Hi [[ session.user.profile.firstName ]]

Enterprise Architecture

  • Date
  • Rating
  • Views
  • The goal of Virtual Desktop Infrastructure (VDI) is to lower the operational costs of supporting an organization’s desktops and laptops. A VDI project should make it easier for IT to support users, keep the organization safe from viruses and better protect its data assets. The key to a successful VDI project is user adoption. But while many organizations consider using an All-Flash Array (AFA) to deliver the performance that will lead to user adoption, the problem is AFAs drive up the cost per desktop, increase the vulnerability of the architecture and encourage additional storage silos.

    Join Storage Switzerland and Cloudistics for an informative webinar that will provide an alternative approach that meets user’s performance expectations while leveraging existing – and often already paid for – storage hardware and does not introduce new silos of storage.
  • In this session we will discuss how state and local government organizations can create modern cloud applications in Microsoft Azure. Learn how you can help modernize your agency and the services you deliver to citizens using:
    •Devices that are sensors, sensor gateways or IoT devices that are publishing events to Event Hub either directly or using Microsoft IoT Hub SDK
    •Gateways - a logical component that groups processing, management of event processors
    •Event processor routes and device actors - Device Actors are chained with various other actor types that are responsible for aggregating, storing, analysis and reporting on device events

    Key takeaways:
    •Initiate a project using Visual Studio Online
    •How an IoT pattern can be used in Azure IoT Hub using a presentation and references to real tenants.
  • Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will explain what this new offering is, and how it enables you to leverage the public cloud for disaster recovery with a solution that plugs into your existing backup environment.
  • APIs have become a strategic necessity for your business because they facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. We will explore in depth the main security concerns API providers and consumers need to consider and how to mitigate them.
  • Napkins, notepads, and multiple devices – keeping notes is a mess. Research suggests that the average employee spends roughly 76 hours a year looking for misplaced notes, items or files (Brother International Organization, 2010).

    Imagine what you could do if you could capture all your ideas and information in one versatile digital notebook. Join us for this webcast to learn how you can harness the power of digital notetaking. Start by collecting and organizing all kinds of information.

    In this webcast, you’ll learn now you can get more hours out of the day by:
    •Collecting information from multiple sources into one handy notebook. For example, grab a news clip off the web, record an inspired idea on the go and combine handwriting, spreadsheets, diagrams, even email.
    •Accessing your information from nearly any device, any time. Use familiar Microsoft Office tools to access your notebook.

    Microsoft OneNote makes it easier to collaborate, whether you want to share your notes with colleagues, add them to a meeting or work together on the same notebook. It’s the simple, more effective way of getting down to business. Join us for this webcast to learn how you can get started organizing your business today.
  • NVMe (Non-Volatile Memory Express) over Fabrics is of tremendous interest among storage vendors, flash manufacturers, and cloud and Web 2.0 customers, Because it offers efficient remote and shared access to a new generation of flash and other non-volatile memory storage, it requires fast, low latency networks, and the first version of the specification is expected to take advantage of RDMA (Remote Direct Memory Access) support in the transport protocol.

    Many customers and vendors are now familiar with the advantages and concepts of NVMe over Fabrics but are not familiar with the specific protocols that support it. This live webcast will explore and compare the Ethernet RDMA protocols and transports that support NVMe over Fabrics and the infrastructure needed to use them. You’ll hear:

    •Why NVMe Over Fabrics requires a low-latency network
    •How the NVMe protocol is mapped to the network transport
    •How RDMA-capable protocols work
    •Comparing available Ethernet RDMA transports: iWARP and RoCE
    •Infrastructure required to support RDMA over Ethernet
    •Congestion management methods
  • In the latest version of HPE NNMi, see how you can seamlessly monitor your physical and virtual network infrastructure end to end. NNMi discovers and visualizes connectivity for virtual network appliances hosted in your VMware environment, and provides root cause analysis and troubleshooting for outages that occur at the virtual network edge. See these features in action, as well as the lineup of new capabilities in NNMi 10.10:

    See new mapping and visualizations to explore the virtual network edge

    Learn how NNMi tracks workloads as they migrate within the data center

    Learn how events, incidents, and root cause analysis capabilities extend into the virtual network edge
  • Software-defined WAN (SD-WAN) deployments have gained significant momentum in 2015. SD-WAN enables companies with distributed branch infrastructure to manage their wide are networks (WAN) infrastructure better with flexible connectivity choices and assure performance for critical applications. In this webinar, thought leaders from VeloCloud and VeloCloud partner will share 2 customer stories from the field highlighting the cost and complexity challenges associated with MPLS-based WAN networks and how SD-WAN provided them with connectivity options to reduce cost and manage the network better with deep application visibility.

    Join this webinar as field experts share their perspective on how to evolve the branch office WAN infrastructure with MPLS and ordinary broadband Internet, simplify deployment and management of applications and save overall cost for the customers. By the end of this webinar, you will learn how the two customers saved over thousands of dollars in bandwidth cost, get control over the “bandwidth killer” applications and enhanced the quality of video conferencing for the branch office users.
  • NetFlow analysis is in its third decade, and many of the architectures that have defined the space are looking pretty long in the tooth. As network function virtualization and DevOps leads IT organizations towards greater cloud and automation orientation, commercial NetFlow analysis tools have largely stuck to Windows software or hardware appliances. What is the next generation of NetFlow analysis? What are the options for IT and network organizations today? This webinar with Kentik VP Product Management and former EMA analyst Jim Frey will help you understand your choices.
  • Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors

Embed in website or blog