Hi [[ session.user.profile.firstName ]]

Information Technology

  • 3 New Use Cases for vRealize Operations
    3 New Use Cases for vRealize Operations Kyle Wassink & Rachel Foresta, Solutions Architects with Blue Medora Recorded: Feb 16 2018 54 mins
    If you own vRealize, but have yet to use it for full-stack dashboarding, rapid root cause analysis or hybrid cloud performance tuning, you're missing out. Watch experts from Blue Medora walk you through: How to unify on-and off-premises operations data within vRealize; Ways to create custom dashboards that give you a 360 view of your entire environment; and tips for using dashboards to pinpoint root causes up to 60% faster
  • Vuolearning eLearning platform demo
    Vuolearning eLearning platform demo Stephen Sutton Recorded: Feb 16 2018 63 mins
    In this webinar VuoLearning will introduce how you can transform your learning content from Powerpoints into interactive eLearning products. Come and check out the opportunity. eLearning course generation has never been easier!

    Speaker: Stephen Sutton

    Stephen Sutton is an experienced Customer Trainer with a demonstrated history of working in the telecommunications industry. He is a strong human resources professional skilled in Service Delivery, 3G, Training Presentations, Requirements Analysis, and ITIL.
  • Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä
    Onnistu käyttäjä- ja pääsynhallinnan (IAM) kehittämisessä Eetu Niemi Recorded: Feb 16 2018 48 mins
    Digitalisaatio ja tietosuojavaatimuksiin (esim. GDPR) vastaaminen ei onnistu ilman hyvin toimivaa käyttäjä- ja pääsynhallintaa (Identity and Access Management, IAM). Se on kuitenkin laaja kokonaisuus, joka vieläpä liittyy organisaatioissa ”kaikkeen”. Siksi käyttäjä- ja pääsynhallinnan kehittäminen on tehtävä harkitusti ja vaatii kokonaisnäkemyksen kehitettävästä IAM-ratkaisusta.

    Tässä webinaarissa opit

    · mistä käyttäjä- ja pääsynhallinnassa on kysymys

    · mitkä ovat käyttäjä- ja pääsynhallinnan hyödyt

    · mistä komponenteista käyttäjä- ja pääsynhallintaratkaisu käytännössä koostuu

    · miten käyttäjä- ja pääsynhallinnan kehittämisessä kannattaa edetä

    Puhuja: Eetu Niemi

    Eetu on arkkitehtuurin monitoimimies, joka on tehnyt erityisen paljon töitä käyttäjä- ja pääsynhallinnan sekä kokonaisarkkitehtuurin parissa. Käyttäjä- ja pääsynhallinnan ratkaisuja hän on suunnitellut ja toteuttanut useilla toimialoilla. Hänellä on kokemusta niin arkkitehtuurisuunnittelusta ja määrittelystä kuin myös teknisestä suunnittelusta ja tuotteiden konfiguroinnista. Eetu toimii arkkitehtuurin sekä käyttäjä- ja pääsynhallinnan konsulttina Coalassa.
  • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
    Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
    Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

    Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

    About the Speaker:
    Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
    Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
  • Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity
    Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity Rob Anderson, Director of Product Marketing, NetFoundry Recorded: Feb 15 2018 16 mins
    Join Rob Anderson, Director of Product Marketing at NetFoundry, as he reviews how hybrid device, site, and cloud networking will evolve to meet digital transformation needs.

    Learn how to make your networks as agile as the applications they need to support in your data center.

    About the presenter:
    Rob is Director of Marketing at NetFoundry. NetFoundry believes in enabling edge innovation. NetFoundry frees individuals, apps, groups, and businesses from traditional network, telco, and hardware constraints, enabling applications and business policies to control underlying networks, with security, compliance, reliability, & performance.

    Prior to NetFoundry, Rob's roles included Director of Global Marketing & Product Management at Modern Systems, along with various management and product development roles in the telecommunications industry. Rob graduated from Clemson University in 2003, holds a Project Management Professional (PMP) certification from the Project Management Institute, and a New Product Development Professional (NPDP) certification from the Product Development and Management Association.
  • How API Adoption Boosts Profits
    How API Adoption Boosts Profits Marshall Van Alstyne, MIT fellow & Boston University professor; David Berlind, Editor-in-Chief of ProgrammableWeb Recorded: Feb 15 2018 60 mins
    The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.

    In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.

    Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:

    - Why enterprises need APIs and API strategy models
    - The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
    - About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
  • The Road to Simplicity: Converging Primary and Secondary Storage
    The Road to Simplicity: Converging Primary and Secondary Storage Jacob Cherian, VP of Product Strategy, Reduxio, Mike Grandinetti, CMO, Reduxio, Keith Worthington, IT Manager, LineMaster, Recorded: Feb 15 2018 45 mins
    In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.

    IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.

    Join this session to learn about:

    - The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
    - The current challenges of copy data management and how to address them
    - A dive into a TCO study depicting the savings achieved through this architectural change
    - Why snapshots are obsolete and you to achieve near-instant data recovery
    - A look into additional use cases of copy data for DevOps team

    The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.

    Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
  • The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned
    The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: Feb 15 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • In Memory Parallel Processing for Big Data Scenarios
    In Memory Parallel Processing for Big Data Scenarios Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Recorded: Feb 15 2018 48 mins
    Denodo Platform offers one of the most sought after data fabric capabilities through data discovery, preparation, curation and integration across the broadest range of data sources. As data volume and variety grows exponentially, Denodo Platform 7.0 will offer in-memory massive parallel processing (MPP) capability for the most advanced query optimization in the market.

    Attend this session to learn:
    * How Denodo Platform 7.0’s native built-in integration with MPP systems will provide query acceleration and MPP caching
    * How to successfully approach highly complex big data scenarios, leveraging inexpensive MPP solutions
    * With the MPP capability in place, how data driven insights can be generated in real-time with Denodo Platform

    * Challenges with traditional architectures
    Denodo Platform MPP capabilities and applications
    * Product demonstration
    * Q&A
  • Accounting for the Endpoint in Your GDPR Strategy
    Accounting for the Endpoint in Your GDPR Strategy Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42 Recorded: Feb 15 2018 45 mins
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center
    Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center David Powell, GM of Service Provider Business, LogicMonitor Recorded: Feb 15 2018 37 mins
    Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:

    - The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
    - Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
    - Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
    - Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.

    How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
  • Big data scaling with syslog-ng
    Big data scaling with syslog-ng Istvan Molnar, Peter Soproni Recorded: Feb 15 2018 54 mins
    Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
  • Hyperledger: Market, Technology & Community Update
    Hyperledger: Market, Technology & Community Update Cloud Standards Customer Council Recorded: Feb 15 2018 54 mins
    Dan O’Prey, Chair of Hyperledger Marketing Committee and CMO at Digital Asset
    Tracy Kuhrt, Community Architect, Hyperledger

    Hyperledger is an umbrella open source project started in December 2015 by the Linux Foundation to support the collaborative development of blockchain-based distributed ledgers across industries. A blockchain is a continuously growing list of records, called blocks, that are linked and secured using cryptography. Transactions between two parties are recorded efficiently and in a verifiable and permanent way.

    In this webinar, Dan O’Prey and Tracy Kuhrt will present an update on the blockchain market, industry trends, and new Hyperledger projects. They will discuss the technical items delivered over the last 6 months and focus areas for Hyperledger in 2018.
  • 5 Habits of High-Velocity Teams Using Kubernetes
    5 Habits of High-Velocity Teams Using Kubernetes William Denniss, Product Manager, Google Cloud and Dan Garfield, Full-Stack Engineer, Codefresh Recorded: Feb 15 2018 63 mins
    Connecting all the pieces to make zero downtime continuous delivery happen at scale is a challenge. Join this webcast to see real teams bring all the components together to make high-velocity deployment to Kubernetes scale. Get a hands-on view of the critical steps that go into making container management a scalable process that not only allows teams to delivery faster but with more confidence in the final result.
  • Preparing Your Data Center for a Digital Makeover
    Preparing Your Data Center for a Digital Makeover Cindy Borovick, Business Intelligence Director, F5 and Lori Mac Vittie, Principal Technical Evangelist, F5 Recorded: Feb 15 2018 38 mins
    Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Recorded: Feb 15 2018 38 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • The 2 fastest ways to move forward on data center consolidation
    The 2 fastest ways to move forward on data center consolidation Marc Keating: Director of technology and alliance strategy; Darren Miller: Manager of engineering test and performance Recorded: Feb 15 2018 60 mins
    You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Discover the SIEMple Life with a Managed SOC
    Discover the SIEMple Life with a Managed SOC Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: Feb 15 2018 59 mins
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • T-72 Hours to Report a Breach: Are you GDPR Ready?
    T-72 Hours to Report a Breach: Are you GDPR Ready? Paul-Johan Jean, GDPR Legal Consultant at Sphaerist Advisory and Hank Schless, Product Marketing Manager at Threat Stack Recorded: Feb 15 2018 44 mins
    May 25th, 2018, the day that Europe’s General Data Protection Regulations (GDPR) comes into effect, is fast approaching. Many US companies are behind the curve in determining whether and how GDPR applies to them and figuring out what to do about it.

    Paul-Johan Jean, a GDPR legal consultant at Sphaerist Advisory, works with US companies to cut through the ambiguity and paralysis and get ready. Tune in on 2/15 at 1 PM EST to learn from this GDPR expert on how to:

    -Dispel myths around the new regulation
    -Take a practical, manageable and cost-effective approach to dealing with GDPR
    -Identify resources that can help you comply with various requirements, such as record keeping or data breach notification
  • Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC
    Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC Scott Sinclair, Sr. Analyst, Enterprise Strategy Group, Inc. Varun Chhabra, Sr. Director - Product Marketing, Dell EMC Recorded: Feb 15 2018 63 mins
    In the era of digital business, IT managers are increasingly responsible for delivering results that drive the success of their business. To achieve this, it is imperative that IT organizations implement a modern storage infrastructure that enables them to increase agility and thereby gain a competitive advantage. In this webcast, experts from Enterprise Strategy Group and Dell EMC will describe the key attributes and benefits of a modern storage infrastructure.