Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • How to Modernize Applications in the Cloud Era
    How to Modernize Applications in the Cloud Era
    Jeffrey Deverter, Cloud Strategist, Cloudreach Recorded: Feb 21 2019 57 mins
    Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.

    Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
  • Cloud Security for Financial Institutions
    Cloud Security for Financial Institutions
    SecureAuth Recorded: Feb 21 2019 40 mins
    The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.

    In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:

    – Customer case studies for addressing PCI & SWIFT requirements in the cloud

    – Gaining visibility into applications data flow before moving to, and after deploying in, the cloud

    – Adopting the Zero Trust security model that requires authentication and authorization for all communication
  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Recorded: Feb 21 2019 59 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (AMS)
    Sebastian Straub - Systems Engineer at N2WS; Jessica Eisenberg - Customer Success Manager at N2WS Recorded: Feb 21 2019 54 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.

    Join our LIVE session to find out more about:

    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Recorded: Feb 21 2019 63 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Presenter:
    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Developing Serverless Applications on Kubernetes with Knative
    Developing Serverless Applications on Kubernetes with Knative
    Bryan Friedman, Director of Product Marketing, Pivotal and Brian McClain, Principal Product Marketing Manager, Pivotal Recorded: Feb 21 2019 56 mins
    Serverless computing has become a hot topic in developer communities. The use of ephemeral containers eliminates the need for always-on infrastructure. But the real payoff for serverless is greater code simplicity and developer efficiency. Sounds great! Except the open-source serverless framework space is crowded and complex. Each unique offering approaches functions differently, with varying methods for triggering, scaling, and event formatting. How is that efficient?

    One thing that most everybody can agree on is to build on top of Kubernetes. With that as the only common ground though, there is still too much fragmentation for developers to wade through when deciding on the right open source serverless solution.

    That's where Knative comes in. An open-source project from Google, Pivotal, and other industry leaders, Knative provides a set of common tooling on top of Kubernetes to help developers build serverless applications. It extends Kubernetes by combining Istio with Custom Resource Definitions to enable a higher-level of abstraction for developers. This brings support for source-to-container builds, autoscaling, routing, and event sourcing. Join this session with Brian McClain and Bryan Friedman to see a complete working demo of Knative and learn:

    ● What are the components of Knative and how do they work together
    ● What are the different ways to deploy serverless applications and functions on Knative
    ● How and when to use Knative’s build features, such as Buildpacks
    ● What is Knative’s eventing model and how are event sources used to trigger functions
    ● How Project riff compliments development on top of Knative
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Recorded: Feb 21 2019 44 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • Emerging Application and Data Protection for Cloud
    Emerging Application and Data Protection for Cloud
    Ulf Mattsson, Head of Innovation, TokenEx Recorded: Feb 21 2019 62 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about Data Protection solutions for enterprise.

    Learn about the new trends in Data Masking, Tokenization and Encryption.

    Learn about new Standards for masking from ISO and NIST.

    Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Recorded: Feb 21 2019 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Enterprise Software-Defined Storage on HPE Gen10 Servers
    Enterprise Software-Defined Storage on HPE Gen10 Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Recorded: Feb 21 2019 53 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Protect While You Promote: How to Balance Social Media Engagement and Security
    Protect While You Promote: How to Balance Social Media Engagement and Security
    Evan Blair, Co-Founder, Global VP Channel, ZeroFOX & Jeremy Wood, Vice President, Product Marketing, Hootsuite Recorded: Feb 21 2019 59 mins
    In our connected world, most people engage with brands online prior to making a purchasing decision. With social media marketing on the rise, risks to your brand and reputation are also increasing, from account hacking to impersonating profiles and more. How can you increase engagement while protecting brand integrity from digital risks?

    Key Takeaways

    • Knowledge about social media security risks related to brand
    • Tips for safe sharing on social media
    • Step-by-step guide for protecting your brand
  • Future IoT Growth Opportunities in Colombia
    Future IoT Growth Opportunities in Colombia
    Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & Sullivan Recorded: Feb 21 2019 48 mins
    IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.

    Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.


    Key Takeaways:

    · What are the key verticals in this market?
    · How will the revenue shares of the hardware, software, services, and connectivity segments change?
    · What are the top three drivers for IoT investments?
  • Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Scaling Collective Code Ownership & Code Reviews at LinkedIn - Nikolai Avteniev
    Nikolai Avteniev - Software Engineer, LinkedIn Recorded: Feb 21 2019 56 mins
    The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.

    However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.

    In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Recorded: Feb 21 2019 56 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • You Can't Make Good Business Decisions Today with Yesterday's Data
    You Can't Make Good Business Decisions Today with Yesterday's Data
    Larry Romireo at EFCO Corporation & Giacomo Lorenzin, Managing Director, Direct Solutions at BackOffice Associates Recorded: Feb 21 2019 45 mins
    There is a growing demand for high-speed analytic database systems and platforms where data can be processed at lightning speed for business decision-making. However, is that data up-to-date? If the process to update that data is batch or overnight, the data delivery may be fast, but the information may be outdated which can result in error-prone reporting and ineffective (or disastrous) business decisions.

    For successful analytics it’s important to move data in real time from multiple systems, including legacy databases, so that combined data can be properly presented in a uniform way.

    Change Data Capture is a technology employed in the best data replication solutions to minimize the amount of time and resources necessary to update data changes from one system to another. By propagating only what’s changed since the last check on the source system, minimal data is passed between systems in order to ensure identical copies of data on both source and target.

    Change Data Capture is frequently used to select and update copies of key data for operational reasons such as maintaining activity on separate systems that interact externally with customers or vendors, or remote systems that interact with corporate databases. However, it is also useful to maintain freshly updated data in systems that are used extensively for non-transactional activity, such as for analysis, reporting and data warehousing.

    Main points:
    1.Retrieving information from any source database for your analytic system
    2.Specialized and configured support to load data into the analytic system
    3.Automatically prepare and map the data between systems, saving time and resources
    4.Best-in-class process to automatically and continuously update data
    5.Change Data Capture saves time, money and effort through efficient and cost-effective technology
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Recorded: Feb 21 2019 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    How to build low-cost, scalable Node.js APIs with Serverless and AWS Lambda
    William Woodhead, Tech Lead and Co-Founder, Pilcro Recorded: Feb 21 2019 26 mins
    Switching from Express to Serverless has completely transformed the delivery of Pilcro’s APIs over the past 6 months.

    It has offered reduced cost, out-of-the-box deployment/scalability/monitoring, and lightning fast development.

    This talk outlines why we made the switch with a demonstration of setting up your first Node.js API with Serverless and AWS Lambda.
  • Operating with Agility Across Your Enterprise
    Operating with Agility Across Your Enterprise
    Jeremy Brown, Senior Solutions Architect, Lynne Mullis, Senior Solutions Architect Recorded: Feb 21 2019 31 mins
    Your IT operation is in a constant state of change. Deployment models are multiplying. Application architectures are evolving. Pressures to innovate are rising. And you’re expected to manage it all with a shrinking budget.

    It is a constant challenge, but it doesn’t need to be.

    In this webinar, you’ll discover how Micro Focus solutions help you master hybrid IT with new enterprise-wide agility. More specifically, you’ll learn how you can:

    •Accelerate delivery of IT resources by bridging traditional and
    transformational IT.
    •Increase IT efficiency by automating routine tasks and processes.
    •Support innovation by employing flexible technologies that evolve
    with your needs.
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (EMEA)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (EMEA)
    Laurent Mombel - System Engineer, N2WS Recorded: Feb 21 2019 60 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.

    Join our LIVE session to find out more about:

    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • Preventing Mobile App API Abuse
    Preventing Mobile App API Abuse
    Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Recorded: Feb 20 2019 56 mins
    Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.

    As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.

    This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
  • Threat Intelligence Driven Incident Response
    Threat Intelligence Driven Incident Response
    Tim Stiller, Senior Incident Response Consultant Recorded: Feb 20 2019 27 mins
    Threat intelligence is a core component of any Incident Response engagement or SOC investigation. While threat intel comes in many forms, shapes, and sizes—when used properly—it adds critical context that enables quick and accurate investigation decisions. If you understand the different types of threat intelligence used across your organization, your team can respond quickly to threats, and prioritize a detection strategy to stop future attackers.

    In this session, Tim will share:
    1. Key types of threat intelligence
    2. How each type should be used effectively
    3. Recycling: translating investigations into detections
  • Container and Cloud Native Security:  Sharing 3 Years of Valuable Experience
    Container and Cloud Native Security: Sharing 3 Years of Valuable Experience
    Dustin Aubrey with Aqua Security Recorded: Feb 20 2019 62 mins
    Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.

    During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.

    We’ll share our views on:
    •What to invest your time in - what’s most impactful for the effort
    •What has been successful
    •What to do as you scale up
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Recorded: Feb 20 2019 47 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    David Neugebauer, Sr. Business Development Mgr, Fujitsu Recorded: Feb 20 2019 35 mins
    Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Recorded: Feb 20 2019 53 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • The Future of Marketing Emerging from Technology of Today: 3 things to watch
    The Future of Marketing Emerging from Technology of Today: 3 things to watch
    Yana Lapitskaya - Managing Director, Yay!Starter Marketing; James Mclaughlin - Regional Account Manager, Intro Feb 26 2019 10:00 am UTC 60 mins
    Artificial intelligence has been around for a while and is already shaping the digital marketing – even if you haven’t noticed it. Every time you work with Google Ads – you are feeding in the data that informs Google’s AI enabling them to serve you with keyword suggestions, additional ad options and much more. Imagine this happening around the clock on a global scale! No wonder Google knows everything.

    Neuroscience has uncovered the decision-making process happening in our brain that advertisers knew very little about.

    Making advertisers understand how system 1 and system 2 brain works as well as their differences is like giving a video camera to someone used to drawing primitive pictures to capture and interpret the reality… It is changing the game forever – the TV, print and digital advertising will never be the same again! We are perhaps witnessing the biggest revolution in marketing since the launch of social media advertising.

    Blockchain is the newest kid on the block, and we are yet to see it manifesting itself in marketing but even now we can say it will go far beyond the cryptocurrency world, tokenizing and decentralizing the digital economy further.

    What does it all mean for you and your company?

    Sign up to our webinar ‘The Future of Marketing Emerging from Technology of Today: 3 things to watch closely’ to learn more about Artificial Intelligence, Neuroscience and Blockchain shaping the new marketing reality.
  • Journey to Enterprise-Scale DevOps: Your Game Plan for Success
    Journey to Enterprise-Scale DevOps: Your Game Plan for Success
    Jen Thomson, Research Director, IDC and Raffi Margaliot, SVP and GM, ADM, Micro Focus Feb 26 2019 11:00 am UTC 60 mins
    Organizations of every size and industry are going through a digital transformation to adapt to new technologies and ways of doing business. A recent survey conducted by IDC across 420 large European organizations shows that a sure way to gain both business and technology benefits is to scale up existing DevOps practices. In this webinar, we’ll present the findings from the IDC survey, and present a blueprint to help organizations accelerate their journey to enterprise-scale DevOps.

    Join this webinar to learn:
    • How and why IDC classifies organizations into two distinct groups: The protagonists of DevOps, called ‘DevOps Determined’; and those struggling to scale DevOps, called ‘DevOps Distracted’
    • How to transition to a ‘DevOps Determined’ organization
    • How the Micro Focus Enterprise DevOps portfolio helps organizations to build and deliver better software faster, and enables them to become ‘DevOps Determined’ on their journey to enterprise-scale DevOps
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Feb 26 2019 4:00 pm UTC 62 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • Collaborative Defense—Bringing Business & Security Together for Resiliency
    Collaborative Defense—Bringing Business & Security Together for Resiliency
    Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRIC Feb 26 2019 5:00 pm UTC 37 mins
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration are topical, consistent themes, reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • Why IT Pros Want Digital Network Architecture
    Why IT Pros Want Digital Network Architecture
    Alejandro Rodriguez, Solutions Architect Feb 26 2019 5:00 pm UTC 15 mins
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • What’s New in Container Storage
    What’s New in Container Storage
    Keith Hudgins, Docker; Alex McDonald, NetApp Feb 26 2019 6:00 pm UTC 75 mins
    Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.

    This live webcast will cover:
    •Container storage types and Container Frameworks
    •An overview of the various storage APIs for the container landscape
    •How to identify the most important projects to follow in the container world
    •The Container Storage Interface spec and Kubernetes 1.13
    •How to get involved in the container community
  • Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    John Huckle, Josh Scott, Stacey Prezel, Bradford Shelley, Meghan Lockwood Feb 26 2019 6:00 pm UTC 60 mins
    Learn what trends HR leaders are talking about in 2019 with results from Business Forward's Annual HR Leadership Survey - then be a pioneer of those strategic initiative trends.

    Business Forward and Acorio executives will walk you through going beyond the "imagination" and show you how to make real changes with the power of ServiceNow's HR Service Delivery platform.
  • Fast Insights with AI-driven Analytics on Google Cloud
    Fast Insights with AI-driven Analytics on Google Cloud
    Naveen Punjabi, Strategic Tech Partnership Lead, Google Cloud & Sameer Satyam, Director, Product, ThoughtSpot Feb 26 2019 6:00 pm UTC 60 mins
    In the face of unprecedented disruption more businesses are looking for new ways to leverage data and analytics in the cloud to stay relevant and competitive. ThoughtSpot on the Google Cloud Platform lets companies reap the benefits of fast search and AI-driven insights in the cloud. Doing so enables anyone, regardless of technical sophistication, to quickly extract ML-derived insights from Google Cloud ML Engine using a simple search to go from answers to predictions in a single click.

    We'll discuss:
    * Launching a winning cloud analytics strategy
    * Generating ML-derived predictions from Google Cloud ML Engine through search
    * Combining the power of ThoughtSpot’s in-memory calculation engine with Google Cloud
  • Optimize Contact Centre Performance: Monitor > Troubleshoot > Analyze
    Optimize Contact Centre Performance: Monitor > Troubleshoot > Analyze
    Alex Bahar, Senior Solutions Engineer Feb 27 2019 2:00 am UTC 45 mins
    The Contact Center is the frontline to your customers - get this experience wrong and the consequences can be substantial - loss of revenue, brand damage, customer churn. Join this session to learn how you can optimize the performance of your contact center, we will cover:

    - From PSTN to CC inbound call monitoring & testing
    - Monitoring the infrastructure performance and availability of Avaya & Cisco UCC
    - Monitoring & quickly troubleshooting the call quality
    - Long term analytics reporting for the performance, quality and availability of your CC
  • How to use Machine Learning & AWS for Fraud Prevention & Detection
    How to use Machine Learning & AWS for Fraud Prevention & Detection
    Steve Turner, Solutions Architect, AWS Feb 27 2019 10:00 am UTC 47 mins
    Join this tech talk to learn how to leverage tools such as Sagemaker and Amazon Machine Learning to help you detect and prevent fraudulent transactions and hear customer success story from Curve.

    What we will cover in this session:
    - Fraud detection
    - Machine Learning at Amazon
    - How to use Amazon Sagemaker to detect fraud
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Feb 27 2019 10:00 am UTC 45 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • Enterprise Security Roadmap: Solutions & Licensing for the Next Gen SOC
    Enterprise Security Roadmap: Solutions & Licensing for the Next Gen SOC
    Martyn Hill, Security Customer Success Manager, Micro Focus Feb 27 2019 2:00 pm UTC 60 mins
    The threat landscape continues to evolve and the needs of the Security Operations Centre, along with their budget and available resources are getting squeezed ever more tightly.

    Micro Focus is evolving its security portfolio to meet these changing needs, leveraging our mature and best-of-breed technologies along with our industry expertise to enhance and convergence our offerings in the monitoring and analytics space to place the power of our solutions right back in the hands of those who operate, maintain and manage your organisation’s security posture.

    In this webinar, we will highlight our latest solution roadmap and vision as well as our plans to dramatically simplify our licensing models to facilitate provisioning and future growth.

    This webinar will be of interest to all those responsible for protecting their organisation’s data and reputation, from the Security practitioners through to the SOC Manager as well as your Security Partners.
  • How to Achieve High Availability for SAP Deployments on AWS
    How to Achieve High Availability for SAP Deployments on AWS
    Ricardo Casanovas, CTO Linke / Guillermo Torres & Maurici Galofré, AWS Solution Architect and SAP experts at Linke Feb 27 2019 3:00 pm UTC 60 mins
    Traditionally, setting up High Availability for SAP systems has been achieved through the implementation of third-party software tools, often expensive and complex to deploy. Today, customers can leverage AWS highly available cloud services to achieve High Availability for their SAP systems at a fraction of their cost.

    Learn how you can configure High Availability for SAP systems on Amazon Web Services using their own AWS tools and services such as Amazon Cloudwatch, AWS Lambda, and AWS Systems Manager.

    Join us to learn:
    •How to plan and define your SAP landscape in High Availability
    •Setup SAP in High Availability using AWS Services
    •Operate with SAP in High Availability on AWS
  • Connect With Control-M: Troubleshooting Linux Jobs Using Logs & Output
    Connect With Control-M: Troubleshooting Linux Jobs Using Logs & Output
    Lorenzo Finetto Feb 27 2019 4:00 pm UTC 60 mins
    Join us at our next Connect With Control-M technical webinar on “Troubleshooting Linux Jobs Using Logs & Output”.
    This webinar will cover running Jobs on Linux Agents with a focus on:

    •Using Tools to Troubleshoot Job Execution Status
    •Validating Control-M/Agent Permissions With Job Output
    •Review Control-M/Agent Communication Parameters

    Our next Connect with Control-M live webinar will be on Wednesday, February 27th, where Lorenzo Finetto will explain and demonstrate the above. We’ll conclude with a live Q&A session.
  • Accelerate Digital Transformation with Multi-Cloud Architectures
    Accelerate Digital Transformation with Multi-Cloud Architectures
    Aaron Miller, Senior Solutions Engineer at Kong and Mike Bilodeau, Product Marketing Manager at Kong Feb 27 2019 5:00 pm UTC 53 mins
    Adopting multiple cloud platforms?
    New economy businesses are deploying cloud-native services that are connected across hybrid and multi-cloud environments. Kong for multi-cloud is the fastest way for organizations to seamlessly adopt multiple cloud platforms.

    In this presentation, Senior Solutions Engineer, Aaron Miller, and Product Marketing Manager, Mike Bilodeau, will discuss using Kong for multi-cloud, the fully managed Kong Cloud offering and how Kong helps large organizations accelerate their digital transformation.

    Takeaways:

    - Learn about the advantages of deploying hybrid and multi-cloud architectures.
    - Understand how Kong Cloud works as a managed service.
    - Learn why Kong can make adopting microservices easier and more effective across hybrid and multi-cloud environments.
  • PWA or Native: The Right Choice
    PWA or Native: The Right Choice
    Mike Thompson, VP of Product Marketing & Faizan Khalidi, Sr. Director of Product Management Feb 27 2019 5:30 pm UTC 60 mins
    The rise of progressive web apps is causing an additional step in your mobile decision process. Should you go Native or should you build your next progressive web app? From our own experience we have learned that there is no one size fits all. In this webinar, we will provide guidance to make sure you have everything you need to make the right choice.
  • Shifting Gears: Focus on Cybersecurity
    Shifting Gears: Focus on Cybersecurity
    Larry Ponemon, Founder, Ponemon Institute; Tim Weisenberger, PM, SAE; Chris Clark, Principal Security Engineer, Synopsys Feb 27 2019 6:00 pm UTC 60 mins
    Today’s vehicle is a connected, mobile computer, a situation that has introduced an issue the automotive industry has limited experience dealing with: cybersecurity risk. Automotive manufacturers have become as much software companies as they are transportation companies, facing all the challenges inherent to software security.

    In this webinar, Synopsys and SAE International experts will discuss key findings from the report Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices, including these:
    - The automotive industry has insufficient cybersecurity resources and skills.
    - Some of those most knowledgeable about automotive cybersecurity feel powerless to voice their concerns.
    - Automotive cybersecurity testing may be occurring too late in the product development life cycle.

    We will also discuss how SAE International and Synopsys can help lead the industry in planning cybersecurity strategy and generating solutions using the data points collected in the survey.

    Topics covered include:
    - Survey methodology
    - Industry standards
    - Best practices
    - Professional development
    - Security controls
  • 451 Research & Citrix: Accelerating Productivity without Compromise
    451 Research & Citrix: Accelerating Productivity without Compromise
    Chris Marsh of 451 Research & Matt Crawford of Citrix Feb 28 2019 12:00 pm UTC 54 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • OneSource Accelerator for SharePoint Webinar
    OneSource Accelerator for SharePoint Webinar
    Peter Gadd, General Manager, Strategic Business Services, Aodan Breathnach, Solution Expert, Software Business Services Feb 28 2019 1:00 pm UTC 60 mins
    Effective and engaging information dissemination via corporate intranets is becoming more important as a means of communication to enhance knowledge management and improve collaboration and feedback.

    Micro Focus OneSource can help you reduce the cost and time involved in building Intranet sites by following a “mobile-first” layout-without the need for external intervention or support.

    Join the webinar to discover how OneSource empowers organisations to put the creation of Intranet sites into the hands of content creators, while enforcing Corporate Brand standards.

    During this engaging webinar, you will learn:

    How OneSource can transform the delivery of your
    organization’s Intranet sites.

    What our customers think: see examples of existing
    customers who use OneSource, with a focus on its effectiveness and return on investment.

    How you can create a “look and feel” Intranet structure
    that is adapted to your corporate standards.

    About the rich features and functionality that
    OneSource offers, via a live demonstration.
  • Sourcing and Vendor Management – A Critical Component of Digital Strategy
    Sourcing and Vendor Management – A Critical Component of Digital Strategy
    Aaron Polikaitis, VP, Vendor Sourcing & Management, IDC's IT Executive Program Feb 28 2019 4:00 pm UTC 60 mins
    CIOs, CPOs and business unit leaders overwhelmingly agree that technology sourcing and procurement is critical for digital transformation and legacy system modernization. Nevertheless, recent IDC research confirms that technology sourcing and procurement organizations are challenged to deliver what their businesses require. IT and line of business executives report of their procurement organizations that:
    • 54% do not understand business needs
    • 62% are undermined by shadow procurement
    • Only 10% work effectively within cross-functional teams

    Procurement organizations have a choice of transforming themselves or watching other enterprise organizations assume the responsibility for sourcing the technology that supports key business initiatives. In this IDC web conference, we will identify the top challenges identified by Procurement, IT, and LOB executives, and discuss strategies for transforming procurement organizations from tactical administrative centers to strategic sourcing partners for the enterprise.
  • Show and Tell: Blue Prism's new Process Discovery Tool
    Show and Tell: Blue Prism's new Process Discovery Tool
    Emily Bristow, Customer Success Director, Blue Prism | Neil McEwan, Customer Excellence, Blue Prism Feb 28 2019 4:00 pm UTC 75 mins
    Process Discovery has often been highlighted by our customers as one of their leading challenges in scaling their RPA capability. This process can be a time-intensive and inaccurate yet keeping automation pipelines full is imperative to achieving maximum ROI and efficiencies for RPA investments. What do you do with your Digital Workforce if they don’t have any work?

    Our panellists are excited to introduce Blue Prism's new Process Discovery tool—a web-based tool available to all Blue Prism customers that simplifies the task of analyzing and qualifying processes for automation readiness, ease of automation and potential business value.

    This Process Discovery tool takes the guesswork out of process discovery and clearly displays each process on a dashboard quadrant ranking each in terms of most automation-ready to least, overlaid with their relative benefit opportunity. The result is an objective, consistent, and reliable way of discovering automation-ready processes.

    Our expert panellists will show you how easy process discovery can be and you’ll leave with an understanding of how your business can repeatedly and sustainably deploy RPA with strategic insight regarding potential ease-of-automation, hours-returned-to-the-business and potential savings.

    In this webinar, hosted by Blue Prism process discovery experts, you will:
    • Learn and get insights from Blue Prism customers leading process discovery
    • Understand the potential value of automating any process by answering a few simple questions
    • Get actionable best practices into supporting the scalability of your process analysis
    • Discover Blue Prism’s latest tool, available to all Blue Prism customers

    This live webinar will include a live-audience Q&A, so make sure to pre-register and join us on February 28th. If you cannot make it on the day, a recording will be made available online afterwards.
  • Shifting Left: Security Through Automation
    Shifting Left: Security Through Automation
    Aqua Security and CircleCi Feb 28 2019 5:00 pm UTC 60 mins
    Presented in partnership with CircleCi

    Enterprises are doing what they can to foster a “security first” mentality within their IT organizations, but don’t always have the necessary skills in-house and may not take the steps needed to build security into an application by design.

    As DevOps accelerate application development and deployment, implementing security as an afterthought is no longer an option, since that approach cannot handle the velocity and scale of agile application deployments. Automation is key to embedding security into the DevOps pipeline and ensuring that code is secure before it’s deployed, not after.

    In this webinar, Aqua Security and CircleCI will show you how you can bake security into the development process, seamlessly, to ensure that your applications are fully secured throughout the development lifecycle. We’ll show you how you can:

    •Build software quickly, using custom job orchestration
    •See all of your builds at a glance, including failed builds and slow tests
    •Identify image vulnerabilities as you build your application
    •Configure your “risk-appetite" to pass or fail images in build based on vulnerability severity
  • Digital First Strategy: Modernize your legacy integration platform
    Digital First Strategy: Modernize your legacy integration platform
    Hariharan Ganesh - Head of Enterprise Integration, Aspire Systems Feb 28 2019 5:00 pm UTC 60 mins
    Does your traditional middleware platform hold back your enterprises’ digital goals? Well, you can’t blame it as it wasn’t really built to support today’s hybrid IT environment. To survive in the fast-paced data-driven economy, businesses should modernize their integration platform to be fast, flexible and cost-effective for delivering seamless customer experience, improving collaboration and innovation.

    In this webinar, we will help to prepare a digital strategy that would drive a systematic path of modernizing your integrations as API driven.

    • Digital Transformation - a journey to a new world
    • Why connected business is the core to digital journey
    • Role of API integration in digital transformation
    • Strategy to move from legacy to modern API world
    • Cloud integration platform for digital API integration