Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
DataON, Microsoft, Intel, Florida PolyRecorded: Aug 21 201960 mins
With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.
Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.
Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.
The webcast will explore the following topics:
• How to successfully plan for an upgrade and migration to Windows Server 2019
• What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI
• How Florida Poly successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.
DataON – Howard Lo, Vice President of Sales & Marketing
Microsoft – Rob Hindman, Senior Program Director of Windows Server
Jayme Williams, TencateRecorded: Aug 21 201960 mins
2019 Results are in: 84% weren’t IT resilient enough
The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?
Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.
Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWSRecorded: Aug 21 201955 mins
Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.
In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).
• How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
• Technical considerations and best practices for SAP HANA and cloud migration.
• Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
Matt Hebb, Product Marketing, Data Center Systems, Western DigitalRecorded: Aug 21 201918 mins
As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.
We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.
In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
>How to simplify your VMware administrative tasks
>How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:
•Observations and recommendations across the six phases of incident response
•Top takeaways for building a solid IR Plan and capability
•Breach Simulations Kits and using these resources to run data breach tabletop exercises
Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, CitrixRecorded: Aug 21 201942 mins
In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.
Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.
What's driving cloud investments today?
Improving the speed of IT service delivery
Greater flexibility to react to changing market conditions
Enabling business continuity
Improving customer support or services
Watch this webinar to find out how you can:
Deliver easy, secure access across devices
Connect people and places, securely
Reduce time to market for new products
Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
Pablo Alvarez-Yanez, Director of Product Management, DenodoRecorded: Aug 21 201947 mins
Digital Transformation, even though a cliche, is definitely on top of every CEO's strategic initiative list. At the heart of any digital transformation, no matter the industry or the size of the company, there is an API strategy. Application programming interfaces (APIs) are the connection points between one application and another, and as such, they enable applications to build on each other, extend each other, and work with each other. Taken together, APIs represent a thriving ecosystem of developers that is showing no sign of slowing down.
Attend this webinar to learn:
- How data virtualization greatly enhances the capabilities of an API
- How data virtualization works as a service container, as a source for microservices and as an API gateway
- How data virtualization can create managed data services ecosystems in a thriving API economy
Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, KaminarioRecorded: Aug 20 201958 mins
Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?
This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.
•Running a database on a VM and connecting it to Kubernetes as a service
•Running a database in Kubernetes using a `stateful set`
•Running a database in Kubernetes using an Operator
•Running a database on a cloud managed service
After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks
John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, GigamonRecorded: Aug 20 201937 mins
IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.
With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.
Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;
• Enhancing Infrastructure resiliency and availability
• Reducing operating and monitoring Costs
• Improved operation efficiencies and cooperation between IT teams
• Step by step GUI configuration examples
Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSetsRecorded: Aug 20 201960 mins
Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.
Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.
During this webinar, we will discuss:
-The modern data architecture required for dealing with extreme data
-How StreamSets enables continuous data movement and transformation across the enterprise
-How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
-A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
David Shaw, Chief Science Officer at Nasuni | Anne Blanchard, Senior Director of Product Marketing at NasuniRecorded: Aug 20 201913 mins
On May 7, 2019, the city of Baltimore was hit by a ransomware attack - code named “RobinHood.” Hackers used remote encryption to lock down the city’s file servers and demanded payment of 13 bitcoin in exchange for keys to release them. The city immediately notified the FBI and took systems offline to keep the attack from spreading, but not before it impacted over 10,000 computers and multiple city departments. The cost? An estimated $4.6M in data recovery costs alone. All told, the cost to restore data, the cost of new systems that would prevent an immediate new attack, and the lost revenue totaled over $18M.
Scenarios like this are causing many companies to reexamine their plans for disaster recovery in order to ensure business continuity, not just in the face of equipment, software, or network failures, but also in the event of a ransomware attack.
Anne Blanchard, Senior Director of Product Marketing sat down with David Shaw, Chief Science Officer at Nasuni, to discuss the Baltimore incident, tips on how to avoid a ransomware attack, and how to dramatically decrease business downtime and cost following an attack.
Meera Rao, Senior Principal Consultant, Synopsys, Brandon Dunlap, Moderator, (ISC)²Recorded: Aug 20 201957 mins
Demands for more secure software and more rapid application development have led to the emergence of DevSecOps. DevSecOps maturity requires a risk-based approach to adding security activities, increasing depth, and improving testing governance. The best strategy is to shift from a reactive to a proactive security approach that injects security at the right time and place with automated continuous testing. This presentation covers these aspects of automated continuous testing:
1. Practices to avoid
4. When and where to use automated testing
5. Best practices for implementing and improving continuous testing throughout the development life cycle
Kelvin Murray, Sr. Threat Research Analyst, WebrootRecorded: Aug 20 201932 mins
** This is an EMEA focused webinar **
When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.
Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.
Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
Jarosław Biniek, SUSE, Przemysław Celiński, ncNETcomRecorded: Aug 20 201991 mins
Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat drugiego spotkania to "DevOps jest prostsze niż myślisz - jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?"
- Co jest nam potrzebne (software / hardware, minimalne zasoby do testowego klastra)
- Rekomendacje odnośnie konfiguracji produkcyjnej i skalowania; jak dobrać storage pod kontenery
- Jak się zabrać do instalacji (konto na SUSE.com, jak pobrać software, po co nam dokumentacja, co trzeba przeczytać), na co zwrócić uwagę przy instalacji i konfiguracji (konfiguracja klastra, tworzenie własnego repozytorium dla kontenerów)
- Propozycje zastosowań (od uruchomienia sklepu internetowego w architekturze mikrousługowej po SAP HANA i SAP Data Hub w kontenerach)
- Pokaz jak zrealizować praktycznie DevOps stosując SUSE CaaS Platform w połączeniu z darmową wersją GitLab
- Silne strony SUSE CaaS Platform (kwestie automatyzacji, łatwości użycia, bezpieczeństwa).
Część pokazowa przygotowywana jest we współpracy z partnerem SUSE, firmą ncNETcom.
Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and CognitiveRecorded: Aug 20 201932 mins
Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
Scott Tye (AE), Jenny Ngo (SE), Sridhar Devarapalli (PM)Recorded: Aug 20 201949 mins
Security threats have become more sophisticated and in combination with new application and cloud deployment models adding to existing complexity have caused more than 3/4 of organizations to be victims of successful cyber attack - don't become the next victim!
Join this session to learn common use cases and best practices for implementing VM microsegmentation in the hybrid cloud world. Nutanix engineers cover design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
The unyielding demand facing all IT professionals today is to accelerate the ability to meet the needs of the business. Achieving that goal requires deploying applications for your internal and external constituents at a faster rate while meeting stricter and stricter compliance and security requirements. This webinar provides insight into how Layer7 SiteMinder can support that goal today and how it will evolve to simplify that support in the future.
Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at ForresterRecorded: Aug 15 201965 mins
As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.
Attendees of the webinar will learn:
-The top challenges organizations face in creating a technology experience that enables productivity
-The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
-A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
Ignacio Verona and David Sastre Medina, Red HatRecorded: Aug 15 201944 mins
X by Orange committed to launch a new, fully software-defined telco operator in Spain - from scratch. They wanted to “Uberize” the telco business by being completely cloud based and not owning a single piece of hardware. The goal was clear, but not easy: Streamline how a communications service provider works to launch new services in less than 90 days, provide an extremely simple user experience, and redefine the telco market. Also, the whole project, including hiring more than 120 people, developing the IT backend, and creating a sales, marketing, and go-to-market strategy, needed to be accomplished in 1 year. And they made it.
In this session recorded at Red Hat Summit, Ignacio Verona and David Sastre Medina, Red Hat, discuss how X by Orange created its infrastructure using Red Hat OpenShift with an “everything is automated” deployment policy. Also, they show how Red Hat Consulting helped the company's goals become reality through extensive involvement - during the initial phases and on site.
Nathan Necaise - VP of Data Sciences Emerging Services - OptivRecorded: Aug 15 201955 mins
The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.
During this webinar, we will discuss:
-Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
-Show customer examples and demonstrate how they are leading to transformative effects
-How to optimize security architectures that use technologies like Splunk using StreamSets
Storage Switzerland, HYCURecorded: Aug 15 201930 mins
Backup and Recovery is as old as the data center itself, but organizations still struggle with the process. IT professionals have tried many solutions to solve their data protection solutions, and the market is full of options, but none seem to address the core issues. Launched only two years ago, HYCU, Inc took a different approach by building backup solutions custom-built for each environment they protect.
Join HYCU, Inc’s CEO, Simon Taylor as he sits down with Storage Switzerland Lead Analyst, George Crump to discuss HYCU’s unique approach to the fiercely competitive backup market.
Primitive Logic CEO Jill Reber & President Kevin MoosRecorded: Aug 15 201936 mins
Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.
Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.
Join Jill Reber and Kevin Moos of Primitive Logic to learn:
- How to work with third parties who process personal data on your behalf
- How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, GigamonAug 22 20191:00 amUTC54 mins
Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.
What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.
Join Gigamon and ActualTech Media in this webinar and learn how to:
- Unleash visibility to secure and optimize your network
- Discover applications that you didn’t even know were running on your network
- Increase overall performance of your network and shared components
- Spot potential security vulnerabilities before they become a problem
Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.
Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, InformaticaAug 22 20194:30 amUTC58 mins
With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.
Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.
This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.
As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales EngineerAug 22 20194:00 pmUTC58 mins
As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.
What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.
We’ll address the following questions:
- What does DFIR readiness include? What frameworks exist?
- What security tools and technologies are essential for DFIR?
- How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
- How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?
Meet Your Hosts:
Danielle Russell, Group Product Marketing Manager
Aaron Genereaux, Sales Engineer
Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSetsAug 22 20195:00 pmUTC34 mins
Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.
During this webinar, we will discuss:
-How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.
-We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla NetworksAug 22 20196:00 pmUTC60 mins
Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
1. Defend against Cyberattacks
2. Ensure Privacy Safeguards
4. Minimize Reputational Risk
5. Earn the Trust of your Customers
Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.
Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GMAug 27 20194:30 amUTC47 mins
Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?
Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
Jarosław Biniek, SUSE; Jakub Kmiecik, TrecomAug 27 20198:00 amUTC90 mins
Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat trzeciego spotkania to "Jak zaprojektować swój pierwszy klaster Ceph?"
- Co jest nam potrzebne do założenia Software-Defined Storage (software / hardware; minimalna konfiguracja do testów, nody zarządzające, monitorujące i storage
- Rekomendacje odnośnie konfiguracji klastra produkcyjnego
- Jak się zabrać do instalacji – przewodnik krok po kroku (jak założyć konto na SUSE.com, jak pobrać pliki instalacyjne, gdzie znajduje się dokumentacja i na co warto w niej zwrócić uwagę), proces instalacji - na co zwrócić uwagę, potencjalne pułapki; podstawy konfiguracji, jak odwzorować fizyczną infrastrukturę w crush map
- Propozycje zastosowań Software-Defined Storage i pokaz używania SES w praktyce (disk-to-disk backup, obsługa obrazów wirtualnych maszyn, przestrzeń na pliki użytkowników serwerów Windows, serwowanie plików za pośrednictwem Samba).
Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVAAug 27 20193:00 pmUTC60 mins
While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
Eric Schabell, global technology evangelist director, Red HatAug 27 20194:30 pmUTC60 mins
The hype about cloud computing is present daily. From cloud to hybrid cloud to hybrid multicloud, businesses hear that this technology is the way to ensure their digital future. As they ponder choices about cloud environments, businesses must continue the daily work of enhancing the customer experience and improving the agile delivery of applications.
In this webinar, we’ll use real customer experiences to highlight the top 3 lessons those customers learned as they transitioned to hybrid multicloud environments. We’ll look closely at:
- What hybrid multicloud means for your business.
- Decisions that affect application delivery.
- How to deal with legacy applications, likely the most important resources to your business.
Arvind Prabhakar - Co-Founder and CTO - StreamSetsAug 27 20195:00 pmUTC62 mins
Modern data infrastructures are fed by vast volumes of data, streamed from an ever-changing variety of sources. Standard practice has been to store the data as ingested and force data cleaning onto each consuming application. This approach saddles data scientists and analysts with substantial work, creates delays getting to insights and makes real-time or near-time analysis practically impossible.
Lucy Kerner Security Global Technical Evangelist and Strategist, Red HatAug 27 20195:30 pmUTC60 mins
Maintaining visibility, control, and security, and ensuring governance and compliance remains paramount. But it becomes more difficult and time consuming in a hybrid infrastructure consisting of physical, virtual, cloud, and container environments. Also, it's becoming more and more challenging for security teams to examine and respond to the growing number of security alerts coming in from the increasing number of security tools in their security operations center. (This is a replay from Red Hat Summit)
Jane Foreman, Citrix and Laura Kaminski, CitrixAug 27 20196:00 pmUTC34 mins
With app and data sprawl at an all-time high, the way we work has never been more convoluted. The complexity that most modern workers experience, demands advances in technology to group and filter workflows—enabling increased productivity without switching apps and devices.
Citrix recently unveiled new Citrix Workspace intelligence features, incorporating feedback from customers, to address the core challenges in today’s evolving workspace. Watch this webinar to discover how Citrix Workspace is organizing work for employees and enhancing their productivity by:
•Eliminating frequent switches across apps to increase focus
•Delivering one universal search across your entire workspace
•Prioritizing notification feeds and using machine learning to automate tasks
Dan Juengst, Brian Gracely & Josh Berkus - Red HatAug 27 20196:30 pmUTC60 mins
Everybody’s talking containers. Everybody’s talking Kubernetes. So many options and so little time to evaluate them all. How do you select a container platform? What’s really important?
In this session recorded at Red Hat Summit, we'll journey through the what, how, who, and why of selecting a container orchestration infrastructure. We'll start with the relationship between Linux and containers, then explore the different options available if you want to move to Kubernetes for container orchestration. Along the way, we'll debunk some myths and shine some light into the dark corners of container orchestration. You'll leave this session armed with the knowledge you need to make the right container orchestration infrastructure decision to dive into the world of cloud-native application development and accelerate innovation to better serve your customers. (This is a replay from Red Hat Summit)
Dan Juengst, Sr. Principal Product Marketing Manager - Hybrid Cloud, Red Hat
Brian Gracely, Director Product Strategy, OpenShift, Red Hat
Josh Berkus, Kubernetes Community Manager, Red Hat
Director, Data Protection SolutionsAug 28 20195:00 pmUTC25 mins
Massive data growth, increasing application density, and compliance requirements are driving organizations to deploy more efficient data protection solutions. As a result, backup and storage admins are leveraging snapshots, in-line deduplication, and new NVMe Flash technology to drive 24x7 operations, continuous data protection, and improve RTOs and increase the RPO SLAs with an on-premises cloud.
We invite you to join us for this webinar to learn how:
>Modernizing your backup and recovery operations for virtual and physical infrastructure can transform your business
>NVMe unlocks the true potential of solid-state flash technology
>Flash and Cloud Object Storage Systems from Western Digital integrate with Veeam and Rubrik stacks to accelerate your storage and data protection services
Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance StrategyAug 28 20196:00 pmUTC41 mins
In the webinar, “The 5 Foundational Elements of a Successful Enterprise Data Governance Program”, the Informatica Data Governance team will share how organizations can start their enterprise data governance journey.
Chris Paap, Solutions Marketing Manager - NutanixAug 29 20194:00 pmUTC26 mins
Many organizations are moving to a database as a service (DBaaS) model for managing and operating their databases because DBaaS model is efficient, agile, cost-effective and scalable. What if copying a database were as easy as the copy and paste operations on your computer? Join us to learn how Nutanix Era automates and simplifies database management, bringing one-click simplicity and invisible operations to database provisioning and lifecycle management (LCM).
Rajkumar Sukumaran, Head of Technology, Mettle Networks and Abraham K. Jacob, Vice President, IP Networking ProductsAug 29 20194:00 pmUTC60 mins
Mettle 2vBNG: Intel based high performance virtual BNG from Mettle Networks. Mettle 2vBNG has a forwarding looking architecture with centralized control plane. This is a quick to setup, easy to integrate, micro services based design that run on Intel CPU.
This webinar will cover the following:
•Why Mettle 2vBNG is a good starting point towards building a virtualized infrastructure.
•How it can coexist with legacy appliances to start with.
•Roadmap and future position of Mettle 2vBNG in the ONF SEBA architecture.
•How it can help moving towards a fully virtualized, cloud-native architecture.
•Common deployment usecases will be discussed.
Storage Switzerland and DriveScaleAug 29 20195:00 pmUTC22 mins
Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra to Drive Down Cloud Data Center Costs
Hyperscale applications like Elastic, Hadoop, Kafka and Cassandra typically use a shared nothing design where each node in the compute cluster operates on its data. Hyperscale architectures, to maximize storage IO performance, keep data local to the compute node processing the job. The problem is that the organization loses the efficiency of shared storage infrastructure. As the hyperscale architecture scales, overprovisioned and underutilized compute, GPU and storage resources cost the organization money!
Join Storage Switzerland and DriveScale for our 20 minute webinar to learn how composable infrastructure can provide both high performance and high efficiency.
In 20 minutes learn:
- The challenges facing hyperscale architectures
- The true cost of underutilized compute and storage
- Why fast Ethernet networks are good for your data
- How a composable architecture brings scale, performance and cost efficiency to your data center
Mike Korembaum, Senior Technical Marketing Engineer Manager at CloudGenixAug 29 20195:00 pmUTC45 mins
While accessing cloud applications from the remote office, customers face three big challenges:
* Poor performance over the WAN
* Ensuring security over the internet
* Implementing regulatory compliance
CloudGenix and Microsoft have introduced a solution for high performance delivery of Azure to remote offices by securely integrating your enterprise WAN with Azure Virtual WAN. You can use any WAN type and any Azure region globally
Register to join us on August 29 at 10 AM PT for a 30-minute webinar to see a demo and presentation of how this solution can help address your cloud connectivity challenges.
John Grim, Sr. Manager, VTRACAug 29 20195:00 pmUTC75 mins
For 12 years, we've written the book on data breaches. Literally. Now, we've written the book on data breach response. Introducing the VIPR Report, the Verizon Incident Preparedness and Response Report. The VIPR covers a three-year review of our IR Plan assessments and data breach simulation exercises across various industries. In this session, we'll discuss the top 20 key takeaways for incident preparedness and response as it relates to the six phases of incident response:
Phase 1 – Planning and Preparation
Phase 2 – Detection and Validation
Phase 3 – Containment and Eradication
Phase 4 – Collection and Analysis
Phase 5 – Remediation and Recovery
Phase 6 – Assessment and Adjustment
Speakers will include:
•John Grim, Managing Principal, VTRAC | Innovations and Development
•Erika Gifford, Senior Manager, GSS | Security Operations Advisory
•Hayden Williams, Senior Manager, VTRAC | Investigative Response
Nathan Swetye - Sr. Manager of Platform Engineering - Cox AutomotiveAug 29 20195:00 pmUTC62 mins
Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.
In this webinar, Nathan Swetye from Cox Automotive will discuss how they:
-Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
-Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
-Reduced data availability from weeks to hours and developer time by 90%.
Dave Wells, Director, Eckerson, Vamshi Sriperumbudur, Portfolio Marketing, InformaticaAug 29 20196:00 pmUTC32 mins
Are your data warehouses ready for advanced analytics and AI projects? Legacy data warehouses are ill-equipped to handle unstructured data complexities or today’s multi-cloud environments. But that doesn’t mean data warehousing is going away. Instead, your peers and competitors are modernizing their data warehouses, which, together with data lakes, form the basis of modern data architectures.
Join experts from Eckerson Group and Informatica for an in-depth discussion of data warehouse modernization. You’ll learn about 10 must-haves for modernization and discover why modernizing your data warehouses is a natural next step in the evolution of data management.
Make sure you’re prepared for tomorrow’s analytics.