Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • AOC/DAC Cable Testing in Data Centers
    AOC/DAC Cable Testing in Data Centers Guylain Barlow, Viavi Recorded: Nov 20 2017 60 mins
    Data Centers vary widely in nature and can be roughly classified as hyperscale, multi-tenant, and private. A critical and common component in the operation of such data centers is the installation and maintenance of the physical cabling infrastructure. A fundamental change taking place is the evolution from cables using classic connectors on copper (RJ-45) or fiber optics (LC) to cables terminated by pluggables such as SFP or QSFP. This represents a new challenge as these cables, called Active Optical Cable (AOC) or Direct Attach Copper (DAC), are not easily validated and tested.

    Attendees will earn 1 BICSI CEC for attending.
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN
    Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN Stein Ericsson, Manager, Global Network Operations at Freeport-McMoRan and Rachna Srivastava, Sr. Director Product Marketing Recorded: Nov 17 2017 41 mins
    Freeport-McMoRan faced immense connectivity and bandwidth issues in its copper mines located in remote locations. Moreover, this S&P 500 company was also looking to revolutionize their IT infrastructure by bringing secure access to cloud-based applications on Microsoft Azure.

    Join this webinar to hear directly from the experts at Freeport-McMoRan on how it leveraged VeloCloud SD-WAN to greatly improve user experience with assured Application Performance and simplified access to Microsoft Azure.

    Attend this webinar to learn:
    - How Freeport-McMoRan quadrupled its bandwidth to support terabyte-sized file transmissions
    - Dramatically improved the network user-experience with VeloCloud SD-WAN
    - How legacy issues, such as non-performing circuits, can easily be fixed and optimized with VeloCloud SD-WAN
    - How Virtual VeloCloud Edge can easily run on Microsoft Azure to optimize access to cloud applications
  • How to Eliminate Inefficiencies in Your IT Organization with DevOps
    How to Eliminate Inefficiencies in Your IT Organization with DevOps Gary Gruver, Francesco Colavita, Syed Husain, Ron Franklin Recorded: Nov 17 2017 62 mins
    This webinar is brought to you by the Vivit DevOps Special Interest Group.

    Businesses need to be more responsive to market changes and meeting customer demand for improved services and better user experiences. In order to meet such high expectations and be competitive in your market, it requires great flexibility and speed throughout the organization. DevOps enables your software development, infrastructure and operations teams to identify and eliminate inefficiencies through communication, collaboration, and automation.

    Join us for this webinar to learn:

    •How you can build a culture of DevOps
    •Accelerate time-to-market
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Software Defined Technologies: Building tomorrow’s digital infrastructure
    Software Defined Technologies: Building tomorrow’s digital infrastructure Phil Lees, Chief Technical Officer, WhiteSpider Recorded: Nov 17 2017 49 mins
    To create greater competitive advantage and better customer experience, organisations need to build their digital capabilities with innovative solutions and initiatives.

    WhiteSpider is an expert in Software Defined Technologies - the building blocks of a digital infrastructure - and one of Cisco's leading partners in designing and delivering Application Centric Infrastructure

    In this webinar we will be looking at how Software Defined Technologies are supporting organisations as they create digital capabilities through:

    1. Enabling Scalability and Agility: Be able to rapidly scale, and react quickly to the changes in business requirements.
    2. Delivering intelligence: Detailed, predictive and actionable analytics
    3. Developing automation: Solutions that enable orchestration and automation reducing the need for, and cost of, human intervention.
    4. Promoting collaboration: Simplifying and unifying the communication between IT and Business.

    We will be looking at specific examples of where WhiteSpider has enabled these capabilities through solutions we have delivered in Motor Racing, Healthcare and Manufacturing.
  • What does the Cloud mean for the Future of Cybersecurity?
    What does the Cloud mean for the Future of Cybersecurity? Darius Goodall, Director, Product Marketing - Security Products, Barracuda Recorded: Nov 16 2017 52 mins
    The growing migration of business critical applications to SaaS based solutions and public cloud platforms signals a fundamental shift in IT infrastructure. The cloud requires organizations to take a fresh look at their security posture in the light of new threats and an expanding deployment surface. We will discuss the emerging security requirements as results of these shifts and provide recommendations to securely operate in cloud environments
  • Post-Soviet Bank Heists: A Hybrid Cybercrime Study
    Post-Soviet Bank Heists: A Hybrid Cybercrime Study Abdullah Sheikh, AD, Customer Solutions, Singtel & Thanassis Diogos, Incident Response Team Leader, Trustwave SpiderLabs Recorded: Nov 16 2017 59 mins
    Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.

    The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
  • Governance, Compliance & Print Security
    Governance, Compliance & Print Security Ron Chestang GCIH, CEH, CISM Print Security Advisor, HP Inc. & Michael Mayberry Technology Account Executive, Staples Recorded: Nov 16 2017 37 mins
    HP and Staples Business Advantage present:
    Governance, Compliance & Print Security - Three keys to protecting business
    • The rise of IoT and its evolving role in Security Challenges
    • IoT Standards & Framework Developments in CyberSecurity
    • Governance and its role in mitigating risk
    • And More: Influential Mega Trends, Risks & Hidden Costs

    Ron Chestang – GCIH, CEH, CISM
    Print Security Advisor
    HP Inc.
    Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
    Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.

    Michael Mayberry
    Technology Account Executive
    Staples Business Advantage
    Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
  • Endpoint Security: The Final Frontier
    Endpoint Security: The Final Frontier Ed Metcalf, Senior Director Product Marketing, Cylance Recorded: Nov 16 2017 46 mins
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • NVMe & Oracle Database: Making Hybrid Transaction/Analytical Processing Possible
    NVMe & Oracle Database: Making Hybrid Transaction/Analytical Processing Possible Ganesh Balabharathi, Principal Database Architect Recorded: Nov 16 2017 38 mins
    Hybrid transaction/analytical processing (HTAP) refers to capabilities to perform OLAP (online analytical processing) and OLTP (online transaction processing) at the same time on a same database system. Oracle Database has always held the edge in HTAP because its version-based concurrency model means that analytical workloads do not block transactional workloads. In this webcast, we will examine how Vexata Scalable Storage Systems utilize technologies such as NVMe Flash and Intel Optane (3D XPoint) can be used to take HTAP to the next level. This webcast will include a demonstration of HTAP running on Oracle 12c with the Vexata VX-100 Scalable Storage System.

    You will learn about:
    - Detailed explanation of Hybrid transactional/analytic environments
    - Best practices for architecting Oracle Hybrid database systems
    - How Vexata maximizes transactional and analytic workloads
  • Taking the Path to Real Time Big Data Analytics
    Taking the Path to Real Time Big Data Analytics Paul Krein, Red River; Joe Paiva, Commerce; Linda Powell, Protection Bureau; Ashok Sankar, Splunk; Nick Psak, Pure Storage Recorded: Nov 16 2017 64 mins
    The shift to the cloud is modernizing government IT, but are agencies' storage models keeping up with that transition? When it comes to big data, the proper system is necessary to avoid major data bottlenecks and accessibility challenges, allowing agencies to get the right information to the right people at the right time. Flash storage is the latest technology that improves scale, speed, and efficiency of data storage. Join us for a panel discussion on the challenge of scale, increased demand for user-focused data management tools, and security and risk reduction with sensitive data.

    Featured Speakers:

    - Paul Krein, Chief Technology Officer, Red River
    - Joe Paiva, Chief Information Officer, International Trade Administration, U.S. Department of Commerce
    - Linda Powell, Chief Data Officer, Consumer Financial Protection Bureau
    - Ashok Sankar, Director, Solutions Strategy, Public Sector and Education, Splunk
    - Nick Psaki, Principal, Office of the CTO, Pure Storage
  • NetCloud Manager Enterprise: New Capabilities for an Elastic Edge
    NetCloud Manager Enterprise: New Capabilities for an Elastic Edge Cradlepoint's Mike Hagman, Bryan Embrey and Mack Lyons Recorded: Nov 16 2017 50 mins
    Join the Cradlepoint team for a live webinar on November 16, 2017, at 9am PT for an introduction to Cradlepoint's new tier, NetCloud Manager Enterprise, and new features available within NetCloud.
     
    Webinar attendees will learn about:
    — New tier and features in NetCloud Manager Enterprise
    — How Cradlepoint NetCloud Manager Enterprise enhances branch office and in-vehicle networking
    — New naming and features in NetCloud Perimeter (formerly NetCloud Engine)
  • vCPE and vPE: Gateway to Service Agility and Virtualization
    vCPE and vPE: Gateway to Service Agility and Virtualization Shaji Nathan, VP, Product Marketing, IP Infusion and Srikanth Krishnamohan, Director, Business Development, IP Infusion Recorded: Nov 16 2017 39 mins
    This webinar will provide attendees an overview of capabilities of VirNOS virtual network function (VNF) and the use cases. We will cover virtualizing services at the customer edge and how service providers can enable services such as VPN and IPSec to their end customers at lower OPEX. The presenter will also discuss vPE/vRouter running at the data center or cloud providing MPLS WAN services.
  • Connecting the Dots to Detect and Kill More Malware
    Connecting the Dots to Detect and Kill More Malware Stephen Helm, Product Marketing Manager Recorded: Nov 16 2017 49 mins
    Today, organizations of all sizes are under siege from an unceasing tide of malware as tens of millions of new malware samples are discovered every month. With ample security budgets, skilled security teams, and cutting-edge-at-a-cost technologies at their disposal, large enterprises are well-positioned to protect themselves against the deluge of malware knocking at their door. Yet malware presents especially daunting challenges for SMBs as they face the same threats as enterprises, but with far fewer resources at their disposal.

    Through threat correlation and scoring, SMBs have a powerful new way to detect and kill malware that other solutions miss.  

    In this webinar we will discuss:
    • The threat landscape for SMBs
    • Known, unknown, and evasive malware
    • The need for network and endpoint threat correlation
    • Threat scoring: a force multiplier
  • Microservices AMA: Load Balancing and Service Discovery
    Microservices AMA: Load Balancing and Service Discovery Charles Pretzer, Technical Architect; Floyd Smith, Technical Marketing Writer Recorded: Nov 16 2017 61 mins
    Learn how NGINX Plus supports service discovery and load balancing in the NGINX Microservices Reference Architecture (MRA).

    More specifically, join this webinar to learn:

    - Get the latest answers to your questions about implementing microservices
    - Learn about the challenges others are facing in development and deployment
    - Ask questions about converting monolithic apps to microservices
    - Get an update on the NGINX Microservices Reference Architecture
  • Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security
    Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security Gary Southwell, General Manager, CSPi Recorded: Nov 16 2017 46 mins
    As organizations move to an agile DevOps model, they are confronted with one major question: How can they manage existing information-security processes to ensure data privacy?

    Since data breaches are not going to go away, organizations really need to focus on how to make breaches irrelevant so that in the event of a breach the data either will not be accessed, or if it is it won’t be in usable form.

    In this webinar, created for application developers and data security resources, CSPi will not only review best practices but also present a software framework to show how organizations can achieve uncompromised enterprise-wide security. Created for application developers and data-security resources, this webinar will also show you how this new approach complements established InfoSec security requirements and maintains the agile benefits of DevOps – all while providing the automated protection of critical data under any use.

    Don’t miss this webinar! Register today.

    Webinar highlights:
    Join us for this valuable webinar to learn how you can:
    1.Uniformly and automatically apply security policies across the enterprise, including containers and VMs as they spawn.
    2.Offload core-intensive security functions while improving application performance.
    3.Secure critical assets in all cases – in motion, at rest, and in use.
  • Just When You Thought it Was Safe to Jump Back into the Cyber Pool...
    Just When You Thought it Was Safe to Jump Back into the Cyber Pool... Simon Bryden, Consulting Systems Engineer Recorded: Nov 16 2017 45 mins
    If nothing else, the last 12 months have proved that we can never overestimate what can happen when you combine poor security hygiene with politics, human ingenuity and human error - if we can believe the latest headlines.

    Wannacry, NotPetya and Equifax have dominated headlines but it’s not hard to compile a much larger list if you look a little bit deeper. And while past results are no guarantee for future performance, it is that time of the year to look ahead to see what might be in store for 2018. However, looking ahead without taking the past into account can only give a partial perspective.

    This Fortinet “Threats on the Horizon” summit presentation will summarize what we have seen so far in 2017 and present our perspective for what we can expect in 2018.
  • Symantec Endpoint Protection Mobile (Video)
    Symantec Endpoint Protection Mobile (Video) Symantec Recorded: Nov 15 2017 5 mins
    4 Min Product Demo Video

    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • Let's cover your bases. Are You Ready for DFARS?
    Let's cover your bases. Are You Ready for DFARS? Scott Croskey, VP of Policies and Standards Recorded: Nov 15 2017 22 mins
    Join Oxford VP of Policy and Standards Scott Croskey as he delves into the finer requirements and directives of the DoD's clarified DFARS Cyber Security Requirements, restating that full compliance is required for contractors no later than December 31, 2017.

    Are you a Government Contractor or Subcontractor?

    Are you concerned about any current compliance issues?

    Has your Organization received an assessment yet?

    The Oxford Solutions team is on the front lines, making sure that our clients and companies of all sizes are making sure they can report accurately and in a timely manner on developing legislation. Scott Croskey will pose questions and further analysis on DFARS requirements this year and beyond.
  • DevOps & Automation: How to Modernize Enterprise Workflows
    DevOps & Automation: How to Modernize Enterprise Workflows Walter Bentley, Red Hat Automation Practice Lead Branden Pleines, Consultant, Automation Practice Recorded: Nov 15 2017 65 mins
    The promise of workflow modernization through automation is great — speed, efficiency, and productivity are the hallmarks. But, the process to get there can be complex: How do you prioritize and modernize those designated workflows as you move to new platforms or implement new processes and ways of working? With workflow modernization, your organization can become fully cross functional, enabling all teams to collaborate to create automation content.

    In this webinar, we’ll show you the strategic approach to workflow automation and provide actionable guidance on to make operations more repeatable, predictable, and automated. You’ll learn how to:

    - Bring a DevOps mindset and approach to the network
    - Create fully automated workflows that are interchangeable between projects
    - Extend the power of Ansible automation across the enterprise
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Recorded: Nov 15 2017 48 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?