Community information
Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
  • In this webinar we'll discuss running business critical applications with Virtual SAN, VMware’s hypervisor-converged Software Defined Storage (SDS). Join Biswapati Bhattacharjee from SanDisk to learn about the following:

    1. Key features, highlights and benefits of Virtual SAN 6, VMware’s hypervisor-converged Software Defined Storage (SDS).
    2. Business benefits of running Business Critical and other Applications with Virtual SAN
    3. Virtual SAN reference architectures and solutions that can deliver very high and consistent performance for Oracle 12c and SQL Server OLTP databases
    4. An All-Flash Virtual SAN solution that can deliver over 3 Million New Orders Per Minute (NOPMs) using SQL Server
  • Join guest speaker Holger Kisker Ph.D. as he discusses what companies need today: a flexible data management architecture to cope with both traditional and emerging sources of data (in any structure), advanced data analytics to extract deeper business insights, and efficient ways to deliver these insights as information or data services for better business decisions. All embedded into an efficient data virtualization layer that makes all data available when, where, and in whatever format it is needed.
  • Einfach gesagt nutzt Social Innovation innovative Technologien und Lösungen, um übergeordnete gesellschaftliche Trends zu addressieren. Die Themen reichen hierbei von Urbanisierung, Smart & Connected Technologies bishin zu neuen Formen des Gesundheitswesens und zur Schonung natürlicher Ressourcen. HDS bietet Social Innovation Lösungen und Dienstleistungen mit dem Fokus auf dem Internet der "wichtigen" Dinge.
  • Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!

    What you'll learn:
    • How data encryption helps prevent data breaches
    • How to address PCI compliance requirements in the cloud
    • How to safeguard cardholder information that is stored in a variety of different databases and versions
    • The HOSTING and Vormetric approach to securing data in motion and at rest
  • Organisations worldwide rely on Oracle databases and applications to support their business objectives. Learn how the Hitachi Unified Compute Platform (UCP) for Oracle Database solution can help you Lower TCO and meets your Oracle Performance, Resilience and growth objectives.
  • Cyber-attacks are growing in complexity, and the rise of Advanced Persistent Threats (APTs) and insider threats has made organisations and government agencies more aware of their vulnerability. A comprehensive defense requires capabilities that go far beyond the firewall to protect against attackers that have penetrated the network perimeter. While no point security solution—technology-based or otherwise—can fully protect an organisation from cyber-attacks and APTs, today’s availability of cross-domain security solutions can help organisations protect themselves better than ever before.

    In this roundtable discussion, participants from the National Bank of Kuwait, Accenture and CA Technologies will examine the current cyber security challenges facing organisations, including in the Middle East, and debate how the need for identity-centric security is critical today.

    Tamer Gamali, President, (ISC)² Kuwait Chapter; Board Member, (ISC)² EMEA Advisory Council; CISO, National Bank of Kuwait

    Shirief Nosseir, Business Lead, Information Security for the CA Technologies business in the Eastern Europe, Middle East and Africa
    Simone Vernacchia
    IT Strategy, Infrastructure & Security Consulting & Outsourcing Director, Accenture Middle East

    (ISC)² is giving away 3 non-member passes for the ISC)² SecureDubai Conference (November 24) to delegates who view the webinar for a minimum of 45 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser:
  • In this webinar we'll discuss running business critical applications with Virtual SAN, VMware’s hypervisor-converged Software Defined Storage (SDS). Join Patric Chang, Senior Director from SanDisk and Michael Haag, Product Line Marketing Manager, VMware Storage and Availability from VMware to learn about the following:

    1. Key features, highlights and benefits of Virtual SAN 6, VMware’s hypervisor-converged Software Defined Storage (SDS).
    2. Business benefits of running Business Critical and other Applications with Virtual SAN
    3. Virtual SAN reference architectures and solutions that can deliver very high and consistent performance for Oracle 12c and SQL Server OLTP databases
    4. An All-Flash Virtual SAN solution that can deliver over 3 Million New Orders Per Minute (NOPMs) using SQL Server
  • As more organizations virtualize their mission-critical workloads, they often experience high latency and unpredictable performance. Virtualization can also complicate the storage administration process. Flash storage has the potential to address these challenges, but each vendor has its own approach. One approach may work for some but not others. Which one will work for your organization? Join Chris Tsilipounidakis as he examines the different flash-based storage architectures available today and how they may or may not meet your performance and capacity needs.
  • The "Practical Guide to Cloud Computing" whitepaper was written by the CSCC to help enterprise IT and business decision makers adopt cloud computing to solve business challenges. This webcast will help cloud customers evaluate the market from the point of view of their organization’s needs. You will learn how to select the right cloud architecture and implementation approach through the use of in-house staff, cloud vendor(s) or both.
  • Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charge for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Mobility, the Internet of Things, SaaS, IaaS and content delivery all depend on network performance. This presentation will look at the following issues:

    - How will Open-IX and the launch of European-model exchanges impact the interconnection market?
    - What are the networking and datacenter technologies that can disrupt this market?
    - What are the advantages of Direct Connect services?
  • We know that DevOps principles and patterns have been pioneered by the “unicorns,” the likes of Google, Amazon, Facebook, Netflix, Twitter and so forth, doing tens, hundreds or even thousands of deployments per day, while preserving world-class availability, reliability and security. However, unique challenges exist when DevOps transformations are undertaken in large, complex organizations.

    The unique challenges include legacy applications, lack of automated testing, tightly coupled architectures, operating in regulated industries, powerful change management approval boards, security and compliance requirements, low trust bureaucratic cultures, and so on.

    However, large, complex organizations are successfully transforming using DevOps, such as GE, Macy’s, Ticketmaster/LiveNation, Barclay’s, Nordstorm, Target, Raytheon.

    In this webinar, Damon Edwards, Gary Gruver, John Willis, and Gene Kim will share their experiences and lessons learned about the unique challenges and solutions of implementing DevOps in large, complex organizations. They will also include lessons learned from the DevOps Enterprise Summit 2014 and goals for the conference this year.

    Panelists Include:
    -- Gene Kim, CTO, Tripwire;
    -- Damon Edwards, Managing Partner, DTO Solutions, Inc;
    -- Gary Gruver, author and experience technologist in Continuous Delivery and DevOps;
    -- John Willis, author and evangelist at Docker, Inc.
  • As communications service providers begin to transition network functions to the cloud to bring new and exciting real time communications services to market quickly and more efficiently, they are looking to key vendor ecosystems to help accelerate the deployments with integrated and differentiated network functions virtualization (NFV) and software defined networking (SDN) solutions that use open approaches.

    This webinar demonstrates the power of solutions from vendor ecosystems and highlights the integration of differentiated network infrastructure products from leading vendors bringing unique, end-to-end Carrier Grade NFV solutions to market for service providers.
  • Speed. Quality. Innovation. That is what you are tasked with day in and day out... delivering superior user experiences that excite and engage your customers. But every benefit of beating your competition to market disappears if the app fails to perform in production. With development now happening in sprints, testing can no longer be sequential. Quality must be a focal point at every stage in the SDLC.

    In this session, learn how to “shift quality left” to make QA more than just a single step in the SDLC. By automating the creation of test and virtual services, and enabling access to realistic test data and scenarios early in the SDLC is key, you can drive a pervasive, continuous quality process integrated earlier throughout the development process.
  • Ensure your data protection strategy is ready for the new world order of data protection, and meets the nine Rs of backup and recovery: Rebuild, Reduce risk, Restart, Restore, Resume, Roll back, Roll forward, Run your business, and in general, Recover information. IT expert Greg Schulz explains how to make that happen in this webcast.

    Everything isn’t the same when it comes to IT data centers, applications, data, organization size and data recovery needs, but there is one constant: The need for critical application recovery. Learn about industry trends, as well as common IT organization threats, risks, challenges and requirements. In addition, Dell data protection experts Kay Benaroch and Robert Amatruda will show additional ways to ensure reliability, data recovery and overall resiliency. Join us and discover:

    •Why data recovery applies to everyday scenarios as well as headline news events
    •How your organization can’t go forward if you can’t go back in time (recovery)
    •Ways the Dell data protection toolbox adapts to your environment
    •Methods to ensure business continuity through data protection appliances
  • In today’s application economy, companies like TIAA CREF are focused on getting applications to market faster, without sacrificing quality—continuing to provide great customer experiences. This requires retooling how you deliver applications, including focusing on smaller batches of work, automating test and deployment, and reducing ‘release drama’ along the way. This session highlights how TIAA CREF was able to automate the delivery pipeline, testing and infrastructure configuration to significantly improve their application delivery process, application quality and team collaboration.
  • In the Age of the Customer, applications are the face of your business and it is more important than ever to address performance and availability issues early in the software development lifecycle - before they get a chance to impact end users. Using Application Performance Management (APM) in pre-production is a best practice for creating and delivering applications that perform well and provide a great user experience.

    In this session, Forrester Research guest speaker Milan Hanson discusses trends and directions for usage of APM in pre-production. And he relays results from the recent Forrester Consulting TEI Study for CA Application Performance Management (CA APM) illustrating the value in both pre-production and production.

    To gain a better understanding of the best practices you should consider from the following topics, Milan will dive into:
    • The importance of addressing performance issues in pre-production
    • Trends and directions for the usage of APM in pre-production
    • The value of CA APM according to the Forrester Consulting TEI Study
  • Many people working in software development spend their careers without seeing what good looks like. Our history is littered with inefficient processes creating poor quality output, too late to capitalise on the expected business value. How have we got to this state? How do we get past it? What does good really look like?
    Continuous Delivery changes the economics of software development, find out how and why.
  • DevOps methods enable teams to ship software more quickly and frequently but that advantage is negated unless the reliability and sustainability practices of operations teams are included throughout planning and execution. Too many organizations that rapidly ‘sheep dip’ development teams in Agile practices that focus at the team level ignore the implications that arise at production scale. Join this exclusive webinar with Dan North of DNA who will discuss how enterprise IT teams can enable collaboration without coercion. Attendees will learn how optimizations can be leveraged across both dev and ops teams so that the constraints that arise in stovepiped approaches are avoided.
  • IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.

    Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.

    Join us on September 28th for an informative presentation that will help you plan a strategy to protect your most critical assets.
  • As network performance becomes more business-critical, visibility and improved control over quality is vital. The network is the CSPs most important asset, but staying on top of performance is a challenge. While customers become more aware and demanding, networks become more complex and fluid. Creanord EchoVault enables unparalleled visibility to the service sold and provides the most scalable performance and SLA management solution for almost any installed equipment and a path to future SDN/NFV networks with the increased demands for timeliness and flexibility.
  • VMware Horizon View allows IT organizations to deliver virtual or hosted desktops and applications through a single platform to users. The success of these virtual desktop deployments is linked to the user experience: virtual desktops have to deliver better performance than physical desktops.

    The heterogeneous, multi-tier, inter-dependent nature of the underlying infrastructure makes performance monitoring, diagnosis and reporting a challenge. When users complain that “the virtual desktop or application is slow”, IT administrators often struggle to determine the actual cause of the problem. Is it the network, database, application, virtualization platform, connection server, storage or the virtual desktop?

    This webinar will help you learn how to unlock the benefits of desktop and application virtualization by enabling your organization to monitor, diagnose and report on the performance of your VMware Horizon View infrastructure.
  • Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news for September 2015.

    The best way to stay secure is to stay informed with Trend Micro experts
  • MIFID II requires a company to keep electronic transaction logs with greater resolution/accuracy than previously. This webinar examines how Solarflare helps fulfill these requirements with PTP, Hardware time stamping and Capture.
  • Every year, retail companies are seeing more of their revenue shift to the ecommerce part of their business during the holiday season. For 2015, revenue from ecommerce sites during the holidays is forecasted to yield over $82 Billion, an increase of 14% over 2014. With this amount of retail revenue moving to ecommerce sites, companies cannot afford to have any downtime that might deter customers from accessing their site and or having a smooth customer experience. Of all the ways an ecommerce site might be affected to upset a business during a busy revenue-generating holiday season, cyber breaches are usually not thought as one of them until it’s too late.

    Security breaches are an increasingly damaging threat within the retail and ecommerce industry and can disrupt the availability and revenue of ecommerce and retail businesses. In some cases, several of the highest–profile breaches have occurred to household names, and have resulted in millions of records being released–at the cost of tens of millions of dollars–and in at least one case, costing executives their jobs. It is of course important that all retail organizations learn lessons from these breaches so as to not duplicate errors from the past.

    In preparation for one of the biggest revenue seasons of the year for ecommerce and Retail, Tricia Pattee, Security Product Manager from HOSTING and Paul Fletcher, Security Evangelist from Alert Logic will provide insight into the latest cyber security trends related to ecommerce and retail as well as the following:
    · Examine the attack vectors and the profile of the threat actors of cyber attacks
    · Provide an understanding of the weaknesses and vulnerabilities that are affecting retail and ecommerce companies
    · Discuss defenses against the retail and ecommerce-related breaches to help detect and prevent copycat attackers
  • This webinar takes top to bottom approach on deep dive training of Data Plane Development Kit. The attendees will learn as how various Data Plane Development Kit (DPDK) components fit together in delivering final vertical applications such as a router, a security appliance, QoS and load balancer.

    Most of the customers and developers are familiar with L2fwd and L3fwd sample applications. However one of the questions that is frequently asked is regarding availability of not only 1) run to completion applications but also 2) pipeline mode applications or 3) a combination of run to completion and pipeline mode application. To clarify, the webinar will classify the key sample applications into the above three categories. We will take two key applications – 1) IP Pipeline and 2) Packet Ordering Sample application and drill down deeper as how customers can map their own application with these architectural usage models. We will do a brief code walk through of one of the application to showcase how professionally the coding is done with great commenting.

    While earlier release features were focused on CapEx improvement, such as thread pinning, only polled mode driver, the latest releases are including OpEx improvements also. The audience will learn Release 2.1 and Release 2.2 features from the point of view both CapEx and OpEx improvement.

    Data Plane Development Kit is spelled as “P-E-R-F-O-R-M-A-N-C-E”. So, any deep dive presentation is complete only with key performance optimization techniques. So, the attendees will learn top 3 key optimization techniques that they can use while integrating their applications with DPDK.
  • For years, most endpoint security strategies have revolved around endpoint anti-virus, but this approach is clearly unable to keep pace with modern threats. To mitigate their risks, IT organizations need to rethink their current endpoint security strategies and move past these reactive security technologies. In order to set organizations down the right path, we will present Forrester’s five design principles of an effective endpoint security strategy, helping security professionals to place attack surface reduction and tool integration as their central focus points within their own strategies. Ultimately, this will allow organizations to better deal with the influx of new device types and data access requirements while reducing the likelihood of data breaches.
  • In this webinar with CenturyLink, discover 5 steps to take today to move toward a secure, fast and flexible hybrid cloud environment. Best practices and use cases are discussed, along with tips and critical questions you should ask your provider before getting started. We will also offer insight around things to avoid and share common, real-world issues that IT managers face when starting their hybrid cloud journey.

    This webinar is the third in NetApp’s Hybrid Cloud Exchange Webinar series. Follow this series to discover industry-leading insights, partnerships, and resources to help you embrace the hybrid cloud on your terms.
  • In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • Na het bijwonen van dit webinar weet u hoe u een mobiele IT-omgeving kunt implementeren die door het dynamisch aanpassen van de security instellingen overal voldoet aan de geldende regelgeving. Medewerkers zijn op deze manier altijd en overal productief en in staat de juiste dienstverlening te verlenen. Zo kunnen medewerkers van een financiele instelling niet alleen op iedere werkplek binnen kantoor, maar ook bij klanten thuis volgens het beleid van hun organisatie werken. Medewerkers in een ziekenhuis zijn in staat om op hun eigen werkplek, als ook bij de patient aan het bed in hun eigen vertrouwde omgeving te werken, zonder dat de privacy van gegevens in gevaar komt. En ook thuiswerken kan op deze manier mogelijk worden gemaakt binnen ieder bedrijf dat waarde hecht aan flexibel werken voor hun medewerkers, zonder de beveiliging uit het oog te verliezen.
  • Join industry experts from SanDisk and Lenovo to learn how to stop spending money on 15k HDDs. Solid state drives used to be a premium product with a premium price, but falling costs combined with improved performance have made them accessible to virtually all types of businesses for all types of applications.The dynamics of data storage have changed, so the overall cost of solid state and flash have become a better price-performance value than spinning disk. And solid state offers big benefits in reliability and manageability, in addition to increased capacity and speed.

    This webinar will explore how to:

    • Improve TCO/TCA
    • Improve performance
    • Reduce power and cooling costs
    • Reduce rack space & cabling
    • Improve reliability
  • Much like a great UI is designed for optimal user experience, a great API is designed for optimal consumer experience. But what defines great consumer experience? And how can you deliver it consistently in every API you develop? In this session we’ll cover these topics in-depth and demonstrate best practices for developing great APIs through collaboration.

    You will learn:
    - Elements that define a great API consumer experience
    - How to consistently drive API design in every API developed
    - Best practices for API strategy
    - API design pitfalls to avoid
  • Experience is the single most important factor to achieve service excellence and is one of the major challenges faced by every network provider’s be it within the Enterprise, Campus or TSP networks today. One of the major reasons for this is static configuration and selection of end-to-end paths based on certain configured criteria, not taking into consideration, the real-time network variables.

    Software Defined Networking (SDN) and Network Function Virtualization (NFV) can boost the agility of network, service provisioning and operations. They are designed to merge the network into the age of the Cloud to become a service creation platform that empowers end users and delivers customized experiences. The industry has reached an inflection point and the status quo of the today’s networks is not sustainable. Communication Service Providers must adapt these rising phenomenon towards an open and agile infrastructure that’s simple to manage, efficient and programmable

    ‘Creating Network of Tomorrow with SDN-NFV’ session will give a quick overview on SDN and NFV technologies with a focus on how they differentiate and complement each other in various use cases. We will briefly present the capabilities that Tech Mahindra brings in this space.
  • Virtual desktops are being widely adopted as a cost-effective way of providing users access to enterprise applications. Performance of these desktops and the scalability of virtual desktop deployments are a key to the success of these IT initiatives.

    In this webinar, Jeff Stokes, Senior Content Developer, Microsoft and Bala Vaidhinathan, CTO, eG Innovations will focus on Windows virtual desktops and VDI image creation best practices that you can adopt to get the most of your virtual desktop infrastructure investments. Some topics will include:

    - Best practices for building images in persistent and non-persistent virtual desktop deployments
    - Tools for building optimized virtual desktop images
    - Optimization techniques for Windows 7, 8 and 10 workloads
    - Performance impact of changes and how to measure them at the desktop level
  • There’s little doubt that DDoS attacks continue to rise in size, frequency and complexity. It’s also true that DDoS attacks impact organizations of all types – from service providers to cloud/hosting providers to enterprises in all verticals and regions of the world. In this session, Arbor’s Carlos Morales, VP of Sales Engineering, along with a panel of Arbor Service Provider and Enterprise customers, will discuss their experiences with DDoS attacks and best practices for DDoS attack defense.
    The panel will discuss:
    -Their DDoS attacks trends and top challenges.
    -Their recommended best practices in DDoS defense.
    -The importance of threat intelligence.
    -The future of DDoS and role of Arbor products and services.

    Steve Bendall
    Head of Network Security DDoS
    BT Security

    Roman Lara
    Network Engineer II

    Alexander Miranda
    Director of Security

    J. Marc Hopkins
    Network Services Manager
    SouthWest Ohio Computer Association
  • Learn how professional run management and cloud-delivered services for SAP increase the value you deliver to your business and how these services reduce your exposure to risk and lower costs. Hear our customers tell their SAP story, and how our unique delivery model has maximized these benefits for them, and earned us the highest customer satisfaction results. Join us to discover how you can:
    •Reduce exposure to business risk from disruptions to your SAP environment.
    •Accelerate your SAP migration, upgrade or expansion projects, such as migrating to the SAP HANA platform.
    •Increase the service levels you deliver to the business, while reducing capital expenditure.
  • Recognizing the growing complexity of stopping DDoS attacks and the diversity of customer requirements, Arbor is announcing an expanded portfolio of DDoS protection products and services that will meet the deployment, scale and cost requirements of any organization- from the largest Service Provider to smallest Enterprise. In this session, join Arbor’s Scott Iekel-Johnson, Senior DDoS Solutions Product Manager, for a detailed review of Arbor's new portfolio of DDoS protection products and services which include: new 2U appliances providing up to 160 Gbps of mitigation capacity, new virtual DDoS mitigation solutions, and new in-cloud and on-premises managed DDoS protection services.
  • The 2015 Alert Logic Cloud Security Report (CSR) has been released! This year’s CSR provides new insights that can prove valuable to organizations who are in the process of building out their security framework. Join Johan Hybinette, HOSTING CISO, and Stephen Coty, Chief Security Evangelist at Alert Logic, for a discussion on the latest industry research findings, trends and best practices on protecting your organization’s IT infrastructure. We’ll discuss these three trends and their impact on the industry:

    •Cloud adoption remains strong as cloud attacks grow.
    •Industries and customers drive threat profile.
    •Examining the kill chain construct drives understanding
  • In the past months, a cascade of significant data breaches have occurred resulting in the loss of millions of customer records, intellectual property and financial data.  These losses are usually the result of a targeted attack (sometimes known as an APT) and over the past few years many vendors have addressed this problem through Breach Detection Systems.  Not all solutions to these advanced threats are equal however, but benchmarking their effectiveness can be difficult.  NSS Labs recently put top breach detection systems through a grueling series of real-world tests and evaluated their ability to detect targeted attacks and deliver an effective return on investment.  This webinar will discuss the various approaches vendors take to addressing targeted attacks, and how they performed in the 2015 Breach Detection System tests.
  • Oggi le aziende si trovano ad affrontare un processo di “Digital Transformation” che richiede una evoluzione dell'approccio classico alla gestione del ciclo di vita del software.
    L’”Application Economy” instaura un collegamento diretto tra l’IT di un’azienda ed il cliente finale: è per questo che le organizzazioni devono dotarsi degli strumenti e delle metodologie adatte a rispondere reattivamente e rapidamente agli input provenienti dal mondo esterno.
    La metodologie DevOps hanno esattamente questo obiettivo: creare un processo di “Continuous Delivery” allo scopo di aumentare il numero di release, garantendo la massima qualità del software, ottimizzando i costi e riducendo il “time to market”
  • Employees are increasingly working out of the office. More and more of them are using mobile devices and logging in to cloud applications to perform business tasks. All this is creating a shift in habits termed ‘Enterprise Mobility’. Industry advancements in authentication and access management present new opportunities for organisations to increase their mobility posture.
    Join (ISC)² and Gemalto in this webinar to find out how you can take advantage of a few guidelines to provide your employees with convenient, secure and compliant mobility.
  • The webinar shows how companies can increase efficiency through running SAP HANA in a Cloud without a heavy capital investment. In this context Dell experts explain the Dell SAP HANA cloud approach utilizing Dell’s multiple cloud and services options. Highlighted will be project milestones and customer benefits of a SAP HANA deployment and management with the help of a global IT partner delivering integrated end-to-end solutions.
  • Energy costs rising, manpower resources falling – managing a data center is getting more stressful by the day. One cold night could be all it takes to tip your power supply over the edge. And let's not forget the never-ending demands from IT for additional space.

    More information on its own is not the answer. Join Rittal's webinar to understand how to:

    • Lower your power consumption and OPEX charges, with 'smart' power distribution
    • Identify issues before they become problems, with intelligent PDUs' monitoring capabilities
    • Expand your DC as your business grows, with modular PDUs
    • Profile your power requirements to help you plan and make better-informed decisions


    Note: All attendees will receive a free copy of the latest White Paper from Rittal.
  • In the past months, a cascade of significant data breaches have occurred resulting in the loss of millions of customer records, intellectual property and financial data.  These losses are usually the result of a targeted attack (sometimes known as an APT) and over the past few years many vendors have addressed this problem through Breach Detection Systems.  Not all solutions to these advanced threats are equal however, but benchmarking their effectiveness can be difficult.  NSS Labs recently put top breach detection systems through a grueling series of real-world tests and evaluated their ability to detect targeted attacks and deliver an effective return on investment.  This webinar will discuss the various approaches vendors take to addressing targeted attacks, and how they performed in the 2015 Breach Detection System tests.
  • Think all underlying hardware that enables Cloud Service Provider offerings is the same? It’s not. In fact, for Cloud Service Providers that offer B2B and consumer cloud services, underlying flash storage options drive data center architectures decisions for performance, scalability and reliability. This webinar will address the varying types of flash storage for B2B IaaS, SaaS, and PaaS…XaaS, as well as consumer-oriented services like video streaming, content repositories, and e-commerce.
  • How long can you afford to be without data?

    45% of businesses surveyed said that they had experienced a data loss in 2014. Downtime can come from any direction, in any form, at any time. Astonishingly, three-quarters of IT professionals say that they have never calculated the hourly cost of downtime.

    Join David Beeler as he explores how you can reduce the impact of downtime on your business to near zero, whilst making it easier for you to manage your systems.