Hi [[ session.user.profile.firstName ]]

Virtualization

  • Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Marcel Scherer, Lenovo und Carsten Duch, SUSE Recorded: Oct 18 2019 46 mins
    SAP Data Hub hat die Aufgabe, die heute vorherrschenden heterogenen Datenquellen, seien sie in der Cloud oder im eigenen Rechenzentrum, zentral und ohne vorherige Konsolidierung zugänglich und vor allem auswertbar zu machen. Die zugrundeliegende Softwarearchitektur basiert auf Containern und setzt eine Kubernetes-Implementierung voraus.
    Eine Möglichkeit, SAP Data Hub auf Enterpriseebene zu betreiben, ist die SUSE Container as a Service (CaaS) Platform. Um den Kunden bei der Planung der durchaus komplexen Applikationsumgebung bestmöglich zu unterstützen, haben Lenovo und SUSE eine gemeinsame Referenzarchitektur entwickelt. Ziel ist es, das Thema Infrastruktur für den Kunden schnell abzuhaken und sich auf die Anwendung zu konzentrieren.
    Erfahren Sie in diesem Webinar mehr über den Aufbau von SUSE CaaS Platform, Grundlagen von SAP Data Hub und wie eine skalierbare Hardwareplattform basierend auf Lenovo ThinkSystem-Servern aussehen könnte.
  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Recorded: Oct 16 2019 45 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB
  • Boost Developer Productivity with SUSE Cloud Application Platform
    Boost Developer Productivity with SUSE Cloud Application Platform
    Brent Smithurst, Product Marketing Manager, SUSE Recorded: Oct 17 2019 48 mins
    SUSE Cloud Application Platform is a modern application delivery platform that brings an advanced cloud native developer experience to Kubernetes. Developers can serve themselves and get apps to the cloud in minutes instead of weeks. SUSE Cloud Application platform eliminates manual IT configuration and helps accelerate innovation by getting applications to market faster. Streamlining application delivery opens a clear path to increased business agility, led by enterprise development, operations, and DevOps teams.

    Join us in this webinar for an overview of SUSE Cloud Application Platform. We’ll discuss and demonstrate how the platform builds on Kubernetes to add easy one step deployment of cloud native applications from the CLI, UI, or Helm Chart Repository using a variety of languages, frameworks, and services most appropriate for the task. Other topics will include installation options on a variety of Kubernetes services, application autoscaling, logging, metrics, and much more. SUSE Cloud Application Platform is 100% open source technology – learn how to get started with it today!
  • Geek's guide to the workspace (part 4): first you get content, then the apps
    Geek's guide to the workspace (part 4): first you get content, then the apps
    Brian Jozefat, Crystal Ricevuto Recorded: Oct 17 2019 30 mins
    Users create an ever-increasing number of documents, presentations, drawings and other content that are stored in files. There is also no shortage of locations to store those files. Making sure that your users have seamless access to all those files, in any repository, is key to providing a productive user experience. In this session, we will demonstrate how Citrix Workspace provides access to all those repositories, including the native Citrix Content Collaboration repository, existing repositories on-premises and in the cloud, and repositories inside Workspace apps to those integrated into Explorer and Finder, all with a seamless experience.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • SMBs Market Overview and Technology Buying Trends (EMEA)
    SMBs Market Overview and Technology Buying Trends (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Recorded: Oct 15 2019 40 mins
    ** This is an EMEA focused webinar **

    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • Introducing Desktop as a Service for Any Cloud
    Introducing Desktop as a Service for Any Cloud
    Kong Yang, Senior Product management & Ruben Spruijt, Senior Product Engineer, Nutanix Recorded: Oct 15 2019 39 mins
    Desktop as a Service (DaaS) is a powerful way to leverage the cloud for end user computing with unmatched flexibility, manageability, and performance. Nutanix Frame is a DaaS solution that runs on multiple clouds and provides simple yet very powerful access to Windows applications through a browser.
    In this webcast, learn how high-end graphics tools, resource demanding software, and classic office productivity apps run and scale easily with Nutanix Frame.

    During this webcast, you will learn:
    o How you can run any Windows software in a browser
    o How to setup and manage DaaS with a breeze
    o How Nutanix Frame integrates with cloud storage, identity, and networking like no one else can
  • Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Jaap Van Kleef, EMEA Technical Manager Recorded: Oct 17 2019 49 mins
    Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.

    Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • Geek's guide to the workspace (part 3): protecting your SaaS
    Geek's guide to the workspace (part 3): protecting your SaaS
    Matthew Brooks, Vijaya Raghavan Krishnan Recorded: Oct 10 2019 43 mins
    SaaS apps are great. They are extremely easy to buy, easy to deploy and easy to access. Regardless of the user's endpoint and location, they can access the app without relying on IT to deploy complex VPNs. Unfortunately, each SaaS app introduces a new identity for the user to remember. User accounts can be easily compromised with a weak password, resulting in stolen data. We have no easy way to disable access to SaaS apps when users leave the company. This session will demonstrate how to incorporate single sign-on, enhanced security, and website filtering for SaaS and web apps into the Citrix Workspace experience.
  • Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Kurt Lender, Intel and Casey Morrison, Astera Labs Recorded: Oct 9 2019 60 mins
    As PCI Express® (PCIe®) specifications continue to double the transfer rates of previous generations, the technology can address a variety of needs for data-demanding applications. However, along with the progression of PCIe specifications, challenges like signal integrity and channel insertion loss arise as well. Retimers are mixed signal analog/digital devices that are protocol-aware and have the ability to fully recover data, extract the embedded clock and retransmit a fresh copy of the data using a clean clock. These devices are fully defined in the PCI Express base specification, including compliance testing, and are used to combat issues that PCI Express faces.

    In this PCI-SIG® hosted webinar, Kurt Lender of Intel and Casey Morrison of Astera Labs will offer solutions to conquer signal integrity and channel insertion loss challenges, explain the diagnostic capabilities of retimer technology and more.

    About the Presenters
    Kurt Lender is an Ecosystem Enabling Manager for Intel Corporation and a Marketing Workgroup Chair at PCI-SIG
    Casey Morrison is the head of Systems and Applications at Astera Labs and a PCI-SIG member
  • Implementing and Leveraging Multi-cloud and Second Generation Cloud Strategies
    Implementing and Leveraging Multi-cloud and Second Generation Cloud Strategies
    Storage Switzerland, Wasabi Recorded: Oct 8 2019 19 mins
    Many businesses are eager to initiate a cloud migration strategy and take advantage of the economic benefits that clouds offer. However, concerns regarding vendor lock-in, proprietary technology, and hidden costs have served as a deterrent for a large number of IT managers. The answer for a growing number of businesses is a multi-cloud strategy where they can create a cloud solution that is tailored to their specific needs. Giving enterprises the ability to choose the computer, storage, and SaaS services that best fits their business requirements and budget puts them in the driver's seat and gives them full control.

    Join Storage Switzerland and Wasabi where we will discuss the challenges with the soup-to-nuts clouds and how a best-of-breed multi-cloud solution is a better strategy for most organizations.

    Register Today - All registrants receive a copy of Storage Switzerland’s latest eBook “What is a Second-Generation Cloud Strategy?”
  • Understanding Storage Security and Threats
    Understanding Storage Security and Threats
    Pierre Mouallem, Lenovo; John Kim, Mellanox; J Metz, Cisco; Steve Vanderlinden, Lenovo Recorded: Oct 8 2019 51 mins
    What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:

    •Protecting the data (Keeping “the bad” out)
    •Threat landscape, Bad actors/hackers
    •Attack vectors, attack surfaces, vulnerabilities
    •Physical security issues
    •Layers of protection (encryption – last line of defense)
    •Remediation after a breach/incident
  • Evolving Data Protection to a Hybrid Cloud Model
    Evolving Data Protection to a Hybrid Cloud Model
    Jason Walker, Technology Evangelist, Pure Storage Recorded: Oct 8 2019 34 mins
    Modernize your current legacy protection for rapid recovery and data reuse, seamlessly between private and public clouds for your customers.

    Learn how to benefit from the economies of cloud by leveraging AWS as the destination archive tier, all while maintaining that single namespace and global deduplication pool.

    Key technical lessons:

    - Modernize your legacy protection without the pain of a forklift solution

    - Meet the emerging expectations of data availability and reusability by taking advantage of the cloud as an archive tier

    - Move away from the cold, static tape tier to the more reliable, durable cloud tier
  • Cybersecurity: Malware Mayhem (EMEA)
    Cybersecurity: Malware Mayhem (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Oct 8 2019 60 mins
    ** This is an EMEA focused webinar **

    One thing is certain: the threats facing small and medium-sized businesses keep changing.

    This webinar looks at the threats Webroot, our MSP partners, and SMB clients are experiencing and the impact to their business. The aim of this webinar is to provide threat information you can easily share with your business colleagues or managed service clients to reassure them you have the knowledge and the tools to look after their endpoints.
  • Geek's guide to the workspace (part 2): beyond Pa$$w0rds for workspace authentic
    Geek's guide to the workspace (part 2): beyond Pa$$w0rds for workspace authentic
    Daniel Feller, Martin Zugec Recorded: Oct 8 2019 43 mins
    One hundred and seventy-seven and counting. That is how many different identities I have. Each identity has a password. Are they secure passwords? Probably not. Passwords, by nature, are insecure. Securing authentication is not easy because there are so many approaches available. In this session, we will look into many of these options, understand how they work and how they differ, and see how we can incorporate them into our primary Citrix Workspace identity.
  • Industry Insights: How to Launch a Privileged Access Security Program
    Industry Insights: How to Launch a Privileged Access Security Program
    Maria Oliva, Director of Consulting Services EMEA, CyberArk, Brandon Dunlap, Moderator, (ISC)² Recorded: Oct 8 2019 56 mins
    Industry analysts and security leaders agree – organisations should prioritise privileged access security programs to maximize risk reduction with respect to the resources required for deployment. “Privileged Access” is what attackers seek, and this access is increasingly available in places organizations overlook including applications.
    Join us for a session that will cover the basics of privilege access security. We’ll address how to define a program with respect to people, process and technology. We’ll also review some lessons learned from the field that will facilitate a successful launch.
  • How to Secure Your Enterprise Application Security & Visibility
    How to Secure Your Enterprise Application Security & Visibility
    Mike Wronski, Technical Director Product Marketing & Jason Burns, Principle Engineering, Networking Nutanix Recorded: Oct 8 2019 54 mins
    Security threats have become more sophisticated and new application and cloud deployment models add to existing complexity. As a result, more than 3/4 of organizations are victims of successful cyber attacks - don't become the next victim! Join this session to learn common use cases and best practices for implementing VM microsegmentation to secure applications. Join us to cover product features, design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
    Join this webcast to learn:
    •Where and how Flow provides needed application security
    •How to enable Flow and start adding security in minutes
    •How policy creation and management is made easier through visualization
    •How to quickly create virtual segmented networks (e.g. DMZ or Development and Production)
    •Methods to segment applications to help prevent malware spread or data breaches
  • 9 Modern Data Warehousing Architecture Patterns and Use Cases
    9 Modern Data Warehousing Architecture Patterns and Use Cases
    Dave Wells, Director, Eckerson Vamshi Sriperumbudur, Portfolio Marketing, Informatica Recorded: Oct 3 2019 43 mins
    For successful analytics & AI initiatives, your cloud data warehouses and cloud data lakes must work together in a cohesive data management architecture. There is no one-size-fits-all solution for data management architecture. Every data warehouse is unique; thus, every modernization plan is unique. There are, however, several architectural patterns for modernization that help to shift from data warehouse and data lake silos to cohesion and compatibility between data lakes and data warehouses.

    Use these patterns individually, in combination, or as mix-and-match for multiple warehouses to develop a modernization plan and drive your analytics and AI projects:
    • Data Warehousing Outside the Data Lake
    • Data Warehousing Inside the Data Lake
    • Data Warehousing in Front of the Data Lake
    • Data Warehousing Inside & Outside the Data Lake
  • Critical NFVI Performance - KPIs to Validate
    Critical NFVI Performance - KPIs to Validate
    Thomas Lindquist CTO of VoerEir Recorded: Oct 3 2019 54 mins
    VoerEir focus on helping operators be successful with their NFV transformation. A cornerstone in our strategy is our list of NFVI performance-KPIs, which determine the performance of VNFs deployed on top of a specific NFVI. There are two prime use cases of these KPIs; First, for a VNF vendor to be able to commit to a performance SLA, the vendor must know the characteristics of the infrastructure on which his VNF shall be deployed. Second, if a VNF does not fulfill his performance SLAs, the operator must be able to sort out where the responsibility lays, on the VNF or the NFVI vendor. The tricky part is to find the KPIs which are essential for different types of VNFs' performance. This webinar describes VoerEir’s way of reasoning when creating the list of performance-KPIs and gives examples of detailed definitions for different kinds of KPIs. It also talks about how VoerEir is working with this in industry forums, and how our test system Touchstone can is used to perform VoerEir’s NFVI evaluation service.
  • How to Improve your Disaster Recovery in Leaps and Bounds
    How to Improve your Disaster Recovery in Leaps and Bounds
    Manjul Sahay, Director of Product Management Nutanix Oct 22 2019 5:00 am UTC 37 mins
    In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
  • Desktops as a service with Citrix
    Desktops as a service with Citrix
    Kireeti Valicherla, Paul Carley Oct 22 2019 9:00 am UTC 45 mins
    Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 22 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    Robin Gareiss, President and Founder, Nemertes Research Oct 22 2019 3:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • What Software Defined Storage Means for Storage Networking
    What Software Defined Storage Means for Storage Networking
    Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox Oct 22 2019 5:00 pm UTC 75 mins
    Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?

    Watch this SNIA webcast to learn:
    •How software-defined storage differs from integrated storage appliances
    •Whether SDS supports block, file, object, or all three types of storage access
    •Potential issues or pitfalls with deploying SDS
    •How SDS affects storage networking
    •Scale-up vs. scale-out vs. hyperconverged vs. cloud
  • Multi-Cloud Data Integration with Data Virtualization (APAC)
    Multi-Cloud Data Integration with Data Virtualization (APAC)
    Paul Moxon, VP Data Architecture and Chief Evangelist Oct 23 2019 1:30 am UTC 53 mins
    'By 2020, over 90% of Enterprises Will Use Multiple Cloud Services and Platforms' IDC FutureScape: Worldwide Cloud 2018 Predictions

    More and more organization are adopting multi-Cloud strategies to provide greater flexibility, cost savings, and performance optimization. Even when organizations commit to a single Cloud provider, they often have data and applications spread across different Cloud regions to support different business units or geographies. The result of this is a high distributed infrastructure that makes finding and accessing the data needed for reporting and analytics even more challenging.

    Data Virtualization provides a data discovery and access layer that allows data users across the organization access the data that they need for their work - irrespective of whether the data is in a data center or in the Cloud - any Cloud! The Denodo Platform Multi-Location Architecture provides quick and easy managed access to data while still providing local control to the 'data owners' and complying with local privacy and data protection regulations (think GDPR and CCPA!).

    In this webinar, you will learn about:
    - The challenges facing organizations as the adopt multi-Cloud data strategies
    - How the Denodo Platform provides a managed data access layer across the organization
    - The different multi-location architectures that can maximize local control over data while still making it readily available
    - How organizations have benefited from using the Denodo Platform as a multi-Cloud data access layer
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Avoid performance stress when using hybrid cloud workloads
    Avoid performance stress when using hybrid cloud workloads
    Thomas Poppelgaard, Christiaan Brinkhoff Oct 24 2019 2:00 pm UTC 44 mins
    Performance is always key for the end user, whether it’s on-premises, hybrid, or public cloud workloads. If your environment faces performance issues, you’ll be pleasantly surprised by the same performance when you move to the cloud. What is the most cost-effective sizing for your virtual machines to get the best performance? Are GPU workloads still relevant? What about WAN optimizers for cloud workloads, such as the HDX Enlightened Data Transport (EDT) protocol and Citrix SD-WAN? During this session, Citrix Technology Professionals (CTPs) will walk you through best practices gathered while deploying workloads on several clouds in addition to Citrix Cloud. Join this session to learn the fundamentals, gain insights into Citrix Virtual Apps and Desktop workloads, and ultimately get prepared to work on your first or second date towards Citrix Cloud services.
  • SUSE & Fujitsu: Enterprise Hyperscale-Storage mit der Freiheit von Open Source
    SUSE & Fujitsu: Enterprise Hyperscale-Storage mit der Freiheit von Open Source
    Thomas Grätz, SUSE und Sepp Stieger, Fujitsu Oct 25 2019 8:00 am UTC 60 mins
    FUJITSU ETERNUS CD10000 Reference Architecture ist ein softwaredefiniertes Hyperscale-Storage-System, das für die Bewältigung geringer als auch riesiger Datenmengen konzipiert wurde. Eine zunächst für einfache Anforderungen ausgelegte Konfiguration kann jederzeit gemäß dem geschäftlichen Wachstum und individuellen Bedürfnissen ausgebaut werden. Somit bietet sich die Möglichkeit, Komponenten problemlos im System hinzuzufügen, auszutauschen oder aufzurüsten - ohne Stillstandzeiten.

    Das System auf Basis von SUSE Enterprise Storage bietet eine überzeugende Wirtschaftlichkeit und Skalierbarkeit für Unternehmen, die wachsende Datenmengen verwalten müssen.
    Erfahren Sie, wie auch Sie von offenen Standards profitieren – ganz ohne Implementierungs- und Betriebsrisiken. Melden Sie sich jetzt an!
  • Financial services cloud adoption and the practicalities of cloud governance
    Financial services cloud adoption and the practicalities of cloud governance
    Kevin Lash, Head of Global Financial Services Strategy & Solutions, & Sahil Bansal, Product Marketing Manager, Nutanix Oct 29 2019 5:00 am UTC 49 mins
    What cloud platforms are financial institutions adopting, and how does that compare to other industries? To answer that question, VansonBourne interviewed 2,300 IT decision makers globally to identify their challenges, usage patterns, and cloud initiatives. The survey found that Financial services organizations (91%) believe hybrid cloud is the ideal IT model.
    In this on-demand webinar we:
    •detail the benchmark findings from the report as a point of comparison for your organization
    •discuss how financial services digital disruption is accelerating hybrid cloud adoption
    •demonstrate how to automate security compliance and cost optimization as a practical example of hybrid cloud technologies in action
  • Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Kamakshi Sridhar, PhD & Ncolas St-Pierre from Sandvine Oct 29 2019 3:00 pm UTC 60 mins
    Learn how Sandvine leverages network policy automation and machine learning to enhance subscriber QoE (Quality of Experience) via dynamic bandwidth allocation across service categories, in near-real time, by analyzing operator-expressed ‘intent’.
  • Transform Healthcare IT with Enterprise Cloud
    Transform Healthcare IT with Enterprise Cloud
    Tapan Mehta, Head of Healthcare & Lifesciences Solutions, Nutanix & Jim Dirkes, S, Systems Engineer, Carolina Medical Systems Oct 31 2019 5:00 am UTC 51 mins
    The healthcare industry is under pressure to transform IT operations in the face of new technologies and increased regulation. As healthcare organizations work hard to simplify operations and add new applications and services, legacy IT infrastructure is no longer able to meet their needs. Join us on this webinar to learn how Medical University of South Carolina (MUSC) is using Nutanix hyperconverged infrastructure (HCI) solutions to elevate IT to focus on the applications and services that power healthcare.

    In this session you’ll learn how to:
    •Meet the needs of the diverse and growing set of healthcare applications (e.g. Epic EHR, VDI)
    •Reduce IT costs and eliminate infrastructure complexity
    •Increase application performance, availability and security
    •Simplify IT operations and management
  • Kubernetes for the Agile Enterprise with SUSE CaaS Platform 4
    Kubernetes for the Agile Enterprise with SUSE CaaS Platform 4
    Chris Lentricchia, Product Marketing Manager, SUSE Oct 31 2019 3:00 pm UTC 60 mins
    Containers are likely a part of you Digital Transformation strategy to increase agility, but how do you implement them at scale? Kubernetes offers terrific value, but it's a complex technology that might leave you wondering where to start.

    SUSE CaaS Platform is a Kubernetes-based container management solution used by application development and DevOps teams to more easily and efficiently deploy and manage containerized applications and services. Enterprises use SUSE CaaS Platform to reduce application delivery cycle times and improve business agility. Focused on providing an exceptional platform operator experience, SUSE CaaS Platform delivers Kubernetes innovations in a complete, enterprise grade solution that enables IT to deliver the power of Kubernetes to users more quickly, consistently, and cost-effectively.

    Join us for this business level webinar to learn more about harnessing the power of Kubernetes with SUSE CaaS Platform, including key benefits along with what's new in our latest release, SUSE CaaS Platform 4.
  • Understanding Fibre Channel Scaling
    Understanding Fibre Channel Scaling
    Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco Nov 6 2019 6:00 pm UTC 75 mins
    One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?

    We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.

    In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:

    •What a deterministic storage network is
    •Fabric management principles
    •Negotiated credit transfers (buffer-to-buffer credits)
    •Network Engineering/Design Principles
    •Oversubscription and Fan-In Ratios
    •Topologies that help scale
    •Domains and Fabric limits
    •Consistency of performance at scale

    Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.

    Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
  • Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Nov 11 2019 11:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    This webinar will provide expert insights on the latest cybercriminal activity, highlighting the year's most innovative, dangerous, and pervasive instances of malware.

    Specifically, we will be covering the developments including information theft, Emotet, BEC scams, ransomware, targeted attacks, and more. Come learn about these developments and strategies to help secure your organisation from ransomware and next-generation cyberthreats.
  • 4G and 5G virtual RAN, from LAN to WAN
    4G and 5G virtual RAN, from LAN to WAN
    Eran Bello, GM at ASOCS Inc. Nov 19 2019 4:00 pm UTC 60 mins
    In this webinar ASOCS will present the benefits of full RAN virtualization in both 4G and 5G networks. Leveraging modern open interfaces such as the ORAN Ethernet Fronthaul and open management interfaces will allow network orchestration and automation for use cases spanning from local area network (LAN) to wide area network (WAN).
  • 2019 Cybersecurity Trends (EMEA)
    2019 Cybersecurity Trends (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Nov 19 2019 4:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    As we near the end of 2019, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2020 Webroot Threat Report, so don’t miss it.

    We will update the key topics to be discussed closer to the date.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Adam Harrison, Cryptocurrency Nov 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Adam Harrison, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Cryptocurrency

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Prepare Your Business for the Workplace of 2025: Top Trends Impacting LATAM
    Prepare Your Business for the Workplace of 2025: Top Trends Impacting LATAM
    Sebastian Menutti Industry Principal, Connected Work, Frost & Sullivan Nov 20 2019 4:00 pm UTC 60 mins
    How will you leverage the emerging growth opportunities generated by the immense change that workplaces are experiencing in Latin America? How do you remain a relevant market participant once your current workplace has become obsolete?

    Key Takeaways:

    • Discover how new styles, workers, and technologies will completely reshape where, when, and how people work. And what can your company do to stay ahead of the curve?
    • Find out about the substantial growth opportunities for companies and technology vendors.
    • Explore how collaborative solutions can spur your employee productivity and business agility.
  • MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Dec 9 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • 2019 Threat Landscape Roundup (EMEA)
    2019 Threat Landscape Roundup (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Dec 16 2019 11:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    SMBs are major targets for cybercriminals. To stay safe, today’s businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced during 2019, see what's upcoming in 2020, and get tips to help you to keep your business and clients safe.

    A Webroot threat expert will be discussing information theft, information stealers, BEC scams, ransomware, targeted attacks, and all the cybercrime headlines of 2019.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Eric K. Gentry, Principal Consultant, PS Advisory Services Dec 18 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Eric K. Gentry, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!