Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
* Measure application performance across APIs and integrations in production
* How to query and retrieve log data across your network
* End-to-end walkthrough of priority issue identification and resolution
* Exciting new capabilities of Anypoint Monitoring
When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new connected world, you need to think about more than just the data and watching hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
Join Claire Agutter, Simone Jo Moore, Sally Bogg, Elisabeth Thomas and Andrea Kisfor an open, honest discussion about the opportunities, lessons and challenges found in a career in ITSM. From entering the industry, to forging a career and making a difference, this one-off panel discussion will explore all facets of being a woman in ITSM in 2018.
For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.
Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.
We'll then see what's happening with the IR Pulse and our caseload trends, followed by:
Kubernetes provides a rich set of tools for DevOps teams to describe, run, and manage different types of workloads. In this session, Jim discusses the Kubernetes architecture and then dives into the main concepts for cluster operations as well as controllers used to model Kubernetes applications. The session includes a demo of creating clusters, deploying and managing applications.
Kubernetes has a number of different components that developers can use to model their applications. In this introductory video, Deen explains the basics of the Kubernetes workload APIs and discussing concepts like Pods. The video also shows how easy it is to deploy, run, and manage Kubernetes workloads with Nirmata, without having to deal with complex interfaces.
With Nirmata, you can securely manage Kubernetes workloads and clusters across public and private clouds. In this video, we create a Kubernetes cluster on VMware vSphere using Nirmata's cloud provider integrations. Once the cluster is up and running, we can create environments and deploy applications on it.
Amazon EKS is a managed Kubernetes service for AWS. Nirmata is a single pane of glass that makes it easy to apply policies and gain visibility across all Kubernetes clusters, managed or custom. When needed, Nirmata can also deploy and operate clusters on any public or private cloud. In this video, we create an Amazon EKS cluster, manage it via Nirmata, and deploy applications to it.
Nirmata provides a consistent, policy-based, cloud-agnostic management plane for Kubernetes. This video shows how to discover GKE clusters, apply policies, and deploy and manage applications in the GKE cluster.
Hybrid cloud Kubernetes and container solution using Oracle and Nirmata. The demo includes:
1) Oracle Image Registry
2) Oracle Linux 7.5
3)Oracle Docker Engine 17.06
4) Oracle Kubernetes 1.9.1
5) Oracle Web logic server 12c
6) Oracle MySQL DB
With Nirmata the entire stack can be easily deployed on bare metal or virtual servers in a private cloud and managed seamlessly alongside Oracle Cloud Services.
Diamanti (a Nirmata ecosystem) partner provides a converged easy-to-use solution for bare-metal Kubernetes. This video shows how Nirmata can manage Diamanti Kubernetes Clusters and workloads, all through a highly-intuitive and modern user interface.
The popularity of blockchain technology is rapidly expanding as both the public and enterprise sector begins to evaluate its reliability and validity. As the blockchain community attempts to address essential shortcomings concerning performance and scalability, a lack of commercially available, professional testing tools acts as a bottleneck preventing the rapid development of viable solutions. The Whiteblock platform provides an easy-to-use and fully configurable testing environment for blockchain systems, protocols, and decentralized applications. This presentation will present the testing methodology developed using this platform as well as summarize the results of testing initiatives conducted within the Whiteblock lab.
Nirmata is a turnkey, multi-cloud, Kubernetes-based platform, designed specifically for complex enterprise environments.
With Nirmata, you can:
Easily deploy Kubernetes on cloud instances, VMs or bare-metal servers.
Import and discover clusters from AKS, EKS and other managed Kubernetes services. Setup add-ons for security, load-balancing, monitoring, and logging. Scale or update your clusters with a click of a button.
Telemetry: The essential ingredient to success with Agile, DevOps and SRE:
Measurements, metrics and telemetry enable teams and organizations to deliver successful results with Agile, DevOps and SRE; in order to achieve speed, quality and automation targets with built-in performance, security and resiliency.
Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.
Additionally, CloudCheckr makes recommendations based on your AWS or Azure usage to better utilize resources and upgrade or downgrade instances. The results? Customers typically report saving 30% on their cloud spend, immediately. Learn more about the cost saving capabilities in this live learning session with CloudCheckr Product Manager Todd Bernhard.
Attendees Will Learn:
- Where you may be overspending
- Reserved Instance Right-Sizing Recommendations
- Utilization Best Practices
In today's digital enterprise, it's technology that drives business success. And with the strategic pairing of AppDynamics and Cisco, organizations can now drive their digital transformation forward in ways never before possible. But how?
In this webinar, you’ll learn how AppDynamics real-time data platform is being correlated with Cisco’s data platforms to give you the richest end-to-end view across the stack, allowing for faster remediation and automation
You’ll gain insights into:
- New challenges of cross-domain failures in the enterprise
- The future of IT intelligence across the software and infrastructure industries
- How Cisco solutions like ACI, CloudCenter and Workload Optimization Manager (CWOM) will be integrated with AppDynamics and Cisco
Quality & Testing SIG Talk: 3 futurists, 2 topics, 1 hour: The Future of APM, Telemetry and Blockchain [Complete Edition]
Join us to for this next SIG Talk event with three speakers who will give you insights into telemetry and the latest buzz around Blockchain technology.
Shown below is an outline of the agenda and topics:
Speaker: Todd DeCapua
Telemetry: The essential ingredient to success with Agile, DevOps and SRE: Measurements, metrics and telemetry enable teams and organizations to deliver successful results with Agile, DevOps and SRE; in order to achieve speed, quality and automation targets with built-in performance, security and resiliency.
Speaker: Matthew David
Blockchain in the Enterprise: The secure, distributed ledger technology that forms the foundation for Blockchain is breaking out as a new foundation for building enterprise applications. The goal of this presentation is to highlight leading Blockchain solutions, the risks and rewards of leveraging Distributed Ledger Technologies (DLT) and how your company can start to leverage Blockchain today.
Speaker: Zak Cole
Blockchain Testing: The popularity of blockchain technology is rapidly expanding as both the public and enterprise sector begins to evaluate its reliability and validity. As the blockchain community attempts to address essential shortcomings concerning performance and scalability, a lack of commercially available, professional testing tools acts as a bottleneck preventing the rapid development of viable solutions. The Whiteblock platform provides an easy-to-use and fully configurable testing environment for blockchain systems, protocols, and decentralized applications. This presentation will present the testing methodology developed using this platform as well as summarize the results of testing initiatives conducted within the Whiteblock lab.
Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.
To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to next-generation network packet brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:
• Delivers complete network-wide visibility across physical, virtual and cloud environments.
• Scales metadata extraction for improved forensics.
• Isolates applications for targeted inspection.
• Gives you visibility into encrypted traffic for threat detection.
See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:
• Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
• Scale to speed of the network without “rip and replace” by load balancing across tool groups.
• Remove single points of failure and increase availability of both the tools and the network.
• Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.
Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
With 90% of all data in the world created in just the past 2 years, you’ll probably be surprised to hear that thinking processes generated 2,500 years ago can still help us to make sense of this explosion of information. Critical thinking through rational, unbiased analysis is still a bedrock for survival in business today. While disruption and innovation are very important (see our Future of Thinking Series parts I and II for more on these topics), modern critical thinking models are the linchpin that determines success or failure in nearly every industry and job.
If you want to learn how to focus on essential information, ignore irrelevant inputs and solve complex problems, one key will be to understand critical thinking and when to apply it.
Join Jason O'Neill, Head of Global Training Services with Kepner-Tregoe and Veena Rajkumar, Learning & Development Program Manager, Western Digital, in the third and final installment of our "Future of Thinking" series where they’ll discuss how critical thinking is more important today than ever before.
What you will learn:
The evolving definition and history of critical thinking
How modern critical thinking models are being used by successful leaders today
Nykypäivän tuotteita yhdistää jatkuva kehittäminen, asiakaskokemuksen tärkeys ja armoton kilpailu. Onnistumiseen vaaditaan kykyä ymmärtää asiakkaiden tarpeita sekä yhdistää saumaton käytettävyys ja tarvittava teknologia. Oikeiden ominaisuuksien kehittäminen ratkaisee tuotteiden menestyksen.
Insinööri on viisas eläin. Lähes kaikki ongelmat ovat teknologialla ratkaistavissa, kunhan resursseja on vain käytettävissä riittävästi. Tuotekehityksessä itse asioiden kehittämistä suurempi ongelma onkin yleensä se, mitä asioita valitaan kehitettäväksi. Ideoita, kehityskandidaatteja on aina ylenmäärin enemmän kuin mitä tuotekehitystiimi pystyy vastaanottamaan. Kuka, ja millä keinoin sitten valitsee ne ideat ja vaatimukset mitä lähdetään kehittämään? Miten näitä "the chosen ones" sitten kannattaa kehityksen alkutaipaleella jalostaa? Kannattaako tästäkin valittujen kultaisten ajatusten joukosta pudottaa vielä pois jotakin ennen kuin konseptit annetaan varsinaiselle tuotekehitystiimille?
Näistä asioista kerrotaan "OIKEAT OMINAISUUDET" -KOULUTUKSESSA.
Tässä maksuttomassa webinaarissa esitellään ajatusmalli ja lähestymistapoja ideavirran hallintaan. Jos olet kiinnostunut Oikeat ominaisuudet -koulutuksesta tai tehokkaasta ideoiden kehittämisestä, katso webinaari.
Webinaarin pitää Harri Pendolin. Harri Pendolin on nähnyt tuotekehityksen tuskat ja haasteet monesta kulmasta. Yli 20 vuotta sitten alkanut ura tuotteiden parissa on vienyt tuotekehittäjästä tuotepäälliköksi ja yrittäjäksi. Nykyisin Harri toimii Contribyten johtavana konsulttina tuotejohtamisen ja portfolion hallinnan alueella. Kokemusta Harrille on kertynyt mm.
• yli 20 tuotekehitysprojektia kehittäjä tai tuotepäällikkönä
• Suomen ensimmäisen tuotejohtamisyrityksen perustaja
• Ulos toimistosta – reittiopas uusien tuotteiden kehittäjille -kirjan kirjoittaja
• Tuotepäällikkö-blogin perustaja
• yli 600 koulutettua tuotepäällikköä
• 8 vuotta tuotejohtamisen koulutusta ja konsultointia
Customer onboarding and origination is the most important engagement for banks. Tech savvy customers tend to open bank accounts from any device. Aspire’s Customer Onboarding Plug n Play built for Temenos Digital Banking Channel users curbs attrition rates and reduces average onboarding time.
Here is a quick demo of Customer Onboarding Plug n Play solution accelerator.
Containers have changed the way we build, deploy, run, and investigate what goes on with our applications. It’s critical to validate that you’ve configured your containers securely, they don’t include any vulnerabilities, and enforce they are doing what’s expected in production.
In this webinar we’ll cover:
-How to implement image scanning in your CI/CD pipeline
-How to prevent vulnerable images from being deployed to production
-Methods for detecting anomalous behavior inside containers
-What’s required for forensics when the container may no longer be running
-How to audit and report on compliance at each stage of your SDLC
Introducing Luma the Virtual Agent with Artificial Intelligence. Learn how organizations using ITSM software from CA Technologies can rapidly leverage this powerful capability without altering their current implementations. •You will see Luma in action, automating self-service, guiding users to create actionable tickets, performing knowledge lookups, and automating tasks such as reset password.
On Tuesday, August 21st, at 1:00 PM ET, 10:00 AM PT, join Carleen Carter, Acorio's Director of Technical Consultants and Solutions, as she presents The Software Asset Management Landscape is Changing: Here's What You Need to Know.
- Software Asset Management Best Practices & Strategy
- Changes with Virtual Machines and Cloud Licenses
- Lower cost and risk with ServiceNow's Software Asset Management
Join Founder and CEO of POPin Hayes Drumwright as he talks about the way town hall meetings can impact your organization when done correctly. He'll share customer examples, give you a formula to follow when doing town hall meetings, and explain best practices when it comes to truly hearing your employees and allowing their feedback to impact the direction of your company.
451 Research’s 14th annual Hosting & Cloud Transformation Summit (HCTS) in Las Vegas from September 24-26 is coming up fast! HCTS welcomes executives in the hosting, cloud, datacenter and managed services sectors to hear timely, actionable insight into the competitive dynamics of innovation from 451 Research analyst talent and guest speakers including AWS, Microsoft, Huawei, ING, DH Capital and more. In this webinar, we will be discussing what to expect from this year’s Summit, some highlights from previous years and asking about upcoming sessions with three 451 Research Vice Presidents who will be taking the main stage at HCTS: Kelly Morgan, Melanie Posey and Al Sadowski. Join this Q&A webinar to learn about:
- What is the Age of Consumption and what should we expect to see from it?
- Why should organizations have a strong business-IT alignment when moving forward with a Digital Transformation strategy?
- What, if any, key shifts are happening in the multi-tenant datacenter space as a result of the age of consumption?
- Why are hyperscalers both a friend AND foe to other service providers?
Managed Service Providers (MSPs), Cloud Service Providers (CSPs), and resellers often have a tough enough time generating invoices for their customers. Add to that the demands of a multi-cloud environment, with AWS, Azure, Google Cloud and more, and it becomes extremely challenging to allocate billing and invoicing.
The solution is automation and self-healing. CloudCheckr can automatically generate invoices and even help resellers profit by keeping discounts and credits allocated among clients, presenting list price, as well as custom charges and credits as desired.
Attendees will learn:
- How to turn billing and invoicing into a profit center
- Creative tag mapping strategies
- How to structure automation monthly, weekly, and daily
New technologies have changed our personal and professional lives for the better. But, accommodating the rapid and dramatic business technology changes can be difficult. Setbacks caused by outdated, legacy ITSM solutions do not make modernization efforts easy. Whether your goals include artificial intelligence, incorporating DevOps, or automating key IT processes, all ITSM teams must embrace change and innovate.
Join our upcoming webinar with representatives from higher-education, healthcare, and government as they share successes, blunders, and challenges from the IT trenches.
TJ Martinez, Director of Customer Support Services, University of New Mexico
Diane Burton, IT Client Services Manager, Seattle Cancer Care Alliance
Nick Kouloungis, Information Technology Services Manager, Louisville Metro Technology Services
Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.
If you aren’t already subject to one or more specific GRC mandates, inevitably, one will soon be dropped on you. Regardless of the regulation, you will need to provide structured evidence proving you operate in compliance with a fit-for-purpose set of controls.
Just in the last 12 months, GDPR and NIST 800-171 have been made mandatory. This, coupled with the stats telling us that security breaches are increasing, despite year on year increases in security investment, tells us that the need to understand and implement security controls is inevitable.
What is the most strategic, long-term and resource-effective way to reconcile increased demands for compliance and security? How do you bring together the aligned but segregated needs for ITSM and Security? How do you elevate traditional change management to the state of the art of change control, providing security-grade change visibility but without compromising your organizations’ IT agility?
Join Tom Cornelius, Senior Partner at Compliance Forge and Founder of the Secure Controls Framework, and Mark Kedgley, Chief Technology Officer and Co-Founder of New Net Technologies in an interactive webinar where we will
•Work out how to streamline and bring together overlapping or conflicting requirements for controls
•Simplify the need for multiple compliance and privacy mandates
•Examine what gives us the right mix of technology and automation to deliver the new hybrid SecureOps way for operating ITSM and security
Get a free copy of the integrated Secure Controls Framework playbook and a fully-functional extended trial of NNT Change Tracker to see how easily you can embrace SecureOps in your environment.
The benefits of DevOps transformation are significant and well-understood, with over 70% of organizations having already implemented or planning to implement DevOps within the next 12 months according to Forrester. But it’s not a change that happens overnight. After empowering tens of thousands of operations teams to effectively manage their services in production, we’ve distilled what we’ve learned from them into a few best practices that have been foundational to driving change and transforming to be more agile.
In this session, we’ll go over a few topics:
- Common operational challenges across the organizational spectrum
- The top best practices that organizations use to empower distributed teams
- How to enable both central and distributed teams to gain comprehensive visibility, take action on issues fast, and be more productive
- A couple of case studies of real organizations who have achieved successes in the journey toward DevOps transformation, and how they’re getting there
Containers offer enterprises substantial gains in application deployment speed and portability. However, these benefits are often countered by the operational complexities of infrastructure configuration and management, especially when employing a mix of cloud and on-premises container environments.
This webinar is for IT Operations and enterprise platform teams interested in driving business agilities using cloud-native technologies. You will learn how modern cloud-native technologies can help streamline complex processes, eliminate the need for network and storage overlays, and ensure reliable performance with granular controls for developers and operators.
In this webinar, Diamanti and Nirmata teams discuss how Nirmata’s federated approach to Kubernetes cluster deployment and application management integrates with the Diamanti platform, seamlessly bridging on-premise bare-metal and hybrid cloud container environments.
You will learn how to:
- Deploy an on-premises container stack in minutes
- Incorporate Diamanti into your multi-cloud environment using Nirmata
- Simplify application management and governance across on-premises and public cloud environments
What is mentoring? What’s the difference between coaching and mentoring? Is mentoring relevant to my organization? What are the strategies and benefits?
Mentoring is a cost efficient and trusted solution to many of the problems surrounding communication and staff development within an organization.
All new members of staff, regardless of seniority, should have an appointed mentor to assist in the induction process; the need for ongoing support with all aspects of practice is particularly important for success and happiness!
This session will seek to debunk the confusion and uncertainty that often surrounds a developmental mentoring role, outlining clearly the responsibilities of the mentor and mentee and highlighting what is to be avoided. Coaching techniques and their appropriateness will be investigated, alongside how to apply these in an agile environment, finishing with strategies on how to embed a mentoring scheme and the benefits for individuals, team and organization!
The application is now the business, and investing in the right APM solution is imperative to delivering flawless customer experiences. So how can you present a solid business case for this major IT investment?
We commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to showcase the cost savings and business benefits you can expect from AppDynamics APM and its integration with Cisco technology.
Register for our webinar featuring Forrester guest speakers as they explain the TEI methodology and learn:
- Technology trends in the APM landscape
- How you can save $1.45 million annually through consolidation of monitoring tools
- Why Cisco + AppDynamics together will accelerate your digital transformation
API abuses are set to become the most frequent attack route for data breaches by 2022. Watch this webinar to learn how your company can stay ahead of threats by delivering advanced data and API security with MuleSoft’s new security offerings.
* How to tokenize, encrypt, or mask sensitive data in transit with API policies
* Why format-preserving tokenization minimizes impact to downstream systems
* When to use layers of defense with rapidly configured, policy-driven perimeter gateways
* How to set up logical perimeters around applications, groups of APIs, or integrations
94% of the Fortune Global 100 use SAS analytics. Through innovative software and services, SAS empowers and inspires customers around the world to transform data into intelligence. IDC predicts by 2019, 40% of Data Transformation initiatives will use AI services; by 2021, 75% of commercial enterprise apps will use AI, over 90% of consumers will interact with customer support bots, and over 50% of new industrial robots will leverage AI.
Data-driven applications and Machine Learning (ML) workloads, using SAS analytics are increasing in volume and complexity as organizations look to reduce training and operational timelines for artificial intelligence (AI) use cases. To enable predictive and cognitive analytics, you need to accelerate training and operations by delivering ultra-low latency with massive ingest bandwidths when faced with heavy mixed random and sequential read/write workloads.
Vexata is teaming up with Destiny Corporation, a Business and Technology firm who is a SAS gold partner and reseller. This webinar is targeted towards SAS Line of Business and IT owners who are challenged with
- new use cases like IoT, machine and deep learning across FSI, Insurance, Healthcare and Lifesciences verticals
- handling growing data-sets and deriving actionable intelligence from these data-sets as well as
-optimizing their existing long running jobs and IT infrastructure without a rip and replace policy.
Learn how to identify your SAS analytics IO bottlenecks and leverage Vexata VX-100 with its transformative VX-OS purpose built to overcome these challenges.
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Windows 10 can be a beast. Learn to tame the monster on our new bi-monthly webinar series all about Windows 10. We'll feature an Insider preview, outside insights, migration times, best practices, and a comprehensive Q&A section.
Provide exceptional customer service and experiences by gaining visibility into your complex, hybrid cloud infrastructure. In this webinar, Joe Weinman, author of Cloudonomics and Digital Disciplines and Eileen Haggerty, Sr. Director of Enterprise Operations at NETSCOUT share smart findings and real-life examples for gaining the visibility needed to manage performance within complex environments.
In this webinar learn about:
The top trends necessitating Smart Data for Hybrid Cloud
The roadblocks for IT organizations leading transformative initiatives
Achieving comprehensive visibility into the multiple, distributed, communicating components such as micro-services implemented across infrastructure
How enterprises are ensuring quality service performance when migrating to hybrid cloud
Containers have sped up the CI/CD process. It’s now easy to package up an application and deploy it in a matter minutes. This allows teams to move faster, and makes it easier to patch software that may contain vulnerabilities. However, this increase in speed has create a need for new processes and tooling.
In this webinar we’ll cover:
-How to scan images for vulnerabilities as part of the CI/CD process
-Why it’s important to scan images in registries as well as part of the CI/CD pipeline
-How to prevent vulnerable images from being deployed
-How to alert if new vulnerabilities are found in images running in production
More organizations than ever before are now recognizing the importance of the employee experience. Productivity, talent acquisition and retention, and customer satisfaction are all related to the employee experience, so it makes very good business sense to improve it as much as possible.
In this webinar, Roy Atkinson and Matt Stone will examine how concentrating on three aspects of employee experience can accelerate business performance.
In this webinar, we will discuss:
* Understanding how the employee experience is related to business success
* Measuring the right things
* Providing a single platform for service management across the organization
Who should attend:
* Service management professionals inside and outside IT
* Managers and process owners who want to learn more about service management trends
Aspire and Sauce Labs are jointly conducting this webinar on the topic ‘Embedding Quality Engineering in DevOps Pipeline’. This webinar is aimed at helping organizations understand the importance of Continuous Testing in a DevOps environment and how it can be integrated with cloud environments.
•Different Dimensions of Quality Engineering
•How Continuous Testing can Make or Break your DevOps Pipeline
•Integrating Continuous Testing with Cloud Environments
•Recommended Tools and Techniques
•Sample Use Cases
IT is responsible for supporting the business through daily operations, growth, and change. This hefty responsibility puts IT at the heart of nearly every forward-thinking organization. Unfortunately, there is no single methodology that tells IT exactly what to do, but Integrating best practices that support agility, while also providing stability is the only way to remain competitive.
ITIL, the most popular IT best practice framework, raises skepticism when it comes to agility. However, when applied judiciously, strategically, and in the context of agile and lean principles can provide a stable platform while enabling speed and efficiency.
Tracy Barnes, STRITCO
About Tracy: Tracy was the project manager for the successful ISO/IEC 20000-1:2005 certification at the Florida Department of Revenue. The first state government agency to be certified in the United States. Tracy has achieved the following certifications: ITIL Expert, PMP, Executive Consultant/Manager in ITSM according to ISO/IEC 20000, Six Sigma Green Belt, Internal Audit Certificate in ITSM according to ISO/IEC 20000-1:2011, and is a Certified Public Manager.
The adoption of a continuous integration & delivery (CI/CD) pipeline has fundamentally transformed how software is developed and supported. This modern DevOps pipeline has dramatically increased the pace of software release cycles and driven new innovations throughout the software industry. Hear directly from a customer’s unique perspective on how Beeline(the world leader in contingent workforce solutions) aligned Development, Operations and Security practitioners to set up a fully automated CI/CD pipeline and incorporated application security early in the process.
In this presentation key Beeline staff, including software development, solution architects and security specialists will discuss the process for defining the parameters for successfully incorporating security in the automated pipeline as part of the overall SDLC (Software Development Life Cycle).
Key principles to improve software delivery will be addressed as well as the full range of issues and obstacles that confronted them and solutions to overcome them. In this presentation you will learn the following:
-Provide you with a framework and an overall blueprint to start securing your automated pipeline
- How to start the conversation with the development and security teams for a continuous delivery culture
- Understand why traditional manual Application Security approaches impedes rapid DevOps software releases
- How automated Application Security supports the vision of DevOps and the continuous delivery culture
- Understand how to make sure you are not missing critical pieces for audit oversight
- Know how to support containers in a modern enterprise
Julie Chickillo - VP Information Security Risk & Compliance Officer, Beeline
Brandon Grady - SVP Engineering & Architecture, Beeline
Ben Finke - Information Security Engineer, Beeline
Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
The future is arriving faster than expected and businesses need to evolve even faster to keep up. As organisations become digital, it’s essential that they leverage the skills and tools that inject agility into the business. An important enabler of the digital business is an end-to-end programmable infrastructure.
Join the discussion with Gary Middleton, Practice Director, Digital Infrastructure, Dimension Data and David Delisi, Director Global Alliances, Sales, Dell EMC on:
- Evolving infrastructure skills and tools for SDx
- Benefits that programmable infrastructure deliver
- Getting the most from programmable infrastructure investments
Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.
Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:
• Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
• Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
• Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
• Secure: Keep all proprietary information for your apps, desktops and data under your control.
The nature of work and the workplace is changing. Remote working and mobility is on the rise, driving organisations to empower their teams with flexible, collaborative and dynamic workspaces and tools to work securely from anywhere, on any device. IoT sensors, location technology and indoor mapping provide opportunities to better understand how people interact with their environment, improve user experience and continually optimise working environments.
Realising the benefits of these innovative technologies and services depends on powerful, flexible and secure networks that address the needs of the users, and are designed to cater for the exciting future of intelligent devices and applications.
Join Lawrence Van Deusen, Group Networking Practice Director, Wired and Wireless Dimension Data and Jon Howell, HPE Aruba, Mobile Engagement EMEA as they discuss how a modern network infrastructure is an essential component of your workplace of the future and:
Current trends driving workplace evolution
Modern workplace requirements and challenges
Smart digital workplace experiences