches and performance issues. If you have deployed the WildFly and JBoss Application Server open source projects, you may want to consider Red Hat® JBoss® Enterprise Application Platform (JBoss EAP), which is a derivative of WildFly 10.x, but provides security and performance support through May of 2029.
Join this webinar to learn about the:
• Differences between projects and products and benefits of using products.
• Security challenges of community-based open source enterprise software at scale.
• Security intrusion costs to industry.
• Importance of cyber initiatives to CIOs.
• Open source software innovation model
RGPD, quelles solutions pour héberger vos données ?
Vous le savez, l’entrée en vigueur du RGPD au 25 mai 2018 va modifier en profondeur la façon dont les organisations conservent et gèrent leurs données, et celles de leurs clients. Vos fournisseurs ont des solutions à vous proposer, mais sont-elles conformes ? Vous vous perdez dans la "jungle" des certifications ?
Alors pour vous aider à y voir plus clair, nous avons invité deux spécialistes de la société Box, Elena Gilotta , Director of Legal Compliance (Data Privacy) et Jeremy Grinbaum , VP Europe du Sud. Pendant 35 minutes, ils répondront aux questions de Guy Hervier, notre rédacteur en chef.
Vous pourrez découvrir en détail quelles solutions s'offrent à vous pour héberger vos données dans un cadre strictement conforme à la RGPD.
Running SAP HANA is undoubtedly a sound business decision, but not enough thought is given to the platform being run on. Most people think of the infrastructure as a box to be added to the hardware pool. But not all platforms are born equal.
IBM’s Power Systems bring to the table a radically different approach to the way SAP HANA is being used. There are significant benefits in the flexibility, cost of operation and the performance delivered by the IBM solution, as well as future options for growth compared to the traditional x86 servers.
This free webinar goes in depth, detailing the ways in which the Power architecture delivers benefits across the board.
Enterprises of all sizes are awakening to a big shift in their legacy Wide Area Networks (WANs). Emerging technologies like SD-WAN are targeting the cost and complexity of established approaches like MPLS and Site-to-Site VPNs. Globalization, the move to cloud datacenters and applications, and the increasing velocity of security threats, demands IT to move faster and do more with less resources.
In this webinar, WAN expert, Jim Metzler founder of Ashton, Metzler & Associates will discuss his recent research “The 2018 Guide to WAN Architecture and Design: Key Considerations when Choosing new WAN and Branch Office Solutions”. Ofir Agasi, Director of Product Marketing at Cato will review pertinent case studies and strategies used by global and regional enterprises to adapt their networks to meet today’s business challenges.
Your first backup appliance was great, but how did you feel about your fifth? As data sets explode into the realm of petabytes, most backup appliances can’t scale to meet the capacity needs of a digital company. The lack of scalability forces companies to buy multiple backup appliances, creating the ‘backup appliance sprawl’. The more backup systems companies have to manage, the more time it takes to balance, monitor and maintain.
Join members of Western Digital and StorReduce to learn about a scale-out deduplication software that enables primary backups to be stored directly on object storage based private or hybrid cloud, eliminating backup appliance sprawl. In this webinar you’ll learn how this technology allows you to:
•Save up to 70% or more for backup environment TCO while retaining your existing backup applications
•Reduce hardware refresh cycle for backup appliances
•Scale as you need without migrations or rip-n-replace hardware changes
•Build a “Data Forever” environment with extreme data durability
Just because Easter is around the corner doesn’t mean your backup appliances should be multiplying like rabbits. Register today!
Feeling bludgeoned by bullhorn messaging suggesting your monolithic behemoth should be put down (or sliced up) to make way for microservices? Without question, “unicorn-style” microservices are the super-nova-hot flavor of the day, but what if teaching your tried and true monolith to be a nimble, fast-dancing elephant meant you could deploy every week versus every 6 to 9 months?
In this session, we’ll look beyond the hype to understand the deployment model your business case actually demands, and if weekly deployments courtesy of a dancing (or flying) elephant fit the bill, love the one you're with as you lead the organization's journey to digital transformation.
With new technologies such as Hive LLAP or Spark SQL, do you still need a data warehouse or can you just put everything in a data lake and report off of that? No! In the presentation, James will discuss why you still need a relational data warehouse and how to use a data lake and an RDBMS data warehouse to get the best of both worlds.
James will go into detail on the characteristics of a data lake and its benefits and why you still need data governance tasks in a data lake. He'll also discuss using Hadoop as the data lake, data virtualization, and the need for OLAP in a big data solution, and he will put it all together by showing common big data architectures.
DevOps is a crucial element of digital transformation, but how do you avoid hidden pitfalls when adopting the practice?
In today’s application economy, behind every digital transformation success story, there’s the agility facilitated by DevOps. And with agility the key to both success and survival, businesses are rushing to implement DevOps across their organization. But for each successful DevOps story, there’s at least one example of failure. In their haste to achieve agility, organizations the world over are making the same mistakes.
In this webinar, Automic’s own Product Marketing Director, Ron Gidron discusses the Top 10 Ways to Fail at DevOps as learned from organizations around the globe. But, in taking a look at how to fail at DevOps implementation, Ron has also been able to uncover the successful patterns of DevOps high achievers.
This Webinar Discusses:
Lessons learned from companies attempting to adopt DevOps
The need to recognize and fund DevOps as part of your digital transformation initiative
Successful patterns demonstrated by DevOps high achievers
This webinar is part of BrightTALK's Founders Spotlight series. In the eighth episode of this series, Harriet Jamieson interviews Dr. Mik Kersten, founder and CEO of Tasktop.
Mik, who has been voted a JavaOne Rock Star speaker twice and is creator and leader of the Eclipse Mylyn open source project, will share how he founded Tasktop. Holding a PhD in Computer Science from the University of British Columbia, Mik has been an Eclipse committer since 2002, is an elected member of the Eclipse Board of Directors and serves on the Eclipse Architecture and Planning councils.
Mik will share his expertise and take live audience questions on software development tools, productivity tools, application lifecycle management, Agile, Eclipse, Mylyn and Java.
Your IT department has its hands full keeping your day-to-day operations in check while working on new projects. They don’t have the time or often the expertise to integrate a new acquisition into your current IT environment. Ask yourself – could your company’s IT department completely integrate a new acquisition in less than 30 days?
In this quick 30-minute webinar, you’ll learn Accudata’s proven formula for success – and understand how IT can enable your M&A business goals. We will cover:
• Why IT departments struggle with business acquisitions
• How to prioritize IT integration tasks
• Accudata’s five-step proven process to make M&A less complicated
• Review a customer example that includes integrating 35 new sites and 600+ users into an existing organization in less than 30 days
As more and more containerized applications get moved into production environments security & compliance become greater concerns. In this webinar we'll review PCI compliance initiatives, talk about how containers change your compliance lifecycle, and how to stay compliant while maintaining the benefits of containers.
Specifically we'll cover
- Live examples of user activity auditing
- Managing dynamic network maps of your containerized infrastructure
- Container Intrusion detection
- Forensic analysis of unauthorized data access
Following an extensive research update for 2018, join Adrian Lane, analyst and CTO at Securosis, and Amir Jerbi, co-founder and CTO at Aqua Security, for an in-depth look at container security challenges, best practices, and benefits.
While a lot has changed and improved in the container ecosystem, enterprises are still trying to find the most effective ways to ensure security and compliance. Having researched this topic in 2016, and once again in recent months, Adrian will provide insights into key areas:
How security risks shift in the era of containers, making traditional security tools insufficient key areas to focus on, including the build pipeline, container contents, host security, runtime security, monitoring, and auditing.
Best practices and benefits of deploying containers with security in mind
Moving to the Cloud can be daunting, but it doesn't have to be. With the right team of experts, who have been through countless migrations, you can make the move and not the mistakes.
In this webinar, attendees will hear from JHC Technologies, a leading Managed Services Provider that specializes in migrating enterprises and public sector organizations' data centers to the public cloud. Additionally, CloudCheckr will discuss tools to automate security and optimize cost once in the cloud.
As data analytics becomes more embedded within organizations, as an enterprise business practice, the methods and principles of agile processes must also be employed.
Agile includes DataOps, which refers to the tight coupling of data science model-building and model deployment. Agile can also refer to the rapid integration of new data sets into your big data environment for "zero-day" discovery, insights, and actionable intelligence.
The Data Lake is an advantageous approach to implementing an agile data environment, primarily because of its focus on "schema-on-read", thereby skipping the laborious, time-consuming, and fragile process of database modeling, refactoring, and re-indexing every time a new data set is ingested.
Another huge advantage of the data lake approach is the ability to annotate data sets and data granules with intelligent, searchable, reusable, flexible, user-generated, semantic, and contextual metatags. This tag layer makes your data "smart" -- and that makes your agile big data environment smart also!
Mobile Users don’t accept bad performance or dysfunctional applications and abandon bad apps with a wipe of their hand. Bad mobile applications are far more complex to test given the fragmentation of devices out there and different network conditions in real life that are difficult to simulate in development labs.
In this webinar we cover the Micro Focus approach to these issues and provide a live showcase on how to secure a stable app that exactly does what it is supposed to do.
When monitoring an increasing number of machines, the infrastructure and tools need to be rethinked. A new tool, ExDeMon, for detecting anomalies and raising actions, has been developed to perform well on this growing infrastructure. Considerations of the development and implementation will be shared.
Daniel has been working at CERN for more than 3 years as Big Data developer, he has been implementing different tools for monitoring the computing infrastructure in the organisation.
Attend this session to learn how to easily share state in-memory across multiple Spark jobs, either within the same application or between different Spark applications using an implementation of the Spark RDD abstraction provided in Apache Ignite. During the talk, attendees will learn in detail how IgniteRDD – an implementation of native Spark RDD and DataFrame APIs – shares the state of the RDD across other Spark jobs, applications and workers. Examples will show how IgniteRDD, with its advanced in-memory indexing capabilities, allows execution of SQL queries many times faster than native Spark RDDs or Data Frames.
Akmal Chaudhri has over 25 years experience in IT and has previously held roles as a developer, consultant, product strategist and technical trainer. He has worked for several blue-chip companies such as Reuters and IBM, and also the Big Data startups Hortonworks (Hadoop) and DataStax (Cassandra NoSQL Database). He holds a BSc (1st Class Hons.) in Computing and Information Systems, MSc in Business Systems Analysis and Design and a PhD in Computer Science. He is a Member of the British Computer Society (MBCS) and a Chartered IT Professional (CITP).
Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.
Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:
• PHY and MAC layer enhancements for better traffic management
• Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
• Considerations for clients and wider network enhancements
Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.
Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks, for an exclusive cybersecurity webinar on March 28th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.
This is a ‘must attend’ event if you want to understand:
- The security, risk and compliance ramifications of operating unpatchable systems and applications
- How to prevent security breaches on legacy machines when patching is not an option
A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.
Businesses looking to move to next-generation enterprise applications, like SAP S/4HANA, must evolve various aspects of their business. A highly important, but often overlooked requirement is the transformation of business data to match the new environment. Getting the data right is critical to ensuring a successful transformation.
Join our guest speaker George Lawrie, Vice President and Principal Analyst at Forrester Research, and Rex Ahlstrom, Chief Strategy and Technology Officer at BackOffice Associates, in this webinar as they discuss:
* Observations on the value of transitions to next-gen apps, like SAP S/4HANA
* The impacts of not getting the data right
* Recommendations for driving best value from transitions
Vice President, Principal Analyst, Forrester Research
George serves Application Development & Delivery Professionals. He brings to Forrester more than two decades of experience deploying global enterprise resource planning (ERP) applications in complex multinationals. During his five years with Forrester, George has led research into topics such as SAP deployment best practices, ERP consolidation, IT investment prioritization, global data synchronization, and trade promotion management.
Chief Strategy and Technology Officer, BackOffice Associates
Rex has over 28 years of technology industry leadership experience. He specializes in enterprise software within the data integration and information management space. Responsible for BackOffice Associates’ current product strategy, marketing and technology in addition to analyst engagement and partnership development, he previously served as CEO of two software start-ups and held major leadership roles at multiple Fortune 500 organizations, including SAP.
As organizations consider migrating applications to the cloud, a business plan and detailed migration plan is critical to success. Version 2.0 covers the key considerations of cloud migration and takes into account the increasing diversity of approaches such as the use of containers, virtual machines and serverless functions, as well as the increasing use of hybrid cloud solutions. In addition, mitigating concerns related to security, privacy and data residency is a major focus of the update.
In this webinar, authors of the paper will discuss each of the six steps outlined in the migration roadmap:
1.Assess your applications and workloads
2.Build a business case
3.Develop a technical approach
4.Adopt a flexible integration model
5.Address compliance, security, privacy and data residency requirements
6.Manage the migration