Hi [[ session.user.profile.firstName ]]

Information Technology

  • FCoE vs. iSCSI vs. iSER
    FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Jun 21 2018 5:00 pm UTC 75 mins
    The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

    One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

    Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

    That leads to several questions about FCoE, iSCSI and iSER:

    •If we can run various network storage protocols over Ethernet, what
    differentiates them?
    •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
    •How are they structured?
    •What software and hardware do they require?
    •How are they implemented, configured and managed?
    •Do they perform differently?
    •What do you need to do to take advantage of them in the data center?
    •What are the best use cases for each?

    Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
  • Hybrid Data Analytics Live TechTALK
    Hybrid Data Analytics Live TechTALK Pradeep Bhanot - Director of Product Marketing at Actian Jun 21 2018 5:00 pm UTC 45 mins
    In this webinar featuring Actian Vector analytics database, Pradeep will provide a product overview, share case studies and include a short demo.

    You can submit your question during the event for the live Q & A.

    Download the Evaluation Edition at https://www.actian.com/lp/try-vector/
  • Transform Your CMS Into a Social Powerhouse
    Transform Your CMS Into a Social Powerhouse Seth Cleaver, Sitefinity Technical Engineer at Progress Jun 21 2018 5:00 pm UTC 60 mins
    Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.

    In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.

    You’ll learn:

    - What social enhancements are available in the latest release of Sitefinity
    - Some useful ideas to increase the social savviness of your website
    - How to integrate a social platform into Sitefinty using OAuth

    Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
  • Using Data Science to Build an End-to-End Recommendation System
    Using Data Science to Build an End-to-End Recommendation System Ambarish Joshi and Jeff Kelly, Pivotal Jun 21 2018 5:00 pm UTC 75 mins
    We get recommendations everyday: Facebook recommends people we should connect with; Amazon recommends products we should buy; and Google Maps recommends routes to take. What all these recommendation systems have in common are data science and modern software development.

    Recommendation systems are also valuable for companies in industries as diverse as retail, telecommunications, and energy. In a recent engagement, for example, Pivotal data scientists and developers worked with a large energy company to build a machine learning-based product recommendation system to deliver intelligent and targeted product recommendations to customers to increase revenue.

    In this webinar, Pivotal data scientist Ambarish Joshi will take you step-by-step through the engagement, explaining how he and his Pivotal colleagues worked with the customer to collect and analyze data, develop predictive models, and operationalize the resulting insights and surface them via APIs to customer-facing applications. In addition, you will learn how to:

    - Apply agile practices to data science and analytics.
    - Use test-driven development for feature engineering, model scoring, and validating scripts.
    - Automate data science pipelines using pyspark scripts to generate recommendations.
    - Apply a microservices-based architecture to integrate product recommendations into mobile applications and call center systems.
  • Battling the Cryptojacking Epidemic & Malware Mutations
    Battling the Cryptojacking Epidemic & Malware Mutations Jack Chan, Network and Security Strategist, FortiGuard Labs Jun 21 2018 5:00 pm UTC 60 mins
    These and other trending vulnerabilities from our Quarterly Threat Report. Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty.

    Join our fourth installment of in-depth threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting System-on-Chip (SoC) devices, fileless malware and -cha-ching! - the mining of digital currency.
  • Intro to EKS: Amazon's Elastic Compute Service for Kubernetes
    Intro to EKS: Amazon's Elastic Compute Service for Kubernetes Nate Fox, Director of Engineering at Onica & Curtis Rissi, Solutions Architect at AWS Jun 21 2018 5:00 pm UTC 60 mins
    For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.

    Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.

    In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.

    In this webinar, we’ll discuss:
    -How Amazon EKS makes it easy to run Kubernetes on AWS 
    -How to leverage additional AWS services with EKS
    -Optimizing costs on EKS
    -Demo on how to setup your cluster to run on Amazon EKS  
    -Customer success story
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Jun 21 2018 5:00 pm UTC 60 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
    Attack Analytics: How to Tackle Too Many Alerts With The Help of AI Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva Jun 21 2018 5:00 pm UTC 60 mins
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • Moving the Enterprise Backup to the Cloud - A Step-By-Step Guide
    Moving the Enterprise Backup to the Cloud - A Step-By-Step Guide Storage Switzerland, Veeam, KeepItSafe Jun 21 2018 5:00 pm UTC 60 mins
    Making sure everything in the data center is properly protected is a common struggle that all data centers face. The cloud, cloud backup, seems like an answer to all those struggles. But, how exactly does IT make the conversion from on-premises backup to cloud backup? Join experts from Storage Switzerland, Veeam and KeepItSafe and learn; a method to determine if cloud backup is right for your organization and if it is, how to create a plan to begin the transfer to cloud based data protection operations.
  • The Critical Steps to Deploying MFA at Enterprise Scale Without Regrets
    The Critical Steps to Deploying MFA at Enterprise Scale Without Regrets Jeffrey Broberg, Sr. Director, Mobile Product Management; OneLogin, Michael Gleason, Sr. Manager, Product Marketing; OneLogin Jun 21 2018 5:00 pm UTC 60 mins
    You know 81% of hacking-related breaches involve stolen or weak credentials (Verizon Data Breach Investigation Report, Verizon, 2017). You know your users are targeted by more phishing attacks than ever before. You even know Multi-Factor Authentication (MFA) is your best weapon in defending against cybercrime.

    But how do you wrap your head around an MFA project at enterprise scale? What product capabilities are essential? And how do you cut down on the time it takes to scope, deploy, and operationalize a solution?

    Join Jeffrey Broberg, Sr. Director of Mobile Product Management at OneLogin and Michael Gleason, Sr. Manager, Product Marketing at OneLogin for a webinar where you will learn:

    - Why a successful MFA deployment represents the ultimate effort-to-impact security project
    - Why choosing an Identity Provider with built-in MFA functionality is the ultimate IT + Security twofer
    - How to smash the security vs. productivity paradigm with dynamic authentication
    - How to deploy and operationalize in hours or day instead of months by deploying MFA in front of your Single Sign-On (SSO) solution
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Jun 21 2018 5:00 pm UTC 60 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • Designed for Speed: Providence Health Plan's Enterprise Data Management Roadmap
    Designed for Speed: Providence Health Plan's Enterprise Data Management Roadmap Jaydeep Ghosh, Director of Data Services, Providence Health Plan & Monica Mullen, Solutions Marketing Manager, Informatica Jun 21 2018 5:00 pm UTC 60 mins
    Providence Health Plan has grown organically over the last 30+ years. With the adoption of the Affordable Care Act as well as growth in other lines of business, the organization was at a crossroad. As new applications and vendors were introduced into the ecosystem to respond to the business’s need, system complexity had increased substantially. The result was a data management challenge that would limit ongoing business success if it remained unsolved.

    Join Jaydeep Ghosh, Director of Data Services at Providence Health Plan, and Monica Mullen, Principal Solutions Marketing Manager at Informatica, as they discuss the enterprise data roadmap that the organization put together to address the current state, position the health plan for future growth, and address these top challenges:

    • Time to business value
    • Multiple, but incomplete, versions of the truth
    • Overall lack of trust in data
  • Slash Storage TCO for Rapidly Scaling Data Sets
    Slash Storage TCO for Rapidly Scaling Data Sets Glen Olsen, Caringo Product Manager & Krishna Subramanian, Komprise COO Jun 21 2018 5:00 pm UTC 60 mins
    The nature of enterprise data is rapidly changing and existing storage infrastructures can’t keep up. Network Attached Storage (NAS) devices were designed for performance and single-site collaboration but file creation and access is different now. Many turn to the cloud to offload data, however, for rapidly scaling data sets, daily transfer rates and bandwidth constraints are an issue. In addition, some sensitive information can’t leave your data center. Komprise and Caringo have partnered to solve these issues by pairing intelligent data management technology with hassle-free, limitless storage.

    Attend this webinar to learn how you can slash TCO for rapidly scaling data sets by identifying data to move from NAS. Then securely transferring it based on value to Caringo Swarm scale-out object storage were it is protected without backups and instantly and securely available internally or externally.
  • Transforming Financial Services IAM with Biometric Authentication
    Transforming Financial Services IAM with Biometric Authentication John Spencer, Chief Product Officer, Veridium | Ross Penny, Global Head of Sales Engineering, Veridium Jun 21 2018 5:00 pm UTC 60 mins
    Financial services have always done identity management. It began as the teller or manager knowing each customer. Next came signature matching, passbooks, and – if you had a lock box in a vault – a key. These systems were inflexible and inconvenient on purpose. With the advent of the computer age, these organizations simply adopted the digital analogs of these physical systems: PINs and passwords. These increased flexibility – a customer or employee could access an account at any time from practically anywhere – but sacrificed security for the sake of convenience. To be secure, PINs and passwords need to be long, complex, and changed regularly: Three things customers have no interest in.

    Today, identity management is undergoing a revolutionary change as biometrics allow companies to combine the convenience people want with the security that both people and organizations need. Learn how three financial services companies from across the world, a private investment firm, a prominent Swiss bank, and a major trading organization, have deployed a biometric authentication platform as part of their identity and access management strategy. Veridium’s Chief Product Officer, John Spencer, will explore the key factors that make up a secure biometric authentication platform, and Global Head of Sales Engineering, Ross Penny, will discuss the details of deploying within different environments.

    In this webinar we’ll discuss:
    • Using enterprise-ready solutions to replace passwords with multi-factor biometric authentication – including 4 Fingers TouchlessID, face recognition, and touch recognition – for employee and customer access.
    • Maintaining a highly secure-yet-convenient user experience across any channel: ATM, app, and personal computer.
    • Providing users with fast, easy, and seamless enrollment and verification.
  • Building for a Better Future: Using SD-WAN to Rebuild a Business Network
    Building for a Better Future: Using SD-WAN to Rebuild a Business Network Rick Rader, IT Director with Myron Steves & Scott Turner and David Turner with Meriplex & Rosa Lear with VeloCloud Jun 21 2018 5:00 pm UTC 60 mins
    In today’s world, undisrupted network connectivity is critical to ensuring business continuity. As the adoption of virtual instances and cloud migration accelerates, dependence on high quality, high speed, high bandwidth connections becomes a necessity. Outages have far reaching implications and can be detrimental to a business as the networks of yesterday are ill-prepared for the business of today and the future. SD-WAN is changing this scenario. In this webinar, Myron Steves discusses how its implementation of SD-WAN transformed their entire network and prepares them for future growth.

    Presenters:
    Rick Rader, IT Director with Myron F Steves
    Scott Turner, Director of Sales with Meriplex Communications
    David Turner, Principal Technologist with Meriplex Communications
    Rosa Lear, Senior Marketing Manager with VeloCloud now part of VMware
  • Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework
    Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework Renee Murphy | Forrester & Josh Mayfield | Absolute Jun 21 2018 5:00 pm UTC 60 mins
    The NIST Cybersecurity Framework (CSF) is the chosen path for thousands of organizations. Why? Because resilience is their most critical need in the face of changing threats, ever-present vulnerabilities, and a sprawling attack surface. NIST CSF provides a blueprint for cyber resilience. But turning theory into reality can be a challenge.

    In this webinar, you’ll drop in on a conversation between our featured guest, Forrester’s Renee Murphy, Principal Analyst for Security and Risk; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the clear and tangible steps at work within leading organizations pursuing NIST CSF.

    You will gather insights and avoid the pitfalls with your rollout of NIST CSF, including how to:
    1- Identify endpoint devices: on and off network
    2- Validate configurations for optimal data protection
    3- Detect compliance drift within your endpoint population
    4- Respond to endpoint security incidents
    5- Recover from security incidents and iterate for continuous compliance


    Featured Speakers:
    - Renee Murphy | Principal Analyst for Security and Risk Professionals | Forrester
    - Josh Mayfield | Director of Solutions | Absolute
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Jun 21 2018 5:00 pm UTC 60 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • Cybercrime Doesn't Discriminate! 7 Questions to Secure Your Business
    Cybercrime Doesn't Discriminate! 7 Questions to Secure Your Business Oriah Longanecker, SkOUT Secure Intelligence Jun 21 2018 5:30 pm UTC 60 mins
    Our presenter, Oriah Longanecker, has over 20 years of experience as an intelligence and cyber warfare officer in the U.S. Air Force! He's lead a variety of intelligence and cyber warfare units for the National Security Agency and other Intelligence Community organizations, as well as U.S. Cyber Command, and currently leads the cybersecurity and threat intelligence efforts for our partner SkOUT Secure Intelligence in the western U.S.

    Data breaches have gained attention with the increasing use of digital files and companies and users large reliance on digital data and electronic record keeping.
  • Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless
    Technical Overview: FIDO2 WebAuthn Data Flows, Attestation, and Passwordless Emil Lundberg, Luke Walker Jun 21 2018 6:00 pm UTC 60 mins
    Watch this webinar for a technical overview of WebAuthn for web applications. This session is led by Emil Lundberg, a key contributor and one of the nine editors of the W3C WebAuthn specification.

    Join us for a deep dive into the core concepts required to integrate WebAuthn into your web application, including what happens behind the scenes during registration and authentication.

    Key topics include:
    - FIDO Authentication, CTAP, and WebAuthn
    - Registration Walkthrough
    - What is Attestation?
    - Resident Keys
    - Second-Factor Authentication
    - Password-less Authentication

    This webinar is intended for software engineers, developers, software architects, and product managers, though it is open to anyone interested on the topic.
  • How to think digital and embrace working with Digital Transformation
    How to think digital and embrace working with Digital Transformation Rajesh Thukral, Director, Digital Transformation Services, Professional Services Jun 21 2018 6:00 pm UTC 60 mins
    Fact: only a quarter of organizations are focusing on a digital transformation strategy even though more than 85% of CEOs believe technology will transform their business more than any other global trend.

    Join Rajesh Thukral, Director of Digital Business Transformation for our latest webinar as he explores the digital imperative – why every business needs to think “digital” and embrace new ways of working with their customers and employees – or risk being disrupted.
    Digital technologies are defining and disrupting how we think and do business.

    Come away with industry insights and tools that will let you assess your company’s digital mindset and help chart your own transformation journey.