Hi [[ session.user.profile.firstName ]]

Virtualization

  • Getting More Out of vRealize Operations: Day 2/3 Operations Getting More Out of vRealize Operations: Day 2/3 Operations David Kruse, Cloud Management Specialist Systems Engineers Recorded: Dec 2 2016 82 mins
    During this session VMware Cloud Specialists will dive into Best Practices for what to do next on Day 3 in vRealize™ Operations™ 6. First we will review in this session, Day 2 Operations, the major concepts learned from Day 2, and then continue to build on, into Day 3.

    - Adding SDDC Management Packs to the environment.
    - Modeling an Application and its Tiers to be managed.
    - Review the Alerts and Systems for Container objects to insure that alerts are bubbling up correctly to Application container objects.
    - Build a Maintenance Schedule to suspend alerts from trigger for the application and its objects.
    - Create Custom Profiles to understand how many Web, Application and Database servers can fit in the Application’s Capacity Provider (Custom Datacenter)
    - Develop Supermetrics to measure KPIs of the managed Application
    - Building a Dashboard to visualize the managed application.
    - Assigning the Dashboard and its application objects to the appropriate roles.
    - A feature walkthrough how to navigate, drilldown and isolate a problem in the newly designed application.
  • Redefining Workspace Delivery with the New VMware Horizon Air Hybrid-mode Redefining Workspace Delivery with the New VMware Horizon Air Hybrid-mode Josue Fontaenez, Sr. Product Line Marketing Manager, VMware Recorded: Dec 1 2016 31 mins
    Deploying virtual desktops and apps on-premises can be costly, and the complexity often associated with desktop virtualization has caused some organizations to think twice. In this webcast, we’ll discuss the new VMware Horizon Air Hybrid-mode, which combines the economic benefits of the cloud with the simplicity of hyper-converged infrastructure. Join us and learn a new way to think about VDI.
  • How to Secure Your Critical Assets today and tomorrow How to Secure Your Critical Assets today and tomorrow Stephen Worn, CTO, DCD; Chris Hobbs, Assa Abloy; Rick Henson, Director, CyrusOne Recorded: Dec 1 2016 59 mins
    Whether you're a company looking to evaluate a data center, or a data / tech company looking to upgrade and improve their physical security, we'll discuss some of the requirements from major organizations along with important considerations for each facility layer, from ‘curb to core.
  • Preserve, Distribute and Deliver - M&E's Three Biggest Data Challenges Preserve, Distribute and Deliver - M&E's Three Biggest Data Challenges George Crump, Storage Switzerland Recorded: Dec 1 2016 63 mins
    In this webinar Storage Switzerland and Caringo, providers of cloud and object storage, will discuss why preservation, distribution and delivery is so critical for M&E IT and also why it is so challenging to deliver. More importantly, we will discuss practical solutions to these challenges so IT departments can lead their organizations to more monetization opportunities.
  • 2017 Ethernet Roadmap for Networked Storage 2017 Ethernet Roadmap for Networked Storage Brad Booth, Microsoft, Brad Smith, Mellanox, Vittal Balasubramanian, Dell, Fred Zhang, Intel, John Kim, Mellanox Recorded: Dec 1 2016 60 mins
    When the SNIA Ethernet Storage Forum (ESF) last looked at the Ethernet Roadmap for Networked Storage in 2015, we anticipated a world of rapid change. The list of advances in 2016 is nothing short of amazing:

    •New adapters, switches, and cables have been launched supporting 25, 50, and 100Gb Ethernet speeds including support from major server vendors and storage startups
    •Multiple vendors have added or updated support for RDMA over Ethernet
    •The growth of NVMe flash and release of the NVMe over Fabrics standard are driving demand for both faster speeds and lower latency in networking
    •The growth of cloud, virtualization, hyper-converged infrastructure, object storage, and containers are all increasing the popularity of Ethernet as a storage fabric

    The world of Ethernet in 2017 promises more of the same. Now we revisit the topic with a look ahead at what’s in store for Ethernet in 2017. With all the incredible advances and learning vectors, SNIA ESF is here to help you keep up. Here’s some of the things to keep track of in the upcoming year:
    •Learn what is driving the adoption of faster Ethernet speeds and new Ethernet storage models
    •Understand the different copper and optical cabling choices available at different speeds and distances
    •Debate how other connectivity options will compete against Ethernet for the new cloud and software-defined storage networks
    •And finally look ahead with us at what Ethernet is planning for new connectivity options and faster speeds such as 200 and 400 Gigabit Ethernet

    The momentum is strong with Ethernet, and we’re here to help you keep on top of the lightning-fast changes. Come join us to look at the future of Ethernet for storage and join the SNIA ESF webcast on December 1st register here.
  • Flash Forward: 3 Stages to Developing an All-Flash Hybrid Cloud Platform Flash Forward: 3 Stages to Developing an All-Flash Hybrid Cloud Platform Mark Peters, Enterprise Strategy Group, Sandeep Singh, Pure Storage and Joel McKelvey, Pure Storage Recorded: Dec 1 2016 48 mins
    Join Mark Peters, Enterprise Strategy Group Senior Analyst, as he moderates a discussion on the three stages to achieve an all-flash cloud storage platform. According to research and trends for 2017, most IT departments prioritize “cloud” as their top IT initiative. Cloud models for IT are increasingly viewed as critical to agile and high performance infrastructure. The cloud economic model is viewed as critical to meeting demanding IT challenges with limited budgets. An all-flash hybrid cloud storage platform can support the goal of becoming more cloud-like, including automated, orchestrated, self-service offerings while allowing you to maintain control of your data and infrastructure.

    Join this webinar to learn the steps needed to develop an all-flash cloud and take part in the following discussions:

    - Cloud IT has become the strategic direction for IT
    - Hybrid cloud (public + private) is the way to go
    - 3 stage journey to the cloud
  • How to Successfully Plan and Implement your Digital Transformation Journey How to Successfully Plan and Implement your Digital Transformation Journey Paulo Rosado, CEO, OutSystems & Customer Panel Recorded: Dec 1 2016 56 mins
    Digital transformation is moving at lightning speed. From a global enterprise software perspective, the use of rapid application development, continuous integration, and standards-based code and tech stacks is growing - your organization can’t afford to miss the boat.

    Join OutSystems CEO Paulo Rosado and a panel of experts as they dish out best practices for planning, launching and expanding your digital transformation journey without crashes or failures.
  • The Big Challenge of Big Data: Untangling the Security Conundrum The Big Challenge of Big Data: Untangling the Security Conundrum Alex Hanway, Marketing Manager for Encryption at Gemalto Recorded: Dec 1 2016 39 mins
    Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:

    With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?

    Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?

    Will security get in the way of the analytics tools?

    How can security apply to different data consumption technologies like Hadoop and NOSQL?

    Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
  • Understanding the Availability Features of vSAN Understanding the Availability Features of vSAN Jeff Hunter, Staff Technical Marketing Architect at VMware Recorded: Nov 30 2016 48 mins
    Application uptime and resiliency to failure are key factors with any hyper-converged infrastructure (HCI) storage solution. Before choosing a platform, it is important to understand its ability to recover from issues such as disk, host, and even entire site failures. This session will focus specifically on the availability features of VMware vSAN. It is a technical discussion that begins with a quick explanation of how vSAN stores virtual machine objects such as configuration (VMX) files and virtual disk (VMDK) files. Next, we will take a look at storage policy-based management (SPBM) as this is the primary method for configuring and managing the levels of resiliency for virtual machine objects. We will examine the differences between and requirements for RAID-1 mirroring and RAID-5/6 erasure coding rules in vSAN storage policies and how these rules affect the number and placement of objects. Next, we will provide technical details around vSAN fault domains and stretched clusters. The session will finish with some notes on vSAN data protection using VMware vSphere Replication and VMware vSphere Data Protection.
  • A Whole New World: Machine-Generated Data and Massive Scale-Out NAS A Whole New World: Machine-Generated Data and Massive Scale-Out NAS Jeff Kato, Taneja Group, Jeff Cobb, Qumulo, Nick Rathke, SCI Recorded: Nov 30 2016 60 mins
    Computer users aren’t top data producers anymore. Machines are. Raw data from sensors, labs, forensics, and exploration are surging into data centers and overwhelming traditional storage. There is a solution: High performance, massively scale-out NAS with data-aware intelligence. Join us as Jeff Cobb, VP of Product Management at Qumulo and Taneja Group Senior Analyst Jeff Kato explain Qumulo’s data-aware scale-out NAS and its seismic shift in storing and processing machine data. We will review how customers are using Qumulo Core, and Nick Rathke of the University of Utah’s Scientific Computing and Imaging (SCI) Institute will join us to share how SCI uses Qumulo to cut raw image processing from months to days.

    Presenters:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group
    Jeff Cobb, VP of Product Management, Qumulo
    Nick Rathke, Assistant Director for IT, The Scientific Computing and Imaging Institute (SCI)
  • The Bifurcation of the Flash Market The Bifurcation of the Flash Market George Crump, Storage Switzerland Recorded: Nov 30 2016 62 mins
    High Performance or Capacity - Making the Right Choice

    The flash market started out monolithically. Flash was a single media type (high performance, high endurance SLC flash). Flash systems also had a single purpose of accelerating the response time of high-end databases. But now there are several flash options. Users can choose between high performance flash or highly dense, medium performance flash systems. At the same time, high capacity hard disk drives are making a case to be the archival storage medium of choice. How does an IT professional choose?
  • Making it happen: Windows 10 accelerates digital transformation Making it happen: Windows 10 accelerates digital transformation John Cash, Practice Dir., HPE, Maribel Lopez, Principal & Founder, Lopez Research, Yolanda Landow, Alliance Dir., Microsoft Recorded: Nov 30 2016 50 mins
    Windows 10 can be central to digital transformation of your workplace by improving workforce productivity, collaboration and innovation, while at the same time ensuring security of your networks, infrastructure, data storage and archives in the cloud.

    Attend this session for expert guidance on…

    1. Transforming your workplace by improving workforce productivity, collaboration, and innovation,

    2. Securing your network, infrastructure, data storage, and archives in the cloud through Windows 10 features, and

    3. Shifting from a technology-centric to a people-centric model that puts your users first.

    Digital transformation is a journey, and like all journeys you want to have a trusted guide along the way. HPE Enterprise Services and Microsoft share a common vision for how cloud, enterprise mobility, and technology industry solutions can be applied to deliver breakthroughs for our clients.
  • SUSE Enterprise Storage 4 – Grow your technical knowledge! SUSE Enterprise Storage 4 – Grow your technical knowledge! Darren Soothill Recorded: Nov 30 2016 28 mins
    Join us for this in-depth technical session on the new release SUSE Enterprise Storage 4, in only 20 minutes!
  • Augmented Construction: How Virtual Environments are Impacting the Physical Augmented Construction: How Virtual Environments are Impacting the Physical Rob Charlton, CEO, Space Group & Adam Ward, Director, BIM Technologies Recorded: Nov 30 2016 48 mins
    In an age of perpetual advancing technology, it’s often difficult to keep up with what’s going to be the “next big thing”.

    Traditional construction methods are fast being overtaken by modern building processes, and what we’re now terming; digital construction.

    As industry innovators, we’re championing the leap from digital construction to augmented construction. There is scope for augmented reality to play a major role in helping construction teams in the field understand how various systems and components fit together during production. But more importantly, it can facilitate a route for architects to take their designs into a virtual environment before the high risk move to construction.

    The current process for a structure is that it is designed in 3D, transferred to 2D documents and then built in a virtual

    3D format. The transition from 3D to 2D and back again can often lead to errors, therefore, what if we could cut this middle step out altogether?

    Just imagine being able to put on an AR headset and see exactly which line on a 2D construction document corresponds to a given object, such as a section of pipe or cable network. Being able to bring drawings into a physical model, giving a sense of scale, proportion, form and space.

    In this webinar, we’ll take you through the following:

     What is Augmented Construction

     Technological advancements and what benefits they bring to the industry

     How to use AR effectively

     What role does data play in this?

     Example projects, who’s using this now

     The next step
  • GDPR: What Your Board Needs to Know GDPR: What Your Board Needs to Know Nigel Hawthorn, Skyhigh Networks, Anthony Lee, DMH Stallard, Dr. Adrian Davis, (ISC)2 EMEA Recorded: Nov 30 2016 63 mins
    The new GDPR regulations are going to change how enterprises behave, and it's not just a matter for IT departments. So how do you get boards to listen? How do you make marketing care? How do you get finance's attention? Who else needs to know?
    Six months after the publication of the GDPR and 20 months before it is implemented, what has been learnt and how can you take advantage of other people’s experience?
    The team will talk and address these and other questions – less a seminar and more a round table discussion; come along with your questions ready for the team.

    Join Nigel Hawthorn, Anthony Lee and Adrian Davis for a look at GDPR and leave with some answers to your questions.
  • VMware + Tanium Unveil New Endpoint Security Solution VMware + Tanium Unveil New Endpoint Security Solution Shankar Iyar, VP and General Manager Desktop Products, VMware and Kevin Chu, Vice President, Technology, Tanium Recorded: Nov 29 2016 20 mins
    IT security professionals know: Being compromised is a given. The challenge is detecting threats by continuously monitoring for patterns and behaviors that indicate malicious intent. That’s a primary reason why endpoint security and endpoint management is converging.

    Join us for a webcast on a strategic partnership between VMware and Tanium that answers this challenge with a new endpoint security and management solution called “VMware TrustPoint.”

    This joint presentation includes a discussion on current trends around the convergence of endpoint security and endpoint management, and how the integration of VMware and Tanium technology delivers powerful TrustPoint capabilities—well suited to mobile and cloud.

    Topics include:
    •Gaining rapid visibility into all information and behaviors on endpoints across global networks
    •Using natural language search for complete data on computing environments
    •Automating Windows migration for 100+ migrations from a central management console
    •Detecting hidden, unmanaged assets across large distributed global networks

    See how TrustPoint, a new integrated solution from VMware and Tanium, can help improve your security profile and better manage complex migration tasks.
  • Getting to Caprica - Making VR Really Usable Getting to Caprica - Making VR Really Usable David Burden - CEO, Daden Limited, an immersive learning and visualisation company Recorded: Nov 29 2016 44 mins
    This webinar will look at the challenges currently facing VR across a variety of "serious business" use cases from education and training to data visualisation and what the technology needs to do in order to get beyond the "wow" and move into being a productive, useful and truly in-demand technology.
  • F5 Big IP iSeries Leveraging Key Intel platforms and Technologies F5 Big IP iSeries Leveraging Key Intel platforms and Technologies Benito Lopez, Senior Manager, F5 Networks; Godfrey Tan, F5 Networks Recorded: Nov 29 2016 38 mins
    The BIG-IP iSeries (Shuttle) is one of the largest product launches for F5 Networks one the key customers for the Network Platforms Group at Intel. F5’s Big IP iSeries leverages key Intel platforms and technologies to support ever growing business models and challenges in cloud and network transformation. Come see how F5 hardware plays an important role for new application deployment architectures and why the BIG-IP iSeries with Intel inside is a pivotal enabler for enterprises and service providers as they merge their architectures with the cloud. Learn the key details of this exciting lineup to help your customers and partners understand how the BIG-IP iSeries can help them tackle the challenges of changing priorities and environments.
  • Understanding Strategies for VR/AR in Business – Methods and Cases Understanding Strategies for VR/AR in Business – Methods and Cases Prof. Mark Skilton, Warwick Business School & Strategic Leader in Digital Strategy, enzen Recorded: Nov 29 2016 49 mins
    The session will explore how this rapidly developing area of VR / AR / Mixed Reality and its position and convergence in the areas of advanced Customer Experience, Digital Asset Management and new A.I. led augmentation strategies starting to transform processes and experience.

    We introduce a novel approach to framing digital spaces and how to measure Augmented impact on performance metrics and then explore how this is further developing into A.I. Intelligent spaces and what this may mean for Business Operating Models and future work automation design in what is described as Intelligent Business Strategy.

    We include a few actual cases studies of how Cyber-physical systems driving “Digital Twins” are extending across processes and changing supply chain feedback and interaction for smart energy, smart design and new knowledge capabilities.
  • NSX Master Class: Flow Based Troubleshooting NSX Master Class: Flow Based Troubleshooting Neil Moore, Staff Systems Engineer, NSX Enterprise, VMware and Ron Fuller, Staff NSX System Engineer, VMware Recorded: Nov 29 2016 57 mins
    This session presents the virtualization visualization tool. vRealize Network Insight not only helps you find the issues on your overlay network, it can correlate when an underlay, such as a bad transceiver, is the true cause of the issue.
    Having visibility into the whole eco structure, from the virtual machine up, enables you to quickly locate and mitigate issues that may have taken you to many different tools, and may have been GONE by the time you finished looking.
    •Deep-dive into virtualization visualization with NSX
    •Three demos highlighting vRealize Network Insight
  • Hacking the Brain: Unlocking the power of NeuroVR Hacking the Brain: Unlocking the power of NeuroVR Luciana Carvalho Se, Chief Evangelist, Racefully & Founder SE3 Solutions Recorded: Nov 29 2016 48 mins
    Can immersive reality actually help us better understand each other? Understand ourselves? How does human cognitive processing change, or become enhanced, once VR and AR are added to the mix?

    What does that mean for our (future) sense of self? What is the impact of literally ‘putting oneself in somebody else’s shoes’ and what that means for human empathy?

    Exploring recent findings on the treatment of phobias, PTSD and mental health issues using VR, and theories around the virtual-physical illusion of presence, this webinar asks how neuroscience has been affected and/or advanced by the development of immersive tech.
  • New Release | SUSE Linux Enterprise 12 SP2- Grow your technical knowledge! New Release | SUSE Linux Enterprise 12 SP2- Grow your technical knowledge! Rob Knight Recorded: Nov 29 2016 28 mins
    Get some excellent technical details on SUSE Linux Enterprise 12 in only 20 minutes!
  • The Business of Virtual Reality The Business of Virtual Reality Ed Greig, Chief Disruptor, Deloitte Digital Recorded: Nov 29 2016 48 mins
    Ed Greig will be talking about how Deloitte Digital is working with clients using virtual and augmented realities today, as well as describing how these technologies are being adopted more broadly across industries.

    He will also describe how to assess and work with new technology so that your organisation can get the most out of it before your competitors do.
  • Zerto Presents - The DR Crowd - Episode 1 Zerto Presents - The DR Crowd - Episode 1 N/A Recorded: Nov 24 2016 2 mins
    In the first episode of "The DR Crowd", the IT helpdesk have hit the wall. Dealing with application performance issues and protecting the business from pesky ransomware infections has got everybody in a kafuffle. The team find out how you can't compare sloths to cheetahs and the secret to dealing with all their issues in one simple solution!
  • GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data Jason Hart, CTO, Identity and Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Nov 24 2016 63 mins
    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
  • Java App Slow? 5 Monitoring Best Practices to Deliver a Great User Experience Java App Slow? 5 Monitoring Best Practices to Deliver a Great User Experience Bala Vaidhinathan, CTO of eG Innovations Dec 6 2016 4:00 pm UTC 60 mins
    Java application slowdowns are so frequent these days that they cost businesses twice as much as actual downtime. When slowness occurs, IT managers often do not have sufficient visibility and insight to quickly determine what caused, and how to resolve, the issue. Is it due to the network, the database, application code, virtualization or storage?

    Join us for this webinar and Bala Vaidhinathan, CTO of eG Innovations, as they present a multi-dimensional approach to performance monitoring and diagnosis that is necessary for ensuring that your Java applications are performing effectively – ensuring quick resolution and a positive user experience.
  • Infrastructure & Licensing Considerations for Hyperconverged Technologies Infrastructure & Licensing Considerations for Hyperconverged Technologies Nathan Biggs; House of Brick Technologies, CEO & Sam Lucido; Dell EMC, Director of Technical Marketing Dec 6 2016 5:00 pm UTC 60 mins
    Advances in technology now have IT organizations evaluating hyper-converged solutions in lieu of building systems. Hyper-converged solutions integrate computers, networking, virtualization, flash storage, and management in one platform that accelerates deployment. In this session, we evaluate each component layer of these new hyper-converged technologies per the Oracle contract, with an eye to reducing rather than increasing database licensing quantities. Attending this session will give IT organizations a clear roadmap for managing database licensing, and offer next steps if additional resources are needed. DBAs and others attending this session will gain knowledge regarding how to apply licensing guidelines on hyper-converged platforms.
  • Silver Peak 2017 Crystal Ball Predictions Silver Peak 2017 Crystal Ball Predictions David Hughes, Founder and CEO Dec 6 2016 6:00 pm UTC 60 mins
    Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball 2017 Predictions Webinar. David will share his predictions for 2017 along with insights on emerging trends that will shape the future of the networking industry.

    Attend this webinar and learn about:
    • Emerging trends that will shift your approach to networking
    • Revolutionary technologies that will enable WANs to autonomously connect users to applications
    • How end-user requirements are shaping the way SD-WANs are delivered
    • Creating a smart 2017 WAN strategy for your organization

    Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade. Register Today!
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Haluk Ulubay, Sr. Director of Marketing, DataCore Software Dec 6 2016 7:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • The Big BI Dilemma - Bimodal Logical Data Warehouse to the Rescue! The Big BI Dilemma - Bimodal Logical Data Warehouse to the Rescue! Rick van der Lans, Independent Industry analyst, Lakshmi Randall, Head of Product Marketing for Denodo Dec 6 2016 7:00 pm UTC 60 mins
    The classic unimodal data warehouse architecture has expired because it is restricted to primarily supporting structured data but not the newer data types such as social, streaming, and IoT data. New BI architecture, such as “logical data warehouse”, is required to augment the traditional and rigid unimodal data warehouse systems with a new bimodal data warehouse architecture to support requirements that are experimental, flexible, explorative, and self-service oriented.

    Learn from the Logical Data Warehousing expert, Rick van der Lans, about how you can implement an agile data strategy using a bimodal Logical Data Warehouse architecture.
    In this webinar, you will learn:

    · Why unimodal data warehouse architectures are not suitable for newer data types
    · Why an agile data strategy is necessary to support a bimodal architecture
    · The concept of Bimodal Logical Data Warehouse architecture and why it is the future
    · How Data Virtualization enables the Bimodal Logical Data Warehouse
    · Customer case study depicting successful implementation of this architecture
  • Getting More Out of vRealize Orchestrator: Introduction to vRealize Orchestrator Getting More Out of vRealize Orchestrator: Introduction to vRealize Orchestrator David D'Entremont Cloud Management Specialist Systems Engineer, VMware Dec 6 2016 8:00 pm UTC 90 mins
    In this session, VMware Cloud Specialists will demonstrate how to quickly install and configure VMware vRealize Orchestrator, explain its basic features and capabilities, and show you how to create and run automated, configurable processes. Other topics will include:

    - Backing up the appliance
    - Managing workflows
    - Understanding policies and packages

    Join us to learn how to more effectively utilize VMware vRealize solutions to quickly get the most value from your VMware investment.
  • Silver Peak 2017 Crystal Ball Predictions (EMEA Version) Silver Peak 2017 Crystal Ball Predictions (EMEA Version) David Hughes, Founder and CEO Dec 7 2016 11:00 am UTC 60 mins
    Join David Hughes, Founder and CEO of Silver Peak, for the annual Crystal Ball 2017 Predictions Webinar. David will share his predictions for 2017 along with insights on emerging trends that will shape the future of the networking industry.

    Attend this webinar and learn about:
    • Emerging trends that will shift your approach to networking
    • Revolutionary technologies that will enable WANs to autonomously connect users to applications
    • How end-user requirements are shaping the way SD-WANs are delivered
    • Creating a smart 2017 WAN strategy for your organization

    Don’t miss this opportunity to hear from one of the leading experts in networking who has been at the forefront of the wide area network (WAN) industry for more than a decade. Register Today!
  • Containers: Best Practices and Data Management Services Containers: Best Practices and Data Management Services Keith Hudgins, Tech Alliances, Docker, Andrew Sullivan, Tech Marketing Engineer, NetApp, Alex McDonald, Chair SNIA-CSI Dec 7 2016 6:00 pm UTC 75 mins
    Now that you have become acquainted with basic container technologies and the associated storage challenges in supporting applications running within containers in production; let’s take a deeper dive into what differentiates this technology from what you are used to with virtual machines. Containers can both complement virtual machines and also replace them as they promise the ability to scale exponentially higher. They can easily be ported from one physical server to another or to one platform—such as on-premise—to another—such as public cloud providers like Amazon AWS. In this Webcast, we’ll explore “container best practices” that discuss how to address the various challenges around networking, security and logging. We’ll also look at what types of applications more easily lend themselves to a microservice architecture versus which applications may require additional investment to refactor/re-architect to take advantage of microservices.
  • BroadView Instrumentation Enabled Closed Control Loop In CORD BroadView Instrumentation Enabled Closed Control Loop In CORD Tom Tofigh, Architect, AT&T; Bhaskar Chinni, Principal PLM, Broadcom Dec 7 2016 6:30 pm UTC 60 mins
    “Central Office Re-architected as a Datacenter (CORD)” is a new design of a telco central office that replaces closed and proprietary hardware with software running on commodity servers, switches, and access devices. Analytics-CORD is an environment that provides tools for applications to program or actuate target probe primitives such as Broadcom based network switches. 

    BroadView Instrumentation is a software suite that enables advanced network analytics in a platform agnostic manner. BroadView Instrumentation provides deep observability of switches and network fabric in A-CORD environment. 

    In this webinar, we will discuss CORD architecture, A-CORD framework and how BroadView Agent integrated w/ A-CORD enables closed feedback loop in service provider networks. We will further discuss how BroadView Agent supports A-CORD use cases such as network level packet trace profile, end-to-end latency computation for real-time traffic, micro-burst detection and scalable monitoring of network fabric to prevent congestion.
  • No IT security staff? No problem. Learn how to outsource your network security No IT security staff? No problem. Learn how to outsource your network security Dan Sell Dec 7 2016 7:00 pm UTC 45 mins
    Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
    Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:

    •Meet all network security needs
    •Reduce management time
    •Eliminate upfront capital investment
    •Utilize subscription pricing for a predictable operating expense model
    •Gain valuable network reporting and expert insight
    •Have a network security professional manage it all
  • Take 20: What's New in VSAN 6.5 Take 20: What's New in VSAN 6.5 Jase McCarty, Staff Technical Marketing Architect VMware Dec 7 2016 7:00 pm UTC 30 mins
    Discover what’s new in vSAN 6.5, including iSCSI Access to support physical workloads, and the ability to connect two vSphere servers without expensive routers or switches.
  • How to Build a Hybrid Cloud with AWS and VMware vSphere How to Build a Hybrid Cloud with AWS and VMware vSphere Brian Cha, Solutions Architect, SoftNAS Dec 7 2016 8:00 pm UTC 60 mins
    Gartner predicts hybrid clouds will be the most common cloud architecture by 2020. With AWS and VMware vSphere, companies have the ability to create a hybrid cloud architecture with ease. But what is the optimal storage architecture for a hybrid cloud? What’s the best way to build it? How do you guarantee your data will be highly-available and protected?

    This webinar will answer those questions. Specifically, we will cover:

    -Hybrid cloud architecture with AWS and vSphere
    -Use Cases: backup, disaster recovery and more
    -Demo: Learn how to replicate storage across vSphere and AWS
    -Common management interface across on-premises vSphere and AWS deployments

    **The first 100 attendees to register during the live webinar will receive a FREE $100 Amazon Web Services credit!**


    Presenters:
    Brian Cha, Solutions Architect, SoftNAS
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro Dec 8 2016 3:00 am UTC 60 mins
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Malware Detection: How to Spot Infections Early with AlienVault USM Malware Detection: How to Spot Infections Early with AlienVault USM Don Shin & Brian Bledsoe Dec 8 2016 4:00 pm UTC 60 mins
    While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.
    In this demo, we'll cover:
    Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
    How new variants propagate while evading preventative security measures
    Signature versus anomaly detection (and why both are important)
    What to do when you detect malware activity on your network
    How USM can help identify malware infections so you can take action quickly
  • Hyperconverged Secondary Storage and Data Protection Hyperconverged Secondary Storage and Data Protection Gaetan Castelein, Head of Product Marketing, Cohesity. Dec 8 2016 5:00 pm UTC 45 mins
    The value of hyperconverged infrastructure is well understood for running primary workloads. Cohesity is extending the benefits of HCI with a platform designed to eliminate secondary storage silos by converging all secondary data and associated data management on one unified solution – including backups, files, objects, test/dev copies, and analytics data.

    With Cohesity, enterprises can:

    - Simplify their storage and data protection infrastructure by converging storage silos
    - Improve service levels by reducing backup RTOs and RPOs
    - Build a hybrid cloud data fabric with native cloud integration
    - Gain visibility into their dark data with in-place analytics
    - Accelerate test/dev with copy data management
    - Reduce secondary storage TCO by 80% or more

    Join us in this session to learn about the Cohesity solution and its benefits in your environment.
  • Re:Invent Re:Cap Re:Invent Re:Cap Mark Nunnikhoven, Vice President of Cloud Technology, Trend Micro Dec 8 2016 6:00 pm UTC 60 mins
    re:Invent 2016 was a whirlwind of announcements and new possibilities. AWS unleashed a torrent of new functionality across all 50+ services. Join leading cloud expert, Mark Nunnikhoven, as he reviews the highlights of the show, unearths the hidden gems, and discusses how these new features could impact your approach to security in the AWS Cloud.
  • Coalfire and vArmour: PCI Compliance with Software-Based Segmentation Coalfire and vArmour: PCI Compliance with Software-Based Segmentation David Anderson, Director of Technology Marketing at vArmour, and Chris Krueger, Principal, Cloud & Virtualization at Coalfire Dec 8 2016 6:00 pm UTC 60 mins
    Join PCI Qualified Security Assessor Coalfire and vArmour to learn how application-layer network visibility, software-based segmentation, and micro-segmentation can help organizations adhere to PCI DSS 3.2 requirements in data center and cloud environments.

    We’ll dive into:
    -vArmour Distributed Security System architecture and capabilities
    -Coalfire evaluation criteria and findings
    -PCI requirements addressable by vArmour DSS
  • How Viable is Google ColdLine Cloud Storage? How Viable is Google ColdLine Cloud Storage? Curtis Preston, Storage Switzerland Dec 8 2016 7:30 pm UTC 60 mins
    Google has recently announced expansion of their cloud storage service. It offers similar service levels as Amazon S-3 and Glacier, but with simplified pricing. How viable is their cloud storage product for the average customer? How do their service levels compare to Amazon and Azure service levels? What about pricing? Is it really that different? And what are some example use cases?

    Other questions center around applications that support these offerings. If an application supports Amazon, will it be easy for them to support Google? Is there anything about Google cloud storage that makes it easier or harder for service providers to work with them?
  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA Dec 9 2016 1:00 pm UTC 60 mins
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • AMPing Up STEM Instruction with 3D Printing AMPing Up STEM Instruction with 3D Printing THE Journal, Stratasys & GIT Dec 9 2016 7:00 pm UTC 60 mins
    Students will enter a job market that requires skills far different that those of today. Learn how schools are taking new approaches to develop critical thinking with 3D printing for future careers. Witness the connection of teacher instruction and student achievement with Jeff Rosen, Program Director for Technology and Robotics at Georgia Institute of Technology. Jeff outlines AMP (Advanced Manufacturing and Prototyping Integrated to Unlock Potential), a National Science Foundation project which includes designed courses, mini challenges and interdisciplinary course experience for grades 6 – 8. Explore the uses of 3D printers for the classroom, and get an introduction to the Stratasys uPrint 3D Printer which offers educators reliability and repeatable results for streamlined learning.
  • Using Deep Packet Inspection, Semantic Awareness to implement Zero Trust to IoT Using Deep Packet Inspection, Semantic Awareness to implement Zero Trust to IoT Alexander Müller, Product Manager DPI, Rohde & Schwarz Cybersecurity ipoque Dec 13 2016 4:00 pm UTC 60 mins
    The Internet of Things (IoT) will provide a wealth of information that will enable us to collect, understand and process data in real-time. This new form of M2M interaction will be partially enabled through SDN/NFV. Networks in Telecoms and other enterprises will now become connected to legacy hardware through IoT ready Telematics platforms. Securing this new technology is imperative in maintaining and protecting the network. In this webinar we will discuss how to make the network ready for IoT and explore the relation between IoT and SDN/NFV:
    • Introduction to IoT
    • The impact of SDN on IoT
    • Securing brownfield IoT deployments (e.g. Industrial Control Systems (ICS) & Telematics platforms)
    • Where and when protection is required in the network
    • Using DPI to understand communicated data
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Dec 13 2016 4:00 pm UTC 60 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Ed Cabrera, Chief Cybersecurity Officer, Trend Micro and Justin Giardina, CTO, iland Dec 13 2016 4:00 pm UTC 60 mins
    Ransomware has become the Number 1 threat facing organizations in 2016; and it is of particular threat to any company that relies heavily on documents to run their business. With adoption of cloud computing for more mission-critical use cases growing, IT leaders are naturally concerned about protecting against ransomware in the cloud as well as on-premise.

    Join the Chief Cybersecurity Officer of Trend Micro and the CTO of iland for this webinar where they'll delve into the significant threat that Ransomware poses to enterprise IT organisations - and discuss how to protect and remediate your business from ransomware attacks in the cloud.

    This webinar will look into how Ransomware has changed; and how it’s becoming more targeted and harder to identify. With email still being the number 1 attack vector and a reported 70% of spam now delivering Ransomware, we will look at how advanced sandboxing technology can be used to identify new and unknown threats, like Ransomware, and why you need a robust disaster recovery and back-up plan.

    What will be covered:
    · Insight into Trend Micro’s ransomware and 2017 threat predictions
    · Threat detection techniques to identify new and unknown threats
    · How Trend Micro threat intelligence is integrated in the iland cloud platform
    · How a cloud-based disaster recovery and back-up plan helps remediate ransomware attacks
  • Splunk: To Virtualize or Not to Virtualize Splunk: To Virtualize or Not to Virtualize Chris Brown, Technical Solutions Manager, Nutanix Dec 13 2016 5:00 pm UTC 60 mins
    Is your Splunk deployment or upgrade going to be hosted on bare metal, a virtualized platform, or the cloud? The cloud has often been chosen for agility and flexibility, but on-prem deployments are experiencing a resurgence. Data security concerns and the desire to bring the analysis engine as close to the data source as possible are key influencers in the on-prem trend. In these cases, bare metal deployments are commonly chosen due to cost or complexity of hypervisors, however with bare metal Splunk loses out on all the quality of life improvements users have come to expect with virtualization.

    This webinar explores the benefits of virtualizing Splunk on the Nutanix enterprise cloud platform, taking the complexity out of managing virtualized infrastructure for Splunk, allowing Splunk experts to spend more time extracting insight from data. Nutanix allows Splunk to take full advantage of server virtualization without the limitations of other solutions and combines this with the agility and flexibility of public clouds. By ensuring data is accessed locally by all Splunk indexers, Nutanix eliminates the “I/O Blender” effect that can plague conventional, bare metal infrastructure.

    Register to see how to architect the best environment for Splunk with deployments that can scale to handle increasing data ingest rates and ever-increasing expectations for high performance. Learn useful tips on how to fully leverage the Nutanix distributed storage fabric, with details on data tiering, EC-X erasure coding, disk balancing, and more. We’ll also show how Splunk on Nutanix ensures:
    • The ability to ingest GBs of data per day
    • Quick search capabilities for mission critical applications
    • Ability to support growth in data ingest rates
    • Ease of deployment and management
    • Self-contained deployments for data security and privacy