Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Apstra and Ansible: Bridge the DevOps Network Divide
    Apstra and Ansible: Bridge the DevOps Network Divide Damien Garros, Apstra and Andrius Benokraitis, Ansible Recorded: Apr 20 2017 59 mins
    Ansible is a simple, powerful, and agentless open source IT automation framework. The Apstra Operating System (AOS) enables companies to build a vendor-agnostic, intent-based and closed-loop Self-Operating Network™.

    Join Damien Garros​, Customer Enablement Engineer at Apstra and Andrius Benokraitis​, Principal Product Manager for Ansible at Red Hat on Thursday, April 20 at 11:00 AM PST / 2:00 PM EST to discover how Ansible and AOS together bridge the gap between networking and DevOps in a useful and meaningful way!
  • CEO PoV: Take Control of your Cloud Application Experience
    CEO PoV: Take Control of your Cloud Application Experience Praveen Akkiraju, CEO, Viptela Recorded: Apr 20 2017 39 mins
    Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.

    The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.

    Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
  • Easy Ways to Improve Your Security Posture
    Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec Recorded: Apr 20 2017 28 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • Building DevOps in the Enterprise
    Building DevOps in the Enterprise Jonah Kowall, VP of Market Development and Insights at AppDynamics Recorded: Apr 20 2017 44 mins
    In this upcoming webinar, Jonah Kowall, VP of Market Development and Insights at AppDynamics, will present his thoughts and opinions on the current and future state of DevOps, specifically targeting enterprises that are undergoing or experimenting with DevOps and agility.

    Jonah will explore the demands for agility in order to remain customer focused and drive digital business. He’ll then share some best practices and ideas to overcome one of the largest challenges to business utilizing DevOps — creating trust across organizations and getting your people on board with the creation of a DevOps culture.

    Key Takeaways:
    - Understand the importance of agility to meet the demands of customers and drive digital business.
    - How to build and execute on cross-functional team building.
    - Best practices for the essential process of collecting and sharing data across all teams.
    - Gain best practices for the cultural change, and how to facilitate ownership, trust, and independent decision making.

    About the presenter:
    Jonah Kowall is the VP of Market Development and Insights at AppDynamics, driving product strategy, roadmap and vision, entry into new markets, and digital evangelism. With 15 years of experience as an IT practitioner at several startups and larger enterprises, Jonah has focused on infrastructure and operations, security, and performance engineering. Jonah also previously worked at Gartner, focusing on availability, performance, and IT operations management (ITOM) and headed their influential APM and NPMD Magic Quadrants as a Research VP.
  • Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats
    Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats Ryan Orsi, Secure Wi-Fi Expert Recorded: Apr 20 2017 21 mins
    It's expected that by 2020, annual revenues around IoT solutions could exceed $470 billion. As all things IoT saturate the market (cars, tea kettles, toasters!) what does that mean from a security standpoint? What vulnerabilities aren't included in the fine print of these technologies? Join Ryan Orsi in episode three of our webinar series for a look at the current state of Wi-Fi Iot and what may lay ahead.
  • Cyber Threat Visualization and Data Capture Solutions
    Cyber Threat Visualization and Data Capture Solutions Gary Southwell, General Manager, CSPi and William Bent, Product Manager, CSPi Recorded: Apr 20 2017 35 mins
    CSPi's Myricom nVoy Series assists in targeted cyber forensic analysis, and compliance assurance for IT and security resources. In this webinar, you'll learn how the nVoy solution makes it easy no matter if they’re just starting out building their network security capabilities or want to add to the infrastructure they already have in place. With just a few minutes of effort, they can build a cost-effective cyber threat visualization solution and implement better network monitoring, data capture, forensic analysis, and regulatory compliance adherence functionality.
  • Test your way to NB-IoT success
    Test your way to NB-IoT success Nisar Sanadi, Product Line Manager, EXFO Wireless Core and Uday Parida, Product Manager, EXFO Wireless division Recorded: Apr 20 2017 64 mins
    The ratification of the 3GPP R13 specifications last year was like the firing of a starting pistol, kicking off the race to deploy NB-IoT networks. NEMs are racing against the clock to support the many changes mandated by these specifications. For their part, MNOs are announcing aggressive schedules to launch their NB-IoT networks and time to market pressures are intense. However, quality and reliability cannot be compromised. Ensuring a successful launch under these conditions requires rigorous and comprehensive testing in a time & cost-effective manner. Not only do compliance, functionality and inter-working need to be verified, but also the ability to handle the load and traffic patterns that can be expected in a live network with several million IoT devices.

    This webinar will delve deeply into what it takes to test IoT network elements and networks in order to get them ready for launch. Whether you are interested in conducting end-to-end testing of the network or isolating certain specific elements for testing, such as the eNodeB, MME, SGW or SCEF, for example, you will gain new insights based on our extensive 3GPP technology testing experience.

    Topics that will be covered:
    -Evolution of 3GPP architecture due to IoT
    -Implication of IoT on functionality, performance, capacity aspects of network elements
    -Potential challenges and pitfalls with IoT deployments

    3 main benefits they will get from attending the webinar:
    -A thorough understanding of the impact of IoT on 3GPP networks
    -A deep dive into key testing use cases and KPIs to ensure quality & reliability
    -A proven methodology for successful deployment

    Who should attend:
    -Test Managers
    -Test Engineers
    -Service Deployment Managers
    -Quality Assurance Personnel
    -Network Planners
    -Anyone responsible for the quality and reliability of the network and services deployed
  • No Asset Left Behind: Protect Your Applications Across Physical, Virtual, Cloud
    No Asset Left Behind: Protect Your Applications Across Physical, Virtual, Cloud Faraz Aladin, Director of Marketing for vArmour Recorded: Apr 19 2017 57 mins
    vArmour is extending its patented distributed security platform to protect workloads running on physical servers and legacy systems. This unique solution is an industry first and provides consistent policy enforcement across physical, virtual and cloud assets with its network based controls and an API driven ecosystem.

    Join Faraz Aladin, Director of Marketing for vArmour, as he covers:

    1) How to secure workloads running on Physical servers using application based segmentation and micro-segmentation
    2) How vArmour provides a web-scale solution that is Simple, Actionable and Extensible, covering all assets (Physical, Virtual or Cloud)
    3) How to comply with regulatory requirements

    ABOUT FARAZ ALADIN
    Faraz Aladin is the Director of Marketing for vArmour. He has more than 25 years of industry experience with the last 20 at Cisco. His subject matter expertise spans across Switching, Routing, Wireless and Security. He is a CCIE and holds an engineering degree from Bombay University.
  • Three Ways to Make Your Joomla! Site Speedy
    Three Ways to Make Your Joomla! Site Speedy Robert Jacobi, President, Joomla! and Nabeel Saeed, Product Evangelist, Imperva Incapsula Recorded: Apr 19 2017 34 mins
    When it comes to web page load time and mobile optimization, we’ve found that visitors can get cranky and leave your site if it isn’t fast. Join us as experts from Joomla! and Incapsula give you recipes on how to accelerate the performance of your Joomla! site without spending a lot of time or money. You’ll also learn the basics of how a content delivery network (CDN) can further help and get a quick tour of how a CDN works.

    Benefits of attending the webinar include:
    •Learn easy ways to optimize your Joomla! content.
    •Additional Joomla! details.
    •The basics of a CDN and how to set one up.
  • Architectural Principles for Networked Solid State Storage Access  - Part 2
    Architectural Principles for Networked Solid State Storage Access - Part 2 Doug Voigt, Chair SNIA NVM Programming Model, HPE, J Metz, SNIA Board of Directors, Cisco Recorded: Apr 19 2017 62 mins
    New solid state storage technologies are forcing the industry to refine distinctions between networks and other types of system interconnects. The question on everyone’s mind is, when is it beneficial to use networks to access solid state storage, particularly persistent memory? The answer to this question involves application, interconnect, memory technology and scalability factors that can be analyzed in the context of a latency budget. In this talk we will explore latency budgets for various types of solid state storage access. These can be used to determine which combinations of interconnects, technologies and scales are compatible with Load/Store instruction access and which are better suited to IO completion techniques such as polling or blocking. In this webcast you’ll learn:

    •Why latency is important in accessing solid state storage
    •How to determine the appropriate use of networking in the context of a latency budget
    •Do’s and don’ts for Load/Store access
  • Building Next Gen Networks for Streaming Entertainment Media
    Building Next Gen Networks for Streaming Entertainment Media Bo Daly, Super Evil Megacorp; Yuval Fisher, Imagine Communications; Kevin Gage, ONEMedia; Rashmi Misra, HPE Recorded: Apr 19 2017 61 mins
    Special Promotion for the TIA 5G Breakfast, April 28, in Boston. Visit TIAonline.org to learn more and use code 5G-WEBCAST for 20% discount.

    Special promotion for TIA Executive Connectivity Jam, June 5-8, Dallas, TX. Visit TIAConnectivityJam.org. Code: 2017CJ-WEBCAST for 10% discount.

    This year, it is expected that 74% of all online traffic will be video with a combination of network broadcasters and Over The Top (OTT) content providers bringing compelling content to and through the Internet. 55% of people in the United States watch video online every day. Facebook, Snapchat, Twitter and Tumbler have launched live streaming capabilities. Twitch, the number one online gaming video platform, sees 9.7 million daily active users (DAUs), with 2 million users broadcasting live streams each month. eSports is a huge gaming draw with some companies seeing upward of 96 million monthly average users (MAUs). And we haven’t even mentioned augmented and virtual reality, yet.

    Network speed, capacity and flexibility to meet the growing demand are improving - but not fast enough and with significant needs still not being addressed. This panel will look at the challenges facing getting video to and from end users including: how to manage the need to deliver to both broadcast and OTT; how to ensure seamless customer experiences; what to expect as 4K and higher resolution cameras become ubiquitous; what network buildout and optimization need to take place to ensure the demand for ultra high speed broadband is met.

    You can continue the conversation after the webcast during the upcoming TIA Connectivity Jam, being held June 5-7 in Dallas, TX.

    Panelists:
    -- Bo Daly, President and Chief Business Officer, Super Evil Megacorp
    -- Yuval Fisher, CTO MVPD, Imagine Communications
    -- Kevin Gage, EVP Strategic Development and Chief Technology Officer, ONE Media
    -- Rashmi Misra, Worldwide General Manager Digital Video Services, Hewlett Packard Enterprise (HPE)
  • Large Scale SD-WAN Deployments: 3 Real-Life Use Cases & Solutions
    Large Scale SD-WAN Deployments: 3 Real-Life Use Cases & Solutions Steve Woo, VP of Product, and Mike Wood, VP of Marketing, VeloCloud Networks Recorded: Apr 19 2017 61 mins
    SD-WAN is becoming the defacto standard for wide area network replacement, migration and greenfield deployment. The questions many very large businesses have are whether SD-WAN is ready for the big time and what are the use cases that matter to them.

    Join Steve Woo and Mike Wood for this webinar where they will reveal three real-life large scale SD-WAN customer deployments, the specific use cases involved and the actual solution deployed.
  • Cyphort Introduces the Anti-SIEM
    Cyphort Introduces the Anti-SIEM Franklyn Jones Recorded: Apr 19 2017 17 mins
    Cyphort just introduced the innovative Anti-SIEM. It’s everything you want in a SIEM and less: Less Cost, Less Noise, Less Complexity, and Less Wasted Time.

    Here’s why you will find the Anti-SIEM quite interesting.

    Cyphort conducted extensive research with your peers in nearly 1,000 organizations across the US. The clear consensus from the majority of SIEM users is that they want more effective security analytics capabilities, and more detection and visibility into the specific advanced threats that are likely the root cause of those endless security alerts you deal with every day.

    The insights from that research enabled us to create a powerful software platform that combines advanced threat detection, actionable security analytics, and automated threat mitigation. It’s called the Anti-SIEM and its open architecture allows it to ingest data from all your security devices and provide a consolidated, timeline view of security incidents.
  • Stop Problems Bouncing Between Support Teams
    Stop Problems Bouncing Between Support Teams Paul Offord Recorded: Apr 19 2017 27 mins
    The demand for increasingly sophisticated IT applications is leading to complex systems that are interconnected with other complex systems. This in turn is driving an increase in the number of difficult performance and stability problems.
    The cause of such problems is often hard to determine, which makes it difficult to allocate the problem to the correct technology team. Consequently, the problem bounces from team to team, as each in turn ‘proves’ that their technology is not at fault.
    More often than not, some of the technical support teams involved are from service providers, and so rather than a problem just bouncing between internal teams, it bounces between commercial organisations. This can result in disputes with circular behaviour driven by the need to avoid reputational and commercial damage.
    Unfortunately, problem management doesn’t provide the solution. Whilst problem managers may coordinate the troubleshooting activity of multiple technical support teams, these teams operate in silos. This paper explains why a siloed approach is ineffective when investigating difficult performance and stability problems.
    Some organisations are aware of these potential issues and are tackling them by creating service-orientated Cross-technology Troubleshooting Teams (CTT).
    In this webinar, we outline the need for a CTT, the benefits it delivers, its structure and strategies to optimise its effectiveness.
  • Performance Management for Cloud-based applications
    Performance Management for Cloud-based applications Nicolas Leszczynski, Senior APM Solution Specialist Riverbed Recorded: Apr 19 2017 39 mins
    Cloud. Elastic computing. Containers. Microservices. Shared Libraries. These technologies are being adopted at almost exponential rates since they greatly simplify application design, development, deployment and manageability.

    Unfortunately, that surface-level simplicity comes with the price of dramatically more complex under-the-covers behaviors and relationships. Application topology is often transient, nebulous, and unpredictably interrelated with countless other applications and services. This has posed a serious challenge for performance management, since many tools and techniques are still rooted to static physical concepts like tiers, servers, and JVMs.

    There’s also been an expansion of the consumption of APM data, as LOB management and application owners look for more KPIs to help them improve the bottom line of the business. APM isn’t just a tool for developers and troubleshooters anymore.

    Learn How Riverbed Solutions can help you not only overcome these cloud applications performance management challenges, but also extract business-relevant information buried deep in these mind-boggling complex architectures
  • How to Accelerate Virtual Desktop Deployment: A Cisco & Pure Storage Case Study
    How to Accelerate Virtual Desktop Deployment: A Cisco & Pure Storage Case Study Kyle Grossmiller, VDI Solutions Architect at Pure Storage, Mike Brennan, Product Manager at Cisco Recorded: Apr 18 2017 60 mins
    Many organizations are looking to virtual desktops and apps to improve productivity, security, and control — but building infrastructure for large-scale Citrix XenDesktop and XenApp deployments can be challenging. While some infrastructure approaches are limited in reliability or ability to scale, this session will present a highly performant, highly available and easy to manage approach to Citrix XenDesktop and XenApp deployments with the FlashStack Converged Infrastructure from Cisco and Pure Storage. In this session, Cisco and Pure Storage VDI solution architects will share test results of a recent Cisco Validated Design for FlashStack with XenDesktop and XenApp for 5000 users. Specifically discussed is how real world users can quickly deploy Citrix virtual apps and desktops, scale performance with user demand, and keep costs low through a repeatable, reliable converged infrastructure approach to VDI. This is also the first FlashStack CVD using Windows® 10 64-bit and Office® 2016 as the base OS desktop and Office Suite, respectively, proving that FlashStack delivers the horsepower needed to power the latest innovations from Microsoft.

    In this webinar, you will learn how to:

    Successfully deploy Citrix XenDesktop and XenApp at scale faster to support high-productivity user workspaces
    Leverage the power of Cisco UCS stateless computing to deploy your network, storage and compute faster and more consistently than any other platform on the market
    Leverage FlashStack to complement Citrix by keeping virtual desktops and apps online and high-performing with minimal admin effort
  • How App Developers Can Drive Better Azure SQL Performance
    How App Developers Can Drive Better Azure SQL Performance Mike Kelly, CTO, SelectStar Recorded: Apr 18 2017 33 mins
    Dynamic data performance, built-in intelligence and scalability brings Azure SQL to the forefront for app developers. With layers of abstraction, your traditional health metrics can be misleading when it comes to understanding how your Azure SQL workloads are truly performing, and in turn, impacting your development timelines. In this webinar with SelectStar’s Mike Kelly, learn how you can optimize the performance of your Azure SQL performance – and in turn, drive better development in the process.

    The webinar will also cover:
    Key trends driving Azure SQL as a leader in the app development space
    Why your Azure SQL performance may lack – and how to fix it
    How to augment monitoring for key elements like DTUs and service groups for maximum performance
  • Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring
    Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring Terrence Barr, Electric Imp; Nisarg Desai, Globalsign; Andrew Ginter, Waterfall Security Solutions Recorded: Apr 18 2017 62 mins
    Industrial Internet Security in Action --
    Interoperable IIoT Security Event Monitoring
    (Inlcuding a preview of security interop demo at Hannover Messe)

    With the rise of the Industrial Internet of Things and Industrie 4.0, manufacturers are adding more connected devices and sharing operation data with IT systems within their own factories and businesses, and they are extending information exchange across their entire value chain. This increased digitization offers a host of benefits to businesses, partners, suppliers and customers. But such connectivity must not itself put sensitive equipment at risk. Security is important within a single manufacturers’ plants, and across every participant in the value chain. Since there is no single, homogeneous security environment, multiple companies and systems that need to work together.

    JOIN THE WEBINAR TO LEARN:
    -How a strong Identity and Root-of-Trust forms the foundation of IoT Security

    -How to securely connect systems from the operational domain (OT), to become more accessible to the information technology (IT) domain.

    -How to implement end-to-end security from device to cloud

    -How 24 IIC Members will demonstrate secure, interoperable IIoT event monitoring at Hannover Messe
  • Open, Collaborative Communications Power Workforce and Customer Experience
    Open, Collaborative Communications Power Workforce and Customer Experience Jim Payne, Senior Product Marketing Manager, RingCentral and Paul Comaroto, Product Marketing Manager, RingCentral Recorded: Apr 18 2017 33 mins
    How we work has changed. Email and instant messaging aren’t sufficient to meet the demands of current business workflows. At the same time, customer-facing workers need to build stronger relationships and foster trust quickly and efficiently.

    Learn about how unified communications and cloud collaboration tools are empowering today’s businesses to operate more effectively, facilitate streamlined collaboration, and make a difference with customers. You'll hear from leading industry experts on how UCaaS is rapidly changing business communications, processes and workflows in 2017.
  • Building Your Digital Workplace
    Building Your Digital Workplace Matthias Machowinsk, Sr Research Director, IHS Markit & Christian Gilby, Director of Product, Aruba Networks Recorded: Apr 18 2017 61 mins
    Fundamental technology shifts are changing how we work and how businesses deliver services to their customers. Users are embracing mobile devices, IT applications are migrating to the cloud and companies are reinventing themselves through digital transformation and the Internet of Things.

    In this webinar we will examine how mobility, the cloud and IoT impact enterprise access networks, and what steps network managers and business leaders need to take to ensure the right level of performance, security and extensibility to ready their networks for the digital revolution.

    Who Should Attend:

    IT and network managers, network architects, chief information officers (CIOs), value-added resellers (VARs) and service providers.

    Key Topics for Discussion:
    •Key trends affecting access networks
    •New technologies that are available
    •The need for ecosystems to deliver innovation
  • The Milestones of Sucessful Apps
    The Milestones of Sucessful Apps Andrew Bird : Chief Digital Officer & EA Visionary Recorded: Apr 18 2017 34 mins
    Managing and delivering App's is a seemingly unique adventure. Yet there are key milestones that are only apparent when looking at our history. Join Andrew Bird to show how "Prioritisation" is the key to adoption, but knowing the list in the first place gives you your choices.
  • What A Modern Enterprise Cloud Platform Looks Like
    What A Modern Enterprise Cloud Platform Looks Like Jeremy Brooks, Manager, Customer Success Engineering, Platform9; Chris Brown, Solutions Marketing Manager, Nutanix Recorded: Apr 14 2017 35 mins
    Just what does it mean to have a cloud platform? What does one even look like? In this session, you'll learn what a modern enterprise cloud platform is comprised of and the following concepts:

    - How a SaaS-managed OpenStack solution can optimize your infrastructure and increase productivity

    - How an agile, DevOps environment can benefit your infrastructure and development teams

    - Do more with less; a SaaS-managed solution frees up your IT team and makes your dev/test team more efficient
  • Don't just check the box - real DDoS protection
    Don't just check the box - real DDoS protection Arbor Networks Recorded: Apr 14 2017 2 mins
    While some enterprises may think that have secured their key services against DDoS attacks simply by deploying intrusion prevention systems (IPS) or firewalls in front of their servers, they are actually exposing their organizations to service outages.

    Do you have the right protection tools for your network?
  • Intent-Based Networking Systems
    Intent-Based Networking Systems Josh Saul Recorded: Apr 13 2017 59 mins
    Gartner calls intent-based networking systems possibly "the next big thing in networking". But what exactly are "intent-based networking systems" and how will they affect you?

    Join Apstra Solutions Architect Josh Saul on Thursday, April 13, 2017 at 11:00 am PST as he demonstrates how the Apstra Operating System (AOS) decouples your network-service design intent and operations from error-prone and time-consuming vendor-specific, box-level workflows, including:

    - Declare service intent in natural language
    - Render configurations automatically
    - Deploy auto-validated configurations
    - Swap out Vendor A switches with Vendor B switches in minutes
    - Receive instant alerts on mis-cabling, bad transceivers, and configuration drifts
    - Operate with continuous validations of the network state

    Don't miss this opportunity to get an in-depth look at the future of networking.
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data Stacy Cannady, Cisco and Richard Nass, Embedded Computing Design/OpenSystemsMedia Apr 24 2017 5:00 pm UTC 60 mins
    Join Stacy Cannady, Cisco and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech
    Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech Luciana Carvalho, VR Evangelist Apr 25 2017 12:00 pm UTC 45 mins
    Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.

    As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.

    Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.

    She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Apr 25 2017 3:00 pm UTC 60 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • Dell EMC, Versa, and Wind River Bring Flexibility, Performance, and Reliability
    Dell EMC, Versa, and Wind River Bring Flexibility, Performance, and Reliability Charlie Ashton, Wind River, Gopi Manapragada, Dell EMC, & Robert McBride, Versa Networks Apr 25 2017 3:00 pm UTC 60 mins
    Your customers look to you to provide routing, security, and SLA backed network connectivity at a competitive price. How you deploy those services (via central office or on premises) depends on the customer’s needs. Now you can provide those services with the carrier grade reliability your customers depend on, and the flexibility and performance you need to drive new revenue streams while keeping your costs down.

    Dell EMC, Versa, and Wind River have teamed up to create a highly efficient, dynamic and reliable service rich virtual enterprise CPE (vE-CPE) reference platform which also has the benefit of being very cost effective. Join us in this web seminar to learn about:
    - Thick and thin branch deployments, and how to choose which is right for you
    - How ease of use, efficiency, and longevity help to make the vE-CPE solution cost effective
    - How the Titanium Cloud ecosystem leverages open solutions to ensure interoperability and breaks vendor lock-in
  • Cloud-Scale Efficiency for Comm Service Providers through Rack Scale NFVi
    Cloud-Scale Efficiency for Comm Service Providers through Rack Scale NFVi Suzanne Kelliher, DCEngine Radisys Product Line Manager & John Wilson, Director. of Market Development for Intel® Rack Scale Apr 25 2017 4:00 pm UTC 60 mins
    Communication Service Providers are undertaking a major transformation from networks interconnected with closed, proprietary hardware network elements, to open architectures based on Software Defined Networks (SDN) and Network Functions Virtualization (NFV). Intel® Rack Scale Design (RSD) is a logical architecture for NFV infrastructure (NFVi) requirements that disaggregates compute, storage, and network resources, with the ability to efficiently pool and utilize these resources.

    In this webinar, experts from Radisys and Intel will present the latest developments in applying Intel® RSD to SDN and NFV applications. Webinar participants will learn how the Radisys DCEngine™ hyperscale platforms, an implementation of Intel® RSD and inspired by Open Compute Project (OCP), can deliver the open software flexibility, DevOps deployment efficiencies, with carrier scalability for robust NFV deployments in emerging communication data center applications. The Webinar will include customer deployment examples, including Radisys DCEngine for open source software architectures, Central Office Re-architected as a Datacenter (CORD) projects, as well as Intel® RSD initiatives in telecom networking applications.
  • Dry Run: Advanced SD-WAN Monitoring and Management
    Dry Run: Advanced SD-WAN Monitoring and Management Jeremy Rossbach, Sr. Principal Product Marketing Manager and Timothy Diep, Director of Product Management, SDN & NFV Solution Apr 25 2017 8:00 pm UTC 60 mins
    How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
    - Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Provide relationship mapping of major IT events
    - Visualize physical and logical dependencies in applications and service chains
    - Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
    - Enable operational insight into how all elements of traditional and overlay networks affect service integrity
  • How To Document Campus Infrastructure - Hospitals, Offices, Airports, etc.
    How To Document Campus Infrastructure - Hospitals, Offices, Airports, etc. David Cuthbertson Apr 26 2017 12:00 pm UTC 45 mins
    Multi-building and multi-site IT environments are not simple to document with both legacy and new technology co-existing for many years. Our webinar looks at documentation methods that make multi-building IT infrastructure easier to plan and manage.
  • Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
    Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Jonathan Abbe, Security Product Managerment, Infoblox; Sam Kumasarmy, Senior Product Marketing, Infoblox Apr 26 2017 3:00 pm UTC 30 mins
    If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that means, you end up with gaps in your view of the threat intelligence and your defense across your infrastructure.

    Join us for an upcoming webinar and learn how Infoblox Threat Intelligence Data Exchange (TIDE) can help you:

    • Get what you need: Easily create threat intelligence data feeds to combine Infoblox’s high-quality data with the data you already have.
    • Easily deploy data: Obtain, manage and distribute data across your infrastructure from a centralized point.
    • Prevent malicious activity: Deploy threat intelligence directly within Infoblox DNS Firewall and other security technologies.

    Register today and get the complete picture.
  • Defining Virtualization to Power your Network Transformation
    Defining Virtualization to Power your Network Transformation Yves Gagnon, Product Manager, EXFO Apr 26 2017 3:00 pm UTC 60 mins
    Virtualization brings with it so many promises, changes and so much uncertainty. Will smarter networks actually deliver? Network transformation is imperative if you’re planning to be part of the massive digital transformation sweeping the industry. However, your transformations can’t negatively impact customers, despite the new level of complexity brought on by the virtualization and abstraction technologies required to meet the explosive demand for new, tailored services.

    Your extensive network functions virtualization (NFV) and software-defined networking (SDN) investments must improve your bottom line, competitiveness and service quality. But how can you be sure that such investments will actually deliver on all the promises and improve the quality of experience for your subscribers?

    Join us for this webinar and we’ll help you find the answers to these questions.

    In this webinar, you will learn about:
    - Virtual machine/VNF and a Docker
    - The ETSI model
    - OpenStack
    - Hypervisor
    - Time consideration and hardware acceleration – SR-IOV & DPDK

    Who should attend?
    - Those involved in the rollout of telecommunications networks, with a focus on network and service assurance platforms.
    - This includes network operations, software platforms and back-office systems.
  • Ready for Primetime: How Hyperconverged Infrastructure is Evolving to Do More
    Ready for Primetime: How Hyperconverged Infrastructure is Evolving to Do More Tim Stammers, Senior Analyst at 451 Research and George Wagner, Sr. Product Marketing Manager at Pivot3 Apr 26 2017 4:00 pm UTC 60 mins
    Traditionally, hyperconverged infrastructure (HCI) has been deployed only for specific use cases. However, HCI has the potential to do so much more! With greater economics and simplicity than traditional three-tier infrastructure, HCI can support multiple mixed workloads and latency-sensitive applications, plus scale predictably and efficiently.

    Join Senior Analyst, Tim Stammers, from 451 Research and Sr. Product Marketing Manager, George Wagner, from Pivot3 as they discuss the evolution of hyperconverged infrastructure, architectural considerations for supporting workload consolidation, and how companies like Pivot3 are enabling organizations to do more with HCI with new architecture and policy-based management capabilities.
  • Stop attacks such as ransomware and get HIPAA compliant for Healthcare
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks Apr 26 2017 6:00 pm UTC 45 mins
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.
  • 5G Today vs. 5G Tomorrow: How it Affects Your Enterprise
    5G Today vs. 5G Tomorrow: How it Affects Your Enterprise David Rush, Cradlepoint; Ken Rehbehn, 451 Research Apr 26 2017 6:00 pm UTC 60 mins
    With 5G rapidly climbing the hype cycle toward the peak of inflated expectations, many organizations are asking the same question: “Where does 5G stand today, and how long before it can help my business?”

    Carriers in the U.S. are not only talking about it, but claiming their trials are ongoing and deployments are coming soon — in many cases, years earlier than had been thought possible. In reality, 5G has a limited, powerful use case today, but can reach its exceptional potential within the next couple years.

    At 11am PT / 2pm ET on April 26, 2017, join Cradlepoint’s David Rush and Ken Rehbehn of 451 Research to explore the 5G reality today and how 5G can help people and businesses in 2018 and beyond.

    Cradlepoint is the global leader in cloud-based network solutions for connecting people, places, and things over wired and wireless broadband.
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Apr 26 2017 7:00 pm UTC 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • From Incident Response to a Continuous Monitoring & Active Threat Hunting
    From Incident Response to a Continuous Monitoring & Active Threat Hunting Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Apr 27 2017 11:30 am UTC 45 mins
    With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.


    In this webinar, Stuart Davis and David Grout will cover:
    - Best practices in regards to Security as a Service
    - How organisations can move from an alert-led security to an intelligence-led security
    - How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
  • How secure is your Hybrid Cloud roadmap? (US/EU focus)
    How secure is your Hybrid Cloud roadmap? (US/EU focus) Aaron Sherrill (451 Research) and Avinash Prasad (Tata Communications) Apr 27 2017 2:00 pm UTC 60 mins
    Hybrid Clouds are expected to gain prominence for hosting diverse enterprise workloads due to a variety of needs. For this model of cloud deployment, there exist broader security and specific privacy concerns driven primarily by data loss, data privacy and compliance to regulatory needs. Although Hybrid Clouds offer a degree of control and security of IT infrastructure, there is a need for unified cloud security management which offers a more holistic view of risk categorisation and standard security policies. How can working with a service provider, who can offer an optimized mix of technology and controls to seamlessly manage Security and Compliance, change the game for the enterprise?
  • PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems
    PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems Paul Vanderlaan Apr 27 2017 3:00 pm UTC 60 mins
    As more devices are made to support PoE, and as applications for PoE continue to emerge, what you know about PoE can help ensure your designers and installers are poised to respond to customer demand, and have the expertise to install best in class systems
  • The Network Security Paradigm Shift – 5 Essential Optimization Strategies
    The Network Security Paradigm Shift – 5 Essential Optimization Strategies Dan Cummins, Senior Security Analyst at 451 Research; Paul Martini, Co-founder & CEO at iboss Apr 27 2017 4:00 pm UTC 60 mins
    Welcome to the last mile of security hardware disruption.

    Join iboss and 451 Research analyst Dan Cummins to learn actionable strategies for overcoming the technical and operational challenges of securing modern networks with remote offices and mobile workers.

    You’ll hear in-depth, real-world customer success stories detailing their move from traditional, appliance-based secure web gateways to a distributed gateway platform.

    No change to network topology. No more buying hardware. No more private network links.
  • Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace Kevin Beaver, Information Security Consultant, Principle Logic & Jamie Chiu, Senior Mgr, Intel Security & Trent Fierro, Aruba Apr 27 2017 4:00 pm UTC 60 mins
    Network security is no longer about firewalls and related perimeter protection. It extends all the way to endpoints and the information assets they process and store. At any given time, do you really know what’s on your network, how they got there, and if they might be creating quantifiable business risks? With the complexity of today’s wired and wireless networks, this is becoming an increasingly-difficult question to answer.

    Join information security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel for a discussion on the technical and operational security concerns impacting modern networks. You’ll hear real-world stories and obtain practical insight into what it takes to have a resilient environment that can withstand today’s threats and risks.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case
    The NIST Cybersecurity Framework (CSF): A Federal Use Case Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Apr 27 2017 5:00 pm UTC 60 mins
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • Machine Learning and Malware: What You Need to Know
    Machine Learning and Malware: What You Need to Know Robert Leong, Dir, Prod Mgmt., McAfee Labs; Raf Los, Optiv; Dr. Paulo Shakarian; Brandon Dunlap (Moderator) Apr 27 2017 5:00 pm UTC 75 mins
    The seismic jolt in the Threat Landscape caused by the success of threats like ransomware combined with the geometric rise of so-called zero-day malware (i.e. malware for which no AV signature defenses exist) has given rise to all manner of innovation in the Cybersecurity industry. But a lot of what is being said and presented in the market is really confusing and that’s a problem for practitioners. One of the most-frequently-used phrases in security today is “Machine Learning” or “Math-Based” and “Artificial Intelligence” or “AI”. These phrases are entering the security conversation to describe capabilities, approaches, and strategies, but in reality, they are confusing a great many people. Which begs the question: “What on Earth does it mean?” and “How can Machine Learning be used in Enterprise Security?” Join McAfee and (ISC)2 on April 27, 2017 at 1:00PM Eastern as we clear the confusion, explore the answers to these questions and discuss what this means for dealing with threats.
  • Machine Learning: The what, how, and why you need it now
    Machine Learning: The what, how, and why you need it now Stewart Rogers, Dir. of Marketing Technology, VentureBeat Apr 27 2017 5:00 pm UTC 60 mins
    The short answer is that machine learning is the enemy of a post-truth world: Set loose on large data sets, it’s used to uncover patterns and deliver key insights that help predict how things will unfold in the future. The long answer is that from the transformation of forecasting and predictive analytics to the development of self-driving cars to Microsoft working to prevent blindness in children, machine learning has quickly become the kind of technology that transforms the world, from impactful business use cases to powerful social change.

    McKinsey’s 2016 data and analytics study found 120 potential machine learning applications in 12 industries—and the evolution is accelerating. Join our latest VB Live interactive event for a deep dive into how to measure, understand, and mobilize the data that matters the most for your business using machine learning.

    In this webinar you’ll:

    * Learn how cognitive technologies scale across mobile devices (including cars)
    * Evaluate the value of a machine learning product to your organization
    * Tailor your data structure to optimize for future machine learning initiatives


    Speakers:


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • New York’s New Cybersecurity Regulations: Explained!
    New York’s New Cybersecurity Regulations: Explained! Mihir Mistry, Senior Security Manager Apr 27 2017 6:00 pm UTC 60 mins
    The nation's first state-mandated cybersecurity regulations regarding banking and financial services companies went into effect in New York state on March 1st. However, many businesses subject to the regulations are asking, what are these rules and how will they affect my business operations.

    SecureWorks invites you to join us on April 27th for a webcast designed to help you understand these new mandates and develop an approach to ensure that your organization has a mature and effective security program in place that will not only help you achieve compliance but will improve your overall information security posture.

    What you will learn:
    • Which entities are covered by the mandate and what type of data needs protecting.
    • The five core elements needed to establish a comprehensive cybersecurity program.
    • Critical questions you should be asking your security program partner.
  • Inside Server Evolution and Spending: Insights from 451 Research
    Inside Server Evolution and Spending: Insights from 451 Research Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure Apr 27 2017 6:00 pm UTC 60 mins
    As workload migration to public cloud continues, IT organizations face a wealth of challenges as they determine the most effective compute ecosystem for their needs. Server technologies are evolving quickly—from converged to hyperconverged to composable—and finding the right fit for on-premises workloads is now a critical component of infrastructure strategies. This webinar will explore the drivers behind enterprise server purchases and how they are planning for the future.

    Join Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure, for this interactive webinar highlighting analysis of customer spending and adoption trends from 451 Research’s latest survey of IT buyers.

    During the webinar, learn:

    -Drivers of today’s purchases of servers and converged infrastructure
    -Key customer pain points and objectives for servers and converged infrastructure
    -How cloud migration is impacting spending on servers and converged infrastructure
    -Where hyperconverged fits into new infrastructure deployments
    -How vendors are positioning themselves to win in this evolving compute market
  • CTO series: Episode 2: -What does a Good Strategy look like...?
    CTO series: Episode 2: -What does a Good Strategy look like...? Andrew Bird : Chief Digital Officer & EA Visionary May 2 2017 9:00 am UTC 30 mins
    An organisations strategy should be unique in terms of fit for its business model. In this context, good strategy should show direct linkage to the operating model of the business and the road map of how growth will be achieved.
    In this Episode 2 of the CTO series, we discuss the measure of linkage to the operating model and the tools which can be used to show alignment or otherwise to the business vision.
  • Advanced SD-WAN Monitoring and Management
    Advanced SD-WAN Monitoring and Management Jeremy Rossbach, Sr. Principal Product Marketing Manager and Timothy Diep, Director of Product Management, SDN & NFV Solution May 2 2017 3:00 pm UTC 60 mins
    How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
    - Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Provide relationship mapping of major IT events
    - Visualize physical and logical dependencies in applications and service chains
    - Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
    - Enable operational insight into how all elements of traditional and overlay networks affect service integrity