Hi [[ session.user.profile.firstName ]]

IT Service Management

  • VM Consolidation with Vexata NVMe Storage Systems
    VM Consolidation with Vexata NVMe Storage Systems Rick Walsworth Recorded: Aug 17 2018 5 mins
    Vexata provides NVMe-based storage solutions that maximize VMware virtualized workloads providing massive consolidation, high performance for enterprise workloads such as Oracle, SQL Server, and SAS Analytics. This demo provides an exclusive view into consolidating mission critical Oracle workloads on VMs supporting a range of mixed OLTP, Analytics and Data Warehouse workloads delivering ultra-low latency over increasing workloads. If you are considering moving enterprise applications into VMware virtualized environments, Vexata delivers the performance and scale to do so with confidence.
  • Operational Alignment: Rebalance IT Process with Customer Needs
    Operational Alignment: Rebalance IT Process with Customer Needs Troy DuMoulin - VP Research & Development, Pink Elephant Recorded: Aug 17 2018 59 mins
    Let’s say your IT organization has processes in place that seem effective on the surface — you resolve service outages, provision resources, and manage changes as required. Your monthly reports may satisfy IT executive requirements, but how aware are you of your business customers’ needs and service expectations in relation to these processes? In their initial efforts to define IT service delivery processes, many organizations have unintentionally pushed customers to the end of the equation.

    Aligning interdependent resources and workflows is crucial for IT operations to be successful — but not at the expense of the customer. Too frequently, IT faces excessive pressure to deliver business metrics, and not enough significance is placed on the goals and values of the customers.

    Join Troy DuMoulin, VP Research & Development at Pink Elephant discusses how team misalignment can hinder service delivery.
  • Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
    Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring Andrew Bragdon, Principal Product Manager, MuleSoft Recorded: Aug 16 2018 56 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:
    * Measure application performance across APIs and integrations in production
    * How to query and retrieve log data across your network
    * End-to-end walkthrough of priority issue identification and resolution
    * Exciting new capabilities of Anypoint Monitoring
  • Das Geheimnis erfolgreicher Unternehmen
    Das Geheimnis erfolgreicher Unternehmen Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Recorded: Aug 16 2018 46 mins
    Nur wer seine Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Aug 15 2018 46 mins
    Part 2 Dangers of Relying on Threat Detection

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new connected world, you need to think about more than just the data and watching hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • [Panel] Women in ITSM: Opportunities, Lessons, Challenges and Advice
    [Panel] Women in ITSM: Opportunities, Lessons, Challenges and Advice Claire Agutter, Simone Jo Moore, Sally Bogg, Elisabeth Thomas, Andrea Kis Recorded: Aug 15 2018 61 mins
    Join Claire Agutter, Simone Jo Moore, Sally Bogg, Elisabeth Thomas and Andrea Kisfor an open, honest discussion about the opportunities, lessons and challenges found in a career in ITSM. From entering the industry, to forging a career and making a difference, this one-off panel discussion will explore all facets of being a woman in ITSM in 2018.
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018 John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Aug 15 2018 75 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Kubernetes Training for Enterprise DevOps
    Kubernetes Training for Enterprise DevOps Jim Bugwadia Recorded: Aug 14 2018 65 mins
    Kubernetes provides a rich set of tools for DevOps teams to describe, run, and manage different types of workloads. In this session, Jim discusses the Kubernetes architecture and then dives into the main concepts for cluster operations as well as controllers used to model Kubernetes applications. The session includes a demo of creating clusters, deploying and managing applications.
  • Kubernetes For Developers
    Kubernetes For Developers Deen Ariff Recorded: Aug 14 2018 9 mins
    Kubernetes has a number of different components that developers can use to model their applications. In this introductory video, Deen explains the basics of the Kubernetes workload APIs and discussing concepts like Pods. The video also shows how easy it is to deploy, run, and manage Kubernetes workloads with Nirmata, without having to deal with complex interfaces.
  • Deploying Kubernetes on vSphere using Nirmata
    Deploying Kubernetes on vSphere using Nirmata Nirmata Recorded: Aug 14 2018 6 mins
    With Nirmata, you can securely manage Kubernetes workloads and clusters across public and private clouds. In this video, we create a Kubernetes cluster on VMware vSphere using Nirmata's cloud provider integrations. Once the cluster is up and running, we can create environments and deploy applications on it.
  • Deploying applications on Amazon EKS using Nirmata
    Deploying applications on Amazon EKS using Nirmata Nirmata Recorded: Aug 14 2018 3 mins
    Amazon EKS is a managed Kubernetes service for AWS. Nirmata is a single pane of glass that makes it easy to apply policies and gain visibility across all Kubernetes clusters, managed or custom. When needed, Nirmata can also deploy and operate clusters on any public or private cloud. In this video, we create an Amazon EKS cluster, manage it via Nirmata, and deploy applications to it.
  • Manage GKE clusters using Nirmata!
    Manage GKE clusters using Nirmata! Ritesh Patel Recorded: Aug 14 2018 6 mins
    Nirmata provides a consistent, policy-based, cloud-agnostic management plane for Kubernetes. This video shows how to discover GKE clusters, apply policies, and deploy and manage applications in the GKE cluster.
  • Nirmata Oracle Kubernetes Stack Demo
    Nirmata Oracle Kubernetes Stack Demo Ritesh Patel Recorded: Aug 14 2018 6 mins
    Hybrid cloud Kubernetes and container solution using Oracle and Nirmata. The demo includes:
    1) Oracle Image Registry
    2) Oracle Linux 7.5
    3)Oracle Docker Engine 17.06
    4) Oracle Kubernetes 1.9.1
    5) Oracle Web logic server 12c
    6) Oracle MySQL DB

    With Nirmata the entire stack can be easily deployed on bare metal or virtual servers in a private cloud and managed seamlessly alongside Oracle Cloud Services.
  • Deploying Application on Diamanti Converged Container Platform using Nirmata
    Deploying Application on Diamanti Converged Container Platform using Nirmata Nirmata Recorded: Aug 14 2018 3 mins
    Diamanti (a Nirmata ecosystem) partner provides a converged easy-to-use solution for bare-metal Kubernetes. This video shows how Nirmata can manage Diamanti Kubernetes Clusters and workloads, all through a highly-intuitive and modern user interface.
  • Q&T SIG Talk Series Ep. 21:  Blockchain Testing
    Q&T SIG Talk Series Ep. 21: Blockchain Testing Zak Cole Recorded: Aug 14 2018 27 mins
    Blockchain Testing

    The popularity of blockchain technology is rapidly expanding as both the public and enterprise sector begins to evaluate its reliability and validity. As the blockchain community attempts to address essential shortcomings concerning performance and scalability, a lack of commercially available, professional testing tools acts as a bottleneck preventing the rapid development of viable solutions. The Whiteblock platform provides an easy-to-use and fully configurable testing environment for blockchain systems, protocols, and decentralized applications. This presentation will present the testing methodology developed using this platform as well as summarize the results of testing initiatives conducted within the Whiteblock lab.
  • About Nirmata
    About Nirmata Nirmata Recorded: Aug 14 2018 3 mins
    Nirmata is a turnkey, multi-cloud, Kubernetes-based platform, designed specifically for complex enterprise environments.

    With Nirmata, you can:
    Easily deploy Kubernetes on cloud instances, VMs or bare-metal servers.
    Import and discover clusters from AKS, EKS and other managed Kubernetes services. Setup add-ons for security, load-balancing, monitoring, and logging. Scale or update your clusters with a click of a button.
  • Q&T SIG Talk Series Ep. 19: Telemetry: Success for Agile, DevOps and SRE
    Q&T SIG Talk Series Ep. 19: Telemetry: Success for Agile, DevOps and SRE Todd DeCapua Recorded: Aug 14 2018 74 mins
    Telemetry: The essential ingredient to success with Agile, DevOps and SRE:

    Measurements, metrics and telemetry enable teams and organizations to deliver successful results with Agile, DevOps and SRE; in order to achieve speed, quality and automation targets with built-in performance, security and resiliency.
  • Q&T SIG Talk Series - Future of APM, Telemetry and Blockchain [Complete Edition]
    Q&T SIG Talk Series - Future of APM, Telemetry and Blockchain [Complete Edition] Todd DeCapua, Matthew David, Zak Cole Recorded: Aug 14 2018 74 mins
    Quality & Testing SIG Talk: 3 futurists, 2 topics, 1 hour: The Future of APM, Telemetry and Blockchain [Complete Edition]

    Join us to for this next SIG Talk event with three speakers who will give you insights into telemetry and the latest buzz around Blockchain technology.

    Shown below is an outline of the agenda and topics:

    Speaker: Todd DeCapua
    Telemetry: The essential ingredient to success with Agile, DevOps and SRE: Measurements, metrics and telemetry enable teams and organizations to deliver successful results with Agile, DevOps and SRE; in order to achieve speed, quality and automation targets with built-in performance, security and resiliency.

    Speaker: Matthew David
    Blockchain in the Enterprise: The secure, distributed ledger technology that forms the foundation for Blockchain is breaking out as a new foundation for building enterprise applications. The goal of this presentation is to highlight leading Blockchain solutions, the risks and rewards of leveraging Distributed Ledger Technologies (DLT) and how your company can start to leverage Blockchain today.

    Speaker: Zak Cole
    Blockchain Testing: The popularity of blockchain technology is rapidly expanding as both the public and enterprise sector begins to evaluate its reliability and validity. As the blockchain community attempts to address essential shortcomings concerning performance and scalability, a lack of commercially available, professional testing tools acts as a bottleneck preventing the rapid development of viable solutions. The Whiteblock platform provides an easy-to-use and fully configurable testing environment for blockchain systems, protocols, and decentralized applications. This presentation will present the testing methodology developed using this platform as well as summarize the results of testing initiatives conducted within the Whiteblock lab.
  • AppDynamics + Cisco: Driving Transformation Across the Stack
    AppDynamics + Cisco: Driving Transformation Across the Stack Steve Long, Regional CTO, AppDynamics Recorded: Aug 14 2018 45 mins
    In today's digital enterprise, it's technology that drives business success. And with the strategic pairing of AppDynamics and Cisco, organizations can now drive their digital transformation forward in ways never before possible. But how?

    In this webinar, you’ll learn how AppDynamics real-time data platform is being correlated with Cisco’s data platforms to give you the richest end-to-end view across the stack, allowing for faster remediation and automation

    You’ll gain insights into:

    - New challenges of cross-domain failures in the enterprise
    - The future of IT intelligence across the software and infrastructure industries
    - How Cisco solutions like ACI, CloudCenter and Workload Optimization Manager (CWOM) will be integrated with AppDynamics and Cisco
  • Get Started: Cost Savings in the Cloud
    Get Started: Cost Savings in the Cloud Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 14 2018 29 mins
    Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.

    Additionally, CloudCheckr makes recommendations based on your AWS or Azure usage to better utilize resources and upgrade or downgrade instances. The results? Customers typically report saving 30% on their cloud spend, immediately. Learn more about the cost saving capabilities in this live learning session with CloudCheckr Product Manager Todd Bernhard.

    Attendees Will Learn:
    - Where you may be overspending
    - Reserved Instance Right-Sizing Recommendations
    - Utilization Best Practices
  • Strengthen Security While Ensuring Network Uptime
    Strengthen Security While Ensuring Network Uptime Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Aug 14 2018 38 mins
    Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.

    To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to next-generation network packet brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:

    • Delivers complete network-wide visibility across physical, virtual and cloud environments.
    • Scales metadata extraction for improved forensics.
    • Isolates applications for targeted inspection.
    • Gives you visibility into encrypted traffic for threat detection.

    See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:

    • Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
    • Scale to speed of the network without “rip and replace” by load balancing across tool groups.
    • Remove single points of failure and increase availability of both the tools and the network.
    • Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.

    Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
  • Future of Thinking Series: Critical Thinking
    Future of Thinking Series: Critical Thinking Jason O'Neill, Kepner-Tregoe & Veena Rajkumar, Western Digital Recorded: Aug 14 2018 60 mins
    With 90% of all data in the world created in just the past 2 years, you’ll probably be surprised to hear that thinking processes generated 2,500 years ago can still help us to make sense of this explosion of information. Critical thinking through rational, unbiased analysis is still a bedrock for survival in business today. While disruption and innovation are very important (see our Future of Thinking Series parts I and II for more on these topics), modern critical thinking models are the linchpin that determines success or failure in nearly every industry and job.

    If you want to learn how to focus on essential information, ignore irrelevant inputs and solve complex problems, one key will be to understand critical thinking and when to apply it.

    Join Jason O'Neill, Head of Global Training Services with Kepner-Tregoe and Veena Rajkumar, Learning & Development Program Manager, Western Digital, in the third and final installment of our "Future of Thinking" series where they’ll discuss how critical thinking is more important today than ever before.

    What you will learn:

    The evolving definition and history of critical thinking

    How modern critical thinking models are being used by successful leaders today

    How to become a critical thinking star at work
  • Lopeta turha kehittäminen - panosta oikeisiin ominaisuuksiin
    Lopeta turha kehittäminen - panosta oikeisiin ominaisuuksiin Harri Pendolin Recorded: Aug 14 2018 51 mins
    Nykypäivän tuotteita yhdistää jatkuva kehittäminen, asiakaskokemuksen tärkeys ja armoton kilpailu. Onnistumiseen vaaditaan kykyä ymmärtää asiakkaiden tarpeita sekä yhdistää saumaton käytettävyys ja tarvittava teknologia. Oikeiden ominaisuuksien kehittäminen ratkaisee tuotteiden menestyksen.

    Insinööri on viisas eläin. Lähes kaikki ongelmat ovat teknologialla ratkaistavissa, kunhan resursseja on vain käytettävissä riittävästi. Tuotekehityksessä itse asioiden kehittämistä suurempi ongelma onkin yleensä se, mitä asioita valitaan kehitettäväksi. Ideoita, kehityskandidaatteja on aina ylenmäärin enemmän kuin mitä tuotekehitystiimi pystyy vastaanottamaan. Kuka, ja millä keinoin sitten valitsee ne ideat ja vaatimukset mitä lähdetään kehittämään? Miten näitä "the chosen ones" sitten kannattaa kehityksen alkutaipaleella jalostaa? Kannattaako tästäkin valittujen kultaisten ajatusten joukosta pudottaa vielä pois jotakin ennen kuin konseptit annetaan varsinaiselle tuotekehitystiimille?

    Näistä asioista kerrotaan "OIKEAT OMINAISUUDET" -KOULUTUKSESSA.

    Tässä maksuttomassa webinaarissa esitellään ajatusmalli ja lähestymistapoja ideavirran hallintaan. Jos olet kiinnostunut Oikeat ominaisuudet -koulutuksesta tai tehokkaasta ideoiden kehittämisestä, katso webinaari.

    Webinaarin pitää Harri Pendolin. Harri Pendolin on nähnyt tuotekehityksen tuskat ja haasteet monesta kulmasta. Yli 20 vuotta sitten alkanut ura tuotteiden parissa on vienyt tuotekehittäjästä tuotepäälliköksi ja yrittäjäksi. Nykyisin Harri toimii Contribyten johtavana konsulttina tuotejohtamisen ja portfolion hallinnan alueella. Kokemusta Harrille on kertynyt mm.
    • yli 20 tuotekehitysprojektia kehittäjä tai tuotepäällikkönä
    • Suomen ensimmäisen tuotejohtamisyrityksen perustaja
    • Ulos toimistosta – reittiopas uusien tuotteiden kehittäjille -kirjan kirjoittaja
    • Tuotepäällikkö-blogin perustaja
    • yli 600 koulutettua tuotepäällikköä
    • 8 vuotta tuotejohtamisen koulutusta ja konsultointia
  • Customer onboarding and Origination for Temenos Digital Banking Solution
    Customer onboarding and Origination for Temenos Digital Banking Solution Aspire Systems Recorded: Aug 13 2018 5 mins
    Customer onboarding and origination is the most important engagement for banks. Tech savvy customers tend to open bank accounts from any device. Aspire’s Customer Onboarding Plug n Play built for Temenos Digital Banking Channel users curbs attrition rates and reduces average onboarding time.

    Here is a quick demo of Customer Onboarding Plug n Play solution accelerator.
  • Live Demo of OptiView XG
    Live Demo of OptiView XG Mike Pennacchi, Network Protocol Specialists Aug 20 2018 5:00 pm UTC 60 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • The Software Asset Management Landscape Has Changed: What You Need to Know
    The Software Asset Management Landscape Has Changed: What You Need to Know Carleen Carter, Meghan Lockwood Aug 21 2018 5:00 pm UTC 60 mins
    On Tuesday, August 21st, at 1:00 PM ET, 10:00 AM PT, join Carleen Carter, Acorio's Director of Technical Consultants and Solutions, as she presents The Software Asset Management Landscape is Changing: Here's What You Need to Know.

    - Software Asset Management Best Practices & Strategy
    - Changes with Virtual Machines and Cloud Licenses
    - Lower cost and risk with ServiceNow's Software Asset Management
  • Operationalizing Town Hall Meetings
    Operationalizing Town Hall Meetings Hayes Drumwright, Founder and CEO of POPin Aug 21 2018 6:00 pm UTC 60 mins
    Join Founder and CEO of POPin Hayes Drumwright as he talks about the way town hall meetings can impact your organization when done correctly. He'll share customer examples, give you a formula to follow when doing town hall meetings, and explain best practices when it comes to truly hearing your employees and allowing their feedback to impact the direction of your company.
  • The Age of Consumption: HCTS 2018 Q&A
    The Age of Consumption: HCTS 2018 Q&A 451 Research Vice Presidents Kelly Morgan, Melanie Posey and Al Sadowski Aug 21 2018 6:00 pm UTC 30 mins
    451 Research’s 14th annual Hosting & Cloud Transformation Summit (HCTS) in Las Vegas from September 24-26 is coming up fast! HCTS welcomes executives in the hosting, cloud, datacenter and managed services sectors to hear timely, actionable insight into the competitive dynamics of innovation from 451 Research analyst talent and guest speakers including AWS, Microsoft, Huawei, ING, DH Capital and more. In this webinar, we will be discussing what to expect from this year’s Summit, some highlights from previous years and asking about upcoming sessions with three 451 Research Vice Presidents who will be taking the main stage at HCTS: Kelly Morgan, Melanie Posey and Al Sadowski. Join this Q&A webinar to learn about:
    - What is the Age of Consumption and what should we expect to see from it?
    - Why should organizations have a strong business-IT alignment when moving forward with a Digital Transformation strategy?
    - What, if any, key shifts are happening in the multi-tenant datacenter space as a result of the age of consumption?
    - Why are hyperscalers both a friend AND foe to other service providers?
  • Get Started: Billing and Invoicing in the Cloud
    Get Started: Billing and Invoicing in the Cloud Brett Gadberry, Technical Account Manager at CloudCheckr Aug 21 2018 6:00 pm UTC 45 mins
    Managed Service Providers (MSPs), Cloud Service Providers (CSPs), and resellers often have a tough enough time generating invoices for their customers. Add to that the demands of a multi-cloud environment, with AWS, Azure, Google Cloud and more, and it becomes extremely challenging to allocate billing and invoicing.

    The solution is automation and self-healing. CloudCheckr can automatically generate invoices and even help resellers profit by keeping discounts and credits allocated among clients, presenting list price, as well as custom charges and credits as desired.

    Attendees will learn:
    - How to turn billing and invoicing into a profit center
    - Creative tag mapping strategies
    - How to structure automation monthly, weekly, and daily
  • How 3 Organizations Overcame ITSM Technology Hurdles: 3 Real-Life Stories
    How 3 Organizations Overcame ITSM Technology Hurdles: 3 Real-Life Stories TJ Martinez, Univ. of New Mexico; Diane Burton, Seattle Cancer Care Alliance; Nick Kouloungis, Louisville Metro Technology Aug 22 2018 6:30 pm UTC 60 mins
    New technologies have changed our personal and professional lives for the better. But, accommodating the rapid and dramatic business technology changes can be difficult. Setbacks caused by outdated, legacy ITSM solutions do not make modernization efforts easy. Whether your goals include artificial intelligence, incorporating DevOps, or automating key IT processes, all ITSM teams must embrace change and innovate.

    Join our upcoming webinar with representatives from higher-education, healthcare, and government as they share successes, blunders, and challenges from the IT trenches.

    Guest Speakers:
    TJ Martinez, Director of Customer Support Services, University of New Mexico
    Diane Burton, IT Client Services Manager, Seattle Cancer Care Alliance
    Nick Kouloungis, Information Technology Services Manager, Louisville Metro Technology Services
  • Compliance...Implement and Operate the Right Security Controls
    Compliance...Implement and Operate the Right Security Controls Tom Cornelius and Mark Kedgley Aug 22 2018 7:00 pm UTC 60 mins
    Most organizations today run a ‘Build-a-Bear’ approach to Cyber Security, with products and practices they piece together.

    If you aren’t already subject to one or more specific GRC mandates, inevitably, one will soon be dropped on you. Regardless of the regulation, you will need to provide structured evidence proving you operate in compliance with a fit-for-purpose set of controls.

    Just in the last 12 months, GDPR and NIST 800-171 have been made mandatory. This, coupled with the stats telling us that security breaches are increasing, despite year on year increases in security investment, tells us that the need to understand and implement security controls is inevitable.

    What is the most strategic, long-term and resource-effective way to reconcile increased demands for compliance and security? How do you bring together the aligned but segregated needs for ITSM and Security? How do you elevate traditional change management to the state of the art of change control, providing security-grade change visibility but without compromising your organizations’ IT agility?

    Join Tom Cornelius, Senior Partner at Compliance Forge and Founder of the Secure Controls Framework, and Mark Kedgley, Chief Technology Officer and Co-Founder of New Net Technologies in an interactive webinar where we will

    •Work out how to streamline and bring together overlapping or conflicting requirements for controls
    •Simplify the need for multiple compliance and privacy mandates
    •Examine what gives us the right mix of technology and automation to deliver the new hybrid SecureOps way for operating ITSM and security

    Get a free copy of the integrated Secure Controls Framework playbook and a fully-functional extended trial of NNT Change Tracker to see how easily you can embrace SecureOps in your environment.
  • Best Practices in Driving DevOps Transformation
    Best Practices in Driving DevOps Transformation Paul Rechsteiner, Principal Product Manager, Incident Response Aug 23 2018 1:00 am UTC 30 mins
    The benefits of DevOps transformation are significant and well-understood, with over 70% of organizations having already implemented or planning to implement DevOps within the next 12 months according to Forrester. But it’s not a change that happens overnight. After empowering tens of thousands of operations teams to effectively manage their services in production, we’ve distilled what we’ve learned from them into a few best practices that have been foundational to driving change and transforming to be more agile.

    In this session, we’ll go over a few topics:

    - Common operational challenges across the organizational spectrum
    - The top best practices that organizations use to empower distributed teams
    - How to enable both central and distributed teams to gain comprehensive visibility, take action on issues fast, and be more productive
    - A couple of case studies of real organizations who have achieved successes in the journey toward DevOps transformation, and how they’re getting there
  • Mentoring for Success! A cost efficient and trusted solution
    Mentoring for Success! A cost efficient and trusted solution Kat Turner, Education Portfolio Manager, ITSM Zone Aug 23 2018 3:00 pm UTC 60 mins
    What is mentoring? What’s the difference between coaching and mentoring? Is mentoring relevant to my organization? What are the strategies and benefits?

    Mentoring is a cost efficient and trusted solution to many of the problems surrounding communication and staff development within an organization.

    All new members of staff, regardless of seniority, should have an appointed mentor to assist in the induction process; the need for ongoing support with all aspects of practice is particularly important for success and happiness!

    This session will seek to debunk the confusion and uncertainty that often surrounds a developmental mentoring role, outlining clearly the responsibilities of the mentor and mentee and highlighting what is to be avoided. Coaching techniques and their appropriateness will be investigated, alongside how to apply these in an agile environment, finishing with strategies on how to embed a mentoring scheme and the benefits for individuals, team and organization!
  • Hybrid Cloud Kubernetes with Diamanti & Nirmata
    Hybrid Cloud Kubernetes with Diamanti & Nirmata Sean Roth, Director of Product Marketing at Diamanti and Ritesh Patel, Founder & VP of Products at Nirmata Aug 23 2018 3:00 pm UTC 60 mins
    Containers offer enterprises substantial gains in application deployment speed and portability. However, these benefits are often countered by the operational complexities of infrastructure configuration and management, especially when employing a mix of cloud and on-premises container environments.

    This webinar is for IT Operations and enterprise platform teams interested in driving business agilities using cloud-native technologies. You will learn how modern cloud-native technologies can help streamline complex processes, eliminate the need for network and storage overlays, and ensure reliable performance with granular controls for developers and operators.

    In this webinar, Diamanti and Nirmata teams discuss how Nirmata’s federated approach to Kubernetes cluster deployment and application management integrates with the Diamanti platform, seamlessly bridging on-premise bare-metal and hybrid cloud container environments.

    You will learn how to:
    - Deploy an on-premises container stack in minutes
    - Incorporate Diamanti into your multi-cloud environment using Nirmata
    - Simplify application management and governance across on-premises and public cloud environments
  • Business Benefits of APM, featuring guest speakers from Forrester
    Business Benefits of APM, featuring guest speakers from Forrester Charles Betz, Principal Analyst at Forrester Research; Henry Huang, Sr., TEI Consultant at Forrester Research; Thomas Wyatt Aug 23 2018 4:00 pm UTC 60 mins
    The application is now the business, and investing in the right APM solution is imperative to delivering flawless customer experiences. So how can you present a solid business case for this major IT investment?

    We commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to showcase the cost savings and business benefits you can expect from AppDynamics APM and its integration with Cisco technology.

    Register for our webinar featuring Forrester guest speakers as they explain the TEI methodology and learn:

    - Technology trends in the APM landscape
    - How you can save $1.45 million annually through consolidation of monitoring tools
    - Why Cisco + AppDynamics together will accelerate your digital transformation
  • Protect APIs and Secure Data with Anypoint Platform
    Protect APIs and Secure Data with Anypoint Platform Bala Narasimhan, Sr. Director, Product Management at MuleSoft Mahesh and Naik, Solutions Architect at MuleSoft Aug 23 2018 4:00 pm UTC 60 mins
    API abuses are set to become the most frequent attack route for data breaches by 2022. Watch this webinar to learn how your company can stay ahead of threats by delivering advanced data and API security with MuleSoft’s new security offerings.

    Key Takeaways:
    * How to tokenize, encrypt, or mask sensitive data in transit with API policies
    * Why format-preserving tokenization minimizes impact to downstream systems
    * When to use layers of defense with rapidly configured, policy-driven perimeter gateways
    * How to set up logical perimeters around applications, groups of APIs, or integrations
  • Accelerating SAS Analytics with Vexata NVMe Storage
    Accelerating SAS Analytics with Vexata NVMe Storage Dana Rafiee, Managing Director at Destiny and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Aug 23 2018 5:00 pm UTC 60 mins
    94% of the Fortune Global 100 use SAS analytics. Through innovative software and services, SAS empowers and inspires customers around the world to transform data into intelligence. IDC predicts by 2019, 40% of Data Transformation initiatives will use AI services; by 2021, 75% of commercial enterprise apps will use AI, over 90% of consumers will interact with customer support bots, and over 50% of new industrial robots will leverage AI.

    Data-driven applications and Machine Learning (ML) workloads, using SAS analytics are increasing in volume and complexity as organizations look to reduce training and operational timelines for artificial intelligence (AI) use cases. To enable predictive and cognitive analytics, you need to accelerate training and operations by delivering ultra-low latency with massive ingest bandwidths when faced with heavy mixed random and sequential read/write workloads.

    Vexata is teaming up with Destiny Corporation, a Business and Technology firm who is a SAS gold partner and reseller. This webinar is targeted towards SAS Line of Business and IT owners who are challenged with
    - new use cases like IoT, machine and deep learning across FSI, Insurance, Healthcare and Lifesciences verticals
    - handling growing data-sets and deriving actionable intelligence from these data-sets as well as
    -optimizing their existing long running jobs and IT infrastructure without a rip and replace policy.

    Learn how to identify your SAS analytics IO bottlenecks and leverage Vexata VX-100 with its transformative VX-OS purpose built to overcome these challenges.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Aug 23 2018 8:00 pm UTC 45 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Windows 10 in the Enterprise Series
    Windows 10 in the Enterprise Series Rex McMillan, Adam Smith Aug 28 2018 4:00 pm UTC 60 mins
    Windows 10 can be a beast. Learn to tame the monster on our new bi-monthly webinar series all about Windows 10. We'll feature an Insider preview, outside insights, migration times, best practices, and a comprehensive Q&A section.
  • 3 Ways to Improve Employee Experience by Expanding Service Management
    3 Ways to Improve Employee Experience by Expanding Service Management Roy Atkinson and Matt Stone Aug 28 2018 5:00 pm UTC 60 mins
    More organizations than ever before are now recognizing the importance of the employee experience. Productivity, talent acquisition and retention, and customer satisfaction are all related to the employee experience, so it makes very good business sense to improve it as much as possible.

    In this webinar, Roy Atkinson and Matt Stone will examine how concentrating on three aspects of employee experience can accelerate business performance.

    In this webinar, we will discuss:
    * Understanding how the employee experience is related to business success
    * Measuring the right things
    * Providing a single platform for service management across the organization

    Who should attend:
    * Service management professionals inside and outside IT
    * Managers and process owners who want to learn more about service management trends
  • Visibility into Complex, Hybrid Cloud Infrastructures
    Visibility into Complex, Hybrid Cloud Infrastructures Joe Weinman, author of Cloudonomics and Digital Disciplines, Eileen Haggerty, AVP Enterprise Operations, NETSCOUT Aug 28 2018 5:00 pm UTC 60 mins
    Provide exceptional customer service and experiences by gaining visibility into your complex, hybrid cloud infrastructure. In this webinar, Joe Weinman, author of Cloudonomics and Digital Disciplines and Eileen Haggerty, AVP Enterprise Operations at NETSCOUT share smart findings and real-life examples for gaining the visibility needed to manage performance within complex environments.

    In this webinar learn about:

    The top trends necessitating Smart Data for Hybrid Cloud

    The roadblocks for IT organizations leading transformative initiatives

    Achieving comprehensive visibility into the multiple, distributed, communicating components such as micro-services implemented across infrastructure

    How enterprises are ensuring quality service performance when migrating to hybrid cloud
  • How to manage vulnerabilities in container environments
    How to manage vulnerabilities in container environments Knox Anderson Aug 28 2018 5:00 pm UTC 30 mins
    Containers have sped up the CI/CD process. It’s now easy to package up an application and deploy it in a matter minutes. This allows teams to move faster, and makes it easier to patch software that may contain vulnerabilities. However, this increase in speed has create a need for new processes and tooling.

    In this webinar we’ll cover:

    -How to scan images for vulnerabilities as part of the CI/CD process
    -Why it’s important to scan images in registries as well as part of the CI/CD pipeline
    -How to prevent vulnerable images from being deployed
    -How to alert if new vulnerabilities are found in images running in production
  • Embedding Quality Engineering in DevOps Pipeline
    Embedding Quality Engineering in DevOps Pipeline Jayanthi Jayaraman, Test Automation Consultant, Aspire Systems ; Clinton Sprauve, Director of Product Marketing, Sauce Labs Aug 28 2018 5:00 pm UTC 60 mins
    Aspire and Sauce Labs are jointly conducting this webinar on the topic ‘Embedding Quality Engineering in DevOps Pipeline’. This webinar is aimed at helping organizations understand the importance of Continuous Testing in a DevOps environment and how it can be integrated with cloud environments.

    Key Takeaways:

    •Different Dimensions of Quality Engineering
    •How Continuous Testing can Make or Break your DevOps Pipeline
    •Integrating Continuous Testing with Cloud Environments
    •Recommended Tools and Techniques
    •Sample Use Cases
  • 7 Deadly Sins of ITIL Implementations
    7 Deadly Sins of ITIL Implementations Tracy Barnes, STRITCO and Chuck Darst, Cherwell Software Aug 28 2018 6:00 pm UTC 60 mins
    IT is responsible for supporting the business through daily operations, growth, and change. This hefty responsibility puts IT at the heart of nearly every forward-thinking organization. Unfortunately, there is no single methodology that tells IT exactly what to do, but Integrating best practices that support agility, while also providing stability is the only way to remain competitive.

    ITIL, the most popular IT best practice framework, raises skepticism when it comes to agility. However, when applied judiciously, strategically, and in the context of agile and lean principles can provide a stable platform while enabling speed and efficiency.


    Guest Speaker:
    Tracy Barnes, STRITCO

    About Tracy: Tracy was the project manager for the successful ISO/IEC 20000-1:2005 certification at the Florida Department of Revenue. The first state government agency to be certified in the United States. Tracy has achieved the following certifications: ITIL Expert, PMP, Executive Consultant/Manager in ITSM according to ISO/IEC 20000, Six Sigma Green Belt, Internal Audit Certificate in ITSM according to ISO/IEC 20000-1:2011, and is a Certified Public Manager.
  • Embedding Security in a Modern DevOps Pipeline – A Customer Perspective
    Embedding Security in a Modern DevOps Pipeline – A Customer Perspective Julie Chickillo, Brandon Grady, Ben Finke, from Beeline Aug 29 2018 5:00 pm UTC 60 mins
    The adoption of a continuous integration & delivery (CI/CD) pipeline has fundamentally transformed how software is developed and supported. This modern DevOps pipeline has dramatically increased the pace of software release cycles and driven new innovations throughout the software industry. Hear directly from a customer’s unique perspective on how Beeline(the world leader in contingent workforce solutions) aligned Development, Operations and Security practitioners to set up a fully automated CI/CD pipeline and incorporated application security early in the process.

    In this presentation key Beeline staff, including software development, solution architects and security specialists will discuss the process for defining the parameters for successfully incorporating security in the automated pipeline as part of the overall SDLC (Software Development Life Cycle).

    Key principles to improve software delivery will be addressed as well as the full range of issues and obstacles that confronted them and solutions to overcome them. In this presentation you will learn the following:

    -Provide you with a framework and an overall blueprint to start securing your automated pipeline
    - How to start the conversation with the development and security teams for a continuous delivery culture
    - Understand why traditional manual Application Security approaches impedes rapid DevOps software releases
    - How automated Application Security supports the vision of DevOps and the continuous delivery culture
    - Understand how to make sure you are not missing critical pieces for audit oversight
    - Know how to support containers in a modern enterprise

    Speakers:

    Julie Chickillo - VP Information Security Risk & Compliance Officer, Beeline
    Brandon Grady - SVP Engineering & Architecture, Beeline
    Ben Finke - Information Security Engineer, Beeline
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Aug 29 2018 6:00 pm UTC 45 mins
    Part 2 - Update Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • The Rise of the API Economy
    The Rise of the API Economy Gary Middleton, Practice Director, Digital Infrastructure, Dimension Data+David Delisi, Director Global Alliances, Dell EMC Aug 30 2018 2:00 pm UTC 45 mins
    The future is arriving faster than expected and businesses need to evolve even faster to keep up. As organisations become digital, it’s essential that they leverage the skills and tools that inject agility into the business. An important enabler of the digital business is an end-to-end programmable infrastructure.
    Join the discussion with Gary Middleton, Practice Director, Digital Infrastructure, Dimension Data and David Delisi, Director Global Alliances, Sales, Dell EMC on:
    - Evolving infrastructure skills and tools for SDx
    - Benefits that programmable infrastructure deliver
    - Getting the most from programmable infrastructure investments
  • 4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Aug 30 2018 3:30 pm UTC 45 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • Modern Networks are the key to the Workplace of the Future
    Modern Networks are the key to the Workplace of the Future Lawrence Van Deusen, Group Networking Practice Director Dimension Data and Jon Howell, HPE Aruba, Mobile Engagement EMEA Sep 4 2018 2:00 pm UTC 45 mins
    The nature of work and the workplace is changing. Remote working and mobility is on the rise, driving organisations to empower their teams with flexible, collaborative and dynamic workspaces and tools to work securely from anywhere, on any device. IoT sensors, location technology and indoor mapping provide opportunities to better understand how people interact with their environment, improve user experience and continually optimise working environments.
    Realising the benefits of these innovative technologies and services depends on powerful, flexible and secure networks that address the needs of the users, and are designed to cater for the exciting future of intelligent devices and applications.

    Join Lawrence Van Deusen, Group Networking Practice Director, Wired and Wireless Dimension Data and Jon Howell, HPE Aruba, Mobile Engagement EMEA as they discuss how a modern network infrastructure is an essential component of your workplace of the future and:
    Current trends driving workplace evolution
    Modern workplace requirements and challenges
    Smart digital workplace experiences