Hi {{ session.user.profile.firstName }}


  • This week on White Space, we look back at the news from DCD Converged conference in London. We’ve also brought back a special guest - Cole Crawford, CEO of Vapor IO and purveyor of unusual rack arrangements.

    We discuss various ways to reuse server heat and discover that Coca Cola is apparently using Internet of Things to develop new flavors of the sugary drink.

    Peter looks at the reasons behind the Telecity outage in the UK - but this outage has nothing on the recent data center fire in Azerbaijan, that left almost the entire country without access to the Internet.

    Also mentioned are the news about CA Technologies getting out of the DCIM business, the reinvention of liquid cooling company Iceotope and the fact that the US government has just discovered another 2000 data centers it didn’t know it had.
  • Did you know that 80-100% of serious security breaches involve privileged account misuse or compromise?
    This, in large part, is due to the fact that enterprises are becoming more complex with an increasing number of users and devices needing network access to privileged accounts. In many cases, advanced attackers are focused on achieving domain administrator privileges because of the unrestricted access and control these credentials have in the IT landscape.

    Join (ISC)² and CyberArk in this webinar where we’ll discuss and demonstrate:

    -vulnerabilities posed by unsecured privileged accounts
    - the state of cyber security and attacker motivations
    - lateral movement techniques - using real-world data - that enable an attacker to take over a network
    - the expanding threat landscape posed by complex IT environments
  • Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?

    This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
  • IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
  • Analysts have been advising for many years that all businesses are becoming software businesses and one of the key software platforms that organisations invest in to support this is SAP's Enterprise Solutions. With this transformation, the availability of these mission-critical enterprise services increases every day.

    During this webinar, you can learn how:

    • SAP and SUSE have collaborated for 16 years to make Linux the preferred operating system upon which SAP applications run.

    • SUSE can help you unleash the power of Open Source whilst providing the most performant and resilient platform available for your SAP applications

    • Highly-Available SAP HANA, the core of SAP's next generation business suite S4/HANA, is ONLY available on SUSE Linux

    One of SUSE’s Platinum Partners – Securelinx – who specialise in the deployment, configuration and support of Linux, are sponsoring this webinar.
  • The virtualization wave is beginning to stall as companies confront application performance problems that can no longer be addressed effectively, even in the short term, by the expensive deployment of silicon storage, brute force caching, or complex log structuring schemes. Simply put, hypervisor-based computing has hit the performance wall established decades ago when the industry shifted from multi-processor parallel computing to unicore/serial bus server computing.

    Join industry analyst Jon Toigo and DataCore in this presentation where you will learn how your business can benefit from our Adaptive Parallel I/O software by:

    - Harnessing the untapped power of today's multi-core processing systems and efficient CPU memory to create a new class of storage servers and hyper-converged systems
    - Enabling order of magnitude improvements in I/O throughput
    - Reducing the cost per I/O significantly
    - Increasing the number of virtual machines that an individual server can host without application performance slowdowns
  • Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
  • To extend Microsoft SCOM for heterogeneous environments that include Citrix, SAP, Siebel, VMware, Oracle, Sybase, DB2, Java, etc., multiple management packs are often deployed - one for each non-Microsoft platform. But the lack of integration between management packs leads to long problem identification and diagnosis cycles, resulting in poor user experience and loss in productivity.

    The eG Enterprise Microsoft SCOM Management Pack allows you to centrally monitor performance both across your entire infrastructure and deep throughout each individual tier, automatically identifying the root causes of performance issues, improving service delivery, saving time and increasing IT value.

    In this live solution tour, you will learn how to escape siloed monitoring and leverage your SCOM environment to gain real-time insight into every factor that affects your end users’ experience, across your entire infrastructure.
  • Hear about 5 key storage advancements in this webinar. You'll learn:
    --How to enable greater infrastructure agility
    --How to cut storage-related costs by 60% or more
    --How customers benefit from recent storage innovations
  • SD-WAN has captured the attention of analysts, press and enterprises worldwide. Promising unrivaled performance, flexibility, visibility and control, this market disruptor will dramatically revolutionize traditional WANs. Is this obtainable, while saving infrastructure costs of up to 90%?
    Hear from Ethan Banks, industry expert and co-founder of Packet Pushers, as he discusses why SD-WANs have moved beyond hype and are taking the industry by storm.
    On this live webinar you will learn:
    •What is an SD-WAN and its benefits
    •Key feature requirements for SD-WANs
    •How to adopt this technology without disturbing the network
    •Ways an SD-WAN can reduce or eliminate your dependency on MPLS
    •Other market observations from this leading industry expert
  • When we talk about “Storage” in the context of data centers, it can mean different things to different people. Someone who is developing applications will have a very different perspective than, say, someone who is responsible for managing that data on some form of media. Moreover, someone who is responsible for transporting data from one place to another has their own view that is related to, and yet different from, the previous two.
    Add in virtualization and layers of abstraction, from file systems to storage protocols, and things can get very confusing very quickly. Pretty soon people don’t even know the right questions to ask!
    How do applications and workloads get the information? What happens when you need more of it? Or faster access to it? Or move it far away? This webinar will take a step back and look at “storage” with a “big picture” approach, looking at the whole piece and attempt to fill in some of the blanks for you. We’ll be talking about:
    - Applications and RAM
    - Servers and Disks
    - Networks and Storage Types
    - Storage and Distances
    - Tools of the Trade/Offs
    The goal of the webinar is not to make specific recommendations, but equip the viewer with information that helps them ask the relevant questions, as well as get a keener insight to the consequences of storage choices.
  • Modern enterprise archiving is no longer about the long-term storage of data you’re required to keep and serves limited utility to the business. New cloud architectures are transforming what once was simply a means to protect corporate data to a more valuable information resource that helps address corporate compliance and litigation support needs.

    Join analysts from Blue Hill Research for this live event and learn how progressive organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. During this webinar, the panel will review real life use cases and discuss:

    • The risks of decentralized and dispersed enterprise data
    • How unifying data availability and governance is bringing increased utility to organizations
    • Key considerations for designing a modern enterprise archive strategy

    Registrants will receive a complimentary copy of the full Blue Hill Research white paper on the subject.

    David Houlihan researches enterprise risk management, compliance and policy management, and legal technology. He is an experienced advisor in legal and technology fields with a unique understanding of complex information environments and business legal needs. As an attorney, he has held roles in the United States Attorney’s Office and more.
    For more: http://bluehillresearch.com/author/david-houlihan/

    James Haight focuses on analytics and emerging enterprise technologies, including exploring the business case development and solution assessment for data warehousing, data integration, advanced analytics and business intelligence applications.
    For more: http://bluehillresearch.com/author/james-haight/
  • Join this interactive webinar to learn:

    • The enterprise app landscape – what trends are we seeing, and what changes are coming

    • Impact of the IoT and wearables on enterprise apps – what are they being used for?

    • The role of apps in the enterprise of the future, and considerations that need to be addressed in the present

    • Where to begin with enterprise apps, and how to continue to make sure they’re a success in the enterprise
  • Featuring Deepak Satya, Executive Director, Dell Services, this video provides Dell's perspective on the future of customer engagements. We believe that truly valuable customer relationships are nurtured by a mix of human and technology channels — drawing on and integrating the strengths of each. Service providers that achieve this balance will reap the rewards.
  • Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
  • Whether adopting Exchange Online, or rolling out Office 365 web or native mobile apps, many organizations are still trying to figure out a deployment and user management strategy that spans the mobile cloud. Learn how VMware Identity Manager can simply federate even the most complex Active Directory environments and then automate the provisioning and licensing of Office 365 accounts while users simply login with their existing credentials. Then learn how to integrate Office 365 for mobile platforms with AirWatch Mobile Management to secure data at rest on iOS, Android and Windows 10 devices.
  • Join this session to find out more about what's new with the Horizon portfolio of desktop and application virtualization solutions--including Horizon 6, Horizon Air and Horizon Flex and how these products tie into the software defined datacenter-understand how other customers are taking advantage of these technologies and map out a plan for when to deliver these services through a cloud provider and when to manage these on premises.
  • The retail industry is becoming more complex and changing faster than ever before. Join us as we talk about the latest industry trends and explore how retailers are adopting End User Computing solutions to revamp customer engagement, store operations, employee communication, and security.
  • The blending of our work and personal lives is a reality for many digital employees. While many organizations continue to maintain strong lines of division, other organizations are struggling to find the right balance of security and privacy. This session will review trends, myths and best practices with our own VMWare in-house privacy council for establishing and communicating Bring-Your-Own policies.