Hi [[ session.user.profile.firstName ]]

Virtualization

  • Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    DataON, Microsoft, Intel, Florida Poly Recorded: Aug 21 2019 60 mins
    With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.

    Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.

    Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.


    The webcast will explore the following topics:

    • How to successfully plan for an upgrade and migration to Windows Server 2019

    • What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI

    • How Florida Poly successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.


    Presented by:

    DataON – Howard Lo, Vice President of Sales & Marketing

    Microsoft – Rob Hindman, Senior Program Director of Windows Server

    Intel Corporation – Balaji Iyer, Solutions Strategist

    Florida Polytechnic University – Bill Webster, Assistant Director of Administrative Computing
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Recorded: Aug 21 2019 49 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Recorded: Aug 21 2019 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Recorded: Aug 21 2019 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • The Role of Data Virtualization in an API Economy (APAC)
    The Role of Data Virtualization in an API Economy (APAC)
    Pablo Alvarez-Yanez, Director of Product Management, Denodo Recorded: Aug 21 2019 47 mins
    Digital Transformation, even though a cliche, is definitely on top of every CEO's strategic initiative list. At the heart of any digital transformation, no matter the industry or the size of the company, there is an API strategy. Application programming interfaces (APIs) are the connection points between one application and another, and as such, they enable applications to build on each other, extend each other, and work with each other. Taken together, APIs represent a thriving ecosystem of developers that is showing no sign of slowing down.

    Attend this webinar to learn:

    - How data virtualization greatly enhances the capabilities of an API
    - How data virtualization works as a service container, as a source for microservices and as an API gateway
    - How data virtualization can create managed data services ecosystems in a thriving API economy
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Recorded: Aug 20 2019 58 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Recorded: Aug 20 2019 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Modern Streaming Data Stack with Kinetica & StreamSets
    Modern Streaming Data Stack with Kinetica & StreamSets
    Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSets Recorded: Aug 20 2019 60 mins
    Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.

    Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.

    During this webinar, we will discuss:

    -The modern data architecture required for dealing with extreme data
    -How StreamSets enables continuous data movement and transformation across the enterprise
    -How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
    -A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
  • Achieving Business Continuity in the Age of Ransomware
    Achieving Business Continuity in the Age of Ransomware
    David Shaw, Chief Science Officer at Nasuni | Anne Blanchard, Senior Director of Product Marketing at Nasuni Recorded: Aug 20 2019 13 mins
    On May 7, 2019, the city of Baltimore was hit by a ransomware attack - code named “RobinHood.” Hackers used remote encryption to lock down the city’s file servers and demanded payment of 13 bitcoin in exchange for keys to release them. The city immediately notified the FBI and took systems offline to keep the attack from spreading, but not before it impacted over 10,000 computers and multiple city departments. The cost? An estimated $4.6M in data recovery costs alone. All told, the cost to restore data, the cost of new systems that would prevent an immediate new attack, and the lost revenue totaled over $18M.

    Scenarios like this are causing many companies to reexamine their plans for disaster recovery in order to ensure business continuity, not just in the face of equipment, software, or network failures, but also in the event of a ransomware attack.

    Anne Blanchard, Senior Director of Product Marketing sat down with David Shaw, Chief Science Officer at Nasuni, to discuss the Baltimore incident, tips on how to avoid a ransomware attack, and how to dramatically decrease business downtime and cost following an attack.
  • Micro Detail.  Macro Intelligence.
    Micro Detail. Macro Intelligence.
    Tom Foottit, Senior Director, Product Management, Accedian Recorded: Aug 20 2019 36 mins
    Why granular, high quality data is critical for optimal end-user experience in the 5G era.
  • Shift Left, Shift Right, or Run Security Right Through The Middle?
    Shift Left, Shift Right, or Run Security Right Through The Middle?
    Meera Rao, Senior Principal Consultant, Synopsys, Brandon Dunlap, Moderator, (ISC)² Recorded: Aug 20 2019 57 mins
    Demands for more secure software and more rapid application development have led to the emergence of DevSecOps. DevSecOps maturity requires a risk-based approach to adding security activities, increasing depth, and improving testing governance. The best strategy is to shift from a reactive to a proactive security approach that injects security at the right time and place with automated continuous testing. This presentation covers these aspects of automated continuous testing:

    1. Practices to avoid
    2. Drawbacks
    3. Prerequisites
    4. When and where to use automated testing
    5. Best practices for implementing and improving continuous testing throughout the development life cycle
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Aug 20 2019 32 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • Jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?
    Jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?
    Jarosław Biniek, SUSE, Przemysław Celiński, ncNETcom Recorded: Aug 20 2019 91 mins
    Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat drugiego spotkania to "DevOps jest prostsze niż myślisz - jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?"

    Plan warsztatów:
    - Co jest nam potrzebne (software / hardware, minimalne zasoby do testowego klastra)
    - Rekomendacje odnośnie konfiguracji produkcyjnej i skalowania; jak dobrać storage pod kontenery
    - Jak się zabrać do instalacji (konto na SUSE.com, jak pobrać software, po co nam dokumentacja, co trzeba przeczytać), na co zwrócić uwagę przy instalacji i konfiguracji (konfiguracja klastra, tworzenie własnego repozytorium dla kontenerów)
    - Propozycje zastosowań (od uruchomienia sklepu internetowego w architekturze mikrousługowej po SAP HANA i SAP Data Hub w kontenerach)
    - Pokaz jak zrealizować praktycznie DevOps stosując SUSE CaaS Platform w połączeniu z darmową wersją GitLab
    - Silne strony SUSE CaaS Platform (kwestie automatyzacji, łatwości użycia, bezpieczeństwa).


    Część pokazowa przygotowywana jest we współpracy z partnerem SUSE, firmą ncNETcom.
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Recorded: Aug 20 2019 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Scott Tye (AE), Jenny Ngo (SE), Sridhar Devarapalli (PM) Recorded: Aug 20 2019 49 mins
    Security threats have become more sophisticated and in combination with new application and cloud deployment models adding to existing complexity have caused more than 3/4 of organizations to be victims of successful cyber attack - don't become the next victim!

    Join this session to learn common use cases and best practices for implementing VM microsegmentation in the hybrid cloud world. Nutanix engineers cover design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
  • Facilitating Secure DevOps
    Facilitating Secure DevOps
    Herb Mehlhorn Recorded: Aug 19 2019 23 mins
    The unyielding demand facing all IT professionals today is to accelerate the ability to meet the needs of the business. Achieving that goal requires deploying applications for your internal and external constituents at a faster rate while meeting stricter and stricter compliance and security requirements. This webinar provides insight into how Layer7 SiteMinder can support that goal today and how it will evolve to simplify that support in the future.
  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    Ignacio Verona and David Sastre Medina, Red Hat Recorded: Aug 15 2019 44 mins
    X by Orange committed to launch a new, fully software-defined telco operator in Spain - from scratch. They wanted to “Uberize” the telco business by being completely cloud based and not owning a single piece of hardware. The goal was clear, but not easy: Streamline how a communications service provider works to launch new services in less than 90 days, provide an extremely simple user experience, and redefine the telco market. Also, the whole project, including hiring more than 120 people, developing the IT backend, and creating a sales, marketing, and go-to-market strategy, needed to be accomplished in 1 year. And they made it.

    In this session recorded at Red Hat Summit, Ignacio Verona and David Sastre Medina, Red Hat, discuss how X by Orange created its infrastructure using Red Hat OpenShift with an “everything is automated” deployment policy. Also, they show how Red Hat Consulting helped the company's goals become reality through extensive involvement - during the initial phases and on site.
  • Modernize Cybersecurity Threat Detection
    Modernize Cybersecurity Threat Detection
    Nathan Necaise - VP of Data Sciences Emerging Services - Optiv Recorded: Aug 15 2019 55 mins
    The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.

    During this webinar, we will discuss:

    -Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
    -Show customer examples and demonstrate how they are leading to transformative effects
    -How to optimize security architectures that use technologies like Splunk using StreamSets
  • Meet The CEO: HYCU, Inc’s Simon Taylor
    Meet The CEO: HYCU, Inc’s Simon Taylor
    Storage Switzerland, HYCU Recorded: Aug 15 2019 30 mins
    Backup and Recovery is as old as the data center itself, but organizations still struggle with the process. IT professionals have tried many solutions to solve their data protection solutions, and the market is full of options, but none seem to address the core issues. Launched only two years ago, HYCU, Inc took a different approach by building backup solutions custom-built for each environment they protect.

    Join HYCU, Inc’s CEO, Simon Taylor as he sits down with Storage Switzerland Lead Analyst, George Crump to discuss HYCU’s unique approach to the fiercely competitive backup market.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • Kristin Demo Test
    Kristin Demo Test
    Kristin Casey, Director Marketing, WWT Aug 22 2019 5:00 am UTC 7 mins
    This is to demo the BT platform to the team so everyone can see how it works. We want to make sure it doesn't have the same challenges we have with webex event center.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Aug 22 2019 4:00 pm UTC 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Aug 22 2019 5:00 pm UTC 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Aug 22 2019 5:00 pm UTC 210 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • Why IoT Security is More Important Than Ever
    Why IoT Security is More Important Than Ever
    Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla Networks Aug 22 2019 6:00 pm UTC 60 mins
    Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
    1. Defend against Cyberattacks
    2. Ensure Privacy Safeguards
    4. Minimize Reputational Risk
    5. Earn the Trust of your Customers

    Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.
  • Exploring Petabyte-scale Storage for Unstructured Data
    Exploring Petabyte-scale Storage for Unstructured Data
    Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GM Aug 27 2019 4:30 am UTC 47 mins
    Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?

    Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
  • Jak zaprojektować swój pierwszy klaster Ceph?
    Jak zaprojektować swój pierwszy klaster Ceph?
    Jarosław Biniek, SUSE; Jakub Kmiecik, Trecom Aug 27 2019 8:00 am UTC 90 mins
    Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat trzeciego spotkania to "Jak zaprojektować swój pierwszy klaster Ceph?"

    Plan warsztatów:
    - Co jest nam potrzebne do założenia Software-Defined Storage (software / hardware; minimalna konfiguracja do testów, nody zarządzające, monitorujące i storage
    - Rekomendacje odnośnie konfiguracji klastra produkcyjnego
    - Jak się zabrać do instalacji – przewodnik krok po kroku (jak założyć konto na SUSE.com, jak pobrać pliki instalacyjne, gdzie znajduje się dokumentacja i na co warto w niej zwrócić uwagę), proces instalacji - na co zwrócić uwagę, potencjalne pułapki; podstawy konfiguracji, jak odwzorować fizyczną infrastrukturę w crush map
    - Propozycje zastosowań Software-Defined Storage i pokaz używania SES w praktyce (disk-to-disk backup, obsługa obrazów wirtualnych maszyn, przestrzeń na pliki użytkowników serwerów Windows, serwowanie plików za pośrednictwem Samba).
  • PREMIER uCPE Solutions
    PREMIER uCPE Solutions
    Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVA Aug 27 2019 3:00 pm UTC 60 mins
    While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
  • 3 pitfalls to avoid with hybrid multicloud
    3 pitfalls to avoid with hybrid multicloud
    Eric Schabell, global technology evangelist director, Red Hat Aug 27 2019 4:30 pm UTC 60 mins
    The hype about cloud computing is present daily. From cloud to hybrid cloud to hybrid multicloud, businesses hear that this technology is the way to ensure their digital future. As they ponder choices about cloud environments, businesses must continue the daily work of enhancing the customer experience and improving the agile delivery of applications.

    In this webinar, we’ll use real customer experiences to highlight the top 3 lessons those customers learned as they transitioned to hybrid multicloud environments. We’ll look closely at:
    - What hybrid multicloud means for your business.
    - Decisions that affect application delivery.
    - How to deal with legacy applications, likely the most important resources to your business.
  • Recipes for Success How to Build Continuous Ingest Pipelines
    Recipes for Success How to Build Continuous Ingest Pipelines
    Arvind Prabhakar - Co-Founder and CTO - StreamSets Aug 27 2019 5:00 pm UTC 62 mins
    Modern data infrastructures are fed by vast volumes of data, streamed from an ever-changing variety of sources. Standard practice has been to store the data as ingested and force data cleaning onto each consuming application. This approach saddles data scientists and analysts with substantial work, creates delays getting to insights and makes real-time or near-time analysis practically impossible.
  • Automating security and compliance for hybrid cloud environments
    Automating security and compliance for hybrid cloud environments
    Lucy Kerner Security Global Technical Evangelist and Strategist, Red Hat Aug 27 2019 5:30 pm UTC 60 mins
    Maintaining visibility, control, and security, and ensuring governance and compliance remains paramount. But it becomes more difficult and time consuming in a hybrid infrastructure consisting of physical, virtual, cloud, and container environments. Also, it's becoming more and more challenging for security teams to examine and respond to the growing number of security alerts coming in from the increasing number of security tools in their security operations center. (This is a replay from Red Hat Summit)
  • Transforming Employee Experience with Intelligence
    Transforming Employee Experience with Intelligence
    Jane Foreman, Citrix and Laura Kaminski, Citrix Aug 27 2019 6:00 pm UTC 34 mins
    With app and data sprawl at an all-time high, the way we work has never been more convoluted. The complexity that most modern workers experience, demands advances in technology to group and filter workflows—enabling increased productivity without switching apps and devices.

    Citrix recently unveiled new Citrix Workspace intelligence features, incorporating feedback from customers, to address the core challenges in today’s evolving workspace. Watch this webinar to discover how Citrix Workspace is organizing work for employees and enhancing their productivity by:
    •Eliminating frequent switches across apps to increase focus
    •Delivering one universal search across your entire workspace
    •Prioritizing notification feeds and using machine learning to automate tasks
  • 10 important things to consider when considering a container platform
    10 important things to consider when considering a container platform
    Dan Juengst, Brian Gracely & Josh Berkus - Red Hat Aug 27 2019 6:30 pm UTC 60 mins
    Everybody’s talking containers. Everybody’s talking Kubernetes. So many options and so little time to evaluate them all. How do you select a container platform? What’s really important?

    In this session recorded at Red Hat Summit, we'll journey through the what, how, who, and why of selecting a container orchestration infrastructure. We'll start with the relationship between Linux and containers, then explore the different options available if you want to move to Kubernetes for container orchestration. Along the way, we'll debunk some myths and shine some light into the dark corners of container orchestration. You'll leave this session armed with the knowledge you need to make the right container orchestration infrastructure decision to dive into the world of cloud-native application development and accelerate innovation to better serve your customers. (This is a replay from Red Hat Summit)

    Speakers:
    Dan Juengst, Sr. Principal Product Marketing Manager - Hybrid Cloud, Red Hat
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat
    Josh Berkus, Kubernetes Community Manager, Red Hat
  • How to Modernize Your Data Protection with Flash and Cloud
    How to Modernize Your Data Protection with Flash and Cloud
    Director, Data Protection Solutions Aug 28 2019 5:00 pm UTC 25 mins
    Massive data growth, increasing application density, and compliance requirements are driving organizations to deploy more efficient data protection solutions. As a result, backup and storage admins are leveraging snapshots, in-line deduplication, and new NVMe Flash technology to drive 24x7 operations, continuous data protection, and improve RTOs and increase the RPO SLAs with an on-premises cloud.


    We invite you to join us for this webinar to learn how:
    >Modernizing your backup and recovery operations for virtual and physical infrastructure can transform your business
    >NVMe unlocks the true potential of solid-state flash technology
    >Flash and Cloud Object Storage Systems from Western Digital integrate with Veeam and Rubrik stacks to accelerate your storage and data protection services
  • 5 Foundational Elements of a Successful Enterprise Data Governance
    5 Foundational Elements of a Successful Enterprise Data Governance
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Aug 28 2019 6:00 pm UTC 41 mins
    In the webinar, “The 5 Foundational Elements of a Successful Enterprise Data Governance Program”, the Informatica Data Governance team will share how organizations can start their enterprise data governance journey.
  • Database as a Service For Your Enterprise Cloud
    Database as a Service For Your Enterprise Cloud
    Chris Paap, Solutions Marketing Manager - Nutanix Aug 29 2019 4:00 pm UTC 26 mins
    Many organizations are moving to a database as a service (DBaaS) model for managing and operating their databases because DBaaS model is efficient, agile, cost-effective and scalable. What if copying a database were as easy as the copy and paste operations on your computer? Join us to learn how Nutanix Era automates and simplifies database management, bringing one-click simplicity and invisible operations to database provisioning and lifecycle management (LCM).
  • Kick Starting Virtualization with Mettle 2vBNG
    Kick Starting Virtualization with Mettle 2vBNG
    Rajkumar Sukumaran, Head of Technology, Mettle Networks and Abraham K. Jacob, Vice President, IP Networking Products Aug 29 2019 4:00 pm UTC 60 mins
    Mettle 2vBNG: Intel based high performance virtual BNG from Mettle Networks. Mettle 2vBNG has a forwarding looking architecture with centralized control plane. This is a quick to setup, easy to integrate, micro services based design that run on Intel CPU.
    This webinar will cover the following:
    •Why Mettle 2vBNG is a good starting point towards building a virtualized infrastructure.
    •How it can coexist with legacy appliances to start with.
    •Roadmap and future position of Mettle 2vBNG in the ONF SEBA architecture.
    •How it can help moving towards a fully virtualized, cloud-native architecture.
    •Common deployment usecases will be discussed.
  • 20 Minute Introduction Composing Infrastructure for Elastic, Hadoop, Kafka
    20 Minute Introduction Composing Infrastructure for Elastic, Hadoop, Kafka
    Storage Switzerland and DriveScale Aug 29 2019 5:00 pm UTC 22 mins
    Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra to Drive Down Cloud Data Center Costs

    Hyperscale applications like Elastic, Hadoop, Kafka and Cassandra typically use a shared nothing design where each node in the compute cluster operates on its data. Hyperscale architectures, to maximize storage IO performance, keep data local to the compute node processing the job. The problem is that the organization loses the efficiency of shared storage infrastructure. As the hyperscale architecture scales, overprovisioned and underutilized compute, GPU and storage resources cost the organization money!

    Join Storage Switzerland and DriveScale for our 20 minute webinar to learn how composable infrastructure can provide both high performance and high efficiency.

    In 20 minutes learn:
    - The challenges facing hyperscale architectures
    - The true cost of underutilized compute and storage
    - Why fast Ethernet networks are good for your data
    - How a composable architecture brings scale, performance and cost efficiency to your data center
  • Connect your remote office to Azure with high performance
    Connect your remote office to Azure with high performance
    Mike Korembaum, Senior Technical Marketing Engineer Manager at CloudGenix Aug 29 2019 5:00 pm UTC 45 mins
    While accessing cloud applications from the remote office, customers face three big challenges:
    * Poor performance over the WAN
    * Ensuring security over the internet
    * Implementing regulatory compliance

    CloudGenix and Microsoft have introduced a solution for high performance delivery of Azure to remote offices by securely integrating your enterprise WAN with Azure Virtual WAN. You can use any WAN type and any Azure region globally

    Register to join us on August 29 at 10 AM PT for a 30-minute webinar to see a demo and presentation of how this solution can help address your cloud connectivity challenges.
  • Introducing the Verizon Incident Preparedness and Response Report
    Introducing the Verizon Incident Preparedness and Response Report
    John Grim, Sr. Manager, VTRAC Aug 29 2019 5:00 pm UTC 75 mins
    For 12 years, we've written the book on data breaches. Literally. Now, we've written the book on data breach response. Introducing the VIPR Report, the Verizon Incident Preparedness and Response Report. The VIPR covers a three-year review of our IR Plan assessments and data breach simulation exercises across various industries. In this session, we'll discuss the top 20 key takeaways for incident preparedness and response as it relates to the six phases of incident response:

    Phase 1 – Planning and Preparation
    Phase 2 – Detection and Validation
    Phase 3 – Containment and Eradication
    Phase 4 – Collection and Analysis
    Phase 5 – Remediation and Recovery
    Phase 6 – Assessment and Adjustment

    Speakers will include:
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
  • How Cox Automotive Democratized Data with a Self-Service Data Exchange
    How Cox Automotive Democratized Data with a Self-Service Data Exchange
    Nathan Swetye - Sr. Manager of Platform Engineering - Cox Automotive Aug 29 2019 5:00 pm UTC 62 mins
    Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.

    In this webinar, Nathan Swetye from Cox Automotive will discuss how they:

    -Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
    -Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
    -Reduced data availability from weeks to hours and developer time by 90%.
  • Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Dave Wells, Director, ​Eckerson, Vamshi Sriperumbudur, Portfolio Marketing, Informatica Aug 29 2019 6:00 pm UTC 32 mins
    Are your data warehouses ready for advanced analytics and AI projects? Legacy data warehouses are ill-equipped to handle unstructured data complexities or today’s multi-cloud environments. But that doesn’t mean data warehousing is going away. Instead, your peers and competitors are modernizing their data warehouses, which, together with data lakes, form the basis of modern data architectures.

    Join experts from Eckerson Group and Informatica for an in-depth discussion of data warehouse modernization. You’ll learn about 10 must-haves for modernization and discover why modernizing your data warehouses is a natural next step in the evolution of data management.
    Make sure you’re prepared for tomorrow’s analytics.