Enterprise applications have become a crucial piece of infrastructure for many businesses. The enterprise applications community on BrightTALK features the latest insights in enterprise application integration, enterprise application architecture and EAS software. Join the community to gain access to thousands of videos and webinars presented by recognized enterprise information systems experts and arm yourself with the knowledge you need to succeed.
As 2017 comes to a close, you may have budget that falls under “use it or lose it.” If so, consider purchasing a credit towards discounted Reserved Instances for 2018 and beyond! RIs from AWS and more recently Microsoft Azure are a great way to save up to 75% compared to On Demand rates, as long as you know you’ll have a long-term need. You can use that end-of-year budget surplus to make an up-front payment towards a one or three year commitment, making your monthly cloud spend much less.
In this webinar, attendees will:
-Learn how to decide between the various types of RIs including Standard and Convertible
-Understand the terms and payment options
-Explore the tools available to make informed recommendations
Containers can offer significant benefits for applications that are deployed using them. However, deploying containers at scale has significant implications for IT infrastructure, including storage management. A careful examination of the storage challenges presented by the various container systems and orchestration tools is essential to making the right choices for your environment.
This webinar explores the storage challenges and different options for containers, the tradeoffs and functional differences between file, block and object storage approaches, as well as the architectural considerations and the various plugins available to help bring it all together.
Discover how Datera’s self-managing software-defined storage uniquely solves challenges:
-Making storage invisible for Containers
La tecnología móvil ha cambiado la forma en que los clientes esperan pagar y las empresas minoristas que no aceptan pagos móviles pueden quedarse atrás a medida que la adopción de estas tecnologías se vuelve más generalizada. En China, por ejemplo, las transacciones en efectivo casi han desaparecido y los pagos móviles aumentaron más del doble hasta los $ 5 mil millones en 2016, un país donde la solución POS de Openbravo ya acepta pagos móviles con AliPay y WeChat. Los minoristas tradicionales tienen mucho que ganar al aceptar pagos móviles porque brindan comodidad a los consumidores, modernizan la experiencia de tienda, y animan a los compradores a gastar más.
Explicaremos los factores que explican el auge de los pagos móviles y describiremos algunas de las soluciones de monedero móvil más populares, como Apple Pay, Android Pay, Samsung Pay, junto con tecnologías que se centran en países específicos como Alipay, WeChatPay y Google. Tez. El panorama de los pagos móviles está fragmentado y en constante evolución, por lo que aconsejamos a los minoristas que consideren cuidadosamente las tecnologías disponibles. Hay muchas razones para aceptar pagos móviles, pero para hacerlo probablemente necesite actualizar su solución de punto de venta, por lo que le ayudaremos a valorar ventajas y desventajas, y cómo Openbravo puede ayudarle en su estrategia.
RIDE is an all-in-one, multi-user, multi-tenant, secure and scalable platform for developing and sharing Data Science and Analytics, Machine Learning (ML) and Artificial Intelligence (AI) solutions in R, Python and SQL.
RIDE supports developing in notebooks, editor, RMarkdown, shiny app, Bokeh and other frameworks. Supported by R-Brain’s optimized kernels, R and Python 3 have full language support, IntelliSense, debugger and data view. Autocomplete and content assistant are available for SQL and Python 2 kernels. Spark (standalone) and Tesnsorflow images are also provided.
Using Docker in managing workspaces, this platform provides an enhanced secure and stable development environment for users with a powerful admin control for controlling resources and level of access including memory usage, CPU usage, and Idle time.
The latest stable version of IDE is always available for all users without any need of upgrading or additional DevOps work. R-Brain also delivers customized development environment for organizations who are able to set up their own Docker registry to use their customized images.
The RIDE Platform is a turnkey solution that increases efficiency in your data science projects by enabling data science teams to work collaboratively without a need to switch between tools. Explore and visualize data, share analyses, all in one IDE with root access, connection to git repositories and databases.
Responding to the need for an application delivery controller to be fully dynamic, HAProxy Technologies invested a lot of resources into developing HAProxy’s Runtime API and the LB-update module. In this webinar, we will demonstrate the abilities of the Runtime API which enables you to change the behavior of your application delivery controller on-the-fly.
What you'll learn:
How to dynamically scale your server farms
How to perform maintenance on your servers
How to change routing policies
How the LB-update module can be used to dynamically update ACLs and maps by pulling a file from one central place
Big Data has a big reputation. But for many organizations, it hasn’t lived up to the hype delivering real-world outcomes. That’s because Big Data can’t deliver value unless it’s accessible and analyzed in the right way. Qlik and Cloudera technology executives will be cutting through the hype to discuss Big Data technology that is available today and being utilized by customers around the world including the real-world customer examples.
Qlik® is the leading visual analytics platform and the pioneer of user-driven business intelligence. Its portfolio of cloud-based and on-premise solutions meets customers’ growing needs from reporting and self-service visual analytics to guided, embedded and custom analytics, regardless of where data is located. Customers using Qlik Sense®, QlikView® and Qlik® Cloud, gain meaning out of information from multiple sources, exploring the hidden relationships within data that lead to insights that ignite good ideas. For more information please visit: www.qlik.com
2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.
Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:
•Continued political tension in the region
•Mixed security maturity
•The effect of new compliance and data protection laws
Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
Mobile technology has changed the way customers expect to pay and retail businesses that do not accept mobile payments may get left behind as the technology becomes more pervasive. In China, for example, cash transactions have almost disappeared and mobile payments more than doubled to $5 trillion in 2016 -- a country where the Openbravo POS solution already accepts mobile payments with AliPay and WeChat. Brick-and-mortar retailers have much to gain from embracing mobile payments because they provide convenience for consumers, modernize the in-store experience, and can encourage shoppers to spend more.
What Will You Learn?
We will explain the drivers behind the boom in mobile payments and describe some of the more popular “Pay” mobile wallet solutions such as Apple Pay, Android Pay, Samsung Pay, along with technologies that focus on specific countries such as Alipay, WeChat and Google Tez. The mobile payments landscape is fragmented and in constant evolution, so we will advise retailers to carefully consider the technologies available. There are plenty of reasons to accept mobile payments, but to do so you will probably need to upgrade your POS systems, so we will help you weigh up the advantages and disadvantages and outline how Openbravo can help you realize your strategy.
Modern application development and maintenance using microservices architecture, containerized infrastructure, and DevOps principles is much more effective than legacy methods.
In this webinar learn how to modernize an existing legacy application to a modern platform like WildFly Swarm on Red Hat® OpenShift Container Platform, using modern development processes with pipeline development
Data autonomy goes hand-in-hand with building a powerful, multi-cloud data management strategy. Enterprises today are rethinking their data management tactics in light of what they can achieve with the correct usage of the public clouds. In this on-demand webcast, guest speaker James Curtis, Senior Analyst, Data Platforms & Analytics, 451 Research, discussed how enterprises are getting valuable data autonomy and building game-changing multi-cloud database management strategies.
As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.
In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:
- Develop an automation strategy that includes network discovery and configuration auditing.
- Adopt a holistic approach to configuration and workload management.
- Automate new network device provisioning.
- Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
- Provide a better way for teams to deploy and manage their own workloads.
Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
Strategic Project Management or SPM shouldn’t be difficult. At the most basic level it’s about ensuring the projects we deliver help our organization to achieve its strategic goals and objectives. Yet consistently SPM fails to deliver consistent results. In this thought provoking webinar industry, expert Andy Jordan joins CA’s Jim Tisch to discuss SPM and understand some of the things that go wrong:
•Setting ourselves up for failure with the prong projects
•The focus on what instead of why
•Short term thinking in project execution
•Failure to ensure commitments are actually met
As 2017 draws to a close and organizations the world over commit to do things better in 2018 this is a webinar you simply can’t afford to miss. Sign up today and let Andy give you the tools you need to deliver on next year’s strategic objectives.
Kubernetes deployments running on OpenStack clusters require a full OpenStack instance including Keystone, Nova, and Cinder services.
This talk presents a more pervasive and simplified deployment architecture by integrating Containerized standalone Cinder services with baremetal Kubernetes. Cinder services offer many storage features that are still missing in Kubernetes. Cinder is supported by many storage vendors, with over 70 storage drivers in its repository. A Containerized standalone Cinder service makes these features and extensive storage products available to Kubernetes clusters, quickly and easily.
Key to this architecture is an external Kubernetes volume provisioner that provisions Cinder volumes transparently and converts Cinder volumes to Kubernetes supported storage types, such as iSCSI, Fibre Channel, NFS, or Ceph RBD.
We'll show you how the combination of the services above with a true Next Generation Data Center Storage Solution like NetApp SolidFire simplifies and accelerates your ability to leverage persistence in a bare metal Kubernetes cluster while delivering advanced features like multi-tenancy, automation and guaranteed Quality of Service.
In recent months, Artificial Intelligence has become the hottest topic in the IT industry. In this session, we’ll explain how Deep Learning — a subset of AI — differs from traditional Machine Learning, and how AWS customers use it to solve complex problems such as computer vision and natural language processing. Then, using Python code, we’ll show you how to start writing and training models using Apache MXNet, a popular library for Deep Learning which supports both CPUs and GPUs. Finally, we’ll demonstrate how you can achieve excellent results quickly by using state-of-the-art, pre-trained models.
In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.
Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.
Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
Didn't make it to AWS re:Invent in Las Vegas this year? Or were you there but found it hard to visit all of the booths and attend all of the sessions? We will cover what you missed in this AWS re:Invent Recap webinar! Attendees with learn:
- What new announcements were made by Amazon and CloudCheckr
- What to expect in the new year
- Observations from the show floor and sessions
With the advent of the digital economy, there’s been a variety of agile concepts, technologies, and frameworks, like microservices, that have popped up and gained traction in the market. The Eclipse MicroProfile project is an open source community specification that optimizes Enterprise Java™ for a microservices architecture and delivers application portability across multiple MicroProfile runtimes.
In this webcast, you’ll get an introduction to the background, present, and future of the Eclipse MicroProfile project.
This is the age of data science. We have more data, computing power and software packages than ever before, and we’re driving real value with data science. But challenges remain: fragmented and dirty data, collaboration issues, and long project cycle times.
Keys to success: a ‘data-first’ approach, enabling collaboration, and a focus on prediction. Cloudera Data Science delivers the unified platform you need for rapid time to value with the most advanced machine learning techniques, including deep learning.
'4 Dimensions of DevOps' is a webinar series demonstrating various aspects of DevOps implementation in a Digital era.
This Part 1 of the webinar series discusses a templated approach towards enabling end-to-end DevOps in a customer-driven marketplace. Any organization trying to introduce a change in their old-school processes and tools will adopt DevOps pipeline automation to enable faster and smoother software delivery.
In this webinar, we will help you explore tools and techniques to build a release plan that suits your needs. Key takeaways:
• Typical challenges in DevOps implementation processes and how to overcome them.
• Industry leading tools and techniques to achieve smooth releases.
• Rough estimate and ROI analysis for implementing an improved release planning.
• Release planning templates that can be readily applied for typical use cases.
In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks. Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.
The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
Join Justin Harris, Public Cloud Architect at Palo Alto Networks and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture to understand:
- Why organisations are moving to the cloud and the obstacles getting there
- The role of Cloud Access Security Brokers (CASB) and a simpler approach to securing SaaS applications
- How a Next-Generation Firewall compliments and enhances AWS/ Azure's built in security tools
- Automation and how to move quickly with cloud security
- Key strategies to ensure your organisation's data remains protected
- Questions and Answers
We do hope you can join us for this exclusive webinar to understand new cloud security challenges and strategies for protecting your data.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.
APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.
Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.
Register today to gain deeper insights into this threat group!
This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
Attendees will earn 1 BICSI CEC.
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
Cloud is transforming many industries, and the automotive industry is no exception. Gartner predicts that, by 2020, we will have a quarter of a billion connected cars on the road, and new cars will rely heavily on innovative cloud-based technology. Find out how Cloud is pushing this industry forward and what the security concerns and predictions will be for 2018 in this video.
Discover more by reading the blog in the attachments.
The recent release of our Cloud-Based Logging Service marks the next step in Palo Alto Networks’ evolution towards a consumption model that complements the dynamic nature of today’s IT infrastructure. In this brief 30-minute webinar we will discuss how Logging Service provides an alternative for Palo Alto Networks next-generation security infrastructure and why it is a cornerstone of our strategy. We will show how the Cloud-Based Logging service will help to offload CAPEX and operational overhead while also increasing data retention and intelligence.
Join Ryan Olson, Senior Director of Threat Intelligence for Palo Alto Networks as he looks at the multiple instances of compromises we make within the Software Supply Chain, and get this predictions of what to expect from 2018.
Discover more by reading the blog in the attachments.
Hear from the Chief Security Officer of Palo Alto Networks as he gives his personal Predictions and Recommendations for 2018. Greg looks at the changing impact of cyberattacks, and how Cyber adversaries will extend further into ransomware, OT systems and cryptocurrencies.
Discover more by reading the blog in the attachments.
Recent public breaches highlight the importance of a security strategy that extends beyond the network perimeter. As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.
In this webcast, you'll learn how Red Hat OpenShift Container Platform can be used to:
- Integrate security monitoring software into CI/CD pipelines for containerized applications.
- Know what's in your containers and where they come from, which is vital to secure and quickly remediate workloads.
- Enhance open source library security, in true DevSecOps fashion, and establish a security-first mindset for application development.
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
"What is cloud-native development?” And, “How do I transition from a traditional application development approach?” These two questions are often top of mind for developers and IT strategists tasked with aligning existing IT applications and investments more closely with current digital business needs.
In this webcast get answers to these questions and learn about considerations for choosing a cloud-native platform, how to plan for a successful transition, and Red Hat’s approach to cloud-native services.
MSPs, CSPs, and Resellers face a lot of challenges as they and their clients move to the cloud. But challenge is another word for opportunity. The cloud offers the potential for savings and security, but enterprises need a trusted partner who can navigate the migration and co-existence.
-See how to use the cloud as a strategic advantage
-Learn how to leverage flexibility when choosing between public, private, and on-premise
-Understand the potential pitfalls like data transfer costs and application latency
-Determine the right model for cloud bursting, failover, backup and archiving
Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.
Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.
Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments. .
During this webcast, you will learn:
-How to make application deployment and operations at scale simple and reliable
-How to make it easy to create “cloud-native” applications in the first place
-Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.
How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just application and user based security policies. In this webinar, we will share the 10 capabilities to test before you buy your next-generation firewall, and the top 5 mistakes to avoid.
Seems like there’s a lot of talk and no action when it comes to organizations implementing “proactive ITSM”. With “agile this” and “agile that” pervading IT organizations, one would think “proactive” would be embraced as by definition it provides what’s needed before it’s needed. Well, proactive ITSM isn’t as farfetched as you might think. This webcast explores how infrastructure monitoring, process automation and technology integrations can play a huge role in enabling ITSM to become truly proactive. The result is more time for IT to focus on things that really matter to the business other than just keeping the lights on or resolving problems.
Cloud is changing the landscape of traditional information technologies. The impact of cloud on business-grade video collaboration has been felt in the Asia Pacific region in recent years. The increasing availability of cloud solutions empowers video collaboration among the entire workforce anytime and anywhere. Early adopters also contribute to the direction of localization and integrations, which helps further improve the feature set and capabilities of the solutions. As a result, there are prospective market growth opportunities for cloud-based video collaboration solutions.
Questions this webinar will answer:
· What are the trends in the Asia-Pacific cloud video collaboration services market?
· What are the growth opportunities for video communications powered by a cloud?
· How is the technology evolving and what are the impacts on end users?
· What are the promising partnerships emerging in the market?
· Why are IT teams and end users facing challenges with video calls?
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.